NoMachine Enterprise Cloud Server Cluster

NoMachine S.a.r.l. · NoMachine.NoMachine.EnterpriseCloudServerCluster

A powerful, resilient gateway to your entire desktop and server infrastructure with integrated high-availability and load-balancing capabilities providing automatic failover in the case of a server outage.

Enterprise Cloud Server Cluster sits at the top of the NoMachine server stack, enabling organizations to converge unlimited user access to hosted desktops and server-based resources, as well as mitigate system or site failures through its built-in fail-over protection. By pairing two Enterprise Cluster Cloud Servers administrators can create an efficient and highly-available cluster to ensure continuity of service to users’ desktops and applications should there be an outage of one of the servers. If one Enterprise Cluster Cloud Server fails, user logins continue to be processed by the other server in the cluster. Tailored for organizations with large-scale deployments, it provides a secure, central gateway to remote desktops and computers hosted inside the corporate network. These resources can be any of the servers from the NoMachine for Enterprise range and also “foreign” X servers, permitting administrators to build a flexibile & highly available multi-tier infrastructure.

winget install --id NoMachine.NoMachine.EnterpriseCloudServerCluster --exact --source winget

Latest 9.4.14

Release Notes

NoMachine makes available version 9.4.14, introducing a number of improvements, along with updates to third‑party components affected by CVEs, as well as fixes for issues found in previous releases. Changes to keys in configuration files

The new CustomXauthorityPath key in server.cfg, allows administrators to change the location of the .Xauthority file or to create separate .Xauthority files per virtual desktop session. This helps prevent XAUTHORITY conflicts in environments with shared home directories and is primarily intended for complex or enterprise deployments. The TokenExpiryTimeout key in server.cfg, lets you define the validity period of the token generated by the server to allow clients to reconnect after a connection failure. By default, the token remains valid for five minutes (300 s). Additionally, the 'EnableDbusLaunch' key in node.cfg has been renamed into 'EnableDbusWrapper'. This new key name is available for fresh new installations, updates will not rename the original EnableDbusLaunch key. Ability to log-in automatically Linux Guest Users via web

Two new keys in server.cfg, EnableWebGuestsAutoLogin and ForceGuestUserCreation, enable seamless guest access to Linux web sessions, where system guests are automatically logged in to the system without encountering any login prompt.

Improvements to session list and export of history

A new option, the '--no-physical' parameter, allows you to exclude physical sessions from the output of session list commands ('nxserver --list', 'nxserver --connectionlist' and 'nxserver --history'). Another new parameter, '--filter item,value' applies the same logic of the '--format items_list' option but limits the output to entries matching the specified item-value pair. The full list of available items can be obtained by running 'nxserver --history --format'. Additionally, the 'nxserver --history' output can now be exported in JSON or CSV formats, facilitating data integration with external analysis platforms and third‑party tools. OpenSSL

OpenSSL libraries shipped by NoMachine client and server packages are now v3.0.19. The full list of CVE patched by OpenSSL v3.0.19 is available on their Official web site https://github.com/openssl/openssl/releases/tag/openssl-3.0.19. Perl

A patch for CVE-2024-56406 has been applied to the current Perl version shipped by NoMachine server packages. Details about the CVE are available at: https://nvd.nist.gov/vuln/detail/CVE-2024-56406 Trouble Reports solved

Here is the complete list of fixes released in version 9.4.14:

TR02X11721 - Kerberos authentication may fail with 'Cannot initialize gssapi' TR11W11638 - Black screen after connection to macOS with a sleeping display TR03X11742 - Black screen may occur when connecting to Linux physical desktops TR07W11488 - On RHEL 10 starting a single application may be not possible TR07W11489 - On RHEL 10, creating a virtual desktop may not be possible TR01X11689 - Possible privileges escalation on Windows via named pipe impersonation TR02X11711 - Possible privilege escalation via a valid Kerberos ccache file TR02X11710 - Possible arbitrary deletion of files by exploiting the NoMachine environment variable for Kerberos cache path TR03X11758 - After power outage it could be no longer possible to connect via VPN TR11W11630 - The connections limit counter is sometimes wrongly increased TR01X11694 - License incorrectly in active state after incomplete installation using '--subscriptionset' TR01X11699 - Possible unexpected termination of nxnode on Linux TR03U10791 - Monitors of client are treated as a single monitor when the X11 graphics mode is disabled TR01X11685 - In a multinode environment, session could not be started when "ClientMenuconfiguration none" is set on the node TR02X11712 - A timeout error occurred while attempting to connect to host with private key and passphrase TR01X11693 - Cannot connect to a node via Web when Duo Authentication is enabled TR11W11629 - Web sessions or virtual desktops with X11 vector graphics mode disabled are counted twice in the connection limit counter TR07V11189 - Unwanted scrolling when scrolling a page with two fingers in a web session

Installer type: inno

Architecture Scope Download SHA256
x86 Download C01F495228EF77A5519777E7BCFB0DFEC2829A1AD42E24406EA8FAAB261BADF3
x64 Download 57643138176F663810123EE637E76A7F2E9A99153A9496644B4B9EAD7B846D7B

Details

Homepage
https://downloads.nomachine.com/
License
Proprietary
Publisher
NoMachine S.a.r.l.
Support
https://www.nomachine.com/support
Privacy Policy
https://kb.nomachine.com/AR05P00977
Copyright
Copyright 2002, 2026 © NoMachine

Tags

remoteremote-accessremote-controlremote-desktop

Older versions (5)

9.3.7
Architecture Scope Download SHA256
x86 Download 2FFF7EAE278C751CF64BE053FFC13840752E4DECDACA0690CAAAA97937B28552
x64 Download 7CE493F9C52629759A5E2C6E1B05F8EA5E109CD0FD006FACCF248E1EEDAA2CD9
9.2.18
Architecture Scope Download SHA256
x86 Download CB9A0D377B95543A5A583AF1B818C5F06759AD6513FF41A4207448BFB690FCF0
x64 Download 245C4B92C142359BB710B0CC2C306A1E35AB33C99FDAE07B22C78FB4E70BB746
9.1.24
Architecture Scope Download SHA256
x86 Download E0FF2B0A941C9920CA0F88BFBD5FBB5ABAEC9A54A0EFF20765F160645E26C5DD
x64 Download CF66F10FC2CF44FAE9A401F6289AFEAC97033AF7234D659CB4AD5FEFACBBD776
9.0.188
Architecture Scope Download SHA256
x86 Download D30FF0AD43CB6D324623BF45E407C37269ABEBAF9BC45C88E86FBB93B360B1CE
x64 Download 6DA09330D5F7A61512CBDBB2FBB0CC4D5AB4098E480C719882193BBA152F80E7
8.16.1
Architecture Scope Download SHA256
x86 Download 8474B0041F18920122C25FC44F393CE8E17E6CC9DEABB3F0AC9C35D4E4E110A6
x64 Download C3AEC61BE665B164319DF4754441049B06E8651B92764853BC8974FB355F05EB