Citrix 1912
Citrix 1912
Lab Environment.............................................................................................................160
Module 3 - Installing and Configuring a XenApp and XenDesktop Site.....................................173
es
Licensing Considerations................................................................................................175
al
Introduction to Zones......................................................................................................659
Introduction to PowerShell..............................................................................................668
fo
Preface to Redundancy..................................................................................................691
Methods of Redundancy.................................................................................................712
al
Certificate Authority........................................................................................................744
XML Service Security Considerations............................................................................750
di
Key Notes:
The Remote Desktop Connection Manager is the primary method of connecting to and
di
Key Notes:
XenCenter is used to manage the lab environment virtual machines specifically to perform
di
Although XenCenter can be used to connect to the console of a virtual machine and log in,
ri bu
this method of access should only take priority above the Remote Desktop Connection
Manager in the event that the lab guide exercise says to do so.
tio
n
Key Notes:
This access requires software on the user device called the Citrix Receiver.
di
st
Receiver uses the Citrix connection protocol called HDX to access these apps and
desktops.
tio
n
Key Notes:
Layer Presentation:
di
N
ot
fo
rr
es
al
e
or
di
st
buri
tio
n
Key Notes:
The User Layer is the grouping presentation of endpoint device architecture that
di
In this layer the endpoint choices can range from small mobile devices to
ri bu
an HTML5 compatible Web browser; however, it does not have all functionality that
Receiver has.
Additional Resources:
Receiver download - https://www.citrix.com/go/receiver.html
Receiver Client Feature Matrix - http://support.citrix.com/article/CTX104182
Citrix Virtual Desktop Handbook 7.x Page 27 -
http://support.citrix.com/article/CTX139331
Key Notes:
The Access Layer is the presentation of the technical component(s) middle-man
di
between the users with their endpoints and the XenApp and XenDesktop Site with
st
Internal users may bypass the NetScaler Gateway to directly access the StoreFront
n
server.
These two access methods are typically determined by several factors, such as the
location of the users, the types of devices and company policy.
Additional Resources:
Citrix Virtual Desktop Handbook 7.x Page 34 -
http://support.citrix.com/article/CTX139331
Key Notes:
The Control Layer is used to group and present the core components of the XenApp
di
The Delivery Controller is the central broker that handles all requests for all user
ri bu
sessions; both apps and desktops, across Server OS and Desktop OS.
The Delivery Controller also performs load balancing on user requests for apps and
tio
The XenApp and XenDesktop deployment relies on the SQL platform to host the
Site database.
The Citrix License Server centrally manages and disburses licenses for user
connections.
Additional Resources:
Citrix Virtual Desktop Handbook 7.x Page 91 -
http://support.citrix.com/article/CTX139331
Key Notes:
The Resource Layer is a presentation of all resources that authorized users can
di
• Apps
ri bu
• Desktops
• User data, like Profiles and documents
tio
consider how best to manage and control these above resources, such as through
creating policies to grant or restrict features.
Additional Resources:
Citrix Virtual Desktop Handbook 7.x Page 55 -
http://support.citrix.com/article/CTX139331
Key Notes:
The Compute Layer is where the Access, Control and Resource Layers pool their
di
It’s by no accident that the Compute layer is presented beneath those three layers,
ri bu
Additional Resources:
Citrix Virtual Desktop Handbook 7.x Page 140 -
http://support.citrix.com/article/CTX139331
Key Notes:
• What is the role of StoreFront?
di
• Delivery Controller
n
Key Notes:
XenApp and XenDesktop share a unified architecture called FlexCast Management
di
Architecture (FMA).
st
FMA's key features are the ability to run multiple versions of XenApp or XenDesktop
ri bu
console.
The variety of delivery methods are referred to as FlexCast models, such as those
depicted above. Although not a comprehensive list, they are the most common.
One of the advantages of using this FMA platform is that it enables administrators to
tailor the delivery method to the business and technical requirements of the end
user.
Additional Resources:
FlexCast Concepts and Components - https://docs.citrix.com/en-us/xenapp-and-
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Server OS machines can run multiple desktop or application sessions from a single
di
Additional Resources:
n
Key Notes:
Published applications are managed centrally and users cannot modify the
di
Additional Resources:
XenApp published apps and desktops: http://docs.citrix.com/en-us/xenapp-and-
xendesktop/7-12/technical-overview/delivery-methods/published-apps-
desktops.html
Key Notes:
Use Desktop OS machines to deliver VDI desktops.
di
st
VDI desktops are hosted on virtual machines and provide each user with a desktop
operating system.
ri bu
VDI desktops require more resources than XenApp published desktops, but do not
require that applications installed on them support server-based operating systems.
tio
In additional, depending on the type of VDI desktop you choose, these desktop can
n
Additional Resources:
VDI Desktops - http://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/technical-
overview/delivery-methods/vdi-desktops.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
The first time a user logs on to use one of these desktops, the user is assigned a
di
desktop from a pool of desktops based on a single master image. After the first use,
st
each time a user logs in to use one of these desktops, the user connects to the
ri
same desktop they were assigned on first use. Changes to the desktop are not lost
bu
Considerations:
n
• 1:1 ratio of users to desktop; user is assigned the same desktop on each
subsequent logon; changes persist and are not discarded on logoff.
• A user’s resource consumption or actions is less likely to affect other
users, making it a good use case for those who require a higher level of
performance due to resource intensive application work.
Additional Resources:
VDI Desktops - http://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/technical-
overview/delivery-methods/vdi-desktops.html
Key Notes:
Remote PC Access allows an end user to log on remotely from virtually anywhere to
di
the physical Windows PC in the office. The Virtual Delivery Agent (VDA) is installed
st
on the office PC; it registers with the Delivery Controller and manages the HDX
ri
Remote PC Access supports a self-service model; after you set up the whitelist of
tio
machines that users are permitted to access, those users can join their office PC’s
to a Site themselves, without administrator intervention. The Citrix Receiver running
n
on their client device enables access to the applications and data on the office PC
from the Remote PC Access desktop session.
Remote PC is a great solution for customers that have a great workstation design
with a backup solution already in place. These customers would not need to build
out additional server infrastructure to get many of the same benefits.
Remote PC can be a great stop-gap where customers can get benefits quickly while
the XenApp and XenDesktop solution is being developed.
Additional Resources:
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Applications and desktops on the master image are securely managed, hosted, and
di
run on machines within your datacenter, providing a more cost effective application
st
delivery solution.
ri bu
Considerations:
• 1:1 ratio of users to desktop for user to access a hosted Desktop OS
tio
application.
n
• It is not highly scalable as it requires a desktop for each user for a single
application
Additional Resources:
VM Hosted Applications - http://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/technical-overview/delivery-methods/vm-hosted-apps.html
Key Notes:
The diagram depicts the assessment and segmentation of users into groups based
di
You need to define user groups based on shared common characteristics in order to
assign the FlexCast model that effectively addresses the requirements of the user
group.
Mobility – understand where user is connecting from (network speeds, network
security, etc.) and how frequently the user is roaming.
Personalization – assess if user requires additional personalization that cannot be
provided by roaming profiles. Determine if user needs the ability to install apps
themselves, or if the admin should install any additional apps required by user.
Security - lockdown, audit requirements.
Application set/application usage – common applications required; how resource
Additional Resources:
ot
Key Notes:
As with physical desktops, it is not possible to meet every user requirement with a
di
single virtual desktop type. Different types of users need different types of desktops.
st
Some users may require simplicity and standardization, while others may require
ri
technologies that have been combined into a single integrated solution. Because
each FlexCast model has different advantages and disadvantages, it is important
that the right model is chosen for each user group within the organization.
There are five FlexCast models available, the advantages and disadvantages of
each model are described below:
• Hosted shared – With the hosted shared FlexCast model, multiple user
desktops are hosted on a single server-based operating system and
provisioned using Machine Creation Services or Provisioning Services.
The hosted shared desktop model provides a low-cost, high-density
solution, however applications must be compatible with a multi-user server
aware and support server based operating systems. In addition, the hosted
VDI model provides administrators with a granular level of control over the
fo
hosted VDI model is provided by Citrix XenDesktop, and offers the following
es
sub categories:
al
Users are dynamically connected to one of the desktops in the pool each
or
time they logon. Changes to the desktop image are lost upon reboot.
di
Users are allocated a virtual desktop on first access. Once assigned, users
bu
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
The previous few slides presented Architecture as layered by layered approach.
di
st
The next few slides will target specific components from all of those layers and
group them together.
ri bu
This grouping is used to present the basic concepts in one of 4 Flow Processes:
tio
• Connection
• Authentication
n
• Enumeration
• Session Launch.
Additional Resources:
XenDesktop Connection Process and Communication Flow -
http://support.citrix.com/article/CTX128909
Citrix Virtual Desktop Handbook 7.x Page 34 -
http://support.citrix.com/article/CTX139331
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Authentication is the process in which user identity is verified.
di
st
Key Notes:
di
st
The authentication type for a user group is often determined based on security
requirements as well as the authentication point used.
ri bu
To start a XenApp or XenDesktop session, the user connects either via Citrix
Receiver, which is installed on the user's device, or via Receiver for Web (RFW).
tio
Within Receiver, the user selects the physical or virtual desktop or virtual application
n
that is needed.
The user's credentials move through this pathway to access the Controller, which
determines what resources are needed by communicating with a Broker Service. It
is recommended for administrators to put a SSL certificate on StoreFront to encrypt
the credentials coming from Receiver.
Additional Resources:
XenDesktop Connection Process and Communication Flow -
http://support.citrix.com/article/CTX128909
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
The Broker Service determines which desktops and applications the user is allowed
di
to access.
st
Once the credentials are verified, the information about available apps or desktops
ri bu
is sent back to the user through the StoreFront-Receiver pathway. When the user
selects applications or desktops from this list, that information goes back down the
tio
pathway to the Controller, which determines the proper VDA to host the specific
applications or desktop.
n
Additional Resources:
XenDesktop Connection Process and Communication Flow -
http://support.citrix.com/article/CTX128909
Technical Overview - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/technical-overview.html#par_anchortitle_2039
Key Notes:
When the user selects applications or desktops from this list, that information goes
di
back down the pathway to the Controller, which determines the proper VDA to host
st
The Controller sends a message to the VDA with the user's credentials and sends
all the data about the user and the connection to the VDA. The VDA accepts the
tio
connection and sends the information back through the same pathways all the way
to Receiver. Receiver bundles up all the information that has been generated in the
n
Additional Resources:
XenDesktop Connection Process and Communication Flow -
http://support.citrix.com/article/CTX128909
Technical Overview - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/technical-overview.html#par_anchortitle_2039
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
In this diagram, the differences between IMA and FMA are apparent. For example,
di
under IMA architecture, each worker was responsible for obtaining the license file.
st
In FMA architecture, this is now centralized and the Delivery Controller checks out
ri
the licenses.
bu
This provides greater flexibility in segmenting the network and also means that the
tio
Additional Resources:
XenDesktop Connection Process and Communication Flow -
http://support.citrix.com/article/CTX128909
Key Notes:
Direct: StoreFront validates credentials against Active Directory.
di
st
• Citrix Receiver
Key Notes:
The Layered Approach Methodology was created by Citrix Consulting to provided a
di
standardized approach method for assessments, designs and builds for Citrix
st
environments.
ri bu
This approach is structured, organized and consistent; and can be flexibly adapted
for various scenarios.
tio
User Layer – what are the user groups and their specific requirements?
• The top layer of the design methodology is the user layer, which is defined
for each unique user group.
• The user layer appropriately sets the overall direction for each user
group’s virtualized environment. This layer incorporates the assessment
for the users, but also their data like user profiles, emails and documents
rr
• The resource layer is the third layer of the design methodology and the final
al
with the user group’s requirements, which were identified within the user
st
data capture and application data capture sections of the assess phase.
ri
solution?
tio
• Every major design decision made for all user groups in the upper three
layers are used as a whole to help design the control components of the
overall solution.
• The design decisions for each user group are met by incorporating the
correct control layer components, which includes access controllers,
desktop controllers and infrastructure controllers.
• Determining capacity, configuration, topology and redundancy for the
respective components creates a control environment capable of supporting
the user requirements.
Compute Layer – what is needed to support the above layers?
• The hardware layer is responsible for the physical devices required to
Key Notes:
User Layer – Receiver version, Receiver deployment method, endpoint devices,
di
Key Notes:
In 1990’s and up to mid 2000’s Citrix was typically hardware deployed
di
st
Key Notes:
Citrix Workspace Cloud simplifies the management of virtual applications, desktops,
di
mobile devices, and data sharing with its cloud-based management platform. You
st
can choose whether you put your resources (hypervisors, VDAs, and StoreFront
ri
The biggest drivers for moving to the cloud is flexibility, redundancy and scalability.
tio
XenApp and XenDesktop supports on premises, hybrid cloud solutions and full
n
cloud deployments.
Additional Resources:
Citrix Workspace Cloud Apps and Desktop Services for New Customers Reference
Architecture - http://docs.citrix.com/content/dam/docs/en-us/workspace-
cloud/downloads/workspace-cloud-apps-desktop-services-for-new-customers-
reference-architecture.pdf
Key Notes:
This model offers complete control over every aspect of the deployment, including
di
updates.
bu
customers looking to use Citrix Workspace Cloud and have Citrix host the XD
broker, consider the following needs:
n
All current XD broker systems that are on premises need to use the “ListOfDDCs”
option for those VDAs to remain on premises. Otherwise, move the VDAs you want
to use with Workspace Cloud into a different OU and change the “ListOfDDCs”
option. Currently, there is no support for adding both an on-premises XD broker and
Workspace Cloud Connector system to the “ListOfDDCs” in the same OU.
You need to configure one or more systems with Internet access that are used to
host the Workspace Cloud Connector that gets installed on these systems to host
multiple services.
Workspace Cloud Connector requires Windows Server 2012 R2 or newer.
Additional Resources:
fo
Citrix Workspace Cloud Apps and Desktop Service with an on-Premises Resource
rr
cloud/downloads/workspace-cloud-apps-desktop-service-on-premises-resource-
reference-architecture.pdf
al
e
or
di
st
ri bu
tio
n
Key Notes:
Simplify cloud adoption:
di
Additional Resources:
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Explain that new versions of the software in use will automatically be provided for
di
updated manually.
ri bu
Choice - Host your apps and data on any cloud or virtualization platform as well as
across multiple locations.
tio
Security - Citrix Cloud doesn’t handle your apps and data – you control where they
n
reside.
Experience - An intuitive admin experience keeps management simple, while
award-winning Citrix HDX technology delights end users.
Additional Resources:
Citrix Cloud Overview - https://www.citrix.com/products/citrix-cloud/
Additional Resources:
How to Prevent Browser-Borne Malware -
di
https://www.citrix.com/blogs/2016/07/19/how-to-prevent-browser-borne-malware/
st
ri bu
tio
n
Key Notes:
With years of successful project implementation experience, Citrix Consulting can
di
help you achieve the highest levels of efficiency, manageability and agility for all of
st
services.
bu
tio
Additional Resources:
n
Key Notes:
First step: define the objectives and determine the business goals.
di
st
Citrix Consulting can assist in the definition of the strategy that will help your
bu
prioritization.
n
Additional Resources:
Consulting Service - https://www.citrix.com/support/consulting/
Key Notes:
After objectives are defined, need to assess the existing environment to understand
di
requirements.
st
During the Assess phase, Citrix Consulting reviews your current environment,
identifies use cases and gathers detailed requirements for the project. This
n
information allows us to define the project success criteria and set the direction for
your proposed Citrix deployment, upgrade, or expansion.
Additional Resources:
Consulting Service - https://www.citrix.com/support/consulting/
Key Notes:
Design in accordance with leading practices and take into account environment
di
The design phase defines the architecture and operational processes required to
ri bu
implement and maintain the production environment that will satisfy your success
criteria. Topics such as environment scalability, redundancy and high availability are
tio
addressed. Citrix Consulting will apply best practices for performance tuning to help
your environment perform at its best.
n
Additional Resources:
Consulting Service - https://www.citrix.com/support/consulting/
Key Notes:
Build the virtualization environment or integrate components/use cases into existing
di
virtualization environment.
st
During the Deploy phase, Citrix Consulting creates and configures the environment
to meet the specifications from the Design phase. This includes supporting the
integration of any applications that have been identified in the design and
performing thorough testing of all infrastructure components. Citrix Consulting will
also guide you through a phased rollout approach to mitigate risk and ensure a
successful deployment.
Additional Resources:
Consulting Service - https://www.citrix.com/support/consulting/
Key Notes:
Implement monitoring processes and maintenance tasks to maintain and stabilize
di
For the long-term health of your Citrix environment, Citrix Consulting can be
ri bu
has the experience to keep your environment stable and your users happy.
n
Additional Resources:
Consulting Service - https://www.citrix.com/support/consulting/
Key Notes:
Realize that the assess -> design -> deploy phases are iterative. For example,
di
these phases can be completed to roll out prioritized user groups to production first
st
(most impact to business and/or quick wins) and the administrator can then later
ri
begin the assess -> design -> deploy phases for the next user groups/FlexCast
bu
Key Notes:
Hypervisor is an optional component, as the environment could be entirely physical
di
Additional Resources:
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
RDS licensing is required for hosted shared desktops and published apps, so
di
admins will need to verify that the number of RDS licenses is sufficient for the
st
Additional Resources:
tio
http://support.citrix.com/article/CTX114501
Key Notes:
When you create a Site, a corresponding Organizational Unit (OU) must be created
di
in Active Directory if you want desktops to discover the Controllers in the Site
st
through Active Directory. The OU can be created in any domain in the forest that
ri
contains your computers. As best practice, the OU should also contain the
bu
Controllers in the Site, but this is not enforced or required. A domain administrator
with appropriate privileges can create the OU as an empty container, then delegate
tio
During normal operations, Controllers and VDAs need read rights to all objects in
the OU and below. VDAs access the OU as their own machine identity; that
machine identity needs at least read rights in the OU to be able to discover
Controllers. A Controller also needs the rights to set properties on its own SCP
object in the container.
Consider the following:
• Separate Citrix OUs to block inheritance for the Citrix OU and thereby
prevent other policies from affecting the Citrix environment.
• Separate infrastructure servers from resources delivered (VDAs) to
Additional Resources:
es
Key Notes:
DNS is a critical component in Microsoft Windows Domains and should be given
di
Most Citrix components need name resolution to function properly. Especially the
ri bu
VDA registration process can fail if duplicate entries or stale records exist in DNS,
so consider enabling “aging and scavenging” on related DNS zones.
tio
For added security, the HDX connection between Receiver and VDA can be
n
encrypted using SSL. This requires certificates to be present on VDAs and since
Certificates are normally issued to names rather than IP addresses, the “XML DNS
Address resolution” needs to be turned on.
A reverse DNS Lookup Zone might also be required, especially if the DNS
namespace differs from Active Directory Domain names.
Additional Resources:
XD Ping Tool - http://support.citrix.com/article/CTX123278
How to Enable DNS Address Resolution in XenDesktop -
N
ot
fo
rr
es
al
e
or
di
st
ri
bu
tio
n
Key Notes:
DHCP is a service responsible for issuing unique IP Addresses (and other
di
information like Gateway servers, Routing information, DNS server location etc.) to
st
specified range of addresses for a limited time (before these addresses are either
bu
returned to the pool or their return date is extended). Sometimes these ranges
(scopes) are not large enough or do allocated addresses are not returned fast
tio
The main two dependencies for DHCP are Machine Creation Services (MCS) and
Provisioning Services (PVS). While MCS will be covered in an upcoming module,
PVS is explained in a different course.
DHCP normally falls not into the responsibilities of the Citrix Administration Team,
but needs to be monitored / checked because of the dependencies.
Servers built manually are often using static IP addresses.
DHCP as a central service can become a single point of failure if no high availability
solution is set up.
Many deployments install the role of DHCP server on their domain controllers.
Key Notes:
Leading practice: have a database service account for each Citrix product/each
di
purpose.
st
accounts.
Consider the following:
tio
administrator’s account.
• Increases security because limits privileges of individual administrator
accounts. If an account is compromised, then it will not provide access to
the entire environment. Important to note that the service account should
not have domain admin privileges, in accordance with the principle of least
privilege.
• The service account permissions for the XA/XD SQL account are required
during the initial setup of the database, removing/adding controllers, and
updating database schema. During the initial setup, the correct security
roles are configured for the services (read, write, and execute only) for
Additional Resources:
fo
vSphere: http://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/install-
rr
configure/install-prepare/vmware.html
es
SCVMM: http://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/install-
al
configure/install-prepare/msscvmm.html
e
Azure: http://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/install-
or
configure/install-prepare/azure.html
ARM: http://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/install-
di
configure/install-prepare/azure-resource-manager.html
st
ri bu
tio
n
Key Notes:
Consider
di
• Avoid naming components POC, test, etc. that will eventually be moved
st
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Configuring a XenApp or XenDesktop Site to use the Secure Sockets Layer (SSL)
di
security protocol includes the following procedures: Obtain, install, and register a
st
server certificate on all Delivery Controllers, and configure a port with the SSL
ri
certificate. Optionally, you can change the ports the Controller uses to listen for
bu
Additional Resources:
SSL - http://docs.citrix.com/en-us/xenapp-and-xendesktop/7-6-long-term-service-
release/xad-security-article/xad-ssl.html
Key Notes:
The Leading practice is to install certificates to secure communication for the
di
Administrators should be aware that they may need to request these in advance or
ri bu
work with the security team beforehand so they can be provided with the certificates
when needed for building.
tio
Consider:
n
Key Notes:
This certificate this is optional, but consider:
di
(passwords obfuscated).
buri
Additional Resources:
How to Enable SSL on XenDesktop 7.x Controllers to Secure XML Traffic:
http://support.citrix.com/article/CTX200415
Key Notes:
Installing a certificate is not required for Hyper-V because XenDesktop leverages
di
Additional Resources:
tio
Key Notes:
In some companies the Citrix Admin has no permissions to manage group policies.
di
st
• This OU can than be delegated for management to the Citrix Admin team
tio
n
Key Notes:
This is a succinct overview of the ports required for XenDesktop and the full list of
di
You may need to work with your security or firewall team to determine how the ports
ri bu
will be opened (manually vs. automatically) and that these decisions should be
made during the design phase to prevent impact to build timelines.
tio
Port 1494 is for the HDX connection, where port 2598 is used if Session Reliability
n
is enabled.
Ports 80/443 depends on if the communication has been secured.
The VDA stands for Virtual Delivery Agent, and refers to the application and desktop
resources being made available to users.
Additional Resources:
Communication Ports Used by Citrix Technologies -
http://support.citrix.com/article/CTX101810
Key Notes:
Keep all machines in your environment up to date with security patches. One
di
advantage is that you can use thin clients as terminals, which simplifies this task.
st
If you are migrating a conventional environment to this release, you may need to
n
Additional Resources:
Security Best Practices - http://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/secure/best-practices.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Some XenApp and XenDesktop management tasks performed within Citrix Studio
di
may require several different steps performed on the hypervisor (like creating
st
machines). Such complex tasks are normally combined into a single workflow that
ri
Each Hypervisor needs different commands to perform similar tasks – using the
tio
abstraction layer from Citrix Studio, the three industry standard hypervisors can be
managed using common commands from the same GUI.
n
Hypervisors in this context can also be cloud vendors such as Azure and AWS.
Explain that for the purpose of running VDAs XenApp and XenDesktop does not
require special abilities from the hypervisor.
While differences may exist in performance, cost, scalability or personal interest, the
administrative team can freely choose amongst several hypervisors.
Key Notes:
Misconception: enterprise companies should use only shared storage.
di
For local storage, will have to copy master images and updates to each server if
ot
There is not a one size fits all, the choice of storage type depends on the design of
the solution.
rr
es
Additional Resources:
al
12/manage-deployment/connections.html#par_anchortitle_f4be
or
xendesktop/7-12/manage-deployment/connections.html#par_anchortitle_ba4
st
ri bu
tio
n
Key Notes:
VLANs can reduce broadcast traffic, enhance security, and enable complex network
di
configurations.
st
ri bu
tio
n
Key Notes:
There are different Citrix Components that use databases for different purposes –
di
each one may have different requirements for the version or features of its
st
database.
ri bu
In previous versions of XenApp and XenDesktop, the database required for XenApp
and XenDesktop would be created as one database by the installer; after install the
tio
admin could split it into different databases to enhance performance or comply with
backup/security guidelines.
n
With the later releases of the product the installer now suggests to deploy 3
separate databases, it is still possible to deploy using a single database. However
this is not recommended. This will be covered in detail in a later module.
Additional Resources:
Supported Databases for XenApp and XenDesktop Components -
http://support.citrix.com/article/CTX114501
Key Notes:
This table serves as a reference and ONLY contains data for the Site Database.
di
The Monitoring and Logging database are not included. Refer below to the
st
Most databases grow but normally do not shrink. So, it is best to plan ahead in
terms of free space on the volume that the database resides on.
tio
Log files, depending on database setting, can fill up the disk of the database system
n
if they are not truncated (which usually happens after a backup of the database).
Solid Microsoft SQL knowledge is recommended in order to change settings
concerning the database server.
Additional Resources:
XenDesktop 7.x Database Sizing - http://support.citrix.com/article/CTX139508
Database Sizing Tool for XenDesktop 7 - http://support.citrix.com/article/CTX209080
Key Notes:
An Enterprise-level product license to XenServer is included with XenApp and
di
Explain that the In-memory read caching feature is available only if XenApp or
XenDesktop Platinum edition is licensed.
tio
n
Additional Resources:
XenServer 7.0: Licensing FAQ - https://docs.citrix.com/content/dam/docs/en-
us/xenserver/xenserver-7-0/downloads/xenserver-7-0-licensing-faq.pdf
Key Notes:
Microsoft licenses exist in many flavors and a professional consultation of the
di
different license models (OEM, Retail, Volume) and Editions should be done during
st
A Key Management Server is a special role that can be added to most Microsoft
Windows servers to serve the activation requests for other servers, but requires a
tio
Additional Resources:
Windows Server 2012 R2 Licensing Datasheet:
http://download.microsoft.com/download/F/3/9/F39124F7-0177-463C-8A08-
582463F96C9D/Windows_Server_2012_R2_Licensing_Datasheet.pdf
Windows Server 2016 Licensing Datasheet:
http://download.microsoft.com/download/7/2/9/7290EA05-DC56-4BED-9400-
138C5701F174/WS2016LicensingDatasheet.pdf
Licensing brief: Licensing Windows Server 2012 R2 for use with virtualization
technologies: https://www.microsoft.com/en-us/Licensing/learn-more/brief-windows-
N
ot
fo
rr
es
al
e
or
di
st
buri
tio
n
Key Notes:
The VDA install on a Windows Server adds the role of Remote Desktop Services
di
(RDS).
st
Additional Resources:
RDS Licensing Configuration on Windows Server 2012 -
Key Notes:
When accessing Windows Server systems, the RDS license is used, while
di
virtualized client systems may already been covered without the need to buy
additional VDA licenses from Microsoft. The same can apply to existing Windows
tio
InTune licenses.
n
Additional Resources:
Using Microsoft VDI to Enable New Workstyles -
https://channel9.msdn.com/series/using-microsoft-vdi-to-enable-new-
workstyles/using-microsoft-vdi-to-enable-new-workstyles-07-microsoft-vdi-licensing
Key Notes:
Most software requires a license per device it is installed on (for example Microsoft
di
Office).
st
Some software requires its own license server in the backend, but may fail if
multiple users access the license server with the same IP (from the same system).
License requirements are most specific to the software and license terms as well as
technical aspects should be clarified before going into production.
Key Notes:
AppDNA 7.12 helps accelerate application migrations to Windows 10 and Windows
di
Server 2016 by predicting potential issues and showing a clear path to application
st
AppDNA can be used to analyze application DNA against an image from the specific
OS family you are migrating from, and the one you are migrating to. The resulting
tio
analysis shows the effects of changes when applications are migrated between OS
platforms.
n
AppDNA provides a set of default Operating System images for each relevant OS
family. You can also import your own custom OS images.
Key Notes:
AppDNA is included with XenApp and XenDesktop platinum edition.
di
st
AppDNA provides insight into the effect of application issues and proposed
implementations on users, workgroups and devices; to help make more informed
ri bu
projects more quickly, saving enterprises time, labor and cost while reducing risk.
n
Key Notes:
Application analysis is a dedicated SQL Server database process that combines all
di
of the information AppDNA has about the application, analyzes it against each
st
Import - When applications are imported they are analyzed by AppDNA and each
application's files, registry entries, and API usage are exposed- revealing their
tio
application "DNA". This data is then loaded to the SQL server database.
n
Analyze - When AppDNA starts the analysis process, it uses the reports that
correspond to the platforms against which the application is being tested. AppDNA
combines all of the information it has about the application portfolio and runs the
report algorithms against the application DNA. It then produces and stores the
reporting data.
Report - After the import and analysis process completes, AppDNA presents the
results of the analysis in a set of report views. This information can then be used to
help plan, fix, and test your application portfolio
Additional Resources:
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
RAG icons can sometimes display 2 outputs: one from the default AppDNA RAG
di
(displayed in the lower right side) of the icon, and an external data source
st
(displayed on the upper left side). The external source is gathered from compatibility
ri
Red output indicates that some substantial issues were found from the application
tio
analysis, and thus the application may experience severe limitations (or not work at
all) within the new platform it was tested for.
n
Amber output indicates a stronger potential for application capability issues within
the new platform it was tested for, and additional application testing may be
required.
Green output indicates that the application it is most likely to be fine within the new
platform it was tested for. However, it
does not mean all is perfect with a given application, and some minor issues could
be encountered.
Key Notes:
The Overview Summary report view
di
overall RAG (red, amber, green) status for each of the active reports. You
can click the RAG icons to go to the Remediation report views for that
tio
application. These give the full details of the remediation required along
n
in the report. (AppDNA does not show the custom RAG pie chart if the
ot
custom RAGs are the same as the standard RAGs for all of the report's
algorithms.) Below the pie charts there is a bar chart that shows the number
fo
the portfolio (which here means the applications included in the report).
The Action View
al
e
of the standard, custom, and after action RAG status of the applications
di
included in the report. (AppDNA does not show the custom RAG pie chart if
st
the custom RAGs are the same as the standard RAGs for all of the report's
ri
algorithms.) Below the pie charts there is a bar chart that shows the number
bu
Key Notes:
The Overview Summary report view is a dashboard that provides a high-level view
di
of the state of your application portfolio. For each of the selected applications, it
st
shows the overall RAG (red, amber, green) status for each of the active reports. You
ri
can click the RAG icons to go to the Remediation report views for that application.
bu
These give the full details of the remediation required along with an MST fix where
applicable.
tio
n
Additional Resources:
Understanding RAG Icons - https://docs.citrix.com/en-us/dna/7-12/reporting/rag-
icons.html
Key Notes:
di
st
NYC-POC-PC1 is the virtual machine that is used as the endpoint device for our
testing in this POC Deployment.
ri bu
Key Notes:
NYC-STF-001 is the virtual machine that is used to install the Citrix StoreFront
di
component and host the Store for access to the XenApp and XenDesktop
st
resources.
ri bu
NYC-XDC-001 is the virtual machine that is used to install the Citrix XenApp and
XenDesktop Delivery Controller component and create from this machine the Site.
tio
NYC-AD-001 is the virtual machine that is a Domain Controller and hosts Active
n
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
The VDA for Desktop OS will be installed on NYC-W10-MST as the final step in
di
The VDA for Desktop OS will be running on the NYC-DVDA-001 because this
ri bu
The VDA for Server OS will be installed on NYC-SVDA-MST as the final step in
n
Key Notes:
Which console do you use within the lab to power on VMs?
di
Additional Resources:
Create a XenApp and XenDesktop Site - http://docs.citrix.com/en-us/xenapp-and-
di
xendesktop/7-12/install-configure/site-create.html
st
ri bu
tio
n
Key Notes:
User Licensing – the license is assigned to a user ID, so the user can launch their
di
resources from multiple devices, and consume only one license. License is
st
assigned to user ID and not able to be re-assigned until 90 days of inactivity lapses.
ri bu
Device Licensing – the license is assigned to a device ID, so multiple users can
launch their resources from one device, and consume only one license. License is
tio
Additional Resources:
rr
http://support.citrix.com/article/CTX128013
al
e
or
di
st
ri bu
tio
n
Key Notes:
Concurrent licenses are not tied to a specific user. When a user launches a product,
di
the product requests the license and it is checked out to the specific computer or
st
device that the user is using. When the user logs off or disconnects from the
ri
session, the license is checked back in and is available for another user.
bu
Per user licenses: A licensed user requires a unique user ID, such as an Active
tio
Directory entry. When assigned to a user, the license allows the user to connect to
their desktops and applications with multiple devices, such as desktop computer,
n
laptop, netbook, smartphone, or thin client. A licensed user can connect to multiple
instances of a product concurrently. When users connect to an application or
desktop, they consume a license for the 90 day license assignment period.
Per device licenses: A licensed device requires a unique device ID and is
authorized for use by any individuals to access instances of a product. Use this type
of license for shared devices, such as classroom or hospital. It allows an unlimited
number of users per device. When devices connect to an application or desktop,
they consume a license for the 90 day license assignment period. The assignment
period begins when a connection is made, is renewed to the full 90 days during the
life of the connection, and expires (allowing reassignment) 90 days after the last
Additional Resources:
Types of Licenses - https://docs.citrix.com/en-us/licensing/11-12-1/lic-license-
types.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
You should always verify that desired features are part of the edition of XD or XA
di
The arrows indicate that all of the features in the preceding edition are also
ri bu
Additional Resources:
bu
https://www.citrix.com/go/products/xendesktop/feature-matrix.html
n
Key Notes:
XenDesktop offers two license models (concurrent / user-device) while XenApp
di
Server VDI refers to using Windows Server OS VDAs without Remote Desktop
ri bu
The Citrix License Server manages the following features of XenDesktop: Delivery
Controller, Provisioning Services, on-demand application delivery, SCOM Bundle,
AppDNA, Session Recording, and enhanced Director monitoring.
The Citrix License Server manages the following features of XenApp: Delivery
Controller, Provisioning Services, on-demand application delivery, SCOM Bundle,
AppDNA, Session Recording, and enhanced Director monitoring.
Secure access (NetScaler Gateway), WAN optimization features (CloudBridge) and
Desktop Player are licensed individually because licenses can be deployed on an
integrated license server on the appliance or on a shared license server in a
datacenter.
Key Notes:
Leading practice: install/upgrade to latest version of license server when
di
implementing new product because new products typically need the latest license
st
server in order to correctly check out licenses. License servers are backwards
ri
compatible. If they are not installing the latest version, that it is imperative to verify
bu
Determine if going to leverage Citrix License Server for Windows or License Server
VPX. VPX does not offer the same functionality, so review the applicable features
n
Key Notes:
Citrix recommends that you upgrade the license server to the latest version when
di
you upgrade or install new Citrix products. New license servers are backward
st
compatible and work with older products and license files. New products often
ri
Citrix does not provide hotfixes for license server components and does not support
tio
older license servers with newer products. The latest versions of the license server
often contain resolutions to issues appearing in earlier versions.
n
Citrix also recommends the following security considerations when you configure
your environment or use the Licensing Administration Console:
• Configure the license server environment so that only authorized
administrators on a trusted network are permitted to access the Licensing
Administration Console port. You achieve this with an appropriately
configured network or host-based firewall.
• When using the Licensing Administration Console, avoid visiting untrusted
websites or clicking on untrusted URLs.
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
di
st
Determine if you need to place a firewall between the license server and any
product servers. Citrix recommends that you determine if your products will
ri bu
communicate with the license server through a firewall before installing licensing.
Where you install the license server can be impacted by firewall considerations.
tio
installation you can use the License Administration Console to change port
numbers.
• Console Web Server Port: The HTTPS TCP/IP port that the Web server
uses to listen for communication with clients connecting to the License
Administration Console. By default, the port is set to 8082. If you are
already using that port number for another application, you can change it
to a range between 1 and 65535. If you are upgrading, you will maintain
your previous configuration and might not get HTTPS by default. If you
change the port, you must stop and restart the Citrix Licensing service.
• License Server Manager Port: This port number is used by the license
• You can verify which port number is being used from the Vendor Daemon
ot
Additional Resources:
es
Key Notes:
The main service is “Citrix Licensing” (lmadmin.exe) which launches the vendor
di
daemon (citrix.exe).
st
ri bu
tio
n
Key Notes:
A customer’s license pool can be issued to a single file or split to multiple license
di
files.
st
• Each license file must be issued to the actual license server’s hostname.
ri bu
Citrix stores the licenses & license files in a database system so they can be
downloaded again if needed.
tio
n
Key Notes:
Remember that the License Administration Console is accessible using a browser
di
The default administrator with permissions to login to the Administration page is the
ri bu
Key Notes:
The thresholds for Warnings and Alerts can be configured on the administration
di
expire.
ri bu
An expired subscription advantage date does not invalidate the license, just the
option to use newer products/features.
tio
The Dashboard page is per default accessible without authentication, but can be
n
made to require a logon first using a setting from the administration page.
Key Notes:
Users and groups can be added from Active Directory to delegate administration
di
permission to the license server. Only two permissions exist: “read only” and “full
st
administration”.
ri bu
The thresholds for Warnings and Alerts can be configured on the administration
page; for example, when evaluation licenses or subscription advantage periods
tio
expire.
n
The license import is essentially an upload of the license file to a specific directory
monitored by the license server.
The License Administration Console can use License Administration users, local
Windows users and groups, and Active Directory users and groups. The Citrix
Licensing Manager can use local Windows users and groups and Active Directory
users and groups. The License Administration Console manages them all. These
users are not connected to the computer's local users.
The Active Directory users and groups are part of an Active Directory/network
authentication system. To support Active Directory users and groups, the Windows
license server must be a member of a Microsoft Active Directory domain and must
be running the License Administration Console. Windows NT domains are not
Additional Resources:
Configure console users - http://docs.citrix.com/en-us/licensing/11-13-1/lic-lmadmin-
overview/lic-lmadmin-users.html
View System Info - http://docs.citrix.com/en-us/licensing/11-13-1/lic-lmadmin-
overview/lic-lmadmin-systeminfo.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
If multiple license files need to be applied (after restoring a license server etc.) it
di
Adding licenses or viewing licenses in use and delegating permissions can also be
tio
After you have imported your license files, they are administered by the Citrix
vendor daemon (CITRIX). The Citrix vendor daemon is responsible for the core
operations of the license server, such as tracking how many licenses are checked
out and who has them. The vendor daemon can manage all of your Citrix license
files and is fully backward compatible with any license files you have. Set properties
for the vendor daemon on the Vendor Daemon Configuration page of the console.
The Vendor Daemon Configuration page allows you to import license files, configure
the vendor daemon, and view logs about license activity. Only users with
Administrator privileges can view this page.
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Will any license file function on every license server?
di
• No. The license file is allocated to the hostname of the license server.
st
ri
• Some license files use newer attributes that cannot be interpreted by older
license server versions, so the newest license server should be used.
n
Key Notes:
Log files are stored in:
di
a 64-bit server
• /opt/citrix/licensing/LS/logs for VPX
n
Additional Resources:
Logs - http://docs.citrix.com/en-us/licensing/11-13-1/lic-lmadmin-overview/lic-
lmadmin-logging.html
Key Notes:
There are many different options to obtain the computer name / hostname of the
di
license server, including powershell (gci Env:\COMPUTERNAME) and several gui &
st
registry related options. Be careful that the hostname within the license file is
ri
The license files are protected against manipulation by a checksum, so they should
tio
Key Notes:
Most license files contain multiple INCREMENT-blocks and the translation of the
di
Key Notes:
The nslookup.exe can be used to validate the delivery controller can resolve the
di
The netstat –bano can be used on the license server to find listening ports and their
ri bu
corresponding processes.
It’s a good idea to check the windows firewall settings on the delivery controller
tio
(outbound) and on the license server (inbound) as well as any external firewall
n
Key Notes:
On a Delivery Controller the PowerShell cmdlet “Get-BrokerSite” returns the
di
currently configured license server and product edition & license model. The
st
Within the Citrix product manual the required version of the license server is
tio
specified; while it is considered a leading practice to use the latest license server
whenever possible.
n
Key Notes:
Scenario: The administrator imported the license file using the License
di
Administration Console. Switching to the Dashboard Page does not show the new
st
• Reboot the license server (might conflict with shared use of the license
bu
• Restart the “Citrix Licensing” service (might also conflict with monitoring
n
systems).
• Logon to the administration page of the License server Administration
Console and click “Vendor Daemon Configuration”. Then click the Vendor
Daemon named “Citrix” and click the button labeled “Reread license files”.
Key Notes:
Unless otherwise noted, the component installer deploys software prerequisites
di
automatically (such as .NET and C++ packages) if they are not detected on the
st
machine. The Citrix installation media also contains some of this prerequisite
ri
software.
bu
The installation media contains several third-party components. Before using the
tio
Citrix software, check for security updates from the third party, and install them.
n
The disk space values are estimates only, and are in addition to space needed for
the product image, operating system, and other software.
Standard, Enterprise and Datacenter editions are supported where applicable.
Additional Resources:
System Requirements - http://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/system-requirements.html#par_anchortitle_42d4
Install using the command line – http://docs.citrix.com/en-us/xenapp-and-
xendesktop/7-12/install-configure/install-command.html
Key Notes:
The Delivery Controller is the core component of a XenApp and XenDesktop
di
The Delivery Controller only manages the power state of the machines for
ri bu
responsible for managing user access, plus brokering and optimizing connections.
n
Controllers also provide the Machine Creation Services that create desktop and
server images.
A Site must have at least one Delivery Controller. After you install the initial
Controller and create a Site, you can add additional Controllers. There are two
primary benefits from having more than one Controller in a Site.
• Redundancy — As best practice, a production Site should always have at
least two Controllers on different physical servers. If one Controller fails,
the others can manage connections and administer the Site.
• Scalability — As Site activity grows, so does CPU utilization on the
Controller and SQL Server database activity. Additional Controllers provide
depends on the number of users, applications, and mode (RDS or VDI). For
ot
• Windows PowerShell 2.0 (included with Windows Server 2008 R2) or 3.0
di
Additional Resources:
tio
xendesktop/7-12/manage-deployment/delivery-controllers.html
System Requirements - http://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/system-requirements.html#par_anchortitle_42d4
Key Notes:
The Delivery Controller is comprised of FMA 20 services that are responsible for
di
connections between end users and their resources, optimizing and load-balancing
ri
the connections, and communicating with hypervisor to determine and manage the
bu
These FMA Services (Controller) are – Broker Service, Machine Creation Service,
Configuration Service, AD Identity Service, Hosting Service, Delegated
n
Key Notes:
di
st
Supported Microsoft SQL Server versions for the Site Configuration Database
(which initially includes the Configuration Logging Database and the Monitoring
ri bu
Database):
• SQL Server 2016, Express, Standard, and Enterprise Editions.
tio
Editions.
• SQL Server 2012 through SP3, Express, Standard, and Enterprise
Editions. By default, SQL Server 2012 SP1 Express is installed when
installing the Controller, if an existing supported SQL Server installation is
not detected.
• SQL Server 2008 R2 SP2 and SP3, Express, Standard, Enterprise, and
Datacenter Editions.
The following database features are supported (except for SQL Server Express,
which supports only standalone mode):
Additional Resources:
Database - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/system-
requirements.html#par_anchortitle_384a
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Site is the name given to a XenApp and XenDesktop deployment that can be
di
After install, the first Delivery Controller can then create a Site.
tio
A Site is the name you give to a product deployment. It comprises the Delivery
Controllers and the other core components, VDAs, virtual resource connections (if
n
used), plus the Machine Catalogs and Delivery Groups you create and manage. A
Site does not necessarily correspond to a geographical location, although it can.
You create the Site after you install the components and before creating Machine
Catalogs and Delivery Groups.
Site creation includes creating the Site Configuration databases. Make sure the
SQL Server software is installed before you create a Site.
Additional Resources:
Create a site - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/install-
N
ot
fo
rr
es
al
e
or
di
st
buri
tio
n
Key Notes:
If required, explain FMA stands for the FlexCast Management Architecture, which is
di
Data for the Site from the FMA services is stored in the site databases – explain this
ri bu
enhances security by preventing the service account password from being stored
n
Additional Resources:
Create a site - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/install-
configure/site-create.html
Key Notes:
There are two options for configuring the connection to the databases during Site
di
creation to address the fact that not every database team will allow Citrix
st
create the databases automatically. The elevated SQL permissions are not
tio
• Option 2: in cases where security team prohibits the service account from
having elevated SQL privileges, during Site creation, can click Generate
database script and provide the scripts to the SQL team/appropriate
contact to create the databases manually (generates two scripts – second
one is for a mirrored database instances). Create the databases, make
sure that the collation is correct, and run the script with SQLCMD. After it is
created, can select Test Connection to validate that Delivery Controller can
connect to the databases created.
If you do not have permission to edit the SQL databases, use the Generate
Additional Resources:
Create a site - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/install-
configure/site-create.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
di
st
Site Database stores the running Site configuration, plus the current session state
and connection information.
ri bu
The Monitoring Database is used by the Director; which is a monitoring tool that is
included with XenApp and XenDesktop that displays metrics regarding sessions and
enables admins/help desk to perform basic troubleshooting steps (end processes,
reset profile, etc.).
Additional Resources:
Manage Configuration Logging - https://docs.citrix.com/en-us/xenapp-and-
xendesktop/7-12/monitor/configuration-logging.html
Key Notes:
di
st
XenApp and XenDesktop 7.12 introduces a feature called Local Host Cache. This
feature will allow users to continuously launch and run most resources even during
ri bu
The failure impact is different for each database, and that the site database is the
n
most critical, as it can cause a production outage because users would not be able
to start new sessions to access their resources (connection leasing mitigates some
of the impact, but certain new sessions cannot be launched).
• Logging/Monitoring – primarily affects administrative activities, and does
not have an immediate/direct impact on production users.
Citrix recommends that you back up the databases regularly so that you can restore
from the backup if the database server fails. In addition, there are several high
availability solutions to consider for ensuring automatic failover:
• SQL Mirroring — This is the recommended solution. Mirroring the
database makes sure that, should you lose the active database server, the
automatically allow one server to take over the tasks and responsibilities of
another server that has failed. However, setting up this solution is more
fo
complicated, and the automatic failover process is typically slower than with
rr
Groups requires that the SQL Server instances reside on Windows Server
or
Additional Resources:
ri bu
Key Notes:
With the release of 7.12 we have two options to support a Site during a database
di
outage: Local Host Cache and Connection Leasing. These two solutions cannot be
st
feature. Do not enable both Local Host Cache and Connection Leasing.
n
Local Host Cache retains a copy of the site data in a local SQLExpress on every
Delivery Controller and relies on this data during a database outage, to continuously
support VDA registrations and session brokering requests.
Connection Leasing was a feature released with 7.6 and is enabled by default. To
disable, run PowerShell command: Set-BrokerSite -ConnectionLeasingEnabled
$false.
Retains the local data in a XML file while updating the Site database with
information periodically for synchronization amongst Delivery Controllers.
Delivery Controllers check for new leases every 10 seconds and sync that
information into the XML file, if a new lease exists.
Additional Resources:
FAQ: Connection Leasing in XenApp and XenDesktop 7.6:
http://support.citrix.com/article/CTX205169
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
With the release of 7.12 we have two options to support a Site during a database
di
outage: Local Host Cache and Connection Leasing. These two solutions cannot be
st
Leasing feature. Do not enable both Local Host Cache and connection leasing.
n
Local Host Cache retains a copy of the site data in a local SQLExpress on every
Delivery Controller and relies on this data during a database outage, to continuously
support VDA registrations and session brokering requests.
Connection Leasing was a feature released with 7.6 and is enabled by default. To
disable, run PowerShell command: Set-BrokerSite -ConnectionLeasingEnabled
$false.
Retains the local data in a XML file while updating the Site database with
information periodically for synchronization amongst delivery controllers.
Delivery Controllers check for new leases every 10 seconds and sync that
information into the XML file, if a new lease exists.
Additional Resources:
FAQ: Connection Leasing in XenApp and XenDesktop 7.6:
http://support.citrix.com/article/CTX205169
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
What is unavailable or changes during an outage:
di
machines are in the unknown power state, and no power operations can
be issued. However, VMs on the host that are powered-on can be used for
tio
connection requests.
n
• Machines with VDAs in pooled Delivery Groups that are configured with
"Shut down after use" are placed into maintenance mode.
• Anonymous session launch requests are rejected.
• An assigned machine can be used only if the assignment occurred during
normal operations. New assignments cannot be made during an outage.
• Automatic enrollment and configuration of Remote PC Access machines is
not possible. However, machines that were enrolled and configured during
normal operation are usable.
• Server-hosted applications and desktop users may use more sessions
upgrade.
rr
Additional Resources:
es
12/manage-deployment/local-host-cache.html
e
or
di
st
ri bu
tio
n
Key Notes:
What is unavailable or changes during an outage:
di
machines are in the unknown power state, and no power operations can
be issued. However, VMs on the host that are powered-on can be used for
tio
connection requests.
n
• Machines with VDAs in pooled Delivery Groups that are configured with
"Shut down after use" are placed into maintenance mode.
• Anonymous session launch requests are rejected.
• An assigned machine can be used only if the assignment occurred during
normal operations. New assignments cannot be made during an outage.
• Automatic enrollment and configuration of Remote PC Access machines is
not possible. However, machines that were enrolled and configured during
normal operation are usable.
• Server-hosted applications and desktop users may use more sessions
Local Host Cache is disabled (regardless of the Connection Leasing setting), and
fo
Connection Leasing retains the same setting it had before the upgrade.
rr
es
Additional Resources:
Local Host Cache: https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
al
12/manage-deployment/local-host-cache.html
e
or
di
st
ri bu
tio
n
Key Notes:
di
st
to the principal broker's configuration. Those changes could have been initiated by
n
Additional Resources:
Local Host Cache: https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
N
12/manage-deployment/local-host-cache.html
ot
overview/databases.html
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
di
st
The principal broker can no longer communicate with the Site database, and stops
bu
listening for StoreFront and VDA information (marked X in the graphic). The
principal broker then instructs the secondary broker (High Availability Service) to
tio
start listening for and processing connection requests (marked with a red dashed
n
elected to take over, and VDAs will re-register with the newly-elected secondary
rr
broker.
es
al
Additional Resources:
e
12/manage-deployment/local-host-cache.html
di
st
ri bu
tio
n
Key Notes:
Communication flow between Delivery Controllers, resource with VDA installed, and
di
endpoint device.
st
The VDA is the intermediary between the Delivery Controller and the user’s device
ri bu
(Receiver, specifically), as the Delivery Controller will send information regarding the
connection to the VDA, and the VDA will send the information to Receiver.
tio
Note that delivered resources may be referred to as VDA or the VDA machine
n
going forward.
VDA is an agent that is installed on machines running Windows Server or Windows
desktop operating systems that allows these machines and the resources they host
to be made available to users. The VDA-installed machines running Windows
Server OS allow the machine to host multiple connections for multiple users and are
connected to users on one of the following ports:
• TCP port 80 or port 443 if SSL is enabled
• TCP port 2598, if Citrix Gateway Protocol (CGP) is enabled, which enables
session reliability
• TCP port 1494 if CGP is disabled or if the user is connecting with a legacy
Additional Resources:
Technical overview - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/technical-overview.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
The VDA software is required to be installed on each resource (virtual or physical)
di
that will be delivered to users otherwise the Delivery Controller cannot communicate
st
with or direct connections to the resource. If a VDA does not register, it cannot be
ri
used.
bu
Desktop Service: Handles the registration process and the communication with the
tio
Controller. Also handles the exchange of pre-logon ticket data and user credentials
during the authentication verification process.
n
PortICA Service: Handles accepting the initial connection and locking the
workstation. Also manages the communication with the display manager for
Thinwire display mode changes and manages the communication with the Desktop
Service.
On a Server OS we do not utilize PortICA but leverage the RDS subsystem instead.
Key Notes:
The configuration options are in order of priority and the Delivery Controller checks
di
each applicable location for the options in order until it locates the Delivery
st
Controller
ri bu
tio
n
Key Notes:
VDA failed registration with the Delivery Controller, results in the Delivery Controller
di
• In other words, if the VDA on a machine fails, then none of the resources
ri bu
• Make sure that the VDA is attempting to register with the correct controller
(spelling, etc.).
• Verify that the firewall is not blocking the registration communication by
telnetting over the registration port (Delivery Controller -> VDA and VDA ->
Delivery Controller).
• Compare time between the Controllers and the VDAs (max acceptable
difference is 5 minutes).
• Check the domain membership of the VDA and test removing and rejoining
the VDA to the domain.
Additional Resources:
Virtual Desktop Agent Registration with Controllers in XenDesktop:
N
http://support.citrix.com/article/CTX126992
ot
process-2/
al
e
or
di
st
ri bu
tio
n
Key Notes:
This port can be changed to a custom port if needed.
di
st
This can be done either through a Citrix computer policy using the “control
registration port” setting or through cmd-line using Program
ri bu
Additional Resources:
n
Key Notes:
The machine type maps to the different FlexCast delivery methods described in
di
Module 1 (e.g. Windows Server OS could be for hosted shared desktops and/or
st
All VMs in a catalog will have the same VDA version and the same apps/desktops.
Typically, there is a master image that is used to create all VMs in a machine
tio
catalog.
n
The existing machines option and that it is for machines that have already been
prepared using a non-Citrix technology.
Since machine catalogs can span hypervisor hosts, it is important to make sure that
where applicable, master images are accessible from all hosts.
During machine catalog creation, will also specify
• (1) power management of machines (power managed only permitted if a
hypervisor or cloud connection has already been configured)
• (2) desktop experience if select Desktop OS as machine type (connect to
same or random desktop). If users will connect to the same desktop, select
Additional Resources:
Create a machine catalog - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/install-configure/machine-catalogs-create.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Windows Server OS and Windows Desktop OS can serve as Master Image for a
di
catalog, but each catalog can only be based on one image at a time.
st
Depending on the catalog type it is possible to update all machines from time to
ri bu
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
the only necessary differences are usually settings that would otherwise lead to a
di
conflict (like name, AD computer account, SID and IP Address). Machine Creation
st
Services and Provisioning Services take care of this, the Master Image does not
ri
need to be “sysprepped”.
bu
If you are using Provisioning Services or Machine Creation Services, do not run
tio
Master image is also known as clone image, golden image, or base image.
When using Provisioning Services, you can use a master image or a physical
computer as the master target device.
Update a master image to apply changes to all the desktops and applications in a
machine catalog that were created with that master image. Managing common
aspects through a single master image lets you deploy system-wide changes such
as Windows updates or configuration changes to a large number of machines
quickly.
Additional Resources:
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Remote PC Access allows an end user to log on remotely from virtually anywhere to
di
the physical Windows PC in the office. The Virtual Delivery Agent (VDA) is installed
st
on the office PC; it registers with the Delivery Controller and manages the HDX
ri
connection between the PC and the end user client devices. Remote PC Access
bu
supports a self-service model; after you set up the whitelist of machines that users
are permitted to access, those users can join their office PCs to a Site themselves,
tio
without administrator intervention. The Citrix Receiver running on their client device
n
enables access to the applications and data on the office PC from the Remote PC
Access desktop session.
Remote PC Access is a feature of XenDesktop and can be used as an interim stage
during migration of physical office PCs to virtual machines.
Remote PC Access can be a solution for employees to access their documents and
applications during roadblocks, quarantine or bad weather.
Additional Resources:
Create a machine catalog - Create a machine catalog - https://docs.citrix.com/en-
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
The value in Remote PC is the access by the HDX protocol
di
st
The following XenDesktop features are not supported for Remote PC Access
deployments:
ri bu
Additional Resources:
Remote Access Design Guide -
https://www.citrix.com/content/dam/citrix/en_us/documents/products-
solutions/remote-access-to-enterprise-pc-xendesktop-75-desktop-guide.pdf (this
content is based on 7.5 but the design guidelines are still relevant)
Remote PC Access - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/install-configure/remote-pc-access.html
Key Notes:
A Delivery group is a collection of machines selected from one or more machine
di
catalogs. The Delivery group specifies which users can use those machines, and
st
Desktop OS desktops.
n
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
A list displays the applications that were discovered on a machine created from the
di
You can also add (create) applications manually. You’ll need to provide the path to
the executable, working directory, optional command line arguments, and display
tio
There are more options for publishing applications that can be accessed by clicking
Application properties, including command line parameters, application names, and
limiting the visibility of apps. Also, can change the application folder that the
application is displayed in by clicking Change under the Place the selected
application in folder title. More detail regarding this will be discussed in later module.
Application Groups will be covered in module 7
Application Groups let you manage collections of applications. You can create
Application Groups for applications shared across different Delivery Groups or used
by a subset of users within Delivery Groups. Application Groups are optional; they
offer an alternative to adding the same applications to multiple Delivery Groups.
Delivery Groups can be associated with more than one Application Group, and an
Additional Resources:
Delivery Groups - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/install-
configure/delivery-groups-create.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Select a Machine Catalog and specify the number of machines you want to use
di
Catalog.
• A Machine Catalog can be specified in more than one Delivery Group;
tio
• A Delivery group can use more than one machine catalog; however, those
catalogs must contain the same machine types (Server OS, Desktop OS,
or Remote PC Access). In other words, you cannot mix machine types in a
Delivery group or in a machine catalog.
• Similarly, you cannot create a Delivery Group containing Desktop OS
machines from a Machine Catalog configured for static desktops and
machines from a Machine Catalog configured for random desktops.
• Each machine in a Remote PC Access machine catalog is automatically
associated with a Delivery Group.
Additional Resources:
Delivery Groups - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/install-
configure/delivery-groups-create.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Need to install the VDA on the resource that it can register with Delivery Controller
di
Need to create a machine catalog and add the machines so that the resources are
ri bu
Key Notes:
Machine Creation services is a very simple way of enabling single image
di
management.
st
MCS will allow you to create a number of unique machines from one single master
ri bu
machine by utilizing storage level cloning and a number of mechanisms, that will
individualize these machines after cloning.
tio
n
Key Notes:
Provisioning Services is a little more complex to install and configure.
di
st
It will, like MCS, allow you to deploy a number of VDA’s all from a single image.
ri
Additional Resources:
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
There are two Citrix technologies for provisioning virtual machines that will be
di
Key Notes:
A vDisk consists of a VHD base image file, a properties file (.pvp), and may also
di
contain a chain of referenced VHD differencing disks (.avhd). Every time a vDisk is
st
updated using the Provisioning Services versioning method, a new differencing disk
ri
file is created.
bu
You can manually adjust the automatic resizing algorithm that determines the size of
tio
the VHD relative to the P: drive, by setting the initial size of the VHD. This can be
useful if, for example, you know users will install a number of applications that are
n
too big to fit on the VHD even after it is resized by the algorithm. In this case, you
can increase the initial size of the application space to accommodate the user-
installed applications.
Note that the machines that the PVS server streams the vDisk to are referred to as
target devices.
Brief PVS Explanation:
• Administrator creates a master VM that contains the OS, applications, and
other configurations desired.
• The OS/applications are then captured to a vDisk via the Imaging Wizard.
Additional Resources:
ot
Key Notes:
In previous versions it was easier to chose between MCS and PVS, but the feature
di
MCS does not require administrator to build out additional infrastructure or to learn
ri bu
MCS has added RAM based caching to put performance on par with PVS.
MCS can now utilize full clones to accommodate backup and storage replication of
virtual machines.
PVS has a unique versioning feature that allows for fast and easy update and roll
back of updates.
PVS can work with physical machines as well as virtual machines.
PVS can host the images on local storage reducing the need to plan for SAN
capacity.
PVS maintains the image in a VHDx file, so if we have multiple datacenters, we can
Additional Resources:
Provisioning Services or Machine Creation Services 2016 Edition -
https://www.citrix.com/blogs/2016/06/28/provisioning-services-or-machine-creation-
services-2016-edition/
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
MCS:
di
requirements.
• MCS does not include a versioning feature that enables the same steady
tio
Key Notes:
The diagram is showing MCS with PvD and explain the flow, as well as the fact that
di
PvD can be leveraged with PVS too. In the case of PVS, the PvDs would be
st
With PvD, users can install applications and have all their changes persist.
PvD is not the same as a differencing disk, as differencing disks store changes as
tio
block-based differences. PvD stores changes at the object level, enabling files,
n
Additional Resources:
ot
12/install-configure/personal-vdisk.html
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
PvD is not a solution for every user, it is for a particular niche use case.
di
• An example use case would be when a roaming profile does not provide
st
the necessary personalization for a user group and the users require the
ri bu
You need to determine the applications that have to be installed on the base image
n
due to the fact that they will conflict with the reconciliation process if installed on the
PvD. Applications that need to be installed on the master image include applications
that modify the Windows network stack or early-boot drivers, agents and clients,
and VM tools.
An administrator uninstalling/updating an application on the base image could cause
an issue if a user has installed an add-on for the application onto the PvD or an
application that has a dependency on the previous application.
Because each Personal vDisk is different, administering and managing the solution
requires additional time/processes.
PvD is excluded from LTSR Support because it is still a feature in development.
Additional Resources:
es
xendesktop/7-12/install-configure/personal-vdisk/personal-vdisk-configure-
or
manage.html
di
12/install-configure/personal-vdisk.html
ri bu
tio
n
Key Notes:
The graphic demonstrates one server (blue) being inconsistent because it is
di
provisioned manually.
st
Some customers are forced to provision VDAs manually, such as for examples:
tio
• The Citrix Admin Team does not have appropriate permissions to use MCS
on the Hypervisor or Storage.
n
Additional Resources:
XenApp and XenDesktop MCS Full Clone Support -
https://www.citrix.com/blogs/2016/10/12/xenapp-and-xendesktop-7-11-mcs-full-clone-
support/
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
MCS relies on snapshots and the whole catalog must be updated at once, PVS has
di
the ability to move a vDisk between 3 stages, Maintenance, Test and Production as
st
well as the versioning feature allows a single machine to boot on any version
ri
Key Notes:
MCS leverages a linked-clone approach to provisioning, with virtual machines
di
reading from a read-only master image that has been de-personalized. Each virtual
st
machine is assigned an identity disk that gives the machine a unique identity and a
ri
differencing disk that handles the writes for the virtual machine
bu
tio
n
Key Notes:
In this step, the administrator is creating a virtual machine that has the necessary
di
Note that deleting, moving, or renaming master images will prevent administrators
ri bu
Key Notes:
There are two options:
di
• Manual: the administrator takes a snapshot of the master VM. This option
st
Key Notes:
MCS is creating a full copy of the snapshot that was provided so that all machines
di
that will be provisioned will have the same desired properties and configurations
st
MCS creates a full copy of the snapshot and stores it so that it can be updated in
order to provision multiple VMs, and so that there is no impact if the administrator
tio
Key Notes:
A temporary virtual machine is created from the snapshot so that an image
di
The Preparation VM is created with the network disconnected to prevent any issues
ri bu
Key Notes:
The Instruction Disk will tell the Preparation VM the steps that need to be run in
di
Key Notes:
The PvD inventory step is only applicable if the Personal vDisk feature is being
di
The image preparation process is where the Preparation VM runs through the list of
ri bu
instructions that it obtained from the Instruction Disk. It is depersonalizing the copy
of the snapshot to change the base OS so that it can be used to provision multiple
tio
machines. This is why sysprep does not need to be run manually when creating a
master image with MCS, because the image preparation process automatically
n
Additional Resources:
Machine Creation Service: Image Preparation Overview and Fault-Finding:
https://www.citrix.com/blogs/2016/04/04/machine-creation-service-image-
preparation-overview-and-fault-finding/
Key Notes:
The preparation VM updates the copy of the snapshot following the image update
di
process, represented in the diagram by the copy of the snapshot being updated
st
from A’ to A’’.
ri bu
tio
n
Key Notes:
The instruction disk reports the success/failure of the steps run during the image
di
preparation process and only moves on with the MCS process if the steps were
st
successfully completed. After reading the report back to MCS, the instruction disk is
ri
then deleted.
bu
tio
Additional Resources:
n
Key Notes:
Now that the copy of the snapshot has been updated and prepared for use with
di
multiple VMs, the copy can be replicated to each storage repository configured for
st
the host connection. The copy of the snapshot is read-only, and the virtual machines
ri
will reference the copy of the snapshot in the applicable storage repository.
bu
Important to note that because the snapshot copy needs to be placed in each
tio
Key Notes:
The identity disks for each VM are created in memory.
di
st
ri bu
tio
n
Key Notes:
MCS creates each VM by attaching the identity disk and creating and attaching a
di
Since each virtual machine is pointing to the read-only snapshot copy, the virtual
ri bu
machines need a unique identity (provided by the identity disk) and a disk to handle
its writes (provided by the differencing disk).
tio
n
• Key Notes:
With the release of version 7.9 through 7.12 we have 3 new features that brings the
di
writes (similar to PVS option “write cache in memory with offload to disk”)
• We can configure the latest release of XenServer to cache the common
Shared OS disk in memory to further minimize central I/O load. (This
feature is not supported on any other hypervisor)
• Additional Resources:
• Introducing MCS Storage Optimization -
https://www.citrix.com/blogs/2016/08/03/introducing-mcs-storage-
optimisation/
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
MCS will generate an Identity Disk for each cloned VM, this disk is always 16 MB.
di
st
MCS will also generate a Difference Disk for each VM, the size of this depends on
the size of the Master VM disk.
ri bu
tio
n
Key Notes:
The differencing disks are discarded because the user changes do not persist for
di
random/non-persistent desktops.
st
Since the differencing disks are queued for deletion, this increases the storage
ri bu
consumption and should be taken into account when determining the storage
requirements.
tio
• VMware hypervisors
• XenServer 6.1 and up
• Pre XenServer 6.1 supported for local and ISCSI storage repositories, but
not for NFS storage repositories
• Pre XenServer 5.6 not supported
Key Notes:
The differencing disk is not deleted following reboot as user changes are required to
di
Key Notes:
When the administrator updates the master VM and goes into the machine catalog
di
and selects Update Catalog option, this creates a new full copy of the snapshot,
st
The VMs are then instructed on reboot to point to the latest updated image. VMs
that have not been rebooted will continue to point to the original image snapshot.
tio
Key Notes:
Static/persistent desktops can not be instructed to read from an updated master
di
image on reboot due to the fact that the persistent differencing disks are tied to the
st
Only newly created Catalogs can be instructed to read from an updated master
image.
tio
Updates for existing machines can be done either manually on an individual basis,
n
Key Notes:
There are three high level concepts involved in making a resource available to end
di
(1) the machine needs to be defined (this involves the process of determining user
ri bu
experience, sizing and available resources such as GPU, CPU and RAM, as well as
creating the Master Image )
tio
(2) the correct number of machines need to be provisioned into a Catalog from a
n
Key Notes:
Step 1 starts with research and documentation.
di
st
Each group of users has its own requirements in terms of mobility, security, updates
& flexibility, provided applications, resource impact, level of personalization, high-
ri bu
availability and other factors. Grouping users with common requirements together
enables them to share a FlexCast model, an image or even a VDA and allows for
tio
Additional Resources:
User Assessment for Desktop Transformation -
https://www.citrix.com/static/dta/project-accelerator-guide-define-user-groups-
master.pdf
Key Notes:
During Step 2 the actual resources (and maybe their infrastructure) will be created.
di
Choosing the “best” delivery model refers to the “most appropriate” for any given
ri bu
company or resource group. Some companies benefit largely by choosing just one
single model to address all requirements, while other prefer to have two different
tio
Key Notes:
During Step 3 the actual Delivery Groups are created, providing access for users
di
Key Notes:
di
st
Can a user access resources from more than one delivery group?
ri
• Yes, one user can have access to resources from several delivery groups
bu
and catalogs.
tio
N
ot
fo
rr
es
al
e
or
di
st
ribu
tio
n
Key Notes:
The Learning Objectives explain what the students can expect to learn and how to
di
Key Notes:
The function of StoreFront is to authenticate users, then enumerate and aggregate
di
resources for them and provide them with access to these resources.
st
StoreFront can be used in parallel to existing Web Interface installations, but both
ri bu
products should not be installed on the same server. NetScaler can be used to
divert clients to the appropriate product if necessary.
tio
desktops, and hosts the application store. StoreFront communicates with the
Delivery Controller using XML.
Additional Resources:
Technical Overview - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/technical-overview.html
Key Notes:
The respective Datacenter, Enterprise and Standard Editions are supported for the
di
OS.
st
StoreFront installer will install and enable required Windows Roles and Features
ri bu
automatically.
StoreFront can be setup without a Certificate but doing so puts user credentials at
tio
Most deployments are setup using two StoreFront servers and two Load Balancers
(e.g. NetScaler) to provide high availability. Special procedures apply and will be
taught in a different Citrix Training.
Depending on the size and load of the deployment, up to five StoreFront servers
can be grouped together.
Additional Resources:
StoreFront System Requirements - https://docs.citrix.com/en-us/storefront/3-
8/system-requirements.html
Key Notes:
Stores are used to retrieve published resources for the user from one or more
di
There are several settings like authentication methods or XML Services are
ri bu
user’s browser, while the “native” Receiver can use its own GUI and access stores
n
Additional Resources:
Create new deployment - https://docs.citrix.com/en-us/storefront/3-8/install-
standard/create-new-deployment.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Stores are used to retrieve published resources for the user from one or more
di
There are several settings like authentication methods or XML Services are
ri bu
user’s browser, while the “native” Receiver can use its own GUI and access stores
n
Additional Resources:
Configure and manage stores - https://docs.citrix.com/en-us/storefront/3-8/configure-
manage-stores.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Authentication: the process in which user identity is verified.
di
st
Explain that two Windows services are responsible for performing authentication
tasks:
n
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Authentication: the process in which user identity is verified.
di
st
Explain that two Windows services are responsible for performing authentication
tasks:
n
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
• Indirect: StoreFront passes credentials to Delivery Controller, which
di
ensuring that users do not need to log on again to access their desktops and
applications. You can only configure one authentication service per StoreFront
tio
deployment.
n
You can enable or disable user authentication methods set up when the
authentication service was created by selecting an authentication method in the
results pane of the Citrix StoreFront management console and, in the Actions pane,
clicking Enable Method or Disable Method, as appropriate. To remove an
authentication method from the authentication service or to add a new one, use the
Add/Remove Methods task.
Additional Resources:
Create and configure the authentication service - https://docs.citrix.com/en-
us/storefront/3-8/configure-authentication-and-delegation/configure-authentication-
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
• Key Notes:
With the Store Centric paradigm, each store can be configured to have a separate
di
authentication service.
st
When upgrading a StoreFront deployment, where multiple stores are configured, all
ri bu
migrated stores will be configured to share the same authentication service located
at /Citrix/Authentication.
tio
If you would like to configure a separate authentication service per store, select the
n
• Additional Resources:
• Create and configure the authentication service -
https://docs.citrix.com/en-us/storefront/3-8/configure-authentication-and-
delegation/configure-authentication-service.html
• Key Notes:
If you enable Citrix Receiver for Web site users to change their passwords at any
di
time, local users whose passwords are about to expire are shown a warning when
st
To set a custom notification period for all users, you edit the configuration file for the
n
authentication service.
StoreFront does not support Fine Grained Password Policies in Active Directory
• If you enable Citrix Receiver for Web site users to change their passwords
at any time, ensure that there is sufficient disk space on your StoreFront
servers to store profiles for all your users. To check whether a user's
password is about to expire, StoreFront creates a local profile for that user
on the server. StoreFront must be able to contact the domain controller to
change users' passwords.
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
• Key Notes:
Prior to StoreFront 3.6, you could install StoreFront only on servers that were joined
di
Key Notes:
Microsoft Extensible Storage Engine (ESE) is used as database backend.
di
st
Store\<#_Store Name>\PersistentDictionary.edb
The database should be backed up routinely to save the users’ subscriptions.
tio
The entries in the database are not lost if administrator temporarily disables the
subscription feature of the store
Keywords like “auto” or “mandatory” can be used to put published applications
automatically in the users’ favorite apps.
The database should be included in a backup routine – otherwise all users might
lose their subscribed apps and have to subscribe to them again. Also, make sure
your antivirus solution does not interfere with database operations on the EDB file.
The subscription data for each Store is located in:
• C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Citrix\Subs
Additional Resources:
Backup / Restore the database: http://support.citrix.com/article/CTX139343
N
ot
stores-share-datastore.html
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
The main reason for grouping StoreFront servers is to provide high availability.
di
st
Port 808 is used to keep the database containing the user subscriptions in sync
between the StoreFront servers of a group.
ri bu
Propagating servers means “adding” as well as “deleting” objects like stores &
Receiver for Web sites from other servers of a group.
n
Although not a technical limit, StoreFront performs best when the number of the
participating servers in a group is kept to or below five.
Port 808 is used to keep the database containing the user subscriptions in sync
between the StoreFront servers of a group
To manage a multiple-server deployment, use only one server at a time to make
changes to the configuration of the server group. Ensure that the Citrix StoreFront
management console is not running on any of the other servers in the deployment.
Any configuration changes you make must be propagated to the other servers in the
group to ensure a consistent configuration across the deployment.
Key Notes:
For internal addresses like “training.lab” or “somewhat.local” only certificates from
di
local / private Certificate Authorities can be used since these domain addresses
st
cannot be validated.
ri bu
Authentication services and stores each require certificates for token management.
StoreFront generates a self-signed certificate when an authentication service or
store is created. Self-signed certificates generated by StoreFront should not be
used for any other purpose.
If your users configure their accounts by entering store URLs directly into Citrix
Receiver and do not use email-based account discovery, the certificate on the
StoreFront server need only be valid for that server and have a valid chain to the
root certificate.
Citrix recommends securing communications between StoreFront and users'
devices using NetScaler Gateway and HTTPS. To use HTTPS, StoreFront requires
Additional Resources:
Secure your StoreFront deployment - https://docs.citrix.com/en-us/storefront/3-
8/secure.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Most options can be configured in the StoreFront Console starting with version 3.5.
di
XenDesktop.
ri bu
Use caution when editing these files – a single missing character can render the
complete website unusable!
tio
Additional Resources:
How to Disable Desktop Auto Launch in StoreFront:
http://support.citrix.com/article/CTX139058
N
http://support.citrix.com/article/CTX200828
Advanced store settings: https://docs.citrix.com/en-us/storefront/3-8/configure-
fo
manage-stores/advanced-store-settings.html
rr
8/configure-using-configuration-files.html
al
e
or
di
st
ri bu
tio
n
• Key Notes:
• Self-Service Password Reset enables end users to have greater control
di
if end users have problems logging on to their systems, they can unlock
ri
recommend that you refer to the Secure configuration article to ensure that
your deployment is correctly configured.
• Self-Service Password Reset contains three components:
• Self-Service Password Reset configuration console
• Self-Service Password Reset Service
• Security question enrollment in StoreFront
Feature is not supported via NetScaler gateway.
SSPR does not support UPN logons example username@domain.com
Feature is only available for Receiver for web with unified experience enabled.
• Additional Resources:
• About Self-Service Password Reset: Http://docs.citrix.com/en-us/self-
service-password-reset/1-1/about.html
• SSPR System requirements: http://docs.citrix.com/en-us/self-service-
password-reset/1-1/system-requirements.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
• Key Notes:
Until 3.5 version of StoreFront, SSPR was supported only up to XA 6.5. The 3.7 and
di
Users can change their passwords from the StoreFront site. This is supported by all
ri bu
versions.
Functions of each component:
tio
• Configures the IIS based SSPR service to read from central store
using data proxy account.
• Configures the IIS based SSPR service to communicate with Active
directory using the self service account.
• Configures which users can use SSPR and points the service to
validate license server version and edition.
• SSPR Service
• IIS based Service
• Self-service account
or
• When different modules require the same type of account, you can use the
di
same account for multiple modules, or you can specify different customized
st
• Requires read and write access to the central store. For more
tio
• Self-service account
• Requires sufficient privileges to unlock and reset the password of the
relevant users in User Configuration. For more information, Secure
configuration.
• Additional Resources:
Configure Self-Service Password Reset: http://docs.citrix.com/en-us/self-service-
password-reset/1-1/install-configure.html
About Self-Service Password Reset: http://docs.citrix.com/en-us/self-service-
password-reset/1-1/about.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
• Additional Resources:
XenApp and XenDesktop Features by edition:
di
https://www.citrix.com/go/products/xendesktop/feature-matrix.html
st
ri bu
tio
n
• Additional Resources:
• XenApp and XenDesktop Features by edition:
di
https://www.citrix.com/go/products/xendesktop/feature-matrix.html
st
ri bu
tio
n
Key Notes:
Receiver exists for all major OS platforms and that it can be used to launch a
di
connection to a VDA after the user has used a browser to enumerate the published
st
Additional Resources:
n
Key Notes:
Citrix Receiver for Web sites enable users to access stores through a webpage. The
di
tasks below enable you to modify settings for your Citrix Receiver for Web sites.
st
Some advanced settings can only be changed by editing the site configuration files.
ri bu
Use the Deploy Citrix Receiver task to configure the behavior of a Citrix Receiver
for Web site when a Windows or Mac OS X user without Citrix Receiver installed
tio
accesses the site. By default, Citrix Receiver for Web sites automatically attempt to
determine whether Citrix Receiver is installed when accessed from computers
n
Additional Resources:
ot
8/manage-citrix-receiver-for-web-site/configure-receiver-for-web-sites.html
rr
https://www.citrix.com/content/dam/citrix/en_us/documents/products-solutions/citrix-
receiver-feature-matrix.pdf
al
e
or
di
st
ri bu
tio
n
Key Notes:
The Native Receiver setup requires the user to install the Receiver or to have the
di
Receiver pre-installed.
st
The native Receiver requires configuration, either manually by the user or by the IT
ri bu
staff.
This setup can be used together with single sign-on and prelaunch session support,
tio
Citrix Receiver attempts to contact beacon points and uses the responses to
determine whether users are connected to local or public networks. When a user
accesses a desktop or application, the location information is passed to the server
providing the resource so that appropriate connection details can be returned to
Citrix Receiver. This ensures that users are not prompted to log on again when they
access a desktop or application.
The CitrixReceiver.exe installation package can be installed in the following
methods:
• By a user from Citrix.com or your own download site
• A first-time Receiver user who obtains Receiver from Citrix.com or your
• Receiver does not require administrator rights to install unless it will use
pass-through authentication.
e
or
Additional Resources:
di
st
receiver-feature-matrix.pdf
Create a single Fully Qualified Domain Name (FQDN) to access a store internally and
tio
externally - https://docs.citrix.com/en-us/storefront/3-8/advanced-
n
configurations/configure-single-fqdn.html
Receiver Install - http://docs.citrix.com/en-us/receiver/windows/4-5/install.html
Key Notes:
This setup does not require to install anything on the client device since the HTML5
di
receiver will be downloaded to the client as part of the website, much like an image
st
or flash plugin.
ri bu
The HTML5 misses a lot of features compared to the native Receiver (no file
redirection, no bi-directional audio) and other features are implemented using
tio
Additional Resources:
Citrix Receiver Client Feature Matrix -
https://www.citrix.com/content/dam/citrix/en_us/documents/products-solutions/citrix-
receiver-feature-matrix.pdf
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Consider the implications of Domain passthrough: requires domain joined
di
used.
ri
bu
The trusted domains setting also restricts other logon methods to adhere to the
provided list of trusted domains.
tio
Additional Resources:
es
8/configure-authentication-and-delegation/configure-authentication-
or
service.html#par_richtext_3
di
st
ri bu
tio
n
Key Notes:
When delivering applications with XenDesktop or XenApp, consider the following
di
options to enhance the experience for users when they access their applications:
st
to select and use the applications that they want. In this mode, no
shortcuts are placed on the user's desktop.
n
Additional Resources:
Configuring application delivery - http://docs.citrix.com/en-us/receiver/windows/4-
N
5/configure/receiver-windows-configure-app-delivery-wrapper.html
ot
fo
rr
es
al
e
or
di
st
ribu
tio
n
Key Notes:
Citrix recommends using the Group Policy Object and provides template file
di
Additional Resources:
tio
Configuring Citrix Receiver for Windows with the Group Policy Object template -
n
http://docs.citrix.com/en-us/receiver/windows/4-5/configure/ica-import-icaclient-
template-v2.html
Key Notes:
If Citrix Receiver for Windows is configured via VDA installation, admx/adml files is
di
found in the Citrix Receiver for Windows installation directory. For example:
st
You can use adm template files to configure Local GPO and/or Domain-Based
GPO.
tio
Citrix recommends you to use the template files provided with the latest Citrix
n
Receiver for Windows. While importing the latest files, the previous settings are
retained.
One of the main benefits of using the new ADMX files is the central store. This
option is available to you when you are administering domain-based GPOs,
although the central store is not used by default. Unlike the case we discussed
earlier with ADM files, the Group Policy Object Editor will not copy ADMX files to
each edited GPO but will provide the ability to read from either a single domain-level
location on the domain controller sysvol (not user configurable) or from the local
administrative workstation when the central store is unavailable. You can share a
custom ADMX file by copying the file to the central store, which makes it available
automatically to all Group Policy administrators in a domain. This capability
Additional Resources:
Configure Receiver with the Group Policy Object Template - http://docs.citrix.com/en-
us/receiver/windows/4-5/configure/ica-import-icaclient-template-v2.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
You can configure NetScaler Gateway to accept user connections by using an email
di
address to discover the StoreFront or NetScaler Gateway URL. The process for
st
• When users connect from inside your network or a remote location and
bu
install Receiver for the first time, they enter their email address or the
tio
StoreFront URL.
n
• Receiver then queries the appropriate DNS server, which responds with
the StoreFront or NetScaler Gateway URL. The URL depends on whether
users connect from the internal network or they connect from a remote
location.
• Users then log on to Receiver with their user name, password, and
domain.
• If users connect from a remote location, NetScaler Gateway provides the
StoreFront URL to Receiver.
• Receiver gets the account information from StoreFront. If users connect
through NetScaler Gateway, the appliance performs SSO to StoreFront. If
Additional resources:
Configuring Email-Based Account Discovery for Receiver -
N
http://blogs.citrix.com/2013/04/01/configuring-email-based-account-discovery-for-
ot
citrix-receiver/
fo
con/ng-clg-storefront-policies-con/ng-clg-storefront-email-discovery-tsk.html
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
User logs on to StoreFront and uses the Activate feature to configure Receiver.
di
st
This method is not very intuitive. End-users may miss this feature altogether. The
are more likely to find it after using the system for a while.
ribu
Additional Resources:
Overview of StoreFront’s provisioning file -
http://support.citrix.com/article/CTX135919
Key Notes:
Advanced users can use command-line parameters during installation of Receiver.
di
st
Also used when deploying Receiver with a script (which is how an ESD works too).
ri
Additional resources:
n
Configure and Install Receiver for Windows Using Command Line Parameters -
http://docs.citrix.com/en-us/receiver/windows/4-5/install/receiver-windows-cfg-
command-line-42.html
Key Notes:
Citrix Receiver attempts to contact beacon points and uses the responses to
di
determine whether users are connected to local or public networks. When a user
st
Citrix Receiver. This ensures that users are not prompted to log on again when they
access a desktop or application.
tio
n
Additional Resources:
Documentation on Beacon Points - https://docs.citrix.com/en-us/storefront/3-
8/integrate-with-netscaler-and-netscaler-gateway/configure-beacon.html
Key Notes:
Since StoreFront 2.6, it is supported to use the same internal and external logon
di
Additional Resources:
tio
Key Notes:
Internal beacons: You can configure one internal beacon and zero to many external
di
beacons. The default setting for the internal beacon is to use the StoreFront. To use
st
your own beacon, you clear the default setting and then enter the URL in the text
ri
box. The internal beacon accepts a valid URL format only. You can use one URL
bu
Key Notes:
External beacons: The default setting for external beacons uses the web address
di
you configure on the Deployment tab, which is typically the NetScaler Gateway
st
FQDN. To use your own beacon, you clear the default setting and enter the URL in
ri
the text box. The external beacon accepts comma-separated URLs without spaces
bu
Key Notes:
Use the Manage Beacons task to specify URLs inside and outside your internal
di
• Internal beacons. You can configure one internal beacon and zero to many
bu
external beacons. The default setting for the internal beacon is to use the
tio
internal beacon, XenMobile disables the text box. To use your own
beacon, you clear the default setting and then enter the URL in the text
box. The internal beacon accepts a valid URL format only. You can use
one URL and it allows a maximum of 256 characters.
• External beacons. The default setting for external beacons uses the web
address you configure on the Deployment tab, which is typically the
NetScaler Gateway FQDN. To use your own beacon, you clear the default
setting and enter the URL in the text box. The external beacon accepts
comma-separated URLs without spaces after the comma. For example,
you can enter https://ng1.com,https://ng2.com,https://ng3.com. The
Additional Resources:
How to Successfully Test Citrix StoreFront Beacons Inside a Remote Desktop
Session - http://support.citrix.com/article/CTX132037
N
ot
netscaler-and-netscaler-gateway/configure-beacon.html
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Use the Manage Beacons task to specify URLs inside and outside your internal
di
• Internal beacons. You can configure one internal beacon and zero to many
bu
external beacons. The default setting for the internal beacon is to use the
tio
internal beacon, XenMobile disables the text box. To use your own
beacon, you clear the default setting and then enter the URL in the text
box. The internal beacon accepts a valid URL format only. You can use
one URL and it allows a maximum of 256 characters.
• External beacons. The default setting for external beacons uses the web
address you configure on the Deployment tab, which is typically the
NetScaler Gateway FQDN. To use your own beacon, you clear the default
setting and enter the URL in the text box. The external beacon accepts
comma-separated URLs without spaces after the comma. For example,
you can enter https://ng1.com,https://ng2.com,https://ng3.com. The
Additional Resources:
How to Successfully Test Citrix StoreFront Beacons Inside a Remote Desktop
Session - http://support.citrix.com/article/CTX132037
N
ot
netscaler-and-netscaler-gateway/configure-beacon.html
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Use the Manage Beacons task to specify URLs inside and outside your internal
di
• Internal beacons. You can configure one internal beacon and zero to many
bu
external beacons. The default setting for the internal beacon is to use the
tio
internal beacon, XenMobile disables the text box. To use your own
beacon, you clear the default setting and then enter the URL in the text
box. The internal beacon accepts a valid URL format only. You can use
one URL and it allows a maximum of 256 characters.
• External beacons. The default setting for external beacons uses the web
address you configure on the Deployment tab, which is typically the
NetScaler Gateway FQDN. To use your own beacon, you clear the default
setting and enter the URL in the text box. The external beacon accepts
comma-separated URLs without spaces after the comma. For example,
you can enter https://ng1.com,https://ng2.com,https://ng3.com. The
Additional Resources:
How to Successfully Test Citrix StoreFront Beacons Inside a Remote Desktop
Session - http://support.citrix.com/article/CTX132037
StoreFront Planning Guide - http://support.citrix.com/article/CTX136547
Configure beacon points - https://docs.citrix.com/en-us/storefront/3-8/integrate-with-
netscaler-and-netscaler-gateway/configure-beacon.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Use the Manage Beacons task to specify URLs inside and outside your internal
di
• Internal beacons. You can configure one internal beacon and zero to many
bu
external beacons. The default setting for the internal beacon is to use the
tio
internal beacon, XenMobile disables the text box. To use your own
beacon, you clear the default setting and then enter the URL in the text
box. The internal beacon accepts a valid URL format only. You can use
one URL and it allows a maximum of 256 characters.
• External beacons. The default setting for external beacons uses the web
address you configure on the Deployment tab, which is typically the
NetScaler Gateway FQDN. To use your own beacon, you clear the default
setting and enter the URL in the text box. The external beacon accepts
comma-separated URLs without spaces after the comma. For example,
you can enter https://ng1.com,https://ng2.com,https://ng3.com. The
Additional Resources:
How to Successfully Test Citrix StoreFront Beacons Inside a Remote Desktop
Session - http://support.citrix.com/article/CTX132037
StoreFront Planning Guide - http://support.citrix.com/article/CTX136547
Configure beacon points - https://docs.citrix.com/en-us/storefront/3-8/integrate-with-
netscaler-and-netscaler-gateway/configure-beacon.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Scenario: You are the Citrix Admin and you have recently configured Beacons in the
di
StoreFront servers. When testing this from the outside network you are unable to
st
• The internal Beacon is resolved first and if this can be resolved in DNS,
n
Key Notes:
Policies are a collection of settings that define how sessions, bandwidth, and
di
You can apply policy settings to physical and virtual machines, or to users. You can
ri bu
apply settings to individual users at the local level or in security groups in Active
Directory. The configurations define specific criteria and rules, and if you do not
tio
specifically assign the policies, the settings are applied to all connections.
n
Additional Resources:
Policies - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/policies.html
Key Notes:
All Citrix Local Policies are created and managed in the Citrix Studio console and
di
stored in the Site Database; whereas, Group Policies are created and managed with
st
the Microsoft Group Policy Management Console (GPMC) and stored in Active
ri
Directory. Microsoft Local Policies are created in the Windows Operating System
bu
settings. Administrators can set GPOs using the GPMC to configure settings and
apply them to a target set of users at different levels of the network.
These GPOs are saved in Active Directory, and access to the management of these
settings is generally restricted for most of IT for security.
Settings are merged according to priority and their condition. Any disabled setting
overrides a lower-ranked enabled setting. Un-configured policy settings are ignored
and do not override lower-ranked settings.
Local policies can also have conflicts with group policies in the Active Directory,
which could override each other depending on the situation.
Key Notes:
Consider that the permissions to create / modify GPOs are required for Site,
di
Domain and OU based policies. Therefore, Site Database policies can be used by
st
Citrix Administrators that have no such permissions to still be able to configure all
ri
VDAs.
bu
tio
n
Key Notes:
According to leading practices, polices should be created either in Active Directory
di
The Citrix Group Policy management extension is required to actually see and edit
ri bu
separate directories.
These extensions are only needed on systems that will be used to create or modify
the Citrix policies.
Key Notes:
Group policy settings are processed in the following order:
di
• Local GPO
st
ri
• Site-level GPOs
tio
• Domain-level GPOs
n
• Organizational Units
However, if a conflict occurs, policy settings that are processed last can overwrite
those that are processed earlier. This means that policy settings take precedence in
the following order:
• Organizational Units
• Domain-level GPOs
• Site-level GPOs
• XenApp or XenDesktop Site GPO (stored in the Site database)
• Local GPO
Additional Resources:
Work with Policies - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/policies.html
Group Policy processing and precedence - https://technet.microsoft.com/en-
us/library/cc785665(v=ws.10).aspx
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Because it’s possible (and even likely) that you may have multiple GPOs to apply,
di
there is always the possibility that these GPOs will have conflicting settings. In this
st
case, how do we know which GPO will win and have its settings applied? The
ri
simple rule to remember is that the last GPO applied will overwrite any settings
bu
applied earlier. And the GPOs closest to the client location in the directory structure
will be applied last. The order goes as follows:
tio
• Local
n
• Site
• Domain
• Organizational Unit
In both Citrix and Microsoft Policies, lower number means higher precedence. Still
the Local, Site, Domain, OU order applies – the link order system is used only for
conflict resolution inside a single OU, while the Priority system is used for conflict
resolution inside a GPO.
New Citrix Polices are added to the priority list with a higher number – so they would
not have much effect and need to be repositioned to their correct rank.
Additional Resources:
Group Policy Basics – Part 2: Understanding Which GPOs to Apply -
https://blogs.technet.microsoft.com/musings_of_a_technical_tam/2012/02/15/group-
policy-basics-part-2-understanding-which-gpos-to-apply/
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Group Policy loopback is a computer configuration setting that enables different
di
Group Policy user settings to apply based upon the computer from which logon
st
occurs.
ri bu
Additional Resources:
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
When you enable loopback processing, you also have to select the desired
di
mode. There are two modes for loopback processing: Merge or Replace.
st
During loopback processing in merge mode, user GPOs process first (exactly as
ri bu
they do during normal policy processing), but with an additional step. Following
normal user policy processing the Group Policy engine applies user settings from
tio
GPOs linked to the computer’s OU. The result– the user receives all user settings
from GPOs applied to the user and all user settings from GPOs applied to the
n
computer. The user settings from the computer’s GPOs win any conflicts since they
apply last.
During loopback processing in Replace Mode, the user settings applied to the
computer “replace” those applied to the user. In actuality, the Group Policy service
skips the GPOs linked to the user’s OU. Group Policy effectively processes as if
user object was in the OU of the computer rather than its current OU.
“Replace” might mean that necessary settings from other GPOs for the user will be
missing, like Folder Redirection etc.
“Merge wins conflicts (1 vs A)”, but settings without conflict will apply. Replace
Additional Resources:
Group Policy Loopback mode explanation -
https://blogs.technet.microsoft.com/askds/2013/02/08/circle-back-to-loopback/
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
In Studio, policies and templates are displayed in a single list regardless of whether
di
they contain user, computer or both types of settings and can be applied using both
st
appliance
• Client IP address – filter on ranges or specific addresses
• Client name – filter on client names
• Delivery Group – apply policies to named Delivery Groups
• Delivery Group type – apply policies to certain types of Delivery Groups
(like shared or private VDAs)
• Tag – filter policies based on tags from Citrix Studio
• User or Group – apply the policy to specific domain users or groups
Additional Resources:
rr
12/policies/policies-processes.html
al
e
or
di
st
ri bu
tio
n
Key Notes:
Assign policies to groups rather than individual users. If you assign policies to
di
groups, assignments are updated automatically when you add or remove users from
st
the group.
ri bu
provides similar functionality to Citrix Policy settings. When possible, keep all
settings consistent (enabled or disabled) for ease of troubleshooting.
n
Additional Resources:
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
“Not configured” enables lower ranking policies to get applied for that specific
di
setting.
st
Some features have dependencies – Audio quality will be meaningless if the Audio
ri bu
• A Marketing User (Jimmy) works from home today – the policy system
n
uses the filters to find policies that apply, in addition to the System default
settings, that always apply at a fixed lowest rank but can be modified with
higher ranking policies. For Jimmy, the “Marketing homeoffice” and
“Baseline” Policy apply (Jimmy is not member of the accounting group,
Jimmy does not connect from an external IP address).
Next, setting by setting is processed, where conflicts will be resolved by
taking the respective setting’s value from the highest ranking (lowest
number) policy.
So for “Audio channel” this means “enabled” (since Prio 1 wins over Prio
4), for “Audio quality” this means “High quality” (since the highest ranking
current state of GPOs in your environment and generates a report that describes how
ot
these objects, including Citrix Policies, are currently being applied to a particular user
fo
and Controller.
rr
es
Additional Resources:
Compare, prioritize, model, and troubleshoot policies - https://docs.citrix.com/en-
al
us/xenapp-and-xendesktop/7-12/policies/policies-compare-model.html
e
or
di
st
ri bu
tio
n
Key Notes:
You can launch the Citrix Group Policy Modeling Wizard from the Actions pane in
di
Studio. You can launch either tool from the Group Policy Management Console in
st
Windows.
ri bu
If you run the Citrix Group Policy Modeling Wizard or Group Policy Results tool from
the Group Policy Management Console, Site policy settings created using Studio
tio
To ensure you obtain the most comprehensive Resultant Set of Policy, Citrix
recommends launching the Citrix Group Policy Modeling wizard from Studio, unless
you create policies using only the Group Policy Management Console.
The same Wizard can be started from AD based GPMC or Citrix Studio (a tab in the
policies node).
Policies created in Studio cannot be reported on with the AD based GPMC – but the
Citrix Studio based Wizard will include policies created or stored in GPOs within AD.
The reports can be viewed, printed or saved as HTML files.
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Templates are a source for creating policies from a pre-defined starting point. Built-
di
be used as:
ri
• A source for creating your own policies and templates to share between
bu
Sites.
tio
will be able to quote the results, for example, "..when using Citrix template
x or y..".
• A method for communicating policies with Citrix Support or trusted third
parties by importing or exporting templates.
The import / export function uses Microsoft Group policy template (GPT) as file
format.
The template functionality exists in the GPMC add-on as well as in Citrix Studio.
To transfer policies from AD to Site Database (or vice versa), transform the policy to
a template which can then be exported / imported.
Additional Resources:
Policy Templates - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/policies/policies-templates.html
Group Policy Management Template Updates for XenApp and XenDesktop -
http://support.citrix.com/article/CTX202000
Whitepaper: HDX Policy Templates - http://support.citrix.com/article/CTX202330
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
You can compare settings in a policy or template with those in other policies or
di
templates. For example, you might need to verify setting values to ensure
st
compliance with best practices. You might also want to compare settings in a policy
ri
Additional Resources:
Compare, prioritize, model, and troubleshoot policies - https://docs.citrix.com/en-
us/xenapp-and-xendesktop/7-12/policies/policies-compare-model.html
Key Notes:
Answer 1: No, since only three policies are applied: Prio 3, Prio 4, System default.
di
Since Prio 3 Policy does not configure the Drive Mapping setting, the next Baseline
st
policy’s setting is used (any value ranks higher than system default).
ri bu
Answer 2: The following unwanted situation could emerge: Accounting users will
have access to their local drives. Reason: A change in the baseline policy or a new
tio
policy that is also mapped to the Accounting users, but ranks higher than the
Baseline policy enables Drive Mapping.
n
Key Notes:
Any value higher than 10000 is usually some warning or error message within the
di
Multiple criteria can be combined to evaluate load on VDAs (memory, CPU etc.), but
ri bu
only the highest value will be reported as load value for this server.
For Example:
tio
and reports a load value of 10000. After the administrator ends the task,
the load drops to 7000 although the CPU is only 20% loaded. The reason
might be, that now a different configured value (memory?) is the “highest
value” and thus gets reported as load value.
Load balancing normally only applies to NEW sessions, so it is best practice to have
some spare resources for existing sessions left on the VDA.
The counters that can be used to report load values:
• Concurrent logons tolerance
• CPU usage
Studio, Director can display recorded load values from the past.
ot
can accept.
es
CPU usage:
e
• This setting specifies the level of CPU usage, as a percentage, at which the
or
server reports a full load. When enabled, the default value at which the
server reports a full load is 90%.
di
• By default, this setting is disabled and CPU usage is excluded from load
st
calculations.
ri bu
• This setting specifies the priority level at which a process' CPU usage is
excluded from the CPU Usage load index.
n
Additional Resources:
rr
http://support.citrix.com/article/CTX202150
al
Key Notes:
By default, Session Reliability is allowed.
di
st
Session Reliability keeps sessions active and on the user's screen when network
connectivity is interrupted. Users continue to see the application they are using until
ri bu
connectivity is lost, the user's display freezes and the cursor changes to a spinning
n
hourglass until connectivity is restored. The user continues to access the display
during the interruption and can resume interacting with the application when the
network connection is restored. Session Reliability re-connects users without re-
authentication prompts. If you do not want users to be able to re-connect to
interrupted sessions without having to re-authenticate, configure the Auto client re-
connect authentication setting to require authentication. Users are then prompted to
re-authenticate when reconnecting to interrupted sessions.
The default of 180 seconds is configurable (should not be set to high to compromise
security, because re-connects do not require re-authentication).
Seeing a spinning hourglass icon attached to the mouse pointer within a session is
normally is an indicator that the session is currently reconnected in the background.
Additional Resources:
N
ot
settings.html
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
If you use both Session Reliability and auto client reconnect, the two features work
di
in sequence. Session Reliability closes (or disconnects) the user session after the
st
amount of time specified in the Session Reliability timeout setting. After that, the
ri
auto client reconnect settings take effect, attempting to reconnect the user to the
bu
disconnected session.
tio
n
Additional Resources:
Session Reliability policy settings - https://docs.citrix.com/en-us/xenapp-and-
xendesktop/7-12/policies/reference/ica-policy-settings/auto-client-reconnect-policy-
settings.html
Key Notes:
ICA Keep-Alive is not used for Sessions running CGP / Session Reliability (Port
di
2598), but only for “plain” ICA Sessions (Port 1494) since Session Reliability uses a
st
• ICA keep-alive does not work if you are using Session Reliability.
bu
Configure ICA keep-alive only for connections that are not using Session
tio
Reliability.
n
Additional Resources:
Keep alive policy settings - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/policies/reference/ica-policy-settings/keep-alive-policy-settings.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
If a task consumes 100% of all CPUs on a VDA - when will the server report “full
di
load”?
st
• This counter is evaluated every 30 seconds but the last 10 samples (300
ri bu
• This inertia is built in to avoid having servers reporting full load whenever a
task “spikes”.
• For example, when starting Excel or Word 100% CPU resources are
consumed, but for a very short amount of time.
Key Notes:
• From version 7.8 the Applications node has been exposed directly in
di
Studio, previously the applications were hidden under the Delivery Group
st
portion of Studio.
ri bu
tio
n
Key Notes:
Each app can use two different names (for user / Admin) – this makes it possible to
di
offer a program with the same name but different command line parameters or
st
Within each application folder, the Application Name (for administrator) must be
unique.
tio
Additional Resources:
Applications - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/manage-
deployment/applications-manage.html
Key Notes:
What are Keywords? Keywords are a method that the Citrix Administration can use
di
to control or direct how an application is displayed to the user, when that user
st
connects to the Storefront store. The Specific Keywords, as mentioned above are
ri
A description and multiple Keywords can be combined in the single field, the
tio
Additional Resources:
N
5/configure/receiver-windows-configure-app-delivery-wrapper.html
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Doctor A is using an old PC in the counselling room and Citrix Receiver will start a
di
remote session for Word, Excel and Outlook since the software is not installed on
st
When using his new laptop, Citrix Receiver starts the local installed version of Word,
Excel and Outlook, because the preference was set using a Keyword for these
tio
three applications.
n
Key Notes:
In the Application category field, optionally specify the category in Receiver where
di
the application appears. For example, if you are adding shortcuts to Microsoft Office
st
If you want applications displayed in specific folders use the following options:
• If you want the application shortcuts Citrix Receiver places in the start
tio
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Mapped drive letters are mapped on a per user basis and might not be available to
di
the FMA subsystem upon launch of the app. It is therefore leading practice to use
st
Most programs do not evaluate the working directory any more but instead use
different directories for specific functions, usually configurable in the programs menu
tio
or via policies.
n
The screenshot shows the Internet Explorer being called with two command line
arguments, the first argument (-k) instructs the browser to operate in kiosk-mode
(fullscreen, reduced GUI), the second argument opens the specified web page.
Additional Resources:
Applications - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/manage-
deployment/applications-manage.html
Key Notes:
This feature functions like a whitelist.
di
st
Every group (or member of the group) needs to be able to access the Delivery
Group itself, so allowing access on the delivery group to “doctors” and later
ri bu
specifying the “nurses” group for access to an application hosted from this Delivery
Group does not enable the nurses to start the program.
tio
• Key Notes:
We had this in XenApp version 6.5 and earlier, within both the Publishing wizard
di
Key Notes:
Workspace Control lets desktops and applications follow a user from one device to
di
another. This ability to roam enables a user to access all desktops or open
st
applications from anywhere simply by logging on, without having to restart the
ri
assist health-care workers in a hospital who need to move quickly among different
workstations and access the same set of applications each time they log on. If you
tio
configure Workspace Control options to allow it, these workers can disconnect from
n
multiple applications at one client device and then reconnect to open the same
applications at a different client device.
Workspace Control affects the following activities:
• Logging on – By default, Workspace Control enables users to reconnect
automatically to all running desktops and applications when logging on, by-
passing the need to re-open them manually. Through Workspace Control,
users can open disconnected desktops or applications, as well as any that
are active on another client device. Disconnecting from a desktop or
application leaves it running on the server. If you have roaming users who
need to keep some desktops or applications running on one client device
StoreFront and all active sessions together, or log off from StoreFront only.
ot
Additional Resources:
• Workspace control - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
al
12/manage-deployment/sessions.html#par_anchortitle_24f8
e
12/manage-deployment/sessions.html#par_anchortitle_d65d
di
st
ri bu
tio
n
Key Notes:
The session pre-launch and Session Linger features help specified users access
di
prelaunch) and keeping application sessions active after a user closes all
ri
By default, session pre-launch and Session Linger are not used: a session starts
tio
(launches) when a user starts an application, and remains active until the last open
application in the session closes.
n
Additional Resources:
Configure session prelaunch and session linger in a Delivery Group -
https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/install-configure/delivery-
groups-manage.html#par_anchortitle_e049
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
The Delivery Group must support applications, and the machines must be running a
di
Session pre-launch is supported only when using Citrix Receiver for Windows.
ribu
Session Linger is supported when using Citrix Receiver for Windows and Receiver
for Web. Additional Receiver configuration is required.
tio
Additional Resources:
ot
https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/install-configure/delivery-
rr
groups-manage.html#par_anchortitle_e049
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Will a member of the Accounting-Group have access to Excel? If not, why?
di
• The Accounting-Group will not have Access to Excel since it has no access
st
What will happen, if a new Group is given access to the Delivery Group “Office”?
What applications will they see?
tio
Delivery Group, they would instantly see all applications that are not
currently restricted (Outlook, Word) in addition to any App they are entitled
to use (Excel).
In the above example, Nurses and Doctors cannot start Excel, even though the
Accounting-Group does not have access to the program either. This is because they
are not explicitly included in the Limit Visibility setting.
Key Notes:
Will a member of the Accounting-Group have access to Excel? If not, why?
di
• The Accounting-Group will not have Access to Excel since it has no access
st
What will happen, if a new Group is given access to the Delivery Group “Office”?
What applications will they see?
tio
Delivery Group, they would instantly see all applications that are not
currently restricted (Outlook, Word) in addition to any App they are entitled
to use (Excel).
In the above example, Nurses and Doctors cannot start Excel, even though the
Accounting-Group does not have access to the program either. This is because they
are not explicitly included in the Limit Visibility setting.
Key Notes:
Will a member of the Accounting-Group have access to Excel? If not, why?
di
• The Accounting-Group will not have Access to Excel since it has no access
st
What will happen if a new Group is given access to the Delivery Group “Office”?
What applications will they see?
tio
Delivery Group, they would instantly see all applications that are not
currently restricted (Outlook, Word) in addition to any App they are entitled
to use (Excel).
In the above example, Nurses and Doctors cannot start Excel, even though the
Accounting-Group does not have access to the program either. This is because they
are not explicitly included in the Limit Visibility setting.
Key Notes:
Will a member of the Accounting-Group have access to Excel? If not, why?
di
• The Accounting-Group will not have Access to Excel since it has no access
st
What will happen, if a new Group is given access to the Delivery Group “Office”?
What applications will they see?
tio
Delivery Group, they would instantly see all applications that are not
currently restricted (Outlook, Word) in addition to any App they are entitled
to use (Excel)
In the above example, Nurses and Doctors cannot start Excel, even though the
Accounting-Group does not have access to the program either. This is because they
are not explicitly included in the Limit Visibility setting.
Key Notes:
Although application folders are technically not a part of application properties it is
di
These Folders are only visible inside the administrative Console – not on the client
ri bu
side. They are meant as a means for the administrator to structure the delivered
applications for simpler management.
tio
These folders often get confused with the “Categories” which are defined in the
n
Additional Resources:
Applications - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/manage-
N
deployment/applications-manage.html
ot
https://www.youtube.com/watch?v=9ktLbPAoT7k&feature=youtu.be
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Example: If a user is connected to Outlook as a delivered application receives an
di
email with a Publisher document attached, opening this document would cause the
st
server to launch Publisher inside the session disregarding the Limit Visibility setting.
ri bu
tio
n
Key Notes:
FTA launches local applications when a file is encountered in the session. If the
di
local app is launched, it must have access to the file to open it. Therefore, you can
st
only open files that reside on network shares or on client drives (using client drive
ri
mapping) using local applications. For example, when opening a PDF file, if a PDF
bu
reader is a local app, then the file opens using that PDF reader. Because the local
app can access the file directly, there is no network transfer of the file through ICA
tio
Additional Resources:
Local App Access and URL redirection - https://docs.citrix.com/en-us/xenapp-and-
xendesktop/7-12/install-configure/laa-url-redirect.html
Host to client redirection - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/hdx/host-to-client-redirection.html
Key Notes:
This feature is also known as FTA (abbreviation) and “Client to Server Content
di
redirection”.
st
Additional Resources:
n
Key Notes:
Content redirection allows you to control whether users access information with
di
devices.
ri bu
Receiver saves the original File-Type Association and restores it if the user de-
favorites the program.
tio
The files can be on local media or a network share (local or accessible to both VDA
n
Additional Resources:
Host to Client redirection - http://docs.citrix.com/en-us/xenapp-and-xendesktop/7-6-
long-term-service-release/xad-hdx-landing/host-to-client-redirection.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
The client drive mapping virtual channel is necessary to open local files on the
di
endpoint. The VDA can only access the file on the endpoint if this channel has not
st
With this feature it is not necessary to have applications installed on the endpoint in
order to open the file / if an application supporting the file type is installed, Receiver
tio
can override the default File-Type Association for this program since it is usually
loaded later (last writer wins).
n
Key Notes:
This is essentially the same situation as the previous slide, however, in this case the
di
user opens a file saved on a network share that is reachable from the session.
st
Instead of opening the file through Client Drive Mapping, the session will pick up the
ri
You can use host to client redirection for performance, so that whenever an
tio
Keep in mind that Host to Client redirection will improve performance only under
specific conditions, because the VDA already optimizes Adobe Flash and other
types of multimedia content. First, consider using the other approaches (policy
settings) noted in the tables below, rather than Host to Client redirection; they offer
more flexibility and usually give a better user experience, particularly for less-
powerful user devices.
Additional Resources:
Host to client redirection - http://docs.citrix.com/en-us/xenapp-and-xendesktop/7-6-
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
What would happen, if a user in a remote location would open a large document
di
• The file will be uploaded to the server through client drive mapping, so if
ri bu
Key Notes:
Featured App Groups are a visual emphasis and a grouping mechanism in addition
di
to the categories.
st
Additional Resources:
How to display the Featured apps group under the "Category" view than the "All"
view on storefront website - http://support.citrix.com/article/CTX217236
Key Notes:
Start menu integration and desktop shortcut only mode lets you bring published
di
application shortcuts into the Windows Start menu and onto the desktop. In this
st
way, users do not have to subscribe to applications from the Receiver user
ri
seamless desktop experience for groups of users, who need access to a core set of
applications in a consistent way.
tio
services, or registry settings to disable the usual "self service" Receiver interface
and replace it with a pre-configured Start Menu. The flag is called SelfServiceMode
and is set to true by default. When the administrator sets the SelfServiceMode flag
to false, the user no longer has access to the self service Receiver user interface.
Instead, they can access subscribed apps from the Start Menu and via desktop
shortcuts - referred to here as shortcut-only mode.
Additional Resources:
Configuring application delivery - http://docs.citrix.com/en-us/receiver/windows/4-
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
The screenshot shows the different settings available in the Receiver Group Policy
di
If no folder is specified and Desktop Shortcut creation is enabled, the icons are
ri bu
Users simply open a browser to a Receiver for Web or Web Interface site and select
and use the applications that they want. In web access mode, no app shortcuts are
placed in the App Folder on your user's device.
Self-service mode - By adding a StoreFront or a Web Interface Services Site
account to Receiver for Windows, you can configure self-service mode, which
enables your users to subscribe to applications through Receiver. This enhanced
user experience is similar to that of a mobile app store. In self-service mode you
can configure mandatory, auto-provisioned, and featured app keyword settings as
needed. When one of your users selects an application, a shortcut to that
application is placed in the App Folder on the user device.
Key Notes:
Self-Service Mode can be configured using Registry, GPO or Web.Config file on
di
Storefront.
st
site, you can configure self-service mode, which allows users to subscribe to
applications from the Receiver user interface. This enhanced user experience is
tio
Additional Resources:
How to Customize App Shortcuts with Receiver for Windows -
http://support.citrix.com/article/CTX200924
Configure Receiver for Windows - http://docs.citrix.com/en-us/receiver/windows/4-
5/configure.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
There is a difference between the Receiver policies and the policies covered in the
di
previous module.
st
• Key Notes:
Application Groups is a 7.9 feature that allows admins to group all or some
di
single entity.
ri bu
• Additional Resources:
• Introducing Application Groups in XenApp -
https://www.citrix.com/blogs/2016/07/20/xenapp-xendesktop-7-9-
introducing-application-groups/
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Using both Applications Groups and Delivery Groups at the same time will work, but
di
the administrator will potentially lose track of where application are configured as
st
Additional Resources:
Create Application Groups - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
tio
12/install-configure/application-groups-create.html
n
Key Notes:
A tag restriction involves several steps:
di
• Create or edit a group with the tag restriction (in other words, "restrict
bu
A tag restriction extends the broker's machine selection process. The broker selects
n
Additional Resources:
Tag restrictions for a desktop or an Application Group - https://docs.citrix.com/en-
us/xenapp-and-xendesktop/7-12/manage-deployment/tags.html
Key Notes:
Use the diagram to learn the different ways of printing. To understand the different
di
printing topologies, the following descriptive names will be used throughout the slide
st
deck :
ri
Additional Resources:
Printing - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/printing.html
Key Notes:
Using this mapping method, the print does not flow inside the HDX protocol, but
di
instead the print is sent directly from the VDA to the print server.
st
remote printer
Printer C: VDA attached printer (uncommon) (can be used to enable a PDF printer
tio
Additional Resources:
XenDesktop Printing chapter - https://docs.citrix.com/en-us/xenapp-and-
xendesktop/7-12/printing.html
Key Notes:
This scenario does not require a print server. For this printer type it is assumed that
di
Endpoints are connected to the printer either with a cable or over the network, but
st
Usually the Endpoint has the model specific printer driver installed to print on this
printer.
tio
Some printers have network interfaces (cable / wireless) and can be addressed via
n
TCP/IP directly. Although these printers are often advertised as network printers by
their manufacturers, they are directly attached to an endpoint, just using a different
method.
Key Notes:
A direct connection from the endpoint to the printer is not necessary. The endpoint
di
hands over the print job to the print server, which transfers the print job to the printer
st
Print servers offer a central management of printing devices and can also enforce
permissions on printers.
tio
Print servers are typically used when users need to share a printer.
n
Key Notes:
Avoid using this method on a large scale with server VDA’s. Attaching several
di
printer objects to every VDA is difficult to manage and can cause extra resource
st
Use mapped printers instead, these can be controlled through policies and login
scripts and will cause less resource usage because they offload the print processing
tio
Key Notes:
Network Printers (or session printers) usually are connected from the VDA by using
di
a print server.
st
These types of printers can be mapped via a logon script, using policies or manually
ri bu
by the user.
tio
n
Key Notes:
The process that makes printers available in a session is known as provisioning.
di
Printer provisioning is typically handled dynamically. That is, the printers that appear
st
in a session are not predetermined and stored. Instead, the printers are assembled,
ri
result, the printers can change according to policy, user location, and network
changes, provided they are reflected in policies. Thus, users who roam to a different
tio
The system also monitors client-side printers and dynamically adjusts in-session
auto-created printers based on additions, deletions, and changes to the client-side
printers. This dynamic printer discovery benefits mobile users as they connect from
various devices.
Creating all printers is time consuming and induces load for the VDA.
Different options are available to select the printers made available:
• Create all printers per default.
• Create only default printer.
• All directly attached printers, but no print server based printers.
Additional Resources:
Printing - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/printing.html
Provision printers - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/printing/printing-provision-printers.html
Auto-created client printers - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
N
12/printing/printing-provision-printers.html#par_anchortitle_179f
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
All session printer policies for a connection will add up to a resultant set of printers
di
that will be mapped into the session. Example: User A is given access to a printer
st
depending on the name of the endpoint device, and in another policy which is
ri
Both printers would be added to the users session in this case. Note, that this is an
exception to policy processing, since normally only one policy can set a result (like
tio
Unless the use the Citrix universal print server, an appropriate printer driver for each
mapped printer has to be installed on the VDA.
Instead of creating multiple session printer policies for different user groups, a single
“Printer assignments” policy can be used. If “Printer assignment” and “session
printer” policies are used, settings from both policies will be merged.
Normally the endpoint’s main printer is the default printer within the session – which
might not always be ideal. Use the Default Printer Policy to set the endpoint’s main
printer, a session printer or a different printer as the default. The last writing policy
with the highest priority effectively sets the default printer.
A similar function exists within MS AD GPOs – although lacking some of the filtering
Note that policies are only applied on logon or re-connection of a session, so a user
ot
that seamlessly roams from one floor to the next floor might not have the policies re-
fo
evaluated.
rr
Universal Print Server - The Citrix Universal Print Server provides universal printing
support for network printers. The Universal Print Server uses the Universal print
es
driver. This solution enables you to use a single driver on a Server OS machine to
al
allow network printing from any device. Citrix recommends the Citrix Universal Print
e
Server for remote print server scenarios. The Universal Print Server transfers the
print job over the network in an optimized and compressed format, thus minimizing
or
Additional Resources:
ri bu
Key Notes:
Although the same printers could be mapped via policies, the spool data sent to the
di
branch file server could potentially consume all bandwidth and cause the user
st
experience to suffer.
ri bu
Mapping printers through the HDX session allows for more granular control of QOS
and compression of the print data.
tio
A special software has been installed on one of the companies VDAs. This software
n
installs a print driver which can directly output print jobs as PDF documents.
What would be the correct name or description for this type of Printer?
• VDA attached Printer
Key Notes:
Internal Endpoint connects to VDA, negotiates Printer-C and Printer-D. While
di
Printer-C can only be used from the VDA by sending pre-spooled print jobs over the
st
HDX protocol to the Endpoint, Printer-D is mapped to the Endpoint from Printserver-
ri
002. If the same print server can be reached from the VDA and if the users
bu
permissions grant access to the Printer-D, then per default the VDA would just map
the printer in the session (if a suitable driver can be installed / has been installed).
tio
Otherwise, Printer-D is treated like Printer-C, so the print job would be sent over the
n
HDX protocol to the Endpoint, which in turn passes the print job on to the
PrintServer-002 but has to reprocess the print job.
The term printing pathway encompasses both the path by which print jobs are
routed and the location where print jobs are spooled. Both aspects of this concept
are important. Routing affects network traffic. Spooling affects utilization of local
resources on the device that processes the job.
Locally attached printers - The system routes jobs to locally attached printers from
the Server OS machine, through the client, and then to the print device. The ICA
protocol optimizes and compresses the print job traffic. When a printing device is
attached locally to the user device, print jobs are routed over the ICA virtual
Additional Resources:
Printing configuration example - https://docs.citrix.com/en-us/xenapp-and-
xendesktop/7-12/printing/printing-configuration-example.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Scenario: An external endpoint has Printer-B mapped from PrintServer-001 and
di
connects to a VDA. Per default, the VDA tries to connect to Printserver-001 to map
st
the Printer-B in the session of the user, but this time the Print Server is located on
ri
the remote side of a VPN. So if the Printer was mapped into the session, the print
bu
job would lose all benefits like compression and bandwidth management or caching.
Depending on the WAN load, the print job might also be blocking other traffic,
tio
connections to print server” policy to Prohibited, so the VDA connects to the printer
only via the Endpoint – every print job will now be sent over the HDX protocol and
can be further managed with other policies to gain performance and control.
Key Notes:
The automatically installed drivers are coming from a repository which is part of the
di
OS – these are mainly stripped down drivers from different manufacturers covering
st
remind them that VDAs might be provisioned to lose every change on reboot,
including the print drivers, so they would have to be automatically re-installed over
and over again.
Having multiple printer drivers on one system can slow down the logon or logoff
process, or cause printing system issues/system instability. Also, drivers can conflict
with each other. Having the least amount of printer drivers necessary is therefore
recommended.
Most printer manufacturers offer universal drivers covering multiple printer models
with a single driver – this is a good approach to limit the number of drivers to test,
implement and maintain. Leading practice: Minimize the number of printer drivers
Additional Resources:
N
Printing - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/printing.html
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Mapping several printers to a single driver can reduce the amount of required printer
di
drivers.
st
The mapping table will be consulted by the system upon session initialization first
before resorting to other mechanisms.
Map client printer drivers - Each client provides information about client-side printers
during logon, including the printer driver name. During client printer auto-creation,
Windows server printer driver names are selected that correspond to the printer
model names provided by the client. The auto-creation process then uses the
identified, available printer drivers to construct redirected client print queues.
Additional Resources:
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
UPD can be configured to produce EMF, XPS, PCL or PostScript files.
di
st
UPD is only compatible with Windows-based Endpoints where a Receiver has been
installed.
ri bu
UPD offers a consistent user experience across VDA platforms, but might not offer
all options of dedicated manufacturer’s printer driver. Special functions like stapling,
tio
cutting, punching etc. might require the original driver to be installed instead.
n
Per default, UPD is used as fallback in sessions, whenever no suitable driver for a
printer can be found.
UPD consists of two components – a driver on the VDA and a driver on the endpoint
which forwards the print job to the local printing system.
EMF is short for Enhanced Metafile Format and is a newer version of the Windows
metafile (WMF) format.
The EMF format is device-independent, meaning that the dimensions of graphics in
the print job is maintained on the printed copy, no matter which resolution the printer
uses.
network printers. The Universal Print Server uses the Universal print driver,
ot
To use the Universal Print Server with a Windows-native driver, enable the Universal
Print Server. By default, if the Windows-native driver is available, it is used.
es
Otherwise, the Universal print driver is used. To specify changes to that behavior,
al
such as to use only the Windows-native driver or only the Universal print driver,
update the Universal print driver usage policy setting.
e
or
Additional Resources:
di
12/printing/printing-provision-printers.html
ri bu
tio
n
Key Notes:
Server load can be reduced when only one printer object needs to be created on
di
session launch.
st
The Universal Printer is a generic front-end for the Universal Print Driver, so users
ri bu
will not see all their printers created in the session, but only the CUP. When they
print to the CUP, per default, they will be asked on the endpoint machine what
tio
printer to output should be sent to. This can be configured with polices to omit the
dialog and just print to the endpoint’s main printer.
n
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Universal Print Server needs to be installed on (all) print servers that VDAs map
di
printers from. The UPD can then be used to transfer EMF files to the print server,
st
essentially in the same way that UPD is used for endpoint side printing.
ri bu
Citrix Universal Print Server consists of two services that use Port 8080
(HTTP/SOAP) and 7229 (CGP) (not to be confused with License Vendor Daemon
tio
7279!) for management and data transfer. A necessary VDA side component is
installed with the VDA but can (/ needs to be) updated independently.
n
Citrix Universal Print Server functionality, per default, is disabled and has to be
enabled explicitly using a policy for the VDAs.
Some options are missing in comparison with endpoint side printing (local settings)
and only basic settings of the printer are exposed.
To use the Universal Print Server with a Windows-native driver, enable the
Universal Print Server. By default, if the Windows-native driver is available, it is
used. Otherwise, the Universal print driver is used. To specify changes to that
behavior, such as to use only the Windows-native driver or only the Universal print
driver, update the Universal print driver usage policy setting.
Additional Resources:
Citrix Universal Print Server - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/printing/printing-provision-printers.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
This tool can be used to simulate multiple sessions auto-creating printers using the
di
Additional Resources:
StressPrinters 1.3.2 for 32-bit and 64-bit Platforms -
http://support.citrix.com/article/CTX109374
How to Use the Stress Printer Tool - http://support.citrix.com/article/CTX129574
Print Detective Tool - http://support.citrix.com/article/CTX116474
Key Notes:
Print Detective is a tool that can enumerate all printer drivers including version
di
information.
st
To install Print Detective, copy the PrintDetective.exe executable file to the desired
location, for the appropriate platform. For example, on a 32-bit system, use the
PrintDetective.exe from the x86 directory and on a 64-bit system use the one from
the x64 directory. There is no installer required as the application is contained in a
standalone executable file.
The Print Detective package includes the PrintDetective.exe file for the 32-bit and
64-bit versions of Windows (located in the x86 and x64 folders respectively), and
the PrintDetective.chm user guide.
Additional Resources:
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Steps to run a test and view results:
di
• Launch UpsCertTool.exe
st
ri
The Citrix UPS Print Driver Certification Tool can be used to test the compatibility of
a print driver with the Citrix Universal Print Server. The tool checks for compatibility
by using the print driver to simulate load, allowing a network administrator or print
driver manufacturer to determine the following:
• Print driver is capable of handling the load normally seen with a Citrix
Additional Resources:
Citrix UPS Print Driver Certification Tool - http://support.citrix.com/article/CTX142119
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Answers:
di
st
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
A profile is a set of files, including a part of the registry, that together contain all
di
wallpaper etc.)
Additional Resources:
About User Profiles - https://msdn.microsoft.com/en-
us/library/windows/desktop/bb776892(v=vs.85).aspx
Key Notes:
Since the release of the FMA the Citrix Profile Management components has been
di
The only two steps required to enable Citrix Profile Management is to create the
ri bu
you install the Virtual Delivery Agent, but you do not have to use Profile
Management as a profile solution.
Key Notes:
By default (if Profile Management is enabled) all users are managed and all files &
di
Key Notes:
UPM is installed together with the VDA software, but might need to be updated
di
By default, UPM does not process user profiles until it is enabled by administrators.
ri bu
tio
n
Key Notes:
Profile Management offers a smooth transition from MS roaming profiles to UPM
di
based profiles.
st
The structure in which the profile contents are saved can even be used to migrate
ri bu
back again.
Profile Management can migrate existing profiles "on the fly" during logon if a user
tio
has no profile in the user store. After this, the user store profile is used by Profile
n
Management in both the current session and any other session configured with the
path to the same user store.
• By default, both local and roaming profiles are migrated to the user store
during logon.
To specifies the types of profile migrated to the user store during logon, choose one
of the following options:
• Local and roaming profiles
• Local
• Roaming
Additional Resources:
Profile handling policy settings - https://docs.citrix.com/en-us/xenapp-and-
xendesktop/7-12/policies/reference/profile-management/profile-handling-policy-
settings.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Variables can be used to separate users’ profile folders per platform (OS, bitness,
di
language, purpose).
st
Profile Management variables can only be used by UPM, while system and AD
ri bu
variables are accessible to other programs as well. AD variables are a good choice
to separate profiles by country or department, provided the according fields on the
tio
Management documentation.
fo
You can also use the %username% and %userdomain% user environment variables
and create custom attributes to fully define organizational variables such as location
rr
Additional Resources:
e
12/policies/reference/profile-management/basic-policy-settings.html
di
st
ri bu
tio
n
Key Notes:
Folder redirection is an excellent addition to most Profile Management solutions.
di
st
Redirected folders do not roam as part of the profile and therefore speed up the
logon and logoff process.
ri bu
Redirected folders normally require a file share different from the profile share.
tio
Accessing large files from redirected folders can take more time since they are
opened over the network – depending on topology.
n
Folder redirection lets you store user data on network shares other than the location
where the profiles are stored. This reduces profile size and load time, but it might
impact network bandwidth. Folder redirection does not require that Citrix user
profiles are employed. You can choose to manage user profiles on your own, and
still redirect folders.
Configure folder redirection using Citrix policies in Studio.
• Ensure that the network locations used to store the contents of redirected
folders are available and have the correct permissions. The location
properties are validated.
By default, this setting is disabled and users are granted exclusive access to the
contents of their redirected folders.
fo
rr
Additional Resources:
es
xendesktop/7-12/policies/reference/profile-management/folder-redirection-policy-
e
settings.html
or
di
st
ri bu
tio
n
Key Notes:
Answer: Expect one profile per user per platform (and additionally per “silo”).
di
st
ri bu
tio
n
Key Notes:
Although CPM can be configured using a local .ini file, it is recommended to secure
di
In the next learning objective we will focus on the different policy settings available.
ri bu
tio
n
Key Notes:
By default, all users are managed.
di
• If only two groups are specified within the processed group policy setting,
st
• If a single group is specified in the excluded groups policy setting, then all
groups except this one are managed.
tio
Management of profiles can fail if groups are used for restricting Profile
Management and these groups are renamed in Active Directory since they are
matched by their name only.
On hosted personal (persistent) desktops users are possibly given local
administrator permission (sometimes to solve some software restrictions). Normally
Profile Management would not manage these users, unless the according policy is
set.
Key Notes:
If a single entry exists in the Registry-Include-Setting (e.g
di
HKCU\SOFTWARE\Adobe) then this will be the **only** registry key that roams. All
st
other keys are implicitly considered to be black-listed and will be excluded from
ri
roaming.
bu
By default, the complete HKCU hive roams and nothing needs to be included.
tio
hosts a single, specialized application. Defining only the printers key and
the application keys to be included could result in a fast loading profile that
can hardly be corrupted.
In case exclusion and inclusion are defined, most specific match wins (in the above
example, the hive “BadlyCoded” would not roam, but its sub-key “important” would).
Exclusions are processed at logoff. This will not block entries to the registry or
filesystem during the session.
The Exclusions section contains policy settings for configuring which files and
directories in a users profile are excluded from the synchronization process.
Exclusion list – directories specifies a list of folders in the user profile that are
Additional Resources:
Exclusions policy settings - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/policies/reference/profile-management/file-system/exclusions-policy-settings.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
In previous versions of Profile Management these settings were either controlled by
di
an .ini configuration file or through manual entry in a policy setting. The pre-defined
st
settings in the .ini file have now been migrated into the policy objects to make
ri
Exclusion list – files : List of files that are ignored during synchronization. File
tio
Examples:
• Desktop\Desktop.ini ignores the file Desktop.ini in the Desktop folder.
• %USERPROFILE%\*.tmp ignores all files with the extension .tmp in the
entire profile.
• AppData\Roaming\MyApp\*.tmp ignores all files with the extension .tmp in
one part of the profile.
If this policy is disabled, no files are excluded. If this policy is not configured here,
the value from the .ini file is used. If this policy is not configured here or in the .ini
file, no files are excluded.
default. If you do not configure this policy here, Profile Management uses the value
ot
from the .ini file. If you do not configure this policy here or in the .ini file, Profile
fo
Additional Resources:
What's New in Profile Management 5.x - https://docs.citrix.com/en-us/profile-
al
management/5/upm-intro-wrapper-den/upm-new-features-den.html
e
or
di
st
ri bu
tio
n
Key Notes:
Stale profiles could accumulate on Hosted Shared environments where multiple
di
users logon during the day, depending on when the servers are rebooted and if they
st
Caching the profile and reusing it can speed up the logon process dramatically, but
n
Additional Resources:
Blog: to cache or not to cache - https://www.citrix.com/blogs/2012/11/30/to-cache-
or-not-to-cache-that-is-the-question/?_ga=1.62125868.1497454651.1430656272
Key Notes:
A user might work on a document which is saved in a local folder on his VDA. When
di
the VDA crashes (or the user does not log off, but just disconnects…) the profile
st
changes (including the document) has not been saved on the file server and is lost.
ri
With Active Write Back, every 5 minutes the latest copy of each changed file is
bu
copied back to the file server. When a user logs on again (after crash or from
different machine), the saved version of the document will be included in the profile.
tio
For some applications a certain registry entry must match a certain file, so only
n
Additional Resources:
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Profile Streaming typically allows for a much faster logon as the amount of data
di
larger files or many files from the profile share – especially if the user just logged on
n
Additional Resources:
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
A special filter driver is used to intercept the access to the placeholder files (reparse
di
Enabling the “Always Cache” policy but setting the value to “0” enables background
ri bu
When enabled, only user profiles within the specified user groups are streamed. All
other user profiles are processed normally.
Additional Resources:
Streamed user profiles policy settings - https://docs.citrix.com/en-us/xenapp-and-
xendesktop/7-12/policies/reference/profile-management/streamed-user-profiles-
policy-settings.html
Key Notes:
Enables a backup of the last known good copy of NTUSER.DAT and rollback in
di
case of corruption.
st
If you do not configure this policy here, Profile Management uses the value from the
ri bu
.ini file. If you do not configure this policy here or in the .ini file, Profile Management
does not back up NTUSER.DAT.
tio
n
Additional Resources:
What's New in Profile Management 5.x - https://docs.citrix.com/en-us/profile-
management/5/upm-intro-wrapper-den/upm-new-features-den.html
Key Notes:
Answer: less traffic, faster logon times
di
st
ri
bu
tio
n
Key Notes:
Delegated Administration now consists of 3 elements (who gets which permissions
di
on which objects).
st
For example, we can give the Junior Admin full admin on the test Delivery Group
ri bu
and the test Catalog while he only has limited permissions of the production
resources.
tio
The Delegated Administration model offers the flexibility to match how your
n
Additional Resources:
Delegated Administration - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/secure/delegated-administration.html
Key Notes:
In this example we have 3 different types of administrators, each requiring individual
di
Key Notes:
Using the helpdesk example, explain that we can control the privileges the Helpdesk
di
In this example the helpdesk can only view the Delivery Group and 3 Catalogs that
ri bu
Roles.
n
Additional Resources:
Delegated Administration - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/secure/delegated-administration.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Citrix Studio cannot be run using local credentials – a domain account is required!
di
st
Key Notes:
You can create custom Roles to match the requirements of your organization, and
di
delegate permissions with more detail. You can use custom Roles to allocate
st
Additional Resources:
tio
12/secure/delegated-administration.html
Key Notes:
The account that is used to create the Site is added to the Full Administrator Role
di
automatically.
st
Understand the function of the Roles and how they relate to typical job Roles:
tio
• Full Administrator
Can perform all tasks and operations.
n
Help Desk Administrator - Can view Delivery Groups, and manage the sessions and
ot
machines associated with those groups. Can see the Machine Catalog and host
information for the Delivery Groups being monitored; and can also perform session
fo
management and machine power management operations for the machines in those
rr
Delivery Groups.
es
Machine Catalog Administrator - Can create and manage Machine Catalogs and
provision the machines into them. Can build Machine Catalogs from the virtualization
al
infrastructure, Provisioning Services, and physical machines. This Role can manage
e
base images and install software, but cannot assign applications or desktops to
or
users.
di
Delivery Group Administrator - Can deliver applications, desktops, and machines; can
also manage the associated sessions. Can also manage application and desktop
st
Host Administrator - Can manage host connections and their associated resource
settings. Cannot deliver machines, applications, or desktops to users.
tio
n
Additional Resources:
Delegated Administration - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/secure/delegated-administration.html
Key Notes:
Creating a Custom Role is very useful since the built in Roles might not meet a
di
Role names can contain up to 64 Unicode characters; they cannot contain the
following characters: \ (backslash), / (forward slash), ; (semicolon), : (colon), #
tio
(pound sign) , (comma), * (asterisk), ? (question mark), = (equal sign), < (left arrow),
n
> (right arrow), | (pipe), [ ] (left or right bracket), ( ) (left or right parenthesis), "
(quotation marks), and ' (apostrophe). Descriptions can contain up to 256 Unicode
characters.
You cannot edit or delete a built-in Role. You cannot delete a custom Role if any
administrator is using it.
Note: Only certain product editions support custom Roles. Editions that do not
support custom Roles do not have related entries in the Actions pane.
Additional Resources:
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
A Scope is essentially just a partition inside the database that allows for grouping of
di
When you create a Site, the only available Scope is the 'All' Scope, which cannot be
deleted.
tio
You can also create Scopes when you create an administrator; each administrator
n
must be associated with at least one Role and Scope pair. When you are creating or
editing desktops, machine catalogs, applications, or hosts, you can add them to an
existing Scope. If you do not add them to a Scope, they remain part of the 'All'
Scope.
Additional Resources:
Delegated Administration - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/secure/delegated-administration.html
Key Notes:
You cannot change the All Scope.
di
st
Each new object created in the database will be added to the All Scope.
ri
Site creation cannot be scoped, nor can Delegated Administration objects (Scopes
bu
and Roles). However, objects you cannot scope are included in the 'All' Scope. (Full
Administrators always have the All Scope.) Machines, power actions, desktops, and
tio
sessions are not directly scoped; administrators can be allocated permissions over
n
Additional Resources:
Delegated Administration - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/secure/delegated-administration.html
Key Notes:
Only scopeable objects show up that have already been created.
di
st
Scope names can contain up to 64 Unicode characters; they cannot include the
tio
> (right arrow), | (pipe), [ ] (left or right bracket), ( ) (left or right parenthesis), "
(quotation marks), and ' (apostrophe). Descriptions can contain up to 256 Unicode
characters.
Additional Resources:
Delegated Administration - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/secure/delegated-administration.html
Key Notes:
When you create a Site as a local administrator, your user account automatically
di
becomes a Full Administrator with full permissions over all objects. After a Site is
st
The Full Administrator Role always has the All Scope; you cannot change this.
By default, an administrator is enabled. Disabling an administrator might be
tio
necessary if you are creating the new administrator now, but that person will not
n
begin administration duties until later. For existing enabled administrators, you might
want to disable several of them while you are reorganizing your object/Scopes, then
re-enable them when you are ready to go live with the updated configuration. You
cannot disable a Full Administrator if it will result in there being no enabled Full
Administrator. The enable/disable check box is available when you create, copy, or
edit an administrator.
Additional Resources:
Delegated Administration - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/secure/delegated-administration.html
Key Notes:
Full Administrator: Can perform all tasks and operations. A Full Administrator is
di
Key Notes:
You can create two types of Delegated Administration reports:
di
administrator, plus the individual permissions for each type of object (for
ri bu
middle pane and then click Create Report in the Actions pane. You can
also request this report when creating, copying, or editing an administrator.
• An HTML or CSV report that maps all built-in and custom Roles to
permissions. You generate this report by running a PowerShell script
named OutputPermissionMapping.ps1. To run this script, you must be a
Full Administrator, a Read Only Administrator, or a custom administrator
with permission to read Roles. The script is located in: Program
Files\Citrix\DelegatedAdmin\SnapIn\Citrix.DelegatedAdmin.Admin.V1\Scrip
ts\.
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
The script to generate the Role to permission mapping can normally be found at the
di
Files\Citrix\DelegatedAdmin\SnapIn\Citrix.DelegatedAdmin.Admin.V1\Scripts\Output
ri
PermissionMapping.ps1”
bu
tio
The following example writes an HTML table to a file named Roles.html and opens
n
Key Notes:
This report will only cover changes that are saved in the database.
di
st
Policy changes in GPMC are not tracked, however, Studio policies are saved in the
database and thus tracked.
n
You can generate CSV and HTML reports containing configuration log data.
• The CSV report contains all the logging data from a specified time interval.
The hierarchical data in the database is flattened into a single CSV table.
No aspect of the data has precedence in the file. No formatting is used and
no human readability is assumed. The file (named MyReport) simply
contains the data in a universally consumable format. CSV files are often
used for archiving data or as a data source for a reporting or data
manipulation tool such as Microsoft Excel.
• The HTML report provides a human-readable form of the logging data for a
Additional Resources:
fo
Key Notes:
CSV is often used for archiving purposes or further processing using data
di
manipulation tools like MS Excel, while HTML Output can be included in project
st
Additional Resources:
Generate reports - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/monitor/configuration-logging.html
Key Notes:
What output formats does Configuration Logging support?
di
Key Notes:
A Site always has one Primary Zone. It can also optionally have one or more
di
Satellite Zones. Satellite Zones can be used for disaster recovery, geographically-
st
Primary Zone:
• The Primary Zone has the default name "Primary," which contains the SQL
tio
Server Site database (and high availability SQL servers, if used), Studio,
n
Additional Resources:
Zones - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/manage-
deployment/Zones.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
• Key Notes:
From version 7.7 we can now span a single XenApp and XenDesktop Site across
di
For optimal performance, install Studio and Director only in the Primary Zone.
tio
fast and reliable VDA registration, and to ensure registration during WAN outages.
• Additional Resources:
XenApp and XenDesktop 7.7: Intro to Zones within FMA -
https://www.citrix.com/blogs/2015/12/29/xenapp-xendesktop-7-7-intro-to-Zones-
within-fma/
Zones - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/manage-
deployment/Zones.html
Deep Dive: XenApp and XenDesktop 7.7 Zones -
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
You might not need Zone; be aware that Zones are only relevant for certain
di
customers, use the bullets to figure out whether Zones are right for you.
st
In a multi-Zone Site, the Zone Preference feature offers the administrator more
ri bu
• There are three forms of Zone Preference. You might prefer to use a VDA
n
Additional Resources:
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
PowerShell is object oriented, so almost every command returns not just plain text
di
or tables, but objects with properties that can e.g. easily be filtered & manipulated.
st
ri bu
Additional Resources:
tio
Key Notes:
Each of the FMA services has a corresponding PowerShell snap-in (DLL) that
di
contains the interfaces and objects that can be controlled from the SDK
st
Individual service .MSI Snap-in install files can be found on the installation media
ri bu
Additional Resources:
TechEdge Orlando 2015 - Advanced Configuration of XenApp and XenDesktop 7.6
using the PowerShell SDK - http://support.citrix.com/article/CTX142511
Key Notes:
During troubleshooting it is recommended to have a look at the command that is
di
failing since most tasks consist of several necessary cmdlets that are started in a
st
specific order. Often only one of these commands fails and the reason might be
ri
Key Notes:
While typing on the PowerShell command line, commands are often abbreviated.
di
You might have seen the above command before in a shorter version like: “asnp
st
cit*”. Many cmdlets have shorter aliases that can be used instead (get-childitem =>
ri
To list all available Snap-ins, issue the following command: get-pssnapin –registered
To list all available modules, issue the following command: get-module -listavailable
Additional Resources:
TechEdge Orlando 2015 - Automation and troubleshooting of Citrix Group Policy for
XenApp and XenDesktop 7.x using PowerShell -
http://support.citrix.com/article/CTX142512
Key Notes:
To demonstrate how many cmdlets are contained inside each PowerShell Snap-in,
di
"cmdlets."}
tio
n
Additional Resources:
http://support.citrix.com/article/CTX139415 - XenDesktop 7.x Services Overview
Key Notes:
Get-Command and Get-Help are very important to understand if you are new to
di
PowerShell.
st
Get-command will allow you to find commands if you only remember part of the
ri bu
name.
n
If commandline is too advanced, PS ISE can be a bit easier as it has the ability to
show inline help and formatting hints.
Key Notes:
The first part (get-brokersession) lists all current sessions regardless of user or
di
state
st
The next cmdlet (where-object) filters all sessions with the criteria (both criteria have
ri bu
to apply, they are joined by “-and”) and passes the result to the cmdlet which will
terminate these sessions (stop-brokersession)
tio
Scenario: You are the Citrix Admin and the Junior Admin asks you for help running
n
the get-brokersession cmdlet. He reports that PowerShell will not accept the
command. What did he likely forget?
• To load the Citrix PS SnapIns.
• There are 3 ways of getting Citrix functionality in PowerShell:
• Asnp citrix*
• Add-PSSnapin -Name Citrix.*
• Start a PowerShell Session from Citrix Studio (Top node, PowerShell
Tab, Button: “Launch PowerShell”)
Key Notes:
Only Server OS VDAs can be scheduled to reboot, Desktop OS VDAs can be
di
controlled through the logoff behavior to either shut down, reboot or suspend. This
st
type.
bu
tio
n
Key Notes:
A restart schedule specifies when to periodically restart all the machines in a
di
Delivery Group.
st
Select a group and then select Edit Delivery Group in the Actions pane.
tio
On the Restart Schedule page, if you do not want to restart machines in the
Delivery Group automatically, select the No radio button and skip to the last step in
n
Click Apply to apply any changes you made and keep the window open, or
click OK to apply changes and close the window.
rr
You cannot perform an automated power-on or shutdown from Studio, only a restart.
es
al
Additional Resources:
e
or
groups-manage.html#par_anchortitle_4612
st
ri bu
tio
n
Key Notes:
You can use PowerShell cmdlets to create multiple restart schedules for machines
di
in a Delivery Group. Each schedule can be configured to affect only those machines
st
in the group that have a specified tag. This tag restriction functionality allows you to
ri
easily create different restart schedules for different subsets of machines in one
bu
Delivery Group.
tio
For example, let's say you use one Delivery Group for all machines in the company.
You want to restart every machine at least once every week (on Sunday night), but
n
the machines used by the accounting team should be restarted daily. You can set up
a weekly schedule for all machines, and a daily schedule for just the machines used
by the accounting team.
Schedule overlap.
Multiple schedules might overlap. In the example above, the machines used by
accounting are affected by both schedules, and might be restarted twice on Sunday.
The scheduling code is designed to avoid restarting the same machine more often
than needed, but it cannot be guaranteed. If both schedules coincide precisely in
start and duration times, it is more likely that the machines will be restarted only
once. However, the more the schedules differ in start and/or duration times, the
Additional Resources:
Create multiple restart schedules for machines in a Delivery Group -
https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/install-configure/delivery-
groups-manage.html#par_anchortitle_ceb9
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
You can use PowerShell cmdlets to create multiple restart schedules for machines
di
in a Delivery Group. Each schedule can be configured to affect only those machines
st
in the group that have a specified tag. This tag restriction functionality allows you to
ri
easily create different restart schedules for different subsets of machines in one
bu
Delivery Group.
tio
For example, let's say you use one Delivery Group for all machines in the company.
You want to restart every machine at least once every week (on Sunday night), but
n
the machines used by the accounting team should be restarted daily. You can set up
a weekly schedule for all machines, and a daily schedule for just the machines used
by the accounting team.
Schedule overlap.
Multiple schedules might overlap. In the example above, the machines used by
accounting are affected by both schedules, and might be restarted twice on Sunday.
The scheduling code is designed to avoid restarting the same machine more often
than needed, but it cannot be guaranteed. If both schedules coincide precisely in
start and duration times, it is more likely that the machines will be restarted only
once. However, the more the schedules differ in start and/or duration times, the
Additional Resources:
Create multiple restart schedules for machines in a Delivery Group -
N
https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-12/install-configure/delivery-
ot
groups-manage.html#par_anchortitle_ceb9
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Other licensing components could also fail: Microsoft KMS Server, Microsoft
di
Additional Resources:
XenDesktop Licensing: Frequently Asked Questions -
https://support.citrix.com/servlet/KbServlet/download/26153-102-
649709/XenDesktop%20FAQ.pdf
Citrix License Check Utility - http://support.citrix.com/article/CTX123935
Citrix Director 7.6 Deep Dive Part 1: License Monitoring -
https://www.citrix.com/blogs/2014/10/10/citrix-director-7-6-deep-dive-part-1-license-
monitoring/
N
14/technical-overview.html
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Customers who virtualize the Citrix License Server are provided with a redundant
di
solution that allows for mobility between multiple physical servers without the need
st
Key Notes:
All information is stored in the Site configuration database; Delivery Controllers
di
communicate only with the database and not with each other. A Controller can be
st
unplugged or turned off without affecting other Controllers in the Site. This means,
ri
however, that the Site configuration database forms a single point of failure. If the
bu
enabled.
The Local Host Cache (LHC) feature allows connection brokering operations in a
XenApp or XenDesktop Site to continue when an outage occurs. An outage occurs
when:
• The connection between a Delivery Controller and the Site database fails
in an on-premises Citrix environment.
• The WAN link between the Site and the Citrix control plane fails in a Citrix
Cloud environment.
Local Host Cache is the most comprehensive high availability feature in XenApp
and XenDesktop. It is a more powerful alternative to the connection leasing feature
not possible. However, machines that were enrolled and configured during
rr
• Server-hosted applications and desktop users may use more sessions than
al
Connection Leasing has certain limitations when active, when the site database is
or
• Users can only connect to the last host they connected to when the site
tio
Additional Resources:
High availability - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
N
ot
fo
rr
es
al
e
or
di
st
ri
bu
tio
n
Key Notes:
Citrix recommends that you back up the database regularly so that you can restore
di
from the backup if the database server fails. In addition, there are several high
st
database makes sure that, should you lose the active database server, the
tio
other solutions because full SQL Server licenses are required on each
database server; you cannot use SQL Server Express edition for a
mirrored environment.
• Using the hypervisor's high availability features — With this method, you
deploy the database as a virtual machine and use your hypervisor's high
availability features. This solution is less expensive than mirroring as it
uses your existing hypervisor software and you can also use SQL Express.
However, the automatic failover process is slower, as it can take time for a
new machine to start for the database, which may interrupt the service to
Additional Resources:
fo
12/technical-overview/databases.html
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
When the last Delivery Controller in a site fails, no new user connections or
di
Additional Resources:
tio
Key Notes:
When the no operational Delivery Controllers are left in the site, the only way to
di
Key Notes:
Although it is likely that a single StoreFront instance could support your XenApp and
di
XenDesktop workload, failover and redundancy are still crucial to maintaining on-
st
StoreFront servers, either Windows 2008 R2, Server 2012 or Server 2016, to
eliminate any possibilities of a single point of failure that may disrupt productivity
and configuring the IP address or DNS name of one controller in each farm. To
streamline the management of multiple StoreFront servers, Citrix has provided a
single admin interface from which you can manage all the servers in your
StoreFront cluster.
To make implementation even more robust, Citrix NetScaler appliance can be
configured to load balance user requests between the multiple StoreFront instances
as well as monitor their availability.
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Redundancy can come in different forms, but mostly means duplicated systems,
di
Key Notes:
Most Load Balancing systems (like Citrix NetScaler) offer many different load
di
The diagram shows only one Load Balancer, which is a single point of failure. This
is done to keep the diagram focused on a certain message.
tio
Adding even more redundant systems can offer even more speed but only add
n
Key Notes:
The controllers will either enter Connection Leasing mode or fail over to Local Host
di
For Connection Leasing: Only users that have previously launched resources within
ri bu
the last 14 days can successfully be brokered. Pooled VDI is not supported.
For Local Host Cache: All brokering will be handled by one single Delivery
tio
Controller.
n
For both: Studio and Director cannot start and the PowerShell API cannot be used.
Key Notes:
StoreFront has scalability built in to the architecture and does not rely on clustering
di
technologies.
st
Additional Resources:
Clustered license servers: https://docs.citrix.com/en-us/licensing/11-12-1/lic-cl-citrix-
di
environment-c.html
st
ri bu
tio
n
Key Notes:
This might cause problems with the AD account of the “cloned” server. The first
di
server might have changed the AD computer account password in the meantime.
st
Two machines claiming the same name or ID will cause a conflict and have to be
ri bu
separated at all times. So, additional caution needs to be applied to ensure the
failed machine does not try to resume it’s original role.
tio
n
Key Notes:
Both license servers must not be issuing licenses at the same time because of
di
EULA restrictions.
st
ri bu
Additional Resources:
tio
https://www.citrix.com/blogs/2015/02/12/making-the-citrix-license-server-truly-highly-
available/ - Making the Citrix License Server (Truly) Highly Available
n
Key Notes:
This slide is to show all 3 database redundancy options side by side, the next three
di
Additional Resources:
tio
Key Notes:
Replica servers have been called mirror servers – some administrators might be
di
The replica servers can be used to speed up read access to the database, while all
ri bu
Additional Resources:
n
Key Notes:
The Witness server can be a different SQL Server edition than the principal and
di
mirror server.
st
SQL Server 2016 and the next version still officially support this feature, but since
ri bu
Additional Resources:
Features in SQL Server 2016: https://msdn.microsoft.com/en-
us/library/ms143729.aspx - Deprecated Database Engine
Key Notes:
The shared storage architecture requires management and redundancy as well –
di
Key Notes:
Citrix recommends NetScaler as the load balancing solution for StoreFront
di
st
ri
Additional Resources:
bu
availability-and-multi-site-configuration.html
n
Key Notes:
Whenever a configuration change has been done on a StoreFront server within a
di
server group, the changes must be propagated to the other servers in the group.
st
It is recommended to designate one server to making changes and keep the rest of
ri bu
Additional Resources:
StoreFront high availability - https://docs.citrix.com/en-us/storefront/3-8/plan/high-
availability-and-multi-site-configuration.html
Configure server groups - https://docs.citrix.com/en-us/storefront/3-8/configure-
server-group.html
Key Notes:
Based on simulated activity where users log on, enumerate 100 published
di
applications, and start one resource, expect a single StoreFront server with the
st
dual Intel Xeon L5520 2.27Ghz processor server to enable up to 30,000 user
bu
Expect a server group with two similarly configured servers in the group to enable
up to 60,000 user connections per hour; three nodes up to 90,000 connections per
hour; four nodes up to 120,000 connections per hour; five nodes up to 150,000
connections per hour; six nodes up to 175,000 connections per hour.
Additional Resources:
StoreFront high availability - https://docs.citrix.com/en-us/storefront/3-8/plan/high-
availability-and-multi-site-configuration.html
Configure server groups - https://docs.citrix.com/en-us/storefront/3-8/configure-
server-group.html
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Mail System, File server (profiles), telephony, web gateway, remote access, proxy,
di
Key Notes:
XenApp and XenDesktop offers to install SQL Express during install.
di
st
Key Notes:
While large organizations has a dedicated security team in charge of all security
di
concerns, smaller companies might leave some of these concerns with the
st
Key Notes:
The diagram serves as a high level overview;use it to investigate all the possibilities
di
Some companies allow internal access only, so securing internal components also
ri bu
Key Notes:
This slide presents the same view as the previous one, but with security measures
di
implemented.
st
ri bu
tio
n
Key Notes:
Typically in larger organizations the Citrix Admin does not have permission to create
di
Key Notes:
Using certificates from public CAs often does not require additional management on
di
client devices, since the public CAs are already included in their built in list of
st
Key Notes:
Private (or internal) CAs are often used for domains that cannot be verified
di
An additional benefit for hosting a private CA is the complete control over certificate
management – but this also comes with the responsibility for protecting the CA
tio
Self-signed certificates do not require a CA. In fact, the certificate is signed using its
own private key. By design, such certificates cannot be revoked if compromised
which is a large drawback. For use in larger enterprises self-signed certificates are
also lacking required central management.
Key Notes:
The most common parts of the solution has been assigned certificates within the
di
lab.
st
Key Notes:
Domain joined PC’s will trust a domain CA by their membership of the domain.
di
st
Using a public signed certificate for StoreFront may be a better solution in order to
support various device types.
tio
n
Key Notes:
The BrokerService also hosts the Secure Ticket Authority (STA) required for remote
di
access.
st
ri bu
Additional Resources:
tio
service-important-steps-to-prevent-theft-of-user-passwords/
Key Notes:
The slide only covers the first part of the of the Pass-through authentication
di
process.
st
At this point we are only presenting the feature and how it ties in to the XML trust
ri bu
feature.
tio
Additional Resources:
n
Key Notes:
Prior to entering the command, the appropriate Citrix PowerShell Snap-In needs to
di
be loaded.
st
Use IPsec, firewalls, or any technology that ensures that only trusted services
ri bu
Restrict access to the XML Service to only the servers running the StoreFront.
n
Key Notes:
Using the XML trust policy with FMA will not work.
di
st
Key Notes:
By using HTTP as the transport type, information is sent in clear text, with
di
By default, the XML Service on the Controller listens on port 80 for HTTP traffic and
ri bu
port 443 for HTTPS traffic. Although you can use non-default ports, be aware of the
security risks of exposing a Controller to untrusted networks.
tio
To change the default HTTP or HTTPS ports used by the Controller, run the
n
Additional Resources:
SSL - http://docs.citrix.com/en-us/xenapp-and-xendesktop/7-6-long-term-service-
release/xad-security-article/xad-ssl.html
How to Enable SSL on XenDesktop 7.x Controllers to Secure XML Traffic:
http://support.citrix.com/article/CTX200415
Key Notes:
While it is leading practice to secure XML traffic, unsecured XML traffic does not
di
the XML traffic between StoreFront and Delivery Controller is typically internal with
ri
both servers on the same VLAN- unlike a browser connection to StoreFront where
bu
On top of securing the XML traffic, the VDA registration traffic and HDX traffic can
• Enabling SSL/TLS connections between users and VDAs is valid only for
al
XenApp 7.6 and XenDesktop 7.6 Sites, plus later supported releases.
e
• Configure SSL/TLS in the Delivery Groups and on the VDAs after you
or
Delivery Groups.
st
permission.
tio
Additional Resources:
Transport Layer Security (TLS) - https://docs.citrix.com/en-us/xenapp-and-
Key Notes:
What are the high level steps for configuring a XenApp and XenDesktop Site?
di
• Answers:
st
ri
Key Notes:
HDX is the name used for ICA and CGP “Common Gateway Protocol” connections.
di
st
While this module focuses on enabling secure access from external networks using
the NetScaler, the HDX protocol can also be encrypted internally using SSL/TLS.
ri bu
Additional Resources:
HDX technologies for optimizing application and desktop delivery -
https://www.citrix.com/content/dam/citrix/en_us/documents/products-solutions/citrix-
hdx-technologies.pdf
TLS settings on VDAs - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
12/secure/tls.html#par_anchortitle_53b7
Configure TLS on a VDA using the PowerShell script - https://docs.citrix.com/en-
us/xenapp-and-xendesktop/7-12/secure/tls.html#par_richtext_5
Key Notes:
NetScaler has a huge feature set; this is just a small percentage of what NetScaler
di
can do.
st
Where a proxy server is typically hosted internal to allow users to browse externally
ri bu
browse internal resources without enabling tcp access to the webservers itself
n
(many customers may be familiar with Microsoft ISA or TMG servers which has
similar functionalities).
HDX proxy is similar to reverse web proxy, however, instead of protecting
webservers, it protects the internal VDA’s and converts port 1494 & 2598 data to
encrypted SSL data in real time.
Key Notes:
The STA service is like the XML service a sub-service within BrokerService.
di
st
Think of the STA like a parking valet desk, you turn in your car and receive a
tio
randomized number, this number can be used to authorize you to pick up your car
later without presenting your credentials. The problem with this, much like the STA,
n
is you don’t want anyone to intercept your randomized number and pick up your car.
Key Notes:
At the point where this analogy starts, authentication, application browsing, request
di
to start an application and load balancing decisions have already taken place.
st
The next step would be NetScaler launching the session on the users behalf.
ri bu
tio
n
Additional Resources:
Establishing a Secure Connection to the Server Farm - https://docs.citrix.com/en-
di
us/netscaler-gateway/11-1/integrate-web-interface-apps/ng-wi-integrate-apps-
st
secure-connection.html (this document talks about Web Interface but the STA
ri
Key Notes:
While there are other products on the market that can do “HDX proxy”, NetScaler
di
When new features are added to the HDX protocol, they are immediately supported
ri bu
on NetScaler Gateway.
Competition does not have the same knowledge about the HDX protocol as Citrix
tio
does.
n
Additional Resources:
How to Configure NetScaler Gateway Session Policies for StoreFront -
https://support.citrix.com/article/CTX139963
Key Notes:
The next slides will highlight the connection flow step by step in more detail, this
di
such.
ri bu
All ports can be changed but this might complicate troubleshooting and monitoring,
deviating from default ports should be only be done with careful planning.
tio
n
Key Notes:
Possible Answers:
di
• Only one port needs to be opened on the firewall (443). Single vendor to
st
address for support (Citrix). Scalability options (more bandwidth, HA, more
ri bu
Key Notes:
StoreFront has scalability built in to the architecture and does not rely on clustering
di
technologies.
st
information back through the NetScaler to the user’s device in the form of a ICA
n
launch file. When the Receiver opens the ICA launch file, the Secure Ticket is
presented to the NetScaler. The NetScaler will then attempt to validate this ticket
with the STA, if this operation fails resources cannot be launched.
Key Notes:
Director can access:
di
st
Real-time data from the Broker Agent using a unified console integrated with
Analytics, Performance Manager, and Network Inspector.
ri bu
Additional Resources:
About Director - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-
N
12/director.html
ot
insight-powered-by-citrix-netscaler-insight-center.pdf
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
By default, Citrix Director is installed on a Delivery Controller.
di
st
Install Director using the installer, which checks for prerequisites, installs any
missing components, and sets up the Director website and performs basic
ri bu
configuration.
Installer handles typical deployments. If Director was not included during
tio
installation, use the installer to add Director. To add any additional components, re-
n
Additional Resources:
Citrix Director Documentation: About Director - https://docs.citrix.com/en-us/xenapp-
and-xendesktop/7-12/director.html
Citrix Director Requirements: https://docs.citrix.com/en-us/xenapp-and-
xendesktop/7-12/system-requirements.html#par_anchortitle_5d4a
Key Notes:
In smaller environments the Delivery Controller should have capacity to run Director.
di
st
However, as load starts to increase Director can take away resources from the
Delivery Controller.
ri bu
To ensure optimal performance inside Director, and ensure proper session brokering
performance, separate the Director role away from Delivery Controller.
tio
To ensure a highly available Director solution, and to spread load between Director
n
Additional Resources:
Load Balancing Director with NetScaler:
https://www.citrix.com/blogs/2016/09/06/using-netscaler-to-load-balance-director/
Key Notes:
The Delivery Controllers ability to process XML queries from StoreFront has a
di
The StoreFront servers might have plenty of available resources, but if the delay is
ri bu
Key Notes:
The default view when logging on to Director as an administrator is the dashboard.
di
The dashboard contains alerts and a number of clickable graphs. If there are active
st
Key Notes:
The lower part of the dashboard contains operational status for hypervisors,
di
Key Notes:
• Dashboard – overview of performance and failures for the last hour – This
di
resources from the site and which applications are used the most.
n
Key Notes:
Administrators can report on recorded performance metrics of a site reaching up to
di
The data can also be exported in PDF, CSV or XLSX-Format for later processing or
ri bu
archival.
The different reports available include:
tio
• Sessions: shows the number of peak concurrent sessions for any delivery
n
group. Also displays session start times and duration for selected users.
• Failures: displays errors relating to VDAs and connections in association
with administrative changes made to the site database.
• Logon Performance: provides an overview of the duration of each logon for
specific delivery groups in a set timespan with a breakdown on how many
time is spent in different phases of the logon process, like group policy
application or running logon scripts.
• Load Evaluator Index: shows the load management values used to
determine session placement on server OS VDAs and breaks them down.
Additional Resources:
es
director-trends-explained/
e
or
di
st
ri bu
tio
n
Key Notes:
The filtered views can be filtered by many different criteria. These filters can also be
di
• Example: I want to find all sessions that are connected from a Receiver
ri bu
custom filter and then modify it. Additionally, you can create custom filtered views of
n
Additional Resources
Citrix Director 7.6: Filters explained - https://www.citrix.com/blogs/2014/12/17/citrix-
director-7-6-filters-explained/
Filter data to troubleshoot failures - https://docs.citrix.com/en-us/xenapp-and-
xendesktop/7-12/director/monitor-deployments.html#par_anchortitle
• Key Notes:
• Citrix alerts are alerts monitored in Director that originate from Citrix
di
components. You can configure Citrix alerts within Director in Alerts > Citrix
st
sent by email to individuals and groups when alerts exceed the thresholds
bu
you have set up. Configure the notification as emails to individuals and
tio
• Additional Resources:
• Alerts and notifications - https://docs.citrix.com/en-us/xenapp-and-
xendesktop/7-12/director/alerts-notifications.html
• Configure alerts policies with SNMP traps - https://docs.citrix.com/en-
us/xenapp-and-xendesktop/7-12/director/alerts-
notifications.html#par_anchortitle_6b0f
• Key Notes:
SCOM integration with Director lets you view alert information from Microsoft
di
System Center 2012 Operations Manager (SCOM) on the Dashboard and in other
st
SCOM alerts are displayed on-screen alongside Citrix alerts. You can access and
drill down into SCOM alerts from SCOM tab in the side bar.
tio
You can view historical alerts up to one month old, sort, filter, and export the filtered
n
Key Notes:
Filters work almost like a SQL “Select * from”
di
st
Key Notes:
Using the Trends section of Director will give you access to a vast amount of
di
Key Notes:
For every administrator that has access to the Dashboard view, the Search-View is
di
Key Notes:
For all administrators that do not have access to the Dashboard view (or Trends and
di
Key Notes:
The beginning of given name, last name or logon name can be used to query active
di
directory while typing. So the first few characters from a user’s name are sometimes
st
Suggestions while typing are also available for the machine and endpoint search.
Matching is always done from left to right, so entering “Tata” would match
tio
Key Notes:
Applications are normally running visible in the session of a user, while processes
di
contain tasks running in the background (normally not visible to the user).
st
ri bu
tio
n
Key Notes:
The Session view and Detailed Session view are self-updating, but can be updated
di
Meaningful names can help a lot while troubleshooting an issue, as the full name of
ri bu
Key Notes:
Desktop sessions each require their own session, while published applications
di
might run in the same session (depending on configuration). Also mention that in
st
some deployments users start off with a single desktop session and start multiple
ri
Selecting the correct session is key in troubleshooting performance issues, when for
tio
Key Notes:
To change this behavior, the full admin could copy the helpdesk role and change the
di
permissions accordingly.
st
• Possible Answer:
tio
• Username (any of the following: given name, last name, logon name)
• Machinename
n
Key Notes:
During log off and closure of applications, depending on the OS & application
di
Tasks currently consuming CPU and memory will continue to do so when a session
ri bu
is disconnected.
tio
n
Key Notes:
Depending on local data and privacy laws using this feature requires consent of the
di
user.
st
privacy.
Shadowing uses Microsoft’s Remote Control feature.
tio
• The VDA needs to be accessible from the HelpDesk Agent’s machine via
the Remote Control port (default: 3389).
• The person or group accessing a session needs according permission to
do so.
• The remote control feature needs to be enabled during setup of Director.
Key Notes:
The VDA needs to be running, but the user will be logged out during the reset
di
procedure.
st
Personal vDisks are a very special solution to some problems/scenarios and adds
ri bu
Any data on the personal vDisk will be lost if they are not saved elsewhere or
n
Additional Resources
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
The profile reset function is available only for user profiles managed by Citrix User
di
to the user profile after resetting the application settings in the profile. In addition,
n
the original profile is not deleted but just renamed; so, data from this profile can be
recovered if needed.
Folder Redirection is important when resetting a Microsoft roaming profile, without
folder redirection enabled the user will lose access to: My Documents, Pictures,
Download etc., and it will be a manual process of copying them from the renamed
profile into the new profile.
Additional Resources
Reset a user Profile - https://docs.citrix.com/en-us/xenapp-and-xendesktop/7-6/xad-
monitor-article/xad-monitor-director-wrapper/xad-help-desk-wrapper/xad-help-reset-
N
ot
fo
rr
es
al
e
or
di
st
buri
tio
n
Key Notes:
The option to kill processes is not new, but it is much more accessible since the
di
Ensure that all Delegated Admins that has access to Director are aware of the
ri bu
Additional Resources
n
Key Notes:
Sending a message to users is extremely helpful when doing maintenance on Citrix
di
Additional Resources
tio
Key Notes:
We are integrating with remote assist to do shadowing.
di
st
Key Notes:
HDX Insight is part of the NetScaler Insight Center™ and is based on the popular
di
Application Deliver Controller (ADC) and the CloudBridge WAN optimization solution
ri
that are uniquely situated in the application ‘line of sight’ both in the data center and
bu
the branch to provide a 360-degree view for applications, including virtual desktop
traffic.
tio
Fast Failure Analysis: HDX Insight allows administrators to dissect the network data
n
from various angles including desktop, application, user groups and at the individual
user level. This results in a fast root-cause-analysis for customer issues.
Real-time Client/Server Latency Measurements: In addition to TCP level jitter and
latency information, HDX Insight provides detailed breakdown of ICA Session
latency by client, ICA RTT, and by server. These are viewed in real-time or
historically on simple dashboards.
Powerful data correlation between application and network data enables reporting
and analysis on applications, the network and users.
When deployed in-line, NetScaler and CloudBridge detect and dissect ICA
Additional Resources
HDX Insight at a glance -
https://www.citrix.com/content/dam/citrix/en_us/documents/products-solutions/hdx-
insight-powered-by-citrix-netscaler-insight-center.pdf
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Remember HDX/CGP/ICA is a proprietary protocol, based on virtual channels.
di
st
The appliance can be hosted on XenServer, VMWare ESX, Microsoft Hyper-V and
bu
KVM.
tio
The Blue line between the Director Server and the NetScaler Insight Center is the
Director querying the NetScaler Insight Server.
n
Key Notes:
In the Lab, a preconfigured appliance will be used.
di
st
Step 1: encompasses assigning an IP, subnet mask, gateway and DNS address to
the appliance.
ri bu
Step 2: can be performed in the Web GUI of the HDX Insight appliance.
tio
Without step 3 admins would need to pull reports directly from NetScaler Insight
center and this would not offer the same flexibility as integrating with Director.
Key Notes:
AppFlow is a UDP based protocol (similar to NetFlow) for transmitting monitoring
di
data related to so called Collectors. The HDX Insight Box is such a collector.
st
ri bu
Additional Resources
tio
Key Notes:
In addition to Director, most statistics are also available from the dashboard within
di
Additional Resources
tio
Key Notes:
Management packs are available for XenApp and XenDesktop (for 7.x versions with
di
Additional Resources
n
Additional Resources
Citrix SCOM Management Bundle Now Available for Platinum Customers -
di
https://www.citrix.com/blogs/2016/03/17/citrix-scom-management-bundle-now-
st
available-for-platinum-customers/
ri bu
tio
n
Key Notes:
Citrix SCOM Management Packs does not ship with a specific release of XenApp
di
and XenDesktop.
st
Citrix SCOM Management Packs are backwards compatible, so you can deploy the
ri bu
latest version although you want to monitor an older XenApp and XenDesktop
environment.
tio
The SCOM Management Packs can be updated to the latest supported release
n
Additional Resources
Citrix SCOM Management Pack for XenApp and XenDesktop version 3.9 -
https://docs.citrix.com/en-us/scom-management-packs/xenapp-xendesktop/3-
9/whats-new.html
Key Notes:
Testing with 10,000 users have proven the following:
di
• Increasing the session count does not impact the CPU usage of
st
MPXAXDAgent
ri bu
• Increasing the session count does not impact the CPU usage of
HealthService
tio
Additional Resources:
XenApp & XenDesktop Management Packs for SCOM Explained -
https://www.citrix.com/blogs/2016/07/11/scale-and-performance-of-citrix-xenapp-and-
xendesktops-management-packs-for-scom-explained-tadej-razborsek/
Citrix SCOM Management Pack for XenApp and XenDesktop Performance Overview
-http://docs.citrix.com/content/dam/docs/en-us/scom-management-pack/xenapp-and-
xendesktop-management-pack/3-
8/downloads/Citrix_MPXAXD_PerformanceOverview.pdf
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
CXD-302 XenApp and XenDesktop Advanced Concepts – Troubleshooting is a two
di
Key Notes:
Most IT companies have troubleshooting methodology in place even if it’s not
di
formally defined.
st
Issue identification is the first step in the troubleshooting methodology. Issues are
ri bu
especially important if you cannot easily reproduce the problem and you need to
understand the circumstances under which the problem appears. It is important to
determine the difference between the expected behavior and the actual behavior.
Recovering the service can potentially be one of the firsts steps in troubleshooting
methodology. Sometimes, one part of the team can work on the recovery while the
other part of the team tries to identify and fix the issue.
Isolation of the problem is helpful to narrow the amount of components to
troubleshoot. Is the problem related to specific servers or components? Specific
times of day? Specific networks? etc.
The methodology that is commonly used (even if not defined formally) is called
Key Notes:
Taking pro-active steps is more important than troubleshooting.
di
st
If the admin had taken pro-active steps in the first place, he would never have faced
the issue in the example.
ri bu
tio
n
Additional Resources:
XenApp and XenDesktop 7.12 Fixed issues - https://docs.citrix.com/en-us/xenapp-
di
and-xendesktop/7-12/whats-new/fixed-issues.html
st
and-xendesktop/7-12/whats-new/known-issues.html
tio
n
Key Notes:
All Citrix webpages are fully indexed by Google and it is a great search tool towards
di
Citrix resources.
st
Use site: Citrix.com followed by what you are searching for to get Citrix only hits.
ri bu
tio
Additional Resources:
n
Additional Resources:
XenApp and XenDesktop 7.12 Fixed issues - https://docs.citrix.com/en-us/xenapp-
di
and-xendesktop/7-12/whats-new/fixed-issues.html
st
ri bu
tio
n
Key Notes:
Hotfixes on the FMA platform are typically prefixed with a name to identify which
di
component they are designed for; following is a list of some of the names being
st
Key Notes:
Installing a hotfix that is in general release is typically “safer” since it has gone
di
When installing any type of hotfix you should always read the release notes as they
ri bu
contain important information on any adverse effects the hotfix may have, or if the
hotfix has any requirements.
tio
n
Additional Resources:
Lifecycle Maintenance Hotfixes - Definitions and Examples
http://support.citrix.com/article/CTX130337
Key Notes:
A Limited Release hotfix should only be installed if they experience the exact same
di
A Limited Release hotfix should never be part of routine patch management of the
ri bu
Key Notes:
Some MyCitrix accounts may not have permission to download all limited hotfixes
di
Additional Resources:
tio
Key Notes:
LTSR was created to allow customers to stay on a specific Citrix platform for an
di
compliant you must continuously keep your platform updated to the latest product
release.
tio
Issue example: Pharma CustomerA has regulations that states that any new
n
environment must undergo regression testing for 18 months before the environment
can go into production. After 4 months of testing XenApp & XenDesktop 7.9 Citrix
releases a new version thus effectively forcing CustomerA to update the
environment and reset the test phase.
Long Term Service Releases (LTSR) of XenApp and XenDesktop are ideal for large
enterprise production environments where you would prefer to retain the same base
version for an extended period. With LTSR, you will have regular access to fixes
typically void of new functionality for predictable on-going maintenance. With each
LTSR comes new extended support timelines that let you plan ahead for upgrades
at a pace that’s right for you and your organization.
Extended Lifecycle with support for 10 years. Citrix typically announces a five year
Additional Resources:
fo
Key Notes:
Current Releases (CR) of XenApp and XenDesktop deliver the latest, most
di
innovative app and desktop virtualization features and functionality allowing you to
st
stay on the cutting edge of technology and ahead of your competition. Ideal for
ri
agile environments where you can rapidly deliver the newest app and desktop
bu
cycles. Instead of managing new releases and patches independently, with Current
n
Releases you can simply upgrade to the latest release which includes fixes and new
functionality side-by-side.
Additional Resources:
Explanation of CR - https://www.citrix.com/support/programs/software-
maintenance/xenapp-and-xendesktop-servicing-options.html
Key Notes:
LSTR is currently in extended support until January 2026.
di
st
ri
Additional Resources:
bu
lifecycle/product-matrix.html
n
Key Notes:
Many problems can be addressed by utilizing the StoreFront event log.
di
st
ri bu
tio
n
Key Notes:
Director has a built-in feature to address profile resets.
di
st
ri bu
tio
n
Key Notes:
The Citrix Supportability Pack is downloaded as a zip file; the zip file contains an
di
updater function and a web view to get an overview of all the tools. Each section
st
products. The tools are cataloged by features and components to make it easier to
find and use, and the addition of Supportability Pack Updater since v1.2.0 makes
the Pack self-updatable. Early versions of the Pack serves as a launch pad for
efforts to raise awareness, improve accessibility, and promote use of internal
troubleshooting tools. In subsequent updates of this pack the spotlight will shift to
creation of new tools based on prevalent customer scenarios and your feedback.
Additional Resources:
Citrix Supportability Pack v1.2.4 - http://support.citrix.com/article/CTX203082
Key Notes:
Installing Supportability Pack
di
st
1. If you have an older version of Supportability Pack on your system, e.g. v1.1.x,
we recommend you completely remove the existing Supportability Pack including all
ri bu
tools and files before downloading the new v1.2.x version. Since v1.2.x provides a
new Updater utility, you can use it to keep all tools up to date in the future.
tio
2. Unzip the Supportability Pack v1.2.x zip package into a local folder of your
n
choice.
3. Open the README.HTML file with any web browser and begin exploring the
tools catalog.
4. Each tool is in its individual folder inside the local directory Tools.
5. The Updater SupportabilityPackUpdater.exe is in the same directory as
README.HTML. Use "SupportabilityPackUpdater.exe /help" to get more info about
how to use it.
Key Notes:
The VDA Clean-Up Utility can be run in unattended mode if desired using the /silent
di
In silent mode, the tool will reboot system automatically. After the reboot, logon to
ri bu
the machine with the same admin user, the tool will run again automatically.
Automatic reboot of the system can be suppressed by using /NoReboot command
tio
Additional Resources:
VDA Cleanup Utility - https://support.citrix.com/article/CTX209255
Key Notes:
HDX Monitor is a free tool provided for download on the Citrix Insight Services
di
Website. Users can run the tool inside a session or admins can use the tool to
st
Explain that HDX Monitor does not change the properties of a session and cannot
interfere with the session (disconnect, logoff etc.).
tio
HDX Monitor can export the data to an XML file for later processing.
n
Citrix HDX includes a broad set of technologies that provide a high-definition user
experience.
HDX provides a superior graphics and video experience for most users by default,
with no configuration required. Citrix policy settings that provide the best out-of-the-
box experience for the majority of use cases are enabled by default.
Use the HDX Monitor tool (which replaces the Health Check tool) to validate the
operation and configuration of HDX visualization technologies and to diagnose and
troubleshoot HDX issues.
Key Notes:
Print detective is a support tool that can scan a local or remote computer for
di
installed print drivers; the tool can list details either in the console or output the data
st
to a log file.
ri bu
The tool can be very helpful in analyzing driver versions across different VDA’s
Example: UserA can print when he is logged on to one ServerA, but not when he is
tio
logged on to ServerB; use the tool to get a list of print drivers on both servers and
n
compare these.
Also, it has the ability to delete specific drivers, but this requires admin rights on the
specific computer.
Print Detective is an information gathering utility that can be used for
troubleshooting problems related to print drivers. It enumerates all printer drivers
from the specified Windows machine, including driver specific information. It can
also be used to delete specified print drivers. It allows for log file capabilities and
provides a command-line interface as well.
Additional Resources:
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
The Receiver Clean-Up Utility can be run in unattended mode if desired using the
di
ReceiverLogs folder is created in the location where the utility is run and tracks all
ri bu
Although the Receiver Clean-Up Utility will backup Receiver registry keys before
n
deleting them, it is recommended to back up the registry before running this tool.
Additional Resources:
Receiver Clean-Up Utility - http://support.citrix.com/article/CTX137494
Key Notes:
Most print driver issues are related to mapping and deleting the printer multiple
di
Stress printers will simulate this action, use the drop-down selectors to chose how
ri bu
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
XDPing is an essential tool to troubleshoot registration and brokering issues in
di
It will verify network settings, DNS lookup, time sync, user information, firewall
ri bu
information etc.
The XDPing tool is a command-line based application which automates the process
tio
environment. The tool can be used to verify configuration settings on both the
XenDesktop Broker and VDA machines, both from the console and remotely.
Depending on how the tool is run, and from where, the following checks and
information can be displayed:
• Information and status of Network Interfaces and Network settings.
(Console Only)
• Performs DNS lookup and reverse lookup on the IP address of the device.
• Information on Time synchronization and time check for Kerberos
Authentication. (Console Only)
• Queries the local event log to check for known events that are related to
XenDekstop.
fo
rr
• Provides client bandwidth and response time information from the VDA to
the client.
es
al
Additional Resources:
e
or
Key Notes:
Various Citrix components contain built in debug trace statements, which leverage
di
the Microsoft Event Tracing for Windows (ETW) technology. This means that these
st
CDFControl has been crafted to gather critical troubleshooting data (such as CDF
tio
trace and performance data) that should help when troubleshooting complex Citrix
related issues. This guide will help you become familiar with all the new features
n
and techniques available to help you maximize your use of this application.
Additional Resources:
CDFControl v3.2.1.8 - http://support.citrix.com/article/CTX111961
Key Notes:
Scout is a data collection tool that can be used to capture environment data and
di
CDF traces from environments running XenDesktop 5.x, XenApp 6.x and XenApp
st
Scout is pre-installed on all controllers running 7.5 upwards, and can be found in the
Citrix Folder on the start menu.
tio
Scout must run on a Citrix Delivery Controller machine when capturing product
n
information.
Additional Resources:
Scout v2.23.0.0s - https://support.citrix.com/article/CTX130147
Key Notes:
Citrix Insight Services (formerly known as TaaS) is an initiative from Citrix focused
di
on Citrix environment and configuration. The tools are focused on a single mission
(data collection), and their impact
tio
n
Additional Resources:
Citrix Insight Services - https://cis.citrix.com/
Citrix Insight Services FAQ - http://support.citrix.com/article/CTX131233.
Key Notes:
Call Home is optional and can be turned off using PowerShell if enabled during
di
install.
st
ri bu
Additional Resources:
tio
Additional Resources:
Sysinternals Suite - https://technet.microsoft.com/en-us/sysinternals/bb842062
di
st
ri bu
tio
n
Key Notes:
Process Explorer can be used to analyze processes and applications.
di
st
Especially helpful for tracking down DLL version issues and handle leaks.
ri
Example: You have an application running in your environment that you suspect of
bu
Additional Resources:
Process Explorer v16.12 - https://technet.microsoft.com/en-
us/sysinternals/processexplorer
The Case of the Unexplained, 2010: Troubleshooting with Mark Russinovich -
https://channel9.msdn.com/events/teched/northamerica/2010/wcl315
Key Notes:
Process Monitor is the combination of two older tools from Sysinternals, Regmon
di
and Filemon.
st
Process Monitor will monitor and trace any I/O or registry based activity and allow
ri bu
you want to find out where the application is trying to write and which write operation
n
gets denied.
Process Monitor is an advanced monitoring tool for Windows that shows real-time
file system, Registry and process/thread activity. It combines the features of two
legacy Sysinternals utilities, Filemon and Regmon, and adds an extensive list of
enhancements, including rich and non-destructive filtering, comprehensive event
properties such as session IDs and user names, reliable process information, full
thread stacks with integrated symbol support for each operation, simultaneous
logging to a file, and much more. Its uniquely powerful features will make Process
Monitor a core utility in your system troubleshooting and malware hunting toolkit.
N
ot
fo
rr
es
al
e
or
di
st
ri bu
tio
n
Key Notes:
Example: You have implemented a new application that spikes to 100% CPU
di
Use ProcDump to create an automated rule for crash dumping the process when it
ri bu
goes to 100%, analyze the dump with the developers to determine the root cause of
the CPU spike.
tio
Write up to 3 mini dumps of a process named 'consume' when it exceeds 20% CPU
n
Additional Resources:
ProcDump v8.0 - https://technet.microsoft.com/en-us/sysinternals/dd996900
Key Notes:
Example: Users on a specific network gets randomly disconnected from their
di
sessions, use WireShark to trace the network traffic, apply filter to look for dropped
st
Additional Resources:
tio