GENERAL QUESTIONS...2 USER S PROFILE AND SETTINGS... 4 SERVICE INSTALLATION AND CONFIGURATION... 6 ASSIGNING PROFILES... 9 MIGRATING PROFILES...
|
|
- Dortha Garrison
- 8 years ago
- Views:
Transcription
1 Citrix Presentation Server FAQ FAQ DATASHEET Profile Management Frequently Asked Questions Table of Contents GENERAL QUESTIONS...2 USER S PROFILE AND SETTINGS... 4 SERVICE INSTALLATION AND CONFIGURATION... 6 ASSIGNING PROFILES... 9 MIGRATING PROFILES
2 GENERAL QUESTIONS How does Profile management work? During logon, the Profile management service manages the user settings in a Citrix user profile. Upon logoff, it merges back only changed user settings to the centrally stored user settings (user s store). Profile management is able to ensure the deltas are tracked correctly and that designated settings are saved based on the latest change only. A more in depth overview of Citrix Profile management is located here: Are any changes required with profiles or on the file share? The users must have write access to their centrally stored profile location. It is best to use the existing user s home directory since permissions are already set correctly. But any UNC path may be defined as long as it uniquely and correctly resolves for every user. Since the Profile management service runs before the user logs on, only system environment variables and AD attributes may be used. There are two user environment variables that are allowed by exception. These are %USERNAME% and %USERDOMAIN%. Basically, any variable that is set before a user logs onto a system may be leveraged in the configuration. When do the profile keys get written back to the user s central store? Deltas to the user s profile are written back to the user s central store during logoff. The HKEY_CURRENT_USER registry settings are scanned and only the deltas are merged back to the NTUSER.DAT within the user s central store. Any changes in the file or folders that have been configured to be captured are copied back to the user s central store. Does last writer win? Last writer wins is prevented when it comes to the entire registry hive. Only the last write to defined files, folders, or registry keys win. Profile management is able to detect deltas and thus ensure that only the defined settings are overwritten. Compare this with roaming profiles wherein the entire profile is overwritten and thus the last write wins. Please see this blog for more in depth details: 2
3 How does Profile management improve logon/logoff performance? FAQ DATASHEET Profile management is capable of reducing user logon time by enabling administrators to exclude (and include) certain files and folders in order to prevent extraneous settings from needlessly being copied with the profile. For example, some applications may create folders and files that account for tens or hundreds of megabytes data that is really not required. By excluding these items, the profile is thus smaller, and smaller profiles load faster. Alternatively, you could elect to only include specific files and folders, thus keeping to a minimum the amount of profile data being managed within the user s profile. There are a couple blogs on this topic: Profile Bloat: Improve logon speed: How does Profile management address profile bloat? As described in the previous question, Profile management enables administrators to exclude (and include) certain files and folders in order to prevent extraneous settings from needlessly being copied with the profile. For example, some applications may create folders and files in the Application Data profile folder that account for tens or hundreds of megabytes, which are excess baggage. By excluding these files and folders, it minimizes the extra data being stored in a profile. Please refer to this blog for more in depth discussion on Profile Bloat: Why do folders I ve excluded still show up in the user s store? A more accurate description of the exclusion capability would have been contents exclusion list. Essentially any folders on the exclusion list will have the contents excluded but the folder structure will still be created in the user store. Is profile corruption reduced or managed better? Often profile corruption occurs from an application improperly creating or writing settings, which is often referred to as profile inconsistency. Less likely to occur is corruption as the result of a network connectivity error which in most cases the OS manages and recovers properly. Corruption exposure of this nature is reduced by minimizing the amount of data that is copied and also limiting the extent of damage to specific data if corruption occurs. Please refer to this blog for more in depth discussion on profile corruption vs. inconsistency: 3
4 User s Profile and Settings Where are the user s profile settings and files stored? The user s profile settings can be stored either on an administratively defined UNC path or a path relative to the user s home directory. By default, the folder created in the %HOMESHARE% directory is named Windows but can be any name as defined in the configuration. In both cases, it may include as part of the path variables such as %USERNAME% and %USERDOMAIN%. The user needs write access to this folder. Within this path or folder, there is at least one subfolder named UPM_Profile which contains the user s profile data. When using the extended synchronization capability (please refer to Admin Guide for details), each drive letter will have an additional folder which follows the naming schemata UPM_Drive_<DriveLetter> (e.g. UPM_Drive_E for E:\). Please make note that since the Profile management service must know its configuration before the user logs on, only system environment variables and AD attributes may be used. There are two user environment variables that are allowed by exception. These are %USERNAME% and %USERDOMAIN%. Basically any variable that is set before a user logs onto a system may be leveraged in the configuration. How does folder redirection work with Profile management? Folder Redirection is automatically recognized and Profile management will not sync those folders and files. Folder redirection is recommended to ensure that user data stored in those folders is segregated. How does the files and folder synchronization functionality work? During a session, Profile management monitors files/folders via the NTFS change journal. Any changes are recorded internally. During logoff, a sophisticated algorithm recognizes these deltas and performs only the required actions over the network. Examples: If a file/folder was renamed during a session, it will not be copied again during logoff. Instead, the file or folder on the network will simply be renamed. If the attributes of a file/folder were changed, only the changed attributes are set during logoff. 4
5 If the content of a file was changed, the file will be copied during logoff. How are the changes to files and folders tracked during the user s session? Profile management monitors the NTFS change journal. In order to be able to resolve relative file names to the absolute paths, the file system has to be scanned once, which takes typically seconds. In order to avoid scanning during every subsequent startup, a cache file is used. It is called UserProfileManager_<DriveLetter>.cache and is located in the installation directory. It's possible that there are environments where the system is not allowed to write to this directory or the admin does not want software to write to this location and therefore you can change the location by group policy. 5
6 Service Installation and Configuration Where should the Profile management service be installed? The MSI package contains the service and supporting DLLs. This package should be installed on any machine that will process the user s logon, such as the XenDesktop virtual machines and XenApp servers. Which OS and profile versions are supported? Currently Windows XP, Vista, Windows Server 2003, Windows Server 2008 (including R2) and Windows 7 are supported. Windows XP and Windows Server 2003 are known as v1 profiles while Vista, Windows Server 2008 and Windows 7 are referred to as v2 profiles (profile folder names are usually ended in.v2). The operating system does not allow these profile versions to be shared across platforms. Please refer to this FAQ for more details around cross platform support. How does the service retrieve its settings? The service checks the GPO settings first, then secondarily the INI within the same folder (where the service was installed) and then resorts to internal defaults. The INI file exists in the same directory as the service executable (default location is \Program Files\Citrix\User Profile Manager\). Any setting that is not configured via group policy object will be looked up in the INI file e.g. if it is Not Configured in GPO and there is an entry in the INI, it will use the INI. If neither the GPO nor INI exists, the service will use its internal defaults. Please note that in most customer scenarios, the INI file is not used to configure settings. What are the internal default settings? By default, if no policy settings are configured, the configuration is read from the INI file that corresponds to the local system s language and version. Example: UPMPolicyDefaults_V1Profile_en.ini for an English XP/Server 2003 system. The INI file contains default settings that should work in most environments with minimal modifications (e.g. enable the service). Profile management will save / restore the user s registry settings and files/folders inside the profile. Some files/folders/registry keys that typically do not contain relevant data are excluded by default. 6
7 If policy settings are not configured and an INI file is not present, Profile management will synchronize the whole HKCU hive from the registry and everything in the user profile. Are local policies supported? Yes. Although they present a similar challenge to INIs in having to centrally manage their deployment. Also be aware that local policies carry the least precedence when multiple policies apply. Please refer to this Microsoft article on precedence. When will the service use the INI setting versus the GPO? Using the Profile management group policy template, you can specify the exact behavior of Profile management and adapt it to your environment. This is how most customers configure Profile management. The INI files settings will be used for any list setting not explicitly set (e.g. Enabled or Disabled) in the GPO. When using group policy to configure Profile management, it is recommended to rename the INI files (e.g. UPMPolicyDefaults_V1Profile_en.OLD) to ensure the INI file settings are not unintentionally applied. All settings will be read from the INI file if not configured via policy. Is the installed service able to be cloned as part of a base image? Yes. For example, Citrix Provisioning Services has successfully been tested. Although I have activated the debug mode, not all of the information seems to be written into the log file. Activating the debug mode does not automatically enable full logging. Verify the checkboxes for all events you want to be logged in the configuration. Please note to scroll down to enable the couple checkboxes that are below the horizontal scroll area. I have changed an option in the GPO for Profile management but this setting does not seem to be operative on the computer. Group policies are not refreshed immediately but instead based on specific events or intervals. If you want them to be refreshed immediately, run gpupdate on the computer. 7
8 I'm using "Folder Redirection" with my roaming profiles already. What do I have to consider when using Profile management? You can easily combine Folder Redirection from the operating system with Profile management s folder synchronization. If folders are redirected, Profile management will ignore them.. In fact, Citrix recommends using folder redirection to ensure that type of user data is segregated from the profile. 8
9 Assigning Profiles What are the methods to assign a profile to a user? Leaving Profile management aside for a moment, Microsoft enables users to be assigned profiles numerous ways. Either via their User Account Properties in Active Directory, through Group Policy and even Terminal Service specific profiles (again through the User Account Properties or Group Policy). Some methods are only available for a specific type of operating system. TS PROFILE: The GPO setting for assigning a Terminal Server profile is located in Computer Configuration/Administrative Templates/Windows Components/Terminal Services (Set path for TS Roaming Profiles). You may use the Use mandatory profiles on the terminal server to force mandatory profile usage The Terminal Server profile setting can also be set on individual accounts within the User Account Properties pages within Active Directory e.g. configured on an individual user basis. Typically it is much better to make this assignment via group policy. Windows XP and Vista: The user s roaming profile setting can be set on individual accounts within the User Account Properties pages. Additionally Windows Server 2008 Active Directory and Vista devices,, a GPO settings based on computers may be used. This GPO setting is located at Computer/Admin Templates/System/User Profile (Set roaming profile path for all users logging onto this computer). What is the priority order for settings profiles for domain users if more than one method is used? When Profile management is used to manage a user s profile, it will take precedence over any other profile assignment. For users not assigned to Profile management, the user may be assigned a profile using multiple methods. The actually profile that will be used is based on the following precedence order: Profile management profile Terminal Services profile GPO Terminal Services profile User Property Roaming profile GPO (only Windows 2008 AD and Vista) Roaming profile User Property 9
10 Migrating Profiles Will Profile management migrate my user s profile to a Citrix user profile? Profile management may be configured to automatically migrate existing roaming and local profiles when the user logs on. You can also use a template profile or even the default windows profile to create new Citrix user profiles. This behavior is part of the configuration either using the INI file or GPO. Migrating mandatory profiles or even the default windows profile by means of the template profile will be discussed below. The document UserProfileManagerLogonLogoffChart.pdf can assist you in planning and setting up your Profile management migration scenario(s). Which profiles may be migrated to Profile management? Profile management is capable of migrating Local and Roaming profiles. Mandatory Profiles (.man profiles) are ignored by Profile management. To ensure Profile management works correctly, deactivate the assignment of mandatory profiles to all users. BUT you could still leverage your mandatory profile for creating new profiles via the Template Profile capability in Profile management. The next question covers this scenario. This is in a way, a route to migrate the existing mandatory profile as a basis in creating all users new profiles. How do I use the template profile in Profile management? Profile management allows you to specify a template profile to be used as a basis for the creation of new Citrix user profiles. Typically, a user having a profile created for the first time will have it based on the Default User profile of the Windows device they are logging onto. While this may be ok, it also means any variations between the various devices Default User profiles will result in differences in the base profile created for those users. Thus you can view the Template Profile capability as essentially a Global Default User profile. To use a template profile the following settings must be configured: Enable the Template profile Group Policy setting Set Path to the template profile to the roaming, local, or mandatory profile you want to use as a template (you will need to rename the NTUSER.MAN to NTUSER.DAT before using a mandatory for template) Optionally, select the check boxes to override existing user profiles 10
11 Ensure the template profile does not contain any user-specific data. How do I use my existing Mandatory profile for creating new user profiles? Profile management allows you to specify a template profile to be used as a basis for the creation of new Citrix user profiles. To use your mandatory profiles as the template profile the following settings must be configured: Enable the Template profile Group Policy setting Set Path to the template profile to the mandatory profile you want to use as a template (you will need to rename the NTUSER.MAN to NTUSER.DAT before using a mandatory for template) Optionally, select the check boxes to override existing user profiles Please make note that since you have to rename the NTUSER.MAN to NTUSER.DAT, you cannot use the same location for both a mandatory and template profile. 11
12 About Citrix Citrix Systems, Inc. (NASDAQ: CTXS) is the global leader and the most trusted name in Application Delivery. More than 230,000 organizations worldwide rely on Citrix to deliver any application to users anywhere with the best performance, highest security and lowest cost. Citrix customers include 100 percent of the Fortune 100 companies and 99 percent of the Fortune Global 500, as well as hundreds of thousands of small businesses and prosumers. Citrix has approximately 8,000 partners in more than 100 countries. Annual revenue in 2007 was $1.4 billion Citrix Systems, Inc. All rights reserved. Citrix, Citrix XenApp, Citrix Presentation Server and Citrix XenDesktop TM are registered trademarks of Citrix Systems, Inc. in the United States and other countries. Microsoft, Windows, and Sharepoint are registered trademarks of Microsoft Corporation in the United States and other countries. All other trademarks and registered trademarks are the property of their respective owners.
GENERAL... 2 SETTINGS AND CONFIGURATION... 7 USING THE LOGGING CAPABILITY... 9 LOGON SPEED...
Citrix Presentation Server FAQ FAQ DATASHEET Troubleshooting Frequently Asked Questions Table of Contents GENERAL... 2 SETTINGS AND CONFIGURATION... 7 USING THE LOGGING CAPABILITY... 9 LOGON SPEED... 12
More informationSolving User Profile Challenges for XenApp and/or XenDesktop
Solving User Profile Challenges for XenApp and/or XenDesktop Jo Harder, Senior Architect joharder http://community.citrix.com/blogs/citrite/joh One Profile Type Doesn t Fit All Answer Depends On... User
More informationConsulting Solutions WHITE PAPER Citrix XenDesktop Citrix Personal vdisk Technology Planning Guide
Consulting Solutions WHITE PAPER Citrix XenDesktop Citrix Personal vdisk Technology Planning Guide www.citrix.com Overview XenDesktop offers IT administrators many options in order to implement virtual
More informationShareFile On-Demand Sync can be installed via EXE or MSI. Both installation types can be downloaded from http://www.citrix.com/downloads/sharefile.
New in this release: Send Logs As of the Windows Sync 2.14 release you can now send logs to ShareFile support via the Send Logs control panel link. This is available in Control Panel > System and Security
More informationDeployment of Keepit for Windows
Deployment of Keepit for Windows Keepit A/S October 13, 2010 1 Introduction When deploying Keepit in larger setups with many desktops and servers, installing Keepit individually on each computer is cumbersome
More informationTHE POWER OF GROUP POLICY
Specops Software presents: THE POWER OF GROUP POLICY By Danielle Ruest and Nelson Ruest The Power of Group Policy... 3 The Inner Workings of GPOs... 4 The Ideal Tool for Systems Management... 7 Your Next
More informationFundamentals, Security, and the Managed Desktop
Fundamentals, Security, and the Managed Desktop Second Edition Jeremy GVflostowit WILEY John Wiley & Sons, Inc. Contents Introduction xxv Chapter 1 Group Policy Essentials 1 Getting Ready to Use This Book
More informationUsing Logon Agent for Transparent User Identification
Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense
More informationHelpdesk Support Tool Administrator s Guide
Helpdesk Support Tool Administrator s Guide VMware User Environment Manager V E R S I O N 8. 6. 0 You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/
More informationVMware View Persona Management DEPLOYMENT GUIDE
VMware View Persona Management DEPLOYMENT GUIDE Table of Contents Introduction to View Persona Management.... 3 User Profiles.... 3 Advantages of View Persona Management.... 3 System Requirements and Recommended
More informationMailStore Outlook Add-in Deployment
MailStore Outlook Add-in Deployment A MailStore Server installation deploys the MailStore Outlook Add-in as a Windows Installer package (MSI) that can be installed on client machines using software distribution.
More informationHOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION
HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)
More informationHow To Write A Gpmc Script For A Gpc (Windows 2003) On A Windows 2000 (Windows 2000) On Your Computer Or Your Computer (Windows 3) On An Ipad Or Ipad (Windows 2) On The Macbook
Group Policy, Profiles, and IntelliMirror for Windows 2003, Windows XP, and Windows 2000 Jeremy Moskowitz SVBEX" San Francisco London Introduction xviii Chapter 1 Group Policy Essentials 1 Getting Started
More informationProfileUnity with FlexApp Technology
ProfileUnity with FlexApp Technology Help Manual Introduction This guide has been authored by experts at Liquidware Labs in order to provide information and guidance concerning ProfileUnity with FlexApp.
More informationProfileUnity with FlexApp Technology
ProfileUnity with FlexApp Technology Installation & Configuration Guide Introduction This guide has been authored by experts at Liquidware Labs in order to provide information and guidance concerning the
More informationWindows Boston. Group Policy Group Policy Basics. Published 2007 Clyde G. Johnson, MCSE, A+
Windows Boston Group Policy Group Policy Basics Published 2007 Clyde G. Johnson, MCSE, A+ What can Group Policy manage Deploy software Security Settings Assign startup/shutdown and logon/logoff scripts
More informationWindows 7 Optimization Guide
Consulting Solutions WHITE PAPER Citrix XenDesktop Windows 7 Optimization Guide For Desktop Virtualization www.citrix.com Contents Contents... 2 Overview... 3 Machine Settings... 3 User Settings... 7 Final
More informationFor Splunk Universal Forwarder and Splunk Cloud
Quick Start Guide; For Splunk Universal Forwarder and Splunk Cloud This document details the procedure for manually installing Layer8 software agents, and forwarding data to an existing Splunk Enterprise
More informationVMware User Environment Manager
VMware User Environment Manager Deployed in 60 Minutes or Less Author: Dale Carter Senior Solution Architect VMware Technology Consulting Services April 2015 Table of Contents 1. VMware User Environment
More informationHP Universal Print Driver Series for Windows Active Directory Administrator Template White Paper
HP Universal Print Driver Series for Windows Active Directory Administrator Template White Paper Table of Contents: Purpose... 2 Active Directory Administrative Template Overview.. 2 Decide whether to
More informationInstallation Guide - Client. Rev 1.5.0
Installation Guide - Client Rev 1.5.0 15 th September 2006 Introduction IntraNomic requires components to be installed on each PC that will use IntraNomic. These IntraNomic Client Controls provide advanced
More informationUsing ProfileUnity to Migrate from Windows XP to Windows 7
Using ProfileUnity to Migrate from Windows XP to Windows 7 Solutions for Windows Introduction This guide has been authored by experts at Liquidware Labs in order to provide information and guidance concerning
More informationDesktop Management, Profile Migration and Cross Platform Delivery. Technical Overview
Desktop Management, Profile Migration and Cross Platform Delivery Executive Summary This document provides a technical overview of how AppSense Environment Manager can deliver a flexible and managed user
More informationThe Importance of User Workspace Virtualization in Desktop Virtualization
res Software // Whitepaper The Importance of User Workspace Virtualization in Desktop Virtualization Whitepaper Transforming Desktops into Workspaces 2 Table of content: Abstract... 3 What is desktop virtualization?...4
More informationPassword Manager Windows Desktop Client
Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard
More informationModule 8: Implementing Group Policy
Module 8: Implementing Group Policy Contents Overview 1 Lesson: Implementing Group Policy Objects 2 Lesson: Implementing GPOs in a Domain 12 Lesson: Managing the Deployment of Group Policy 21 Lab: Implementing
More informationCitrix Lab Manager 3.6 SP 2 Quick Start Guide
WHITE PAPER Citrix Essentials for Microsoft Hyper-V Citrix Lab Manager 3.6 SP 2 Quick Start Guide www.citrix.com Contents Document Summary... 3 Preparation... 3 Architectural Review of Lab Manager... 3
More informationVMware Mirage Web Manager Guide
Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
More informationModule 5: Implementing Group Policy
Module 5: Implementing Group Policy Contents Overview 1 Lesson: Creating and Configuring GPOs 2 Lesson: Configuring Group Policy Refresh Rates and Group Policy Settings 16 Lesson: Managing GPOs 27 Lesson:
More informationApp-V Deploy and Publish
App-V Deploy and Publish Tools from TMurgent Technologies Updated Aug 5, 2010 Version 1.8 Introduction: The deployment of Virtual Applications in the simplest way possible, without the need for complicated
More informationHyperoo 2 User Guide. Hyperoo 2 User Guide
1 Hyperoo 2 User Guide 1 2 Contents How Hyperoo Works... 3 Installing Hyperoo... 3 Hyperoo 2 Management Console... 4 The Hyperoo 2 Server... 5 Creating a Backup Array... 5 Array Security... 7 Previous
More informationMS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy. Course Objectives. Required Exam(s) Price.
MS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy Discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy. In this four-day instructor
More informationTool Tip. SyAM Management Utilities and Non-Admin Domain Users
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
More informationFrequently Asked Questions
Frequently Asked Questions Share Drive Frequently Asked Questions Table of Contents How do I change my password?... How do I reset my password if I forgot it?... How do I share files/folders with Groups
More informationWhite Paper Profile migration for a system upgrade to Microsoft Windows Server 2008 R2 and Citrix XenApp 6
White Paper Profile migration for a system upgrade to sepago 2010 page 1 of 11 Preface XenApp 6 is the new Citrix flagship for dynamic application provisioning in arbitrary IT networks. It replaces the
More informationXMap 7 Administration Guide. Last updated on 12/13/2009
XMap 7 Administration Guide Last updated on 12/13/2009 Contact DeLorme Professional Sales for support: 1-800-293-2389 Page 2 Table of Contents XMAP 7 ADMINISTRATION GUIDE... 1 INTRODUCTION... 5 DEPLOYING
More informationManaging Windows Environments with Group Policy
3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: rwhitney@discoveritt.com Web: www.discoveritt.com Managing Windows Environments with Group Policy Course: MS50255C
More informationOutpost Network Security
Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It
More informationUser Environment Manager Administrator s Guide
Administrator s Guide VMware User Environment Manager V E R S I O N 8. 6. 0 You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/ The VMware
More informationProactiveWatch 2.0 Patch Management and Reporting
ProactiveWatch 2.0 Patch Management and Reporting V090908 2009 ProactiveWatch, Inc. All Rights Reserved. Purpose of this Guide... 1 II. Patching View... 1 Main Patching Screen... 2 Filtering by Patch Attribute...
More informationThis document details the procedure for installing Layer8 software agents and reporting dashboards.
Quick Start Guide This document details the procedure for installing Layer8 software agents and reporting dashboards. Deployment to data analysis takes approximately 15 minutes. If you wish to deploy via
More informationGuide to deploy MyUSBOnly via Windows Logon Script Revision 1.1. Menu
Menu INTRODUCTION...2 HOW DO I DEPLOY MYUSBONLY ON ALL OF MY COMPUTERS...3 ADMIN KIT...4 HOW TO SETUP A LOGON SCRIPTS...5 Why would I choose one method over another?...5 Can I use both methods to assign
More informationDesktop Virtualization Made Easy Execution Plan
Consulting Solutions WHITE PAPER Citrix XenDesktop Desktop Virtualization Made Easy Execution Plan A desktop virtualization architecture guide for small to medium environments www.citrix.com Trying to
More informationMS 50255B: Managing Windows Environments with Group Policy (4 Days)
www.peaklearningllc.com MS 50255B: Managing Windows Environments with Group Policy (4 Days) Introduction In course you will learn how to reduce costs and increase efficiencies in your network. You will
More informationCitrix Systems, Inc.
Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change
More informationUser Guide Release Management for Visual Studio 2013
User Guide Release Management for Visual Studio 2013 ABOUT THIS GUIDE The User Guide for the release management features is for administrators and users. The following related documents for release management
More informationUsing RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
More informationChapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:
Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative
More informationNAS 253 Introduction to Backup Plan
NAS 253 Introduction to Backup Plan Create backup jobs using Backup Plan in Windows A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Create backup
More informationSage CRM 7.3 Terminal Services & Citrix Support Guide
Sage CRM 7.3 Terminal Services & Citrix Support Guide Contents Introduction... 2 Which Versions are Supported in 7.3?... 2 Using Citrix... 3 Installing the Outlook Plug-in for Exchange Integration... 3
More informationImplementing HIPAA Compliance with ScriptLogic
Implementing HIPAA Compliance with ScriptLogic A ScriptLogic Product Positioning Paper By Nick Cavalancia 1.800.424.9411 www.scriptlogic.com Table of Contents INTRODUCTION... 3 HIPAA BACKGROUND... 3 ADMINISTRATIVE
More informationContents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7.
Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Troubleshooting Introduction Adaxes Self-Service Client provides secure
More informationChapter 1 Scenario 1: Acme Corporation
Chapter 1 Scenario 1: Acme Corporation In This Chapter Description of the Customer Environment page 18 Introduction to Deploying Pointsec PC page 20 Prepare for Deployment page 21 Install Pointsec PC page
More informationDeviceLock Management via Group Policy
User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 1.3 Standard GPO Inheritance
More informationAutomating client deployment
Automating client deployment 1 Copyright Datacastle Corporation 2014. All rights reserved. Datacastle is a registered trademark of Datacastle Corporation. Microsoft Windows is either a registered trademark
More informationWeb Security Service
Webroot Web Security Service Desktop Web Proxy Configuration Guide Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Desktop Web Proxy Configuration Guide September
More informationHigh Availability for Citrix XenApp
WHITE PAPER Citrix XenApp High Availability for Citrix XenApp Enhancing XenApp Availability with NetScaler Reference Architecture www.citrix.com Contents Contents... 2 Introduction... 3 Desktop Availability...
More informationThin Client & Virtual Desktop White Paper
Thin Client & Virtual Desktop White Paper TABLE OF CONTENTS Overview 2 Compatible Thin Client Products 2 Thin Client Implementation Basics 2 Content Creation and Targeting... 2 Content Display... 3 Increase
More informationInstallation and Setup: Setup Wizard Account Information
Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account
More informationPC Power Down. MSI Deployment Guide
PC Power Down MSI Deployment Guide 1. Introduction 1.1. Outline The client software for PC Power Down can be pushed out across a network, saving the effort of individually visiting each computer to install
More informationQuick Start Guide. User Manual. 1 March 2012
Quick Start Guide User Manual 1 March 2012 This document outlines the steps to install SAMLite system into a single box of server and configure it to run for passive collection (domain login script). This
More informationColligo Contributor File Manager 4.6. User Guide
Colligo Contributor File Manager 4.6 User Guide Contents Colligo Contributor File Manager Introduction... 2 Benefits... 2 Features... 2 Platforms Supported... 2 Installing and Activating Contributor File
More informationInstalling Intouch Søk og SMS
Document version: 1.0 Document date: 2013-05-31 BluePosition ApS - SCION-DTU - Diplomvej 376-2800 Lyngby - Tlf.: +45 70 20 65 25 - Fax.: +45 45 26 77 10 www.mobilecti.dk www.blueposition.com www.mobileivr.dk
More informationM86 Authenticator USER GUIDE. Software Version: 2.0.10 Document Version: 04.26.11
M86 Authenticator USER GUIDE Software Version: 2.0.10 Document Version: 04.26.11 M86 AUTHENTICATOR USER GUIDE 2011 M86 Security All rights reserved. 828 W. Taft Ave., Orange, CA 92865, USA Version 1.01,
More informationWazza s QuickStart 15. Leopard Server - Disaster Backup
Wazza s QuickStart 15. Leopard Server - Disaster Backup About the Document This document is the 15th in a series of documents describing the process of installing and configuring a Mac OS X 10.5 Server
More informationTECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION
TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION Contents 1. Getting Started... 4 1.1 Specops Deploy Supported Configurations... 4 2. Specops Deploy and Active Directory...5 3. Specops Deploy
More informationEvaluation Virtual Appliance Quick Start Guide for Citrix XenApp
EVALUATION GUIDE Citrix XenApp Evaluation Virtual Appliance Quick Start Guide for Citrix XenApp This document provides step-by-step instructions for extracting and running the Citrix XenApp 6 Evaluation
More information50331D Windows 7, Enterprise Desktop Support Technician (Windows 10 Curriculum)
This course can be purchased by authorized Microsoft Learning Centers at the Courseware Marketplace web-site. Microsoft Certified Trainers (MCTs) can get a free copy at the same website. About the Course
More informationSystemTools Software Inc. NTFS and Share Permissions Reporting
SystemTools Software Inc. NTFS and Share Permissions Reporting SystemTools Software s Tech Support department receives numerous requests asking about permissions reporting, so we ve decided to create this
More informationManaging and Maintaining a Microsoft Windows Server 2003 Environment
Managing and Maintaining a Microsoft Windows Server 2003 Environment Course 2273: Five days; Blended (classroom/e-learning) Introduction Elements of this syllabus are subject to change. This course combines
More informationAdvanced Farm Administration with XenApp Worker Groups
WHITE PAPER Citrix XenApp Advanced Farm Administration with XenApp Worker Groups XenApp Product Development www.citrix.com Contents Overview... 3 What is a Worker Group?... 3 Introducing XYZ Corp... 5
More informationHDX 3D Version 1.0 Release Notes
HDX 3D Version 1.0 Release Notes www.citrix.com Citrix HDX 3D for Professional Graphics 1.0 Release Notes This document summarizes the features in Citrix HDX 3D for Professional Graphics 1.0 and describes
More informationRemote Desktop Reporter Agent Deployment Guide
Remote Desktop Reporter Agent Deployment Guide Table of Contents Overview... 2 Agent Components... 2 Agent Security... 2 Windows Firewall Considerations... 3 Installation Procedure and Configuration Parameters...
More informationTROUBLESHOOTING GUIDE
Lepide Software LepideAuditor Suite TROUBLESHOOTING GUIDE This document explains the troubleshooting of the common issues that may appear while using LepideAuditor Suite. Copyright LepideAuditor Suite,
More informationInstallation Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Inventory is a trademark owned by Specops Software.
More informationPORTAL ADMINISTRATION
1 Portal Administration User s Guide PORTAL ADMINISTRATION GUIDE Page 1 2 Portal Administration User s Guide Table of Contents Introduction...5 Core Portal Framework Concepts...5 Key Items...5 Layouts...5
More informationLecture 3: Active Directory Domain Service (AD DS)
Lecture 3: Active Directory Domain Service (AD DS) Agenda Active Directory Domain Service (AD DS) Installing and Configuring Active Directory Domain Services Implementing a Group Policy Infrastructure
More informationCitrix EdgeSight for Load Testing Installation Guide. Citrix EdgeSight for Load Testing 3.8
Citrix EdgeSight for Load Testing Installation Guide Citrix EdgeSight for Load Testing 3.8 Copyright Use of the product documented in this guide is subject to your prior acceptance of the End User License
More informationMicrosoft Corporation. Status: Preliminary documentation
Microsoft Corporation Status: Preliminary documentation Beta content: This guide is currently in beta form. The AppLocker team greatly appreciates you reviewing the document and looks forward to receiving
More informationFor Active Directory Installation Guide
For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically
More informationKerio VPN Client. User Guide. Kerio Technologies
Kerio VPN Client User Guide Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on Kerio VPN Client, version 7.1 for Windows. All additional
More information50255: Managing Windows Environments with Group Policy
50255: Managing Windows Environments with Group Policy Microsoft - Servidores Localidade: Lisboa Data: 01 Oct 2015 Preço: 1520 ( Os valores apresentados não incluem IVA. Oferta de IVA a particulares e
More informationCA XOsoft Replication for Windows
CA XOsoft Replication for Windows Microsoft SQL Server Operation Guide r12.5 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the
More informationManaging Windows Environments with Group Policy 50255D; 5 Days, Instructor-led
Managing Windows Environments with Group Policy 50255D; 5 Days, Instructor-led Course Description In this course you will learn how to reduce costs and increase efficiencies in your network. You will discover
More informationOutlook Connector Installation & Configuration groupwaresolution.net Hosted MS Exchange Alternative On Linux
Outlook Connector Installation & Configuration groupwaresolution.net Hosted MS Exchange Alternative On Linux Page 1 of 5 DOWNLOAD Please download the connector installer msi file and save it to your computer.
More informationOffice of Information Technologies (OIT)
Office of Information Technologies (OIT) Encrypting File System (EFS) November 14th, 2007 Contents Introduction... 1 Benefits... 1 How it works... 1 Enabling EFS... 2 Step 1: Obtain an EFS key pair...
More informationHELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE
HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
More informationProduct Review ControlUp
Product Review ControlUp Februari 2012 Wilco van Bragt Control-UP Page 2 of 15 Introduction While Citrix Resource Manager was not perfect in earlier version of Citrix Presentation Server, many Citrix administrators
More informationServer Edition Administrator s Guide
Server Edition Administrator s Guide July 13, 2010 Introduction This document covers FinePrint, pdffactory, and pdffactory Pro Server Editions (SE). Installing SE on a Windows server provides easy deployment
More informationHELP DOCUMENTATION E-SSOM INSTALLATION GUIDE
HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
More informationMobileMail. Administrator s Guide. 2014 Citrix Systems, Inc. All rights reserved.
MobileMail Administrator s Guide Prepared by: Citrix Labs Version: 1.3.1 Last Updated: June 18, 2014 Contents Introduction... 5 Installation... 6 Citrix XenApp 6.5... 6 Citrix XenDesktop 7.x... 6 Citrix
More informationACTIVE DIRECTORY DEPLOYMENT
ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...
More informationInventoryControl for use with QuoteWerks Quick Start Guide
InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY
More informationEZ GPO. Power Management Tool for Network Administrators.
EZ GPO Power Management Tool for Network Administrators. Table of Contents Introduction...3 Installation...4 Configuration...6 Base Options...7 Options Properties Dialogue...8 Suggested Configuration Settings...9
More informationCITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS
CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Number: 1Y0-A14 Passing Score: 800 Time Limit: 90 min File Version: 42.2 http://www.gratisexam.com/ CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Exam Name: Implementing
More informationNetwork Installation Guide. windows and mac
Network Installation Guide windows and mac Copyright Information 2009 Promethean Limited. All rights reserved. This guide is distributed for ActivInspire. It may only be reproduced for use within the institution
More informationStorage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V
Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised
More informationAgency Pre Migration Tasks
Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required
More informationNE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment
NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 05 October 2005 200 Microsoft
More information