GENERAL QUESTIONS...2 USER S PROFILE AND SETTINGS... 4 SERVICE INSTALLATION AND CONFIGURATION... 6 ASSIGNING PROFILES... 9 MIGRATING PROFILES...

Size: px
Start display at page:

Download "GENERAL QUESTIONS...2 USER S PROFILE AND SETTINGS... 4 SERVICE INSTALLATION AND CONFIGURATION... 6 ASSIGNING PROFILES... 9 MIGRATING PROFILES..."

Transcription

1 Citrix Presentation Server FAQ FAQ DATASHEET Profile Management Frequently Asked Questions Table of Contents GENERAL QUESTIONS...2 USER S PROFILE AND SETTINGS... 4 SERVICE INSTALLATION AND CONFIGURATION... 6 ASSIGNING PROFILES... 9 MIGRATING PROFILES

2 GENERAL QUESTIONS How does Profile management work? During logon, the Profile management service manages the user settings in a Citrix user profile. Upon logoff, it merges back only changed user settings to the centrally stored user settings (user s store). Profile management is able to ensure the deltas are tracked correctly and that designated settings are saved based on the latest change only. A more in depth overview of Citrix Profile management is located here: Are any changes required with profiles or on the file share? The users must have write access to their centrally stored profile location. It is best to use the existing user s home directory since permissions are already set correctly. But any UNC path may be defined as long as it uniquely and correctly resolves for every user. Since the Profile management service runs before the user logs on, only system environment variables and AD attributes may be used. There are two user environment variables that are allowed by exception. These are %USERNAME% and %USERDOMAIN%. Basically, any variable that is set before a user logs onto a system may be leveraged in the configuration. When do the profile keys get written back to the user s central store? Deltas to the user s profile are written back to the user s central store during logoff. The HKEY_CURRENT_USER registry settings are scanned and only the deltas are merged back to the NTUSER.DAT within the user s central store. Any changes in the file or folders that have been configured to be captured are copied back to the user s central store. Does last writer win? Last writer wins is prevented when it comes to the entire registry hive. Only the last write to defined files, folders, or registry keys win. Profile management is able to detect deltas and thus ensure that only the defined settings are overwritten. Compare this with roaming profiles wherein the entire profile is overwritten and thus the last write wins. Please see this blog for more in depth details: 2

3 How does Profile management improve logon/logoff performance? FAQ DATASHEET Profile management is capable of reducing user logon time by enabling administrators to exclude (and include) certain files and folders in order to prevent extraneous settings from needlessly being copied with the profile. For example, some applications may create folders and files that account for tens or hundreds of megabytes data that is really not required. By excluding these items, the profile is thus smaller, and smaller profiles load faster. Alternatively, you could elect to only include specific files and folders, thus keeping to a minimum the amount of profile data being managed within the user s profile. There are a couple blogs on this topic: Profile Bloat: Improve logon speed: How does Profile management address profile bloat? As described in the previous question, Profile management enables administrators to exclude (and include) certain files and folders in order to prevent extraneous settings from needlessly being copied with the profile. For example, some applications may create folders and files in the Application Data profile folder that account for tens or hundreds of megabytes, which are excess baggage. By excluding these files and folders, it minimizes the extra data being stored in a profile. Please refer to this blog for more in depth discussion on Profile Bloat: Why do folders I ve excluded still show up in the user s store? A more accurate description of the exclusion capability would have been contents exclusion list. Essentially any folders on the exclusion list will have the contents excluded but the folder structure will still be created in the user store. Is profile corruption reduced or managed better? Often profile corruption occurs from an application improperly creating or writing settings, which is often referred to as profile inconsistency. Less likely to occur is corruption as the result of a network connectivity error which in most cases the OS manages and recovers properly. Corruption exposure of this nature is reduced by minimizing the amount of data that is copied and also limiting the extent of damage to specific data if corruption occurs. Please refer to this blog for more in depth discussion on profile corruption vs. inconsistency: 3

4 User s Profile and Settings Where are the user s profile settings and files stored? The user s profile settings can be stored either on an administratively defined UNC path or a path relative to the user s home directory. By default, the folder created in the %HOMESHARE% directory is named Windows but can be any name as defined in the configuration. In both cases, it may include as part of the path variables such as %USERNAME% and %USERDOMAIN%. The user needs write access to this folder. Within this path or folder, there is at least one subfolder named UPM_Profile which contains the user s profile data. When using the extended synchronization capability (please refer to Admin Guide for details), each drive letter will have an additional folder which follows the naming schemata UPM_Drive_<DriveLetter> (e.g. UPM_Drive_E for E:\). Please make note that since the Profile management service must know its configuration before the user logs on, only system environment variables and AD attributes may be used. There are two user environment variables that are allowed by exception. These are %USERNAME% and %USERDOMAIN%. Basically any variable that is set before a user logs onto a system may be leveraged in the configuration. How does folder redirection work with Profile management? Folder Redirection is automatically recognized and Profile management will not sync those folders and files. Folder redirection is recommended to ensure that user data stored in those folders is segregated. How does the files and folder synchronization functionality work? During a session, Profile management monitors files/folders via the NTFS change journal. Any changes are recorded internally. During logoff, a sophisticated algorithm recognizes these deltas and performs only the required actions over the network. Examples: If a file/folder was renamed during a session, it will not be copied again during logoff. Instead, the file or folder on the network will simply be renamed. If the attributes of a file/folder were changed, only the changed attributes are set during logoff. 4

5 If the content of a file was changed, the file will be copied during logoff. How are the changes to files and folders tracked during the user s session? Profile management monitors the NTFS change journal. In order to be able to resolve relative file names to the absolute paths, the file system has to be scanned once, which takes typically seconds. In order to avoid scanning during every subsequent startup, a cache file is used. It is called UserProfileManager_<DriveLetter>.cache and is located in the installation directory. It's possible that there are environments where the system is not allowed to write to this directory or the admin does not want software to write to this location and therefore you can change the location by group policy. 5

6 Service Installation and Configuration Where should the Profile management service be installed? The MSI package contains the service and supporting DLLs. This package should be installed on any machine that will process the user s logon, such as the XenDesktop virtual machines and XenApp servers. Which OS and profile versions are supported? Currently Windows XP, Vista, Windows Server 2003, Windows Server 2008 (including R2) and Windows 7 are supported. Windows XP and Windows Server 2003 are known as v1 profiles while Vista, Windows Server 2008 and Windows 7 are referred to as v2 profiles (profile folder names are usually ended in.v2). The operating system does not allow these profile versions to be shared across platforms. Please refer to this FAQ for more details around cross platform support. How does the service retrieve its settings? The service checks the GPO settings first, then secondarily the INI within the same folder (where the service was installed) and then resorts to internal defaults. The INI file exists in the same directory as the service executable (default location is \Program Files\Citrix\User Profile Manager\). Any setting that is not configured via group policy object will be looked up in the INI file e.g. if it is Not Configured in GPO and there is an entry in the INI, it will use the INI. If neither the GPO nor INI exists, the service will use its internal defaults. Please note that in most customer scenarios, the INI file is not used to configure settings. What are the internal default settings? By default, if no policy settings are configured, the configuration is read from the INI file that corresponds to the local system s language and version. Example: UPMPolicyDefaults_V1Profile_en.ini for an English XP/Server 2003 system. The INI file contains default settings that should work in most environments with minimal modifications (e.g. enable the service). Profile management will save / restore the user s registry settings and files/folders inside the profile. Some files/folders/registry keys that typically do not contain relevant data are excluded by default. 6

7 If policy settings are not configured and an INI file is not present, Profile management will synchronize the whole HKCU hive from the registry and everything in the user profile. Are local policies supported? Yes. Although they present a similar challenge to INIs in having to centrally manage their deployment. Also be aware that local policies carry the least precedence when multiple policies apply. Please refer to this Microsoft article on precedence. When will the service use the INI setting versus the GPO? Using the Profile management group policy template, you can specify the exact behavior of Profile management and adapt it to your environment. This is how most customers configure Profile management. The INI files settings will be used for any list setting not explicitly set (e.g. Enabled or Disabled) in the GPO. When using group policy to configure Profile management, it is recommended to rename the INI files (e.g. UPMPolicyDefaults_V1Profile_en.OLD) to ensure the INI file settings are not unintentionally applied. All settings will be read from the INI file if not configured via policy. Is the installed service able to be cloned as part of a base image? Yes. For example, Citrix Provisioning Services has successfully been tested. Although I have activated the debug mode, not all of the information seems to be written into the log file. Activating the debug mode does not automatically enable full logging. Verify the checkboxes for all events you want to be logged in the configuration. Please note to scroll down to enable the couple checkboxes that are below the horizontal scroll area. I have changed an option in the GPO for Profile management but this setting does not seem to be operative on the computer. Group policies are not refreshed immediately but instead based on specific events or intervals. If you want them to be refreshed immediately, run gpupdate on the computer. 7

8 I'm using "Folder Redirection" with my roaming profiles already. What do I have to consider when using Profile management? You can easily combine Folder Redirection from the operating system with Profile management s folder synchronization. If folders are redirected, Profile management will ignore them.. In fact, Citrix recommends using folder redirection to ensure that type of user data is segregated from the profile. 8

9 Assigning Profiles What are the methods to assign a profile to a user? Leaving Profile management aside for a moment, Microsoft enables users to be assigned profiles numerous ways. Either via their User Account Properties in Active Directory, through Group Policy and even Terminal Service specific profiles (again through the User Account Properties or Group Policy). Some methods are only available for a specific type of operating system. TS PROFILE: The GPO setting for assigning a Terminal Server profile is located in Computer Configuration/Administrative Templates/Windows Components/Terminal Services (Set path for TS Roaming Profiles). You may use the Use mandatory profiles on the terminal server to force mandatory profile usage The Terminal Server profile setting can also be set on individual accounts within the User Account Properties pages within Active Directory e.g. configured on an individual user basis. Typically it is much better to make this assignment via group policy. Windows XP and Vista: The user s roaming profile setting can be set on individual accounts within the User Account Properties pages. Additionally Windows Server 2008 Active Directory and Vista devices,, a GPO settings based on computers may be used. This GPO setting is located at Computer/Admin Templates/System/User Profile (Set roaming profile path for all users logging onto this computer). What is the priority order for settings profiles for domain users if more than one method is used? When Profile management is used to manage a user s profile, it will take precedence over any other profile assignment. For users not assigned to Profile management, the user may be assigned a profile using multiple methods. The actually profile that will be used is based on the following precedence order: Profile management profile Terminal Services profile GPO Terminal Services profile User Property Roaming profile GPO (only Windows 2008 AD and Vista) Roaming profile User Property 9

10 Migrating Profiles Will Profile management migrate my user s profile to a Citrix user profile? Profile management may be configured to automatically migrate existing roaming and local profiles when the user logs on. You can also use a template profile or even the default windows profile to create new Citrix user profiles. This behavior is part of the configuration either using the INI file or GPO. Migrating mandatory profiles or even the default windows profile by means of the template profile will be discussed below. The document UserProfileManagerLogonLogoffChart.pdf can assist you in planning and setting up your Profile management migration scenario(s). Which profiles may be migrated to Profile management? Profile management is capable of migrating Local and Roaming profiles. Mandatory Profiles (.man profiles) are ignored by Profile management. To ensure Profile management works correctly, deactivate the assignment of mandatory profiles to all users. BUT you could still leverage your mandatory profile for creating new profiles via the Template Profile capability in Profile management. The next question covers this scenario. This is in a way, a route to migrate the existing mandatory profile as a basis in creating all users new profiles. How do I use the template profile in Profile management? Profile management allows you to specify a template profile to be used as a basis for the creation of new Citrix user profiles. Typically, a user having a profile created for the first time will have it based on the Default User profile of the Windows device they are logging onto. While this may be ok, it also means any variations between the various devices Default User profiles will result in differences in the base profile created for those users. Thus you can view the Template Profile capability as essentially a Global Default User profile. To use a template profile the following settings must be configured: Enable the Template profile Group Policy setting Set Path to the template profile to the roaming, local, or mandatory profile you want to use as a template (you will need to rename the NTUSER.MAN to NTUSER.DAT before using a mandatory for template) Optionally, select the check boxes to override existing user profiles 10

11 Ensure the template profile does not contain any user-specific data. How do I use my existing Mandatory profile for creating new user profiles? Profile management allows you to specify a template profile to be used as a basis for the creation of new Citrix user profiles. To use your mandatory profiles as the template profile the following settings must be configured: Enable the Template profile Group Policy setting Set Path to the template profile to the mandatory profile you want to use as a template (you will need to rename the NTUSER.MAN to NTUSER.DAT before using a mandatory for template) Optionally, select the check boxes to override existing user profiles Please make note that since you have to rename the NTUSER.MAN to NTUSER.DAT, you cannot use the same location for both a mandatory and template profile. 11

12 About Citrix Citrix Systems, Inc. (NASDAQ: CTXS) is the global leader and the most trusted name in Application Delivery. More than 230,000 organizations worldwide rely on Citrix to deliver any application to users anywhere with the best performance, highest security and lowest cost. Citrix customers include 100 percent of the Fortune 100 companies and 99 percent of the Fortune Global 500, as well as hundreds of thousands of small businesses and prosumers. Citrix has approximately 8,000 partners in more than 100 countries. Annual revenue in 2007 was $1.4 billion Citrix Systems, Inc. All rights reserved. Citrix, Citrix XenApp, Citrix Presentation Server and Citrix XenDesktop TM are registered trademarks of Citrix Systems, Inc. in the United States and other countries. Microsoft, Windows, and Sharepoint are registered trademarks of Microsoft Corporation in the United States and other countries. All other trademarks and registered trademarks are the property of their respective owners.

GENERAL... 2 SETTINGS AND CONFIGURATION... 7 USING THE LOGGING CAPABILITY... 9 LOGON SPEED...

GENERAL... 2 SETTINGS AND CONFIGURATION... 7 USING THE LOGGING CAPABILITY... 9 LOGON SPEED... Citrix Presentation Server FAQ FAQ DATASHEET Troubleshooting Frequently Asked Questions Table of Contents GENERAL... 2 SETTINGS AND CONFIGURATION... 7 USING THE LOGGING CAPABILITY... 9 LOGON SPEED... 12

More information

Solving User Profile Challenges for XenApp and/or XenDesktop

Solving User Profile Challenges for XenApp and/or XenDesktop Solving User Profile Challenges for XenApp and/or XenDesktop Jo Harder, Senior Architect joharder http://community.citrix.com/blogs/citrite/joh One Profile Type Doesn t Fit All Answer Depends On... User

More information

Consulting Solutions WHITE PAPER Citrix XenDesktop Citrix Personal vdisk Technology Planning Guide

Consulting Solutions WHITE PAPER Citrix XenDesktop Citrix Personal vdisk Technology Planning Guide Consulting Solutions WHITE PAPER Citrix XenDesktop Citrix Personal vdisk Technology Planning Guide www.citrix.com Overview XenDesktop offers IT administrators many options in order to implement virtual

More information

ShareFile On-Demand Sync can be installed via EXE or MSI. Both installation types can be downloaded from http://www.citrix.com/downloads/sharefile.

ShareFile On-Demand Sync can be installed via EXE or MSI. Both installation types can be downloaded from http://www.citrix.com/downloads/sharefile. New in this release: Send Logs As of the Windows Sync 2.14 release you can now send logs to ShareFile support via the Send Logs control panel link. This is available in Control Panel > System and Security

More information

Deployment of Keepit for Windows

Deployment of Keepit for Windows Deployment of Keepit for Windows Keepit A/S October 13, 2010 1 Introduction When deploying Keepit in larger setups with many desktops and servers, installing Keepit individually on each computer is cumbersome

More information

THE POWER OF GROUP POLICY

THE POWER OF GROUP POLICY Specops Software presents: THE POWER OF GROUP POLICY By Danielle Ruest and Nelson Ruest The Power of Group Policy... 3 The Inner Workings of GPOs... 4 The Ideal Tool for Systems Management... 7 Your Next

More information

Fundamentals, Security, and the Managed Desktop

Fundamentals, Security, and the Managed Desktop Fundamentals, Security, and the Managed Desktop Second Edition Jeremy GVflostowit WILEY John Wiley & Sons, Inc. Contents Introduction xxv Chapter 1 Group Policy Essentials 1 Getting Ready to Use This Book

More information

Using Logon Agent for Transparent User Identification

Using Logon Agent for Transparent User Identification Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense

More information

Helpdesk Support Tool Administrator s Guide

Helpdesk Support Tool Administrator s Guide Helpdesk Support Tool Administrator s Guide VMware User Environment Manager V E R S I O N 8. 6. 0 You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/

More information

VMware View Persona Management DEPLOYMENT GUIDE

VMware View Persona Management DEPLOYMENT GUIDE VMware View Persona Management DEPLOYMENT GUIDE Table of Contents Introduction to View Persona Management.... 3 User Profiles.... 3 Advantages of View Persona Management.... 3 System Requirements and Recommended

More information

MailStore Outlook Add-in Deployment

MailStore Outlook Add-in Deployment MailStore Outlook Add-in Deployment A MailStore Server installation deploys the MailStore Outlook Add-in as a Windows Installer package (MSI) that can be installed on client machines using software distribution.

More information

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)

More information

How To Write A Gpmc Script For A Gpc (Windows 2003) On A Windows 2000 (Windows 2000) On Your Computer Or Your Computer (Windows 3) On An Ipad Or Ipad (Windows 2) On The Macbook

How To Write A Gpmc Script For A Gpc (Windows 2003) On A Windows 2000 (Windows 2000) On Your Computer Or Your Computer (Windows 3) On An Ipad Or Ipad (Windows 2) On The Macbook Group Policy, Profiles, and IntelliMirror for Windows 2003, Windows XP, and Windows 2000 Jeremy Moskowitz SVBEX" San Francisco London Introduction xviii Chapter 1 Group Policy Essentials 1 Getting Started

More information

ProfileUnity with FlexApp Technology

ProfileUnity with FlexApp Technology ProfileUnity with FlexApp Technology Help Manual Introduction This guide has been authored by experts at Liquidware Labs in order to provide information and guidance concerning ProfileUnity with FlexApp.

More information

ProfileUnity with FlexApp Technology

ProfileUnity with FlexApp Technology ProfileUnity with FlexApp Technology Installation & Configuration Guide Introduction This guide has been authored by experts at Liquidware Labs in order to provide information and guidance concerning the

More information

Windows Boston. Group Policy Group Policy Basics. Published 2007 Clyde G. Johnson, MCSE, A+

Windows Boston. Group Policy Group Policy Basics. Published 2007 Clyde G. Johnson, MCSE, A+ Windows Boston Group Policy Group Policy Basics Published 2007 Clyde G. Johnson, MCSE, A+ What can Group Policy manage Deploy software Security Settings Assign startup/shutdown and logon/logoff scripts

More information

Windows 7 Optimization Guide

Windows 7 Optimization Guide Consulting Solutions WHITE PAPER Citrix XenDesktop Windows 7 Optimization Guide For Desktop Virtualization www.citrix.com Contents Contents... 2 Overview... 3 Machine Settings... 3 User Settings... 7 Final

More information

For Splunk Universal Forwarder and Splunk Cloud

For Splunk Universal Forwarder and Splunk Cloud Quick Start Guide; For Splunk Universal Forwarder and Splunk Cloud This document details the procedure for manually installing Layer8 software agents, and forwarding data to an existing Splunk Enterprise

More information

VMware User Environment Manager

VMware User Environment Manager VMware User Environment Manager Deployed in 60 Minutes or Less Author: Dale Carter Senior Solution Architect VMware Technology Consulting Services April 2015 Table of Contents 1. VMware User Environment

More information

HP Universal Print Driver Series for Windows Active Directory Administrator Template White Paper

HP Universal Print Driver Series for Windows Active Directory Administrator Template White Paper HP Universal Print Driver Series for Windows Active Directory Administrator Template White Paper Table of Contents: Purpose... 2 Active Directory Administrative Template Overview.. 2 Decide whether to

More information

Installation Guide - Client. Rev 1.5.0

Installation Guide - Client. Rev 1.5.0 Installation Guide - Client Rev 1.5.0 15 th September 2006 Introduction IntraNomic requires components to be installed on each PC that will use IntraNomic. These IntraNomic Client Controls provide advanced

More information

Using ProfileUnity to Migrate from Windows XP to Windows 7

Using ProfileUnity to Migrate from Windows XP to Windows 7 Using ProfileUnity to Migrate from Windows XP to Windows 7 Solutions for Windows Introduction This guide has been authored by experts at Liquidware Labs in order to provide information and guidance concerning

More information

Desktop Management, Profile Migration and Cross Platform Delivery. Technical Overview

Desktop Management, Profile Migration and Cross Platform Delivery. Technical Overview Desktop Management, Profile Migration and Cross Platform Delivery Executive Summary This document provides a technical overview of how AppSense Environment Manager can deliver a flexible and managed user

More information

The Importance of User Workspace Virtualization in Desktop Virtualization

The Importance of User Workspace Virtualization in Desktop Virtualization res Software // Whitepaper The Importance of User Workspace Virtualization in Desktop Virtualization Whitepaper Transforming Desktops into Workspaces 2 Table of content: Abstract... 3 What is desktop virtualization?...4

More information

Password Manager Windows Desktop Client

Password Manager Windows Desktop Client Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard

More information

Module 8: Implementing Group Policy

Module 8: Implementing Group Policy Module 8: Implementing Group Policy Contents Overview 1 Lesson: Implementing Group Policy Objects 2 Lesson: Implementing GPOs in a Domain 12 Lesson: Managing the Deployment of Group Policy 21 Lab: Implementing

More information

Citrix Lab Manager 3.6 SP 2 Quick Start Guide

Citrix Lab Manager 3.6 SP 2 Quick Start Guide WHITE PAPER Citrix Essentials for Microsoft Hyper-V Citrix Lab Manager 3.6 SP 2 Quick Start Guide www.citrix.com Contents Document Summary... 3 Preparation... 3 Architectural Review of Lab Manager... 3

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Module 5: Implementing Group Policy

Module 5: Implementing Group Policy Module 5: Implementing Group Policy Contents Overview 1 Lesson: Creating and Configuring GPOs 2 Lesson: Configuring Group Policy Refresh Rates and Group Policy Settings 16 Lesson: Managing GPOs 27 Lesson:

More information

App-V Deploy and Publish

App-V Deploy and Publish App-V Deploy and Publish Tools from TMurgent Technologies Updated Aug 5, 2010 Version 1.8 Introduction: The deployment of Virtual Applications in the simplest way possible, without the need for complicated

More information

Hyperoo 2 User Guide. Hyperoo 2 User Guide

Hyperoo 2 User Guide. Hyperoo 2 User Guide 1 Hyperoo 2 User Guide 1 2 Contents How Hyperoo Works... 3 Installing Hyperoo... 3 Hyperoo 2 Management Console... 4 The Hyperoo 2 Server... 5 Creating a Backup Array... 5 Array Security... 7 Previous

More information

MS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy. Course Objectives. Required Exam(s) Price.

MS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy. Course Objectives. Required Exam(s) Price. MS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy Discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy. In this four-day instructor

More information

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Share Drive Frequently Asked Questions Table of Contents How do I change my password?... How do I reset my password if I forgot it?... How do I share files/folders with Groups

More information

White Paper Profile migration for a system upgrade to Microsoft Windows Server 2008 R2 and Citrix XenApp 6

White Paper Profile migration for a system upgrade to Microsoft Windows Server 2008 R2 and Citrix XenApp 6 White Paper Profile migration for a system upgrade to sepago 2010 page 1 of 11 Preface XenApp 6 is the new Citrix flagship for dynamic application provisioning in arbitrary IT networks. It replaces the

More information

XMap 7 Administration Guide. Last updated on 12/13/2009

XMap 7 Administration Guide. Last updated on 12/13/2009 XMap 7 Administration Guide Last updated on 12/13/2009 Contact DeLorme Professional Sales for support: 1-800-293-2389 Page 2 Table of Contents XMAP 7 ADMINISTRATION GUIDE... 1 INTRODUCTION... 5 DEPLOYING

More information

Managing Windows Environments with Group Policy

Managing Windows Environments with Group Policy 3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: rwhitney@discoveritt.com Web: www.discoveritt.com Managing Windows Environments with Group Policy Course: MS50255C

More information

Outpost Network Security

Outpost Network Security Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It

More information

User Environment Manager Administrator s Guide

User Environment Manager Administrator s Guide Administrator s Guide VMware User Environment Manager V E R S I O N 8. 6. 0 You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/ The VMware

More information

ProactiveWatch 2.0 Patch Management and Reporting

ProactiveWatch 2.0 Patch Management and Reporting ProactiveWatch 2.0 Patch Management and Reporting V090908 2009 ProactiveWatch, Inc. All Rights Reserved. Purpose of this Guide... 1 II. Patching View... 1 Main Patching Screen... 2 Filtering by Patch Attribute...

More information

This document details the procedure for installing Layer8 software agents and reporting dashboards.

This document details the procedure for installing Layer8 software agents and reporting dashboards. Quick Start Guide This document details the procedure for installing Layer8 software agents and reporting dashboards. Deployment to data analysis takes approximately 15 minutes. If you wish to deploy via

More information

Guide to deploy MyUSBOnly via Windows Logon Script Revision 1.1. Menu

Guide to deploy MyUSBOnly via Windows Logon Script Revision 1.1. Menu Menu INTRODUCTION...2 HOW DO I DEPLOY MYUSBONLY ON ALL OF MY COMPUTERS...3 ADMIN KIT...4 HOW TO SETUP A LOGON SCRIPTS...5 Why would I choose one method over another?...5 Can I use both methods to assign

More information

Desktop Virtualization Made Easy Execution Plan

Desktop Virtualization Made Easy Execution Plan Consulting Solutions WHITE PAPER Citrix XenDesktop Desktop Virtualization Made Easy Execution Plan A desktop virtualization architecture guide for small to medium environments www.citrix.com Trying to

More information

MS 50255B: Managing Windows Environments with Group Policy (4 Days)

MS 50255B: Managing Windows Environments with Group Policy (4 Days) www.peaklearningllc.com MS 50255B: Managing Windows Environments with Group Policy (4 Days) Introduction In course you will learn how to reduce costs and increase efficiencies in your network. You will

More information

Citrix Systems, Inc.

Citrix Systems, Inc. Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change

More information

User Guide Release Management for Visual Studio 2013

User Guide Release Management for Visual Studio 2013 User Guide Release Management for Visual Studio 2013 ABOUT THIS GUIDE The User Guide for the release management features is for administrators and users. The following related documents for release management

More information

Using RADIUS Agent for Transparent User Identification

Using RADIUS Agent for Transparent User Identification Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your

More information

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative

More information

NAS 253 Introduction to Backup Plan

NAS 253 Introduction to Backup Plan NAS 253 Introduction to Backup Plan Create backup jobs using Backup Plan in Windows A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Create backup

More information

Sage CRM 7.3 Terminal Services & Citrix Support Guide

Sage CRM 7.3 Terminal Services & Citrix Support Guide Sage CRM 7.3 Terminal Services & Citrix Support Guide Contents Introduction... 2 Which Versions are Supported in 7.3?... 2 Using Citrix... 3 Installing the Outlook Plug-in for Exchange Integration... 3

More information

Implementing HIPAA Compliance with ScriptLogic

Implementing HIPAA Compliance with ScriptLogic Implementing HIPAA Compliance with ScriptLogic A ScriptLogic Product Positioning Paper By Nick Cavalancia 1.800.424.9411 www.scriptlogic.com Table of Contents INTRODUCTION... 3 HIPAA BACKGROUND... 3 ADMINISTRATIVE

More information

Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7.

Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Troubleshooting Introduction Adaxes Self-Service Client provides secure

More information

Chapter 1 Scenario 1: Acme Corporation

Chapter 1 Scenario 1: Acme Corporation Chapter 1 Scenario 1: Acme Corporation In This Chapter Description of the Customer Environment page 18 Introduction to Deploying Pointsec PC page 20 Prepare for Deployment page 21 Install Pointsec PC page

More information

DeviceLock Management via Group Policy

DeviceLock Management via Group Policy User Manual DeviceLock Management via Group Policy SmartLine Inc 1 Contents Using this Manual...3 1. General Information...4 1.1 Overview...4 1.2 Applying Group Policy...5 1.3 Standard GPO Inheritance

More information

Automating client deployment

Automating client deployment Automating client deployment 1 Copyright Datacastle Corporation 2014. All rights reserved. Datacastle is a registered trademark of Datacastle Corporation. Microsoft Windows is either a registered trademark

More information

Web Security Service

Web Security Service Webroot Web Security Service Desktop Web Proxy Configuration Guide Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Desktop Web Proxy Configuration Guide September

More information

High Availability for Citrix XenApp

High Availability for Citrix XenApp WHITE PAPER Citrix XenApp High Availability for Citrix XenApp Enhancing XenApp Availability with NetScaler Reference Architecture www.citrix.com Contents Contents... 2 Introduction... 3 Desktop Availability...

More information

Thin Client & Virtual Desktop White Paper

Thin Client & Virtual Desktop White Paper Thin Client & Virtual Desktop White Paper TABLE OF CONTENTS Overview 2 Compatible Thin Client Products 2 Thin Client Implementation Basics 2 Content Creation and Targeting... 2 Content Display... 3 Increase

More information

Installation and Setup: Setup Wizard Account Information

Installation and Setup: Setup Wizard Account Information Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account

More information

PC Power Down. MSI Deployment Guide

PC Power Down. MSI Deployment Guide PC Power Down MSI Deployment Guide 1. Introduction 1.1. Outline The client software for PC Power Down can be pushed out across a network, saving the effort of individually visiting each computer to install

More information

Quick Start Guide. User Manual. 1 March 2012

Quick Start Guide. User Manual. 1 March 2012 Quick Start Guide User Manual 1 March 2012 This document outlines the steps to install SAMLite system into a single box of server and configure it to run for passive collection (domain login script). This

More information

Colligo Contributor File Manager 4.6. User Guide

Colligo Contributor File Manager 4.6. User Guide Colligo Contributor File Manager 4.6 User Guide Contents Colligo Contributor File Manager Introduction... 2 Benefits... 2 Features... 2 Platforms Supported... 2 Installing and Activating Contributor File

More information

Installing Intouch Søk og SMS

Installing Intouch Søk og SMS Document version: 1.0 Document date: 2013-05-31 BluePosition ApS - SCION-DTU - Diplomvej 376-2800 Lyngby - Tlf.: +45 70 20 65 25 - Fax.: +45 45 26 77 10 www.mobilecti.dk www.blueposition.com www.mobileivr.dk

More information

M86 Authenticator USER GUIDE. Software Version: 2.0.10 Document Version: 04.26.11

M86 Authenticator USER GUIDE. Software Version: 2.0.10 Document Version: 04.26.11 M86 Authenticator USER GUIDE Software Version: 2.0.10 Document Version: 04.26.11 M86 AUTHENTICATOR USER GUIDE 2011 M86 Security All rights reserved. 828 W. Taft Ave., Orange, CA 92865, USA Version 1.01,

More information

Wazza s QuickStart 15. Leopard Server - Disaster Backup

Wazza s QuickStart 15. Leopard Server - Disaster Backup Wazza s QuickStart 15. Leopard Server - Disaster Backup About the Document This document is the 15th in a series of documents describing the process of installing and configuring a Mac OS X 10.5 Server

More information

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION

TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION TECHNICAL DOCUMENTATION SPECOPS DEPLOY / APP 4.7 DOCUMENTATION Contents 1. Getting Started... 4 1.1 Specops Deploy Supported Configurations... 4 2. Specops Deploy and Active Directory...5 3. Specops Deploy

More information

Evaluation Virtual Appliance Quick Start Guide for Citrix XenApp

Evaluation Virtual Appliance Quick Start Guide for Citrix XenApp EVALUATION GUIDE Citrix XenApp Evaluation Virtual Appliance Quick Start Guide for Citrix XenApp This document provides step-by-step instructions for extracting and running the Citrix XenApp 6 Evaluation

More information

50331D Windows 7, Enterprise Desktop Support Technician (Windows 10 Curriculum)

50331D Windows 7, Enterprise Desktop Support Technician (Windows 10 Curriculum) This course can be purchased by authorized Microsoft Learning Centers at the Courseware Marketplace web-site. Microsoft Certified Trainers (MCTs) can get a free copy at the same website. About the Course

More information

SystemTools Software Inc. NTFS and Share Permissions Reporting

SystemTools Software Inc. NTFS and Share Permissions Reporting SystemTools Software Inc. NTFS and Share Permissions Reporting SystemTools Software s Tech Support department receives numerous requests asking about permissions reporting, so we ve decided to create this

More information

Managing and Maintaining a Microsoft Windows Server 2003 Environment

Managing and Maintaining a Microsoft Windows Server 2003 Environment Managing and Maintaining a Microsoft Windows Server 2003 Environment Course 2273: Five days; Blended (classroom/e-learning) Introduction Elements of this syllabus are subject to change. This course combines

More information

Advanced Farm Administration with XenApp Worker Groups

Advanced Farm Administration with XenApp Worker Groups WHITE PAPER Citrix XenApp Advanced Farm Administration with XenApp Worker Groups XenApp Product Development www.citrix.com Contents Overview... 3 What is a Worker Group?... 3 Introducing XYZ Corp... 5

More information

HDX 3D Version 1.0 Release Notes

HDX 3D Version 1.0 Release Notes HDX 3D Version 1.0 Release Notes www.citrix.com Citrix HDX 3D for Professional Graphics 1.0 Release Notes This document summarizes the features in Citrix HDX 3D for Professional Graphics 1.0 and describes

More information

Remote Desktop Reporter Agent Deployment Guide

Remote Desktop Reporter Agent Deployment Guide Remote Desktop Reporter Agent Deployment Guide Table of Contents Overview... 2 Agent Components... 2 Agent Security... 2 Windows Firewall Considerations... 3 Installation Procedure and Configuration Parameters...

More information

TROUBLESHOOTING GUIDE

TROUBLESHOOTING GUIDE Lepide Software LepideAuditor Suite TROUBLESHOOTING GUIDE This document explains the troubleshooting of the common issues that may appear while using LepideAuditor Suite. Copyright LepideAuditor Suite,

More information

Installation Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.

Installation Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Inventory is a trademark owned by Specops Software.

More information

PORTAL ADMINISTRATION

PORTAL ADMINISTRATION 1 Portal Administration User s Guide PORTAL ADMINISTRATION GUIDE Page 1 2 Portal Administration User s Guide Table of Contents Introduction...5 Core Portal Framework Concepts...5 Key Items...5 Layouts...5

More information

Lecture 3: Active Directory Domain Service (AD DS)

Lecture 3: Active Directory Domain Service (AD DS) Lecture 3: Active Directory Domain Service (AD DS) Agenda Active Directory Domain Service (AD DS) Installing and Configuring Active Directory Domain Services Implementing a Group Policy Infrastructure

More information

Citrix EdgeSight for Load Testing Installation Guide. Citrix EdgeSight for Load Testing 3.8

Citrix EdgeSight for Load Testing Installation Guide. Citrix EdgeSight for Load Testing 3.8 Citrix EdgeSight for Load Testing Installation Guide Citrix EdgeSight for Load Testing 3.8 Copyright Use of the product documented in this guide is subject to your prior acceptance of the End User License

More information

Microsoft Corporation. Status: Preliminary documentation

Microsoft Corporation. Status: Preliminary documentation Microsoft Corporation Status: Preliminary documentation Beta content: This guide is currently in beta form. The AppLocker team greatly appreciates you reviewing the document and looks forward to receiving

More information

For Active Directory Installation Guide

For Active Directory Installation Guide For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically

More information

Kerio VPN Client. User Guide. Kerio Technologies

Kerio VPN Client. User Guide. Kerio Technologies Kerio VPN Client User Guide Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on Kerio VPN Client, version 7.1 for Windows. All additional

More information

50255: Managing Windows Environments with Group Policy

50255: Managing Windows Environments with Group Policy 50255: Managing Windows Environments with Group Policy Microsoft - Servidores Localidade: Lisboa Data: 01 Oct 2015 Preço: 1520 ( Os valores apresentados não incluem IVA. Oferta de IVA a particulares e

More information

CA XOsoft Replication for Windows

CA XOsoft Replication for Windows CA XOsoft Replication for Windows Microsoft SQL Server Operation Guide r12.5 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the

More information

Managing Windows Environments with Group Policy 50255D; 5 Days, Instructor-led

Managing Windows Environments with Group Policy 50255D; 5 Days, Instructor-led Managing Windows Environments with Group Policy 50255D; 5 Days, Instructor-led Course Description In this course you will learn how to reduce costs and increase efficiencies in your network. You will discover

More information

Outlook Connector Installation & Configuration groupwaresolution.net Hosted MS Exchange Alternative On Linux

Outlook Connector Installation & Configuration groupwaresolution.net Hosted MS Exchange Alternative On Linux Outlook Connector Installation & Configuration groupwaresolution.net Hosted MS Exchange Alternative On Linux Page 1 of 5 DOWNLOAD Please download the connector installer msi file and save it to your computer.

More information

Office of Information Technologies (OIT)

Office of Information Technologies (OIT) Office of Information Technologies (OIT) Encrypting File System (EFS) November 14th, 2007 Contents Introduction... 1 Benefits... 1 How it works... 1 Enabling EFS... 2 Step 1: Obtain an EFS key pair...

More information

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

Product Review ControlUp

Product Review ControlUp Product Review ControlUp Februari 2012 Wilco van Bragt Control-UP Page 2 of 15 Introduction While Citrix Resource Manager was not perfect in earlier version of Citrix Presentation Server, many Citrix administrators

More information

Server Edition Administrator s Guide

Server Edition Administrator s Guide Server Edition Administrator s Guide July 13, 2010 Introduction This document covers FinePrint, pdffactory, and pdffactory Pro Server Editions (SE). Installing SE on a Windows server provides easy deployment

More information

HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE

HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

MobileMail. Administrator s Guide. 2014 Citrix Systems, Inc. All rights reserved.

MobileMail. Administrator s Guide. 2014 Citrix Systems, Inc. All rights reserved. MobileMail Administrator s Guide Prepared by: Citrix Labs Version: 1.3.1 Last Updated: June 18, 2014 Contents Introduction... 5 Installation... 6 Citrix XenApp 6.5... 6 Citrix XenDesktop 7.x... 6 Citrix

More information

ACTIVE DIRECTORY DEPLOYMENT

ACTIVE DIRECTORY DEPLOYMENT ACTIVE DIRECTORY DEPLOYMENT CASAS Technical Support 800.255.1036 2009 Comprehensive Adult Student Assessment Systems. All rights reserved. Version 031809 CONTENTS 1. INTRODUCTION... 1 1.1 LAN PREREQUISITES...

More information

InventoryControl for use with QuoteWerks Quick Start Guide

InventoryControl for use with QuoteWerks Quick Start Guide InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY

More information

EZ GPO. Power Management Tool for Network Administrators.

EZ GPO. Power Management Tool for Network Administrators. EZ GPO Power Management Tool for Network Administrators. Table of Contents Introduction...3 Installation...4 Configuration...6 Base Options...7 Options Properties Dialogue...8 Suggested Configuration Settings...9

More information

CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS

CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Number: 1Y0-A14 Passing Score: 800 Time Limit: 90 min File Version: 42.2 http://www.gratisexam.com/ CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Exam Name: Implementing

More information

Network Installation Guide. windows and mac

Network Installation Guide. windows and mac Network Installation Guide windows and mac Copyright Information 2009 Promethean Limited. All rights reserved. This guide is distributed for ActivInspire. It may only be reproduced for use within the institution

More information

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised

More information

Agency Pre Migration Tasks

Agency Pre Migration Tasks Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required

More information

NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment

NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 05 October 2005 200 Microsoft

More information