3 Disclaimer This document is furnished "AS IS". Citrix Systems, Inc. disclaims all warranties regarding the contents of this document, including, but not limited to, implied warranties of merchantability and fitness for any particular purpose. This document may contain technical or other inaccuracies or typographical errors. Citrix Systems, Inc. reserves the right to revise the information in this document at any time without notice. This document and the software described in this document constitute confidential information of Citrix Systems, Inc. and its licensors, and are furnished under a license from Citrix Systems, Inc. This document and the software may be used and copied only as agreed upon by the Beta or Technical Preview Agreement About Citrix Citrix (NASDAQ:CTXS) is leading the transition to software-defining the workplace, uniting virtualization, mobility management, networking and SaaS solutions to enable new ways for businesses and people to work better. Citrix solutions power business mobility through secure, mobile workspaces that provide people with instant access to apps, desktops, data and communications on any device, over any network and cloud. With annual revenue in 2015 of $3.28 billion, Citrix solutions are in use at more than 330,000 organizations and by over 100 million users globally. Learn more at Copyright 2016 Citrix Systems, Inc. All rights reserved. Citrix, Citrix Receiver, and StoreFront are trademarks of Citrix Systems, Inc. and/or one of its subsidiaries, and may be registered in the U.S. and other countries. Other product and company names mentioned herein may be trademarks of their respective companies.
4 Introduction As many applications have been ported to the web, users end up relying on multiple browsers and browser versions in order to achieve compatibility with web-based apps. If the application is an internally hosted application, organizations are also often required to install and configure complex VPN solutions in order to provide secure access to remote users. Typical VPN solutions require a client-side agent that must also be maintained across numerous operating systems and operating system versions. The challenges with web-based applications explains why web browsers are one of the most heavily deployed applications on Citrix XenApp. With the latest enhancements to XenApp, users can have a seamless web-based application experience where a hosted web-based application simply appears within the user s preferred local browser. For example, if a user s preffered browser is Mozilla Firefox but the application is only compatible with Microsoft Internet Explorer, XenApp Secure Browser will display the Internet Explorer compatible application as a tab within the Firefox browser. In order to make this a seamless experience, the following must be accomplished: Integrated Experience: In traditional XenApp deployments, the launching of an application results in a new application icon appearing within the user s task bar. With Secure Browser, the application only appears as a tab within the user s running browser. Browser Bars: Hosting a browser inside of a browser results in duplicate browser bars, bookmark bars, navigation buttons, etc. The Secure Browser tab must have the same appearance as a traditional browser tab. Authentication: Most web-based applications include user authentication. In a traditional XenApp deployment, users log in to StoreFront to launch an application only to be required to log on a second time to the web-based application. Secure Browser streamlines the log on experience to mimic that of a traditional PC where the user only authenticates once, to the web-based application. This document provides instructions for configuring XenApp Secure Browser. Please follow each section in order to ensure a successful installation.
5 Architecture The conceptual architecture for XenApp Secure Browser follows the same architecture for any XenApp 7.x and XenDesktop 7.x solution. Users HTTPS (443) Access NetScaler Gateway Hardware Resource HTTPS (443) ICA (1494) Secure Browser HTTP (80) HTTPS (443) Web App StoreFront XML (443) Control SQL (1433) XML (80) Controller SQL Server A remote user, securely accessing StoreFront, receives a list of web-based applications, which is generated by the Controller requesting a resource list from SQL Server. A remote user selects the web-based application icon displayed within StoreFront. The Controller and SQL Server create an appropriate launch command for the user application request. The HTML5 Receiver executes the delivered launch command and creates a secure connection, through NetScaler Gateway, to the Secure Browser host. The Secure Browser web application launches, using the defined web browser. The web application interface is sent to the user s preferred, local web browser as a new browser tab. The user interacts with the Secure Browser application like any other tab in their local browser. Deployment Creating a XenApp Secure Browser implementation is accomplished by Creating an unauthenticated user delivery group Publishing the appropriate browser-based applications Enabling HTML5 access with a Citrix Policy Integrating an unauthenticated StoreFront Store Validating the end-to-end solution The following sections will guide the admin through the process.
6 Machine Catalog A Citrix XenApp-based machine catalog must already be created within Citrix Studio. The machine catalog must contain at least one XenApp 7.8 server and can utilize Provisioning Services, Machine Creation Services or manual provisioning. The XenApp Secure Browser hosts must have the appropriate web browsers installed. For help on creating and deploying a XenApp Machine Catalog, please refer to the XenApp Reviewers Guide. Delivery Group A delivery group defines the available resources and user rights assignments for a particular group of XenApp hosts. Within Citrix Studio, in the navigation tree on the left, select Delivery Groups. In the Actions pane on the right, select Create Delivery Group. In the Create Delivery Group wizard, select Next on the Getting started with Delivery Groups welcome screen.
7 Select the appropriate XenApp Machine Catalog within the Create Delivery Group wizard. Select the appropriate number of machines to include within this catalog. Select Next. Within the Users portion of the Create Delivery Groups wizard, select the following: Select Next Allow any authenticated users to use this Delivery Group Give access to unauthenticated (anonymous) users Within the Applications portion of the Create Delivery Groups wizard, select Next. The appropriate browser-based applications will be created later.
8 Within the Desktops portion of the Create Delivery Groups wizard, select Next. For Secure Browser implementations, users will not require the ability to launch the full desktop interface. Within the Summary portion of the Create Delivery Groups wizard, give the delivery group a name that will be referenced by the administrator Select Finish. A warning message might appear indicating that the delivery group does not contain any applications or desktops. Select Yes to continue.
9 Within Desktop Studio, verify the delivery group appears. Applications In the previous step, an empty delivery group was created. The next step is to create a set of applications users can access. Although this step could be accomplished in the delivery group portion of the implementation, it is separated as a stand-alone step as admins might wish to add additional applications in the future without being required to recreate the delivery group. Within Citrix Studio, in the navigation tree on the left, select Applications. In the Actions pane on the right, select Add applications.
10 Within the Introduction portion of the Add Applications wizard, select Next Within the Delivery Group portion of the Add Applications wizard, select the appropriate delivery group. Select Next Within the Applications portion of the Add Applications wizard, do the following: Google Chrome: Select the Add drop-down item and select From start menu Microsoft Internet Explorer: Select the Add drop down item and select Manually
11 For Google Chrome Within the Add Applications from Start Menu portion of the Add Applications wizard, select Google Chrome. Select OK For Microsoft Internet Explorer For the Patch to the executable file select Browse. Navigate to the installation location for Internet Explorer. Select OK Within the Applications portion of the Add Applications wizard, select Google Chrome or Internet Explorer. Select Properties.
12 Within the Identification portion of the Application Settings wizard, provide the following details: Select Delivery. Application name (for users): This will be the application name users see within StoreFront. Application name (for administrator): This will be the application name administrators see in Studio. Users will want to see a unique icon for the application instead of the default Chrome or Internet Explorer icon. Within the Delivery portion of the Application Settings wizard, select Change next to the application icon. In the Select Icon screen, select Choose an icon from a file on a representative machine and select Browse. Select Yes to the warning message Unable to browser machines in delivery group. Do you want to browser the local machine?
13 Navigate to the file containing the icon. Within the Select Icon screen, select the icon. Select OK. Select Location within the Application Settings wizard. Add the following in the Command line argument box For Google Chrome: --kiosk --no-default-browsercheck --no-first-run URL For Microsoft Internet Explorer: -k URL Select OK. Note: For URL, enter in the URL for the application: Within the Applications section of the Add Applications wizard, select Next.
14 Select Finish The application should now appear within Studio.
15 Citrix Policies In order to allow HTML5 access to the available resources, the system must allow web socket connections. The following steps shows how to use a Citrix policy to provide this functionality. Within Citrix Studio, in the navigation tree on the left, select Policies. In the Actions pane on the right, select Create Policy. Within the Settings screen of the Create Policy wizard, select Web Sockets in the All Settings drop down box. In the settings portion of the dialog box, highlight WebSockets connections and click Select.
16 Within the Edit Settings screen, select Allowed. Select OK. Select Next Within the Users and Machines screen of the Create Policy wizard, select Delivery Group and select Assign In the Assign Policy screen, set the following: Select OK Mode: Allow Delivery Group: Delivery group name for Secure Browser apps
17 In the Users and Machines screen of the Create Policy wizard, select Next. In the Summary screen of the Create Policy wizard, give the policy a name and select Finish.
18 StoreFront To get access to the available resources, users use their local web browser and connect to the StoreFront site. The following steps outlines how to setup a new StoreFront site for unauthenticated user access. For implementations where StoreFront is installed on the delivery controller: Within Citrix Studio, in the navigation tree on the left, select Citrix StoreFront - Stores. In the Actions pane on the right, select Create Store. For implementations where StoreFront is installed on a dedicated host: Within Citrix StoreFront, in the navigation tree on the left, select Stores. In the Actions pane on the right, select Create Store. In the Getting Started screen of the Create Store wizard, select Next.
19 In the Store Name screen of the Create Store wizard, do the following: Select Next Provide a store name to be used to uniquely identify this store Enable the Allow only unauthenticated users to access this store In the Delivery Controllers screen of the Create Store wizard, select Add. In the Add Delivery Controller screen, do the following: Select OK Provide a Display Name Select XenDesktop 7.0 or higher and XenApp 7.5 or higher configuration type Add the respective delivery controllers fully qualified domain names Specify the appropriate transport type: HTTP or HTTPS. If using HTTPS, appropriate server and root certificates must be installed and configured.
20 In the Delivery Controllers screen of the Create Store wizard, select Next. In the XenApp services URL screen of the Create Store wizard, select the following Select Next. Enable XenApp Services URL Make this the default Store for PNAgent In the Summary screen of the Create Store wizard, select Finish.
21 The new store should be visible in Citrix Studio. Select Receiver for Web Sites in the middle of the screen. Remember this URL as it is used by end users to access the store. Within Citrix Studio, select Manage Receiver for Web Sites on the right side of the console. Select Deploy Citrix Receiver tab. Select Always use Receiver for HTML5 in the Deployment options section. Select Workspace Control. Set Logoff action to Terminate Unselect Enable workspace control Select OK
22 Validation At this point, it is advisable to test the configuration to validate all components are working together, properly. On an end point device, launch a web browser and navigate to the StoreFront address for websites. Validation: StoreFront should not request the user to log in. Select the web app. Validation: XenApp Secure Browser should create a new tab within the user s running browser. Validation: The XenApp Secure Browser tab should only contain a single set of navigation buttons and bars. The experience should mimic that of the traditional PC experience.
23 Advanced Options Additional items can be done to augment a XenApp Secure Browser implementation. These items include Active Directory Group Policies Website Shortcuts Application Icons Active Directory Group Policies Microsoft Active Directory Group Policies can be used to configure Internet Explorer and Google Chrome. Internet Explorer settings are already incorporated into Active Directory while Google Chrome requires downloading and installing the appropriate policy templates. The policies for Internext Explorer and Google Chrome should be applied to the Active Directory Organizational Unit (OU) containing the computer accounts for the XenApp Secure Browser servers. Note: Active Directory User Configuration policies will not function with unauthenticated users, which are used as part of this deployment guide. Unauthenticated users are based on local user accounts and not domain accounts. In order to implement User configuration policies, local policies must be used. Internet Explorer Policy The following settings are recommended for XenApp Secure Browser applications delivered through Internet Explorer: Computer Configuration\Policies\Administrative Templates\Windows Components\Internet Explorer Prevent running first run wizard Enabled - go directory to homes page Turn off Automatic Crash Recovery Turn off Reopen Last Browsing Session Enabled Enabled Computer Configuration\Policies\Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel\Security Page\Internet Zone Turn off first run prompt Enabled First run opt in: Enabled The following requires a local policy on the XenApp Secure Browser server. User Configuration\Policies\Administrative Templates\Windows Components\Internet Explorer\Browser Menus Turn off Shortcut Menu Enabled
24 Google Chrome Policy The following settings are recommended for Secure Browser applications delivered through Google Chrome: Note: The ADMX file for Google Chrome can be obtained from: Computer Configuration\Policies\Administrative Templates\Google\Google Chrome Continue running background apps when Google Chrome is closed Disable saving browser history Specify a list of enabled plugins Disabled Enabled Enabled Computer Configuration\Policies\Administrative Templates\Google\Google Chrome\Password manager Allow users to show passwords in Password Manager Enable the password manager Disabled Disabled Website Shortcuts The deployment guide assumes an organization wishes to have users access StoreFront to get to their applications. However, certain user and business requirements dictate the need to have an application icon hosted on a non-storefront website in order to provide a more seamless experience. The following steps enables this functionality: Within Citrix Studio or Citrix StoreFront, select the appropriate store. In the Actions pane on the right, select Manage Receiver for Web Sites
25 Within the Manage Receiver for Web Sites screen, select Configure Select Website Shortcuts Select Add Enter in the URL for the website that will host the links to the published resources. Select the link Get Shortcuts The Get Shortcuts website provides a list of each published resource and the corresponding URL. This URL should be used as the link on the corporate website to access the published resource. When a user selects the link from the corporate website, the app automatically launches. If the link is used on any other website that was not defined in the previous step, users are asked if they wish to launch the resource.
26 Application Icons Publishing a web-based app through Internet Explorer or Chrome results in the icon for the application being either the Internet Explorer icon or the Chrome icon. XenApp allows for the use of custom images, but those images must be in an.ico file (as well as others standards). The following allows an administrator to easily create custom icon files for XenApp Secure Browser. Use the Snipping Tool, within Windows, to create a screen capture of an image to be used as an icon. Save the file as a.png file type. Numerous graphical processing tools allows for the creation of ICO files. There are also free tools online that converts PNG files to ICO files. For example, Save the file will convert the PNG file into an ICO file. will convert the PNG file into an ICO file and allow modifications to the image.
27 Within Citrix Studio, launch the properties of the published resource and select Delivery. Select Change for the icon. Select Choose an icon from a file or a representative machine and select Browse Select the previously saved ICO file. In the Select Icon screen, verify the icon is selected and hit OK.
Citrix Workspace Cloud Apps and Desktop Services for New Customers Reference Architecture Produced by Citrix Solutions Lab This guide will walk you through an example of how to use Citrix Workspace Cloud
Citrix Workspace Cloud Apps and Desktop Service with an on-premises Resource Reference Architecture Produced by Citrix Solutions Lab This guide walks you through an example of how to use Citrix Workspace
Deploying NetScaler Gateway in ICA Proxy Mode Deployment Guide This deployment guide defines the configuration required for using the NetScaler Gateway in ICA Proxy Mode. Table of Contents Introduction
X1 StoreFront and Receiver X1 for Web Tech Preview Getting Started Guide March 2015 Contents Introduction to X1... 1 Who is the tech preview for?... 2 About the tech preview release... 2 Pre-requisites
Upgrading from Citrix Receiver 3.4 to Receiver 4.2.100 Step by step instructions for upgrading Receiver for Windows April 2015 Table of Contents Introduction Section 1: StoreFront Server Upgrading with
Smart Card Configuration for Citrix Environments Version 1.0 Table of Contents Introduction... 3 Obtaining a Smart Card... 3 Required hardware... 3 Setting up a Windows Domain... 4 Installing Domain Controller
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
How to Configure NetScaler Gateway 11.1 with StoreFront 3.6 and XenApp/XenDesktop 7.9 Introduction The purpose of this document is to provide the steps required to configure a NetScaler Gateway to work
App Orchestration 2.0 Configuring NetScaler Load Balancing and NetScaler Gateway for App Orchestration Prepared by: Christian Paez Version: 1.0 Last Updated: December 13, 2013 2013 Citrix Systems, Inc.
Wavecrest InstallationGuide Wavecrest Certificate www.wavecrest.net Copyright Copyright 1996-2015, Wavecrest Computing, Inc. All rights reserved. Use of this product and this manual is subject to license.
Startup Guide for Dell Wyse vworkspace & Microsoft Azure Dell Engineering September 2015 A Dell Deployment and Configuration Guide Revisions Date Sep 2015 Description Initial release THIS DOCUMENT IS FOR
Subject: Citrix Remote Access using PhoneFactor Authentication ATTENTION: End users should take note that Main Line Health has not verified within a Citrix environment the image quality of clinical cal
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
Microsoft Dynamics GP Release Workflow Installation and Upgrade Guide February 17, 2011 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is.
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
8x8 Virtual Office Telephony Interface for Salesforce Administrator Guide May 2014 The Champion For Business Communications Table of Contents 8x8 Virtual Office Telephony Interface for Salesforce.... 3
XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V
Configuring NetScaler 10.5 Load Balancing with StoreFront 2.5.2 and NetScaler Gateway for Prepared by: James Richards Last Updated: August 20, 2014 Contents Introduction... 3 Configure the NetScaler load
. All right reserved. For more information about Specops Self Service Portal and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Self Service Portal is a trademark owned
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes
Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
Lab 05: Deploying Microsoft Office Web Apps Server DISCLAIMER 2013 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Hyper-V, Internet Explorer, Lync, PowerPoint, Silverlight, SQL
Universal Management Service 2015 UMS 2015 Help All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,
User Document Adobe InDesign & InCopy CS5 Support for Citrix Xenpp Server 5.0 Copyright 2010 Adobe Systems Incorporated. All rights reserved. Adobe, the Adobe logo, InCopy and InDesign are either trademarks
Micro Focus iprint Appliance March 2016 1 About This Document This document provides the basic instructions to deploy the Micro Focus iprint Appliance and how to start printing. Refer to the Micro Focus
IBM Tivoli Software Maximo Asset Management Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management Document version 1.0 Rick McGovern Staff Software Engineer IBM Maximo
SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide Published July 2015 This document covers steps to configure Citrix VDI on Pulse Secure s SA Series SSL VPN platforms. It also covers brief
How to Configure NetScaler Gateway 10.5 to use with StoreFront 2.6 and XenDesktop 7.6. Introduction The purpose of this document is to record the steps required to configure a NetScaler Gateway for use
WHITE PAPER Citrix XenDesktop High Availability for Desktop Virtualization How to provide a comprehensive, end-to-end highavailability strategy for desktop virtualization. www.citrix.com Contents Contents...
Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring
Web VTS Installation Guide Copyright 2006-2010 SiiTech Inc. All rights reserved. Table of Contents Overview of Web VTS... 1 System Requirements... 2 Installation Sequence... 3 Installing Web VTS... 6 ii
XenApp, XenDesktop, and XenMobile Integration for A Comprehensive Mobility Solution citrix.com Desktop and application virtualization have enhanced mobility everywhere, allowing users to access their Windows
VPN User Guide For Mac System Requirements Operating System: Mac OSX. Internet Browser: Safari (Firefox and Google Chrome are NOT currently supported). Disclaimer Your computer must have the system requirements
Installation Guide Lepide Active Directory Self Service Tool Lepide Software Private Limited Page 1 Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of
GO-Global Cloud 4.1 QUICK START SETTING UP A WINDOWS CLOUD SERVER AND HOST This guide provides instructions for setting up a cloud server and configuring a host so it can be accessed from the cloud server.
Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change
Silect MP Author for Microsoft System Center Operations Manager Silect Software s MP Author User Guide September 2, 2015 Disclaimer The information in this document is furnished for informational use only,
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Clarios Technology Pty. Ltd. Intelligent Reporter Installation Guide Installing Intelligent Reports JIRA plugin The Intelligent Reports plugin for JIRA is available through the Atlassian Marketplace. Follow
User Manual User Manual for Version 188.8.131.52 I Endpoint Protector Virtual Appliance User Manual Table of Contents 1. Endpoint Protector Virtual Appliance Formats1 1.1. Available Formats of the Virtual Appliance...
2X Cloud Portal v10.5 URL: www.2x.com E-mail: email@example.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: firstname.lastname@example.org Information in this document is subject to change without notice. Companies, names, and data used in examples
The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment
Crownpeak Installation and System Requirements Configuration Guide Copyright 2000-2016 Crownpeak Technology Los Angeles, California, USA. All rights reserved. Crownpeak is a trademark of Crownpeak Technologies.
File Share Navigator Online 1 User Guide Service Pack 3 Issued November 2015 Table of Contents What s New in this Guide... 4 About File Share Navigator Online... 5 Components of File Share Navigator Online...
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
Deliver file sharing and synchronization services using Citrix ShareFile Self-paced exercise guide Table of Contents Table of Contents... 2 Overview... 3 Exercise 1: Setting up a ShareFile Account... 6
Instructions for Accessing the Hodges University Virtual Lab Table of Contents Adding the VLAB as a Trusted Site... 3 Accessing the VLAB using Windows 8... 5 Using Internet Explorer and Windows 8 to Access
Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server
VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET
ThinManager and Active Directory Use the F1 button on any page of a ThinManager wizard to launch Help for that page. Visit http://www.thinmanager.com/kb/index.php/special:allpages for a list of Knowledge
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that
Meshcentral.com Introduction to Meshcentral Installing the mesh agent and making use of it Version 0.1.2 May 9, 2011 Ylian Saint-Hilaire 2011 Intel Corporation. All Rights Reserved. Legal Notices and Disclaimers
8x8 Virtual Office Administrator Guide October 2013 The Champion For Business Communications Table of Contents 8x8 Virtual Office Salesforce Call Center App... 3 System Requirements...3 Installation...
I. PURPOSE To add Citrix XenApp Client Setup for home PC/Office using the 32bit Windows client. II. POLICY: Network Request form must be sent from MIS staff to HCN Hardware Support requesting Citrix XenApp
Citrix Introduction and FAQs Introduction to Citrix... 2 Why should I use this?... 2 What about Support?... 2 What browser should I use?... 2 Known Issues... 2 System Requirements for Windows-based computers...
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
Workstation Configuration Version 8.0 May 10, 2013 For the most recent version of this document, visit our documentation website. Table of Contents 1 Workstation configuration 3 1.1 Custom level Internet
Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To
Dell SonicWALL SRA 7.5 Citrix Access Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through Dell SonicWALL SRA 7.5. It also includes information about
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Virtual Owl Guide for Windows University Information Technology Services Training, Outreach, Learning Technologies & Video Production Copyright 2015 KSU Division of University Information Technology Services
Intel Active Management Technology with System Defense Feature Quick Start Guide Introduction...3 Basic Functions... 3 System Requirements... 3 Configuring the Client System...4 Intel Management Engine
Sophos UTM Remote Access via PPTP Configuring Remote Client Product version: 9.300 Document date: Tuesday, October 14, 2014 The specifications and information in this document are subject to change without
QUICK REFERENCE GUIDE July 2014 CITRIX REMOTE ACCESS CITRIX DESKTOP OVERVIEW Citrix remote access software enables you to establish a connection to the servers at Goodmans from outside the Firm. Once the
Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec
Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 December 2010 COPYRIGHT NOTICE TRADEMARKS 2010 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd., Chip PC GmbH All rights reserved.
Single Sign On for ShareFile with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into Citrix ShareFile with Citrix NetScaler. Table of Contents
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor
TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED