Citrix Provisioning Services: To PXE or not to PXE
- Details
With Citrix Provisioning Services the client (called target device) need to use “something” to connect to the PVS server to start the streaming process of the operating systems within the vDisk to target device. The default connection is using the PXE technique combined with TFTP, but Citrix also offers another technique called Boot Device Manager (BDM). In this article I will go both options using pros and cons (through my eyes) and how you can work around the cons (of both techniques). At the end I will give my vision which technique to use (in which scenarios).
Read more: Citrix Provisioning Services: To PXE or not to PXE
Unattended installation Citrix Provisioning Services 6.1 Part 1
- Details
Unattended installation of Front-End products like Citrix XenApp 6.5 or Windows 7 is really commodity nowadays. Unattended installations of back-end components are done less, which is actually logically. Such components are not installed in large amounts and are only executed once (per version). However more and more back-end components can be installed silently, mainly for the large enterprises. For such environments where the amounts of servers are higher, the efforts to set-up an unattended installation are worth doing those actions in comparison with manually install those servers. Citrix Provisioning Services (PVS) offers unattended installation and configuration and at one of my project we needed to install more than 10 Provisioning Services servers. This is definitely a use case to use the unattended possibilities of Citrix Provisioning Services. In this article I will explain how you can install Citrix Provisioning Services unattended including my experiences with it so far.
Read more: Unattended installation Citrix Provisioning Services 6.1 Part 1
Bring Your Own Device: Hype or Reality
- Details
For the last years BYOD is a hot and trending topic, many many articles are writing about it. Actually if you search for my chosen title many article can be found, in which the answer to the question about BYOD will be there for a long(er) time.
As this is a 100% opinion article I will start with writing down the pros and cons of BYOD trough my eyes. Followed I will write down (again through my eyes) reasons why BYOD can be sees as a hype or a reality. Finally I will write down my vision of BYOD.
RDS Deployment Possibilities
- Details
One of the remarks the RDS Team got out was the difficulties IT departments had was the installation of the RDS components. It was unclear which components were needed/required and where they should be installed. Because Microsoft is aiming with RDS is created on the low complexity environments, it will become more important to provide clear guidance of the installation steps. The RDS team reacted on this remark by adding a complete new feature within the installation part for creating RDS Deployment Scenarios. In this article I will describe those scenarios and how they can be implemented.
Using RES Workspace Manager to secure your environment
- Details
Although User Environment Management (UEM) becomes more and more important in almost every company it is getting easier to convince the IT people and management of purchasing the UEM. However there are still people who just see such a product as a logon script replacement, which can also be done using scripting or Group Policy Preferences. I’m not writing this article to discuss or argue about that statement as you can do actually a lot of the same configuration with scripts or Group Policy Preferences for the basic set-up like printer assignment, network mappings and so on. However UEM products offer much more other functionalities like Profile Management, E-mail management, Trouble Shooting tools, Performance Management and additional Security Management. This last one can be a real important added value for lot of companies, but is often not taken into account by the decision to use/purchase a UEM product. In this article I will focus on the security part showing/describing the features available in RES Workspace Manager 2012 (most of those features are also available in other UEM products as well) and provide you with use cases where those features were implemented and created an added value for that company.
Read more: Using RES Workspace Manager to secure your environment
FairShare of Resources in RD Session Host
- Details
One of the new features within Remote Desktop Services in Windows Server 2012 is Fair Share of Resources. Actually Fair Share was already introduced in Windows Server 2008R2 but the feature is extended in Windows Server 2012. In this article I will describe how Fair Share of Resources is functioning, what can be configured and how it works in practice.
RDS User Profile Disk
- Details
One of the new features within RDS (both Session Host as Virtual Machine) is called User Profile Disk. User Profile Disk is according Microsoft the successor of Roaming Profiles and Folder Redirection. In this article I’m will show you how to enable the User Profile Disk, how to configure the settings of the User Profile Disk, How it’s works and what the differences are with Roaming Profiles, Folder Redirection and User Experience Virtualization (EU-V).
Citrix Load Balancing Policies XenApp 6.x explained
- Details
When I checked the statistics of the VanBragt.Net Virtualization website I noticed that several connections were based on search for Citrix Load Balancing. That brought me to the idea to write some more about it. In the same time in one of my project the Load Balancing part came into the picture so I can also share/use my personal experiences in the article. This article will describe when and why you would like to use Citrix Load Balancing and how you need to configure it.
Before we really start the article handles Citrix Load Balancing Policies which should not be confused with Citrix Load Evaluators which are often also called Citrix Load Balancing. The Load Evaluators are used to divide users equally over servers based on user load and/or used resources. However Load Balancing Policies are a step before that process by specifying which group of servers should be used to start the session on.
Update: As Andrew stated in the comments this component will only work when connecting via Access Gateway, Web Interface of Cloud Gateway. Old methods (like TCP via HTTP) often used on Thin Clients will ignore the configuration.
Read more: Citrix Load Balancing Policies XenApp 6.x explained
Why Client Hypervisors will become really important
- Details
A few years ago Citrix launched the first version of XenClient. With this launch a big supplier (Citrix) started a product virtualizing the operating system on client hardware. When Citrix launches the technical people love the technique, but many people are/were wondering which business needs such products will fulfill. Although several suppliers followed, even Microsoft announced the availability of Hyper-V in the Windows 8 client; still the technique is not really adopted and is not hyped like other virtualization techniques. In this article I will describe my opinion why I think Client Hypervisors will become important, but by other reasons than current often used.
Read more: Why Client Hypervisors will become really important