Using RES Workspace Manager to secure your environment
- Details
Although User Environment Management (UEM) becomes more and more important in almost every company it is getting easier to convince the IT people and management of purchasing the UEM. However there are still people who just see such a product as a logon script replacement, which can also be done using scripting or Group Policy Preferences. I’m not writing this article to discuss or argue about that statement as you can do actually a lot of the same configuration with scripts or Group Policy Preferences for the basic set-up like printer assignment, network mappings and so on. However UEM products offer much more other functionalities like Profile Management, E-mail management, Trouble Shooting tools, Performance Management and additional Security Management. This last one can be a real important added value for lot of companies, but is often not taken into account by the decision to use/purchase a UEM product. In this article I will focus on the security part showing/describing the features available in RES Workspace Manager 2012 (most of those features are also available in other UEM products as well) and provide you with use cases where those features were implemented and created an added value for that company.
Read more: Using RES Workspace Manager to secure your environment
FairShare of Resources in RD Session Host
- Details
One of the new features within Remote Desktop Services in Windows Server 2012 is Fair Share of Resources. Actually Fair Share was already introduced in Windows Server 2008R2 but the feature is extended in Windows Server 2012. In this article I will describe how Fair Share of Resources is functioning, what can be configured and how it works in practice.
Customer Case: Everything on Top Discussions Part 1
- Details
At a start-up of a project often the requirements and wishes of the organization are sky-high. Everything should be possible and included. Sometimes it just looks like they are ordering a dish at restaurant and ask to add all ingredients that are possible (Everything on Top). Logically when the project is actually starting and/or evolving those requirements and wishes are reflected to the available budget and the current infrastructure/environment, so the goals and targets are adjusted. However sometime everything should actually on top and I participated in such a project. In this article series I will describe the experiences during this project. Instead of using the standard approach I will discuss the biggest discussion points during the project and how those discussions ended. But first I will start with a short description of the current infrastructures and the requirements of the project.
Read more: Customer Case: Everything on Top Discussions Part 1
RDS User Profile Disk
- Details
One of the new features within RDS (both Session Host as Virtual Machine) is called User Profile Disk. User Profile Disk is according Microsoft the successor of Roaming Profiles and Folder Redirection. In this article I’m will show you how to enable the User Profile Disk, how to configure the settings of the User Profile Disk, How it’s works and what the differences are with Roaming Profiles, Folder Redirection and User Experience Virtualization (EU-V).
PoC Res Relay Server Experiences
- Details
Introducing Relay Server
To start the article it’s good to explain what the RES Relay Server actually is. The RES Relay Server is introduced in RES Workspace Manager 2012. Before the Relay Server all Workspace Manager clients (called Agents) are directly connecting to the SQL database where the configuration and logging of RES Workspace Management is stored. In case of real large environments this could be resource intensive on the SQL database. Also in the case of several offices/more sites the traffic between the agent and the database will be transferred over (slower) WAN links. In the last scenario RES Workspace Manager (RES WM) could be used with a second mirrored database, but this involves more hardware and software costs. The relay server component can be used for such scenarios. The relay server is separate component, which can be installed on a Windows machine. The agent server will communicate with the database and caches all the information. The agent will be connected to the relay server and retrieve the settings from the relay server.
Citrix Load Balancing Policies XenApp 6.x explained
- Details
When I checked the statistics of the VanBragt.Net Virtualization website I noticed that several connections were based on search for Citrix Load Balancing. That brought me to the idea to write some more about it. In the same time in one of my project the Load Balancing part came into the picture so I can also share/use my personal experiences in the article. This article will describe when and why you would like to use Citrix Load Balancing and how you need to configure it.
Before we really start the article handles Citrix Load Balancing Policies which should not be confused with Citrix Load Evaluators which are often also called Citrix Load Balancing. The Load Evaluators are used to divide users equally over servers based on user load and/or used resources. However Load Balancing Policies are a step before that process by specifying which group of servers should be used to start the session on.
Update: As Andrew stated in the comments this component will only work when connecting via Access Gateway, Web Interface of Cloud Gateway. Old methods (like TCP via HTTP) often used on Thin Clients will ignore the configuration.
Read more: Citrix Load Balancing Policies XenApp 6.x explained
Why Client Hypervisors will become really important
- Details
A few years ago Citrix launched the first version of XenClient. With this launch a big supplier (Citrix) started a product virtualizing the operating system on client hardware. When Citrix launches the technical people love the technique, but many people are/were wondering which business needs such products will fulfill. Although several suppliers followed, even Microsoft announced the availability of Hyper-V in the Windows 8 client; still the technique is not really adopted and is not hyped like other virtualization techniques. In this article I will describe my opinion why I think Client Hypervisors will become important, but by other reasons than current often used.
Read more: Why Client Hypervisors will become really important