Citrix Advisor
Citrix Advisor is a service that helps you optimize DaaS deployment and enhance its overall health and readiness. It automates environment checks and delivers actionable recommendations, empowering you to proactively identify configuration issues, inefficiencies, resource wastes, deviations from best practices, and more.
Note:
- This service is available exclusively to Full Administrators.
- We recommend submitting your feedback using the feedback icon in the top-right corner of the page.
Benefits
With Advisor, you can:
- Proactively identify and resolve issues: Detect potential problems, configuration drift, and deviations from best practices before they impact users, disrupt business operations, or compromise security.
- Optimize environment performance and stability: Fine-tune configurations, optimize resource allocation, and implement best practices to enhance the stability, security, and performance of your Citrix deployments.
- Streamline operations and reduce overhead: Automate routine checks, simplify complex remediation tasks, and receive guided assistance, thereby reducing operational overhead and freeing up administrative resources.
- Optimize costs and resource utilization: Identify areas of overspending, uncover opportunities for resource optimization, and ensure efficient utilization of Citrix technologies to minimize the total cost of ownership.
- Maintain compliance and adherence to best practices: Ensure that your Citrix deployments adhere to Citrix best practices, security standards, and industry regulations, reducing risk and improving overall governance.
- Simplify complex tasks: Simplify administrative tasks to support a healthy, optimized environment.
Access Citrix Advisor
To view Citrix Advisor recommendations, follow these steps:
- Sign in to Citrix Cloud using an account with the Full Administrator role.
- Click the DaaS tile.
- In the left pane, select Advisor.
-
Click Check site to run a site check and generate updated recommendations based on the current configuration.
All recommendations appear in the list.
Filter recommendations
You can filter recommendations by Impact, Category, or Component to focus on the information most relevant to your deployment.
-
In Advisor, locate the filters at the top right of the recommendation list.
-
Click a filter (for example, Category) to view available options.
Category Description Reference Security Recommendations for detecting threats and vulnerabilities that might lead to security breaches. Security recommendations Reliability Recommendations for ensuring and improving the continuity of your business-critical applications. Reliability recommendations Performance Recommendations for enhancing performance across applications and desktops to deliver faster, more responsive experiences for end users. Performance recommendations Operational excellence Recommendations for helping you achieve process and workflow efficiency, resource manageability, and deployment best practices. Operational excellence recommendations Cost optimization Recommendations for reducing overall spending by right-sizing resources, minimizing waste, and aligning capacity with actual usage needs. Cost optimization recommendations -
Select one or more checkboxes to apply the filter. The list updates automatically to display only the recommendations that match your selections.
-
Use multiple filters together to narrow down the list.
Review and act on recommendations
Use the recommendations list to understand configuration issues or improvement opportunities in your deployment. You can view details, take corrective actions, or dismiss recommendations based on their relevance.
To review and act on recommendations, follow these steps:
-
Select a recommendation to view its details in the lower pane.
-
To implement the recommendation:
- Click Fix now.
-
Follow the recommended steps to make the necessary updates.
Sometimes, you’re directed to supporting documentation when automated configuration isn’t supported or feasible. We want to make sure that Advisor is designed to provide automated actions directly within the UI wherever possible, minimizing the need for manual setup.
- After making updates, click Recheck to update the status of the affected resources.
Note:
The UI and steps vary depending on the recommendation. The screenshot shown is for illustration purposes only.
-
If a recommendation isn’t relevant to your deployment or doesn’t require action, click Dismiss to remove it from the current list and future check results.
Tip:
To restore dismissed recommendations, click Check site, then click Manage at the bottom of the page to view and restore them.
View the full site check report
The full report provides a summary of all Advisor recommendations from the latest site check. It includes passed, dismissed, and unresolved checkpoints, helping you assess the overall health and optimization opportunities in your DaaS site.
To view the full report, click the View full report icon at the top right of the recommendation list.
References
This section lists all Citrix Advisor recommendations by category to help you understand their purpose and impact.
Security recommendations
Recommendation | ID | Impact | Component | Description |
---|---|---|---|---|
Upgrade VDAs that reached End of Life | REC_001 | High | VDA | Some machines are using VDA versions that have reached End of Life and are no longer supported by Citrix. Upgrade affected machines to the latest LTSR or CR VDA version. |
Implement device posture policies | REC_021 | Medium | Secure Private Access | The current Secure Private Access configuration lacks device posture policies, allowing unrestricted access to internal applications from any device. To mitigate this risk and enhance security, implement device posture policies that classify devices as: Compliant, Non-compliant, and Denied access. |
Implement adaptive access policies | REC_022 | Medium | Secure Private Access | The current Secure Private Access configuration lacks adaptive access policies, allowing potentially insecure access to applications. To enhance security, implement adaptive access policies that dynamically control access to enterprise web, SaaS, TCP, and UDP apps based on context. For granular controls, enable restricted access to enterprise web and SaaS apps by adding the security restrictions: Clipboard, Screen capture, Printing, Key logging protection, Downloads, Uploads, Watermark, and Open in remote browser. |
Reliability recommendations
Recommendation | ID | Impact | Component | Description |
---|---|---|---|---|
Configure restart schedules for multi-session delivery groups | REC_004 | High | VDA | Some multi-session delivery groups do not have restart schedules configured. Scheduled restarts help maintain optimal performance, stability, and resource availability across multi-session OS VDAs. To ensure service continuity and reduce downtime, create at least two restart schedules. Alternate restart schedules with tag restrictions by tagging VDAs into groups, such as ‘Even’ and ‘Odd.’ |
Alternate restart schedules for multi-session delivery groups | REC_005 | Medium | VDA | Some multi-session delivery groups only have one restart schedule configured. To ensure service continuity and reduce downtime, create at least two restart schedules. Alternate restart schedules with tag restrictions by tagging VDAs into groups, such as ‘Even’ and ‘Odd.’ |
Host applications on multiple VDAs | REC_006 | High | VDA | Some published applications are hosted on only a single VDA, which can impact service continuity and lead to downtime risks. Ensure that each application is hosted on multiple VDAs in a delivery group to help maintain availability and reliability. |
Upgrade VDAs to match the catalog functional level | REC_008 | High | VDA | Some machines use an earlier VDA version not supported by the minimum catalog functional level, which can prevent them from registering. To avoid registration issues, upgrade earlier VDA versions to match the catalog functional level. |
Deploy Cloud Connectors in your zones | REC_014 | High | Cloud Connector | Fewer than two Cloud Connectors are deployed in some of your zones (resource locations). Deploy at least two Cloud Connectors per resource location to maintain availability and resiliency during Connector updates. Resource locations should follow the N + 1 model, where N is the baseline requirement based on deployment size and the additional 1 provides redundancy. |
Schedule Connector updates | REC_015 | Medium | Cloud Connector | Some zones (resource locations) don’t have a scheduled start time for Connector updates. To ensure that updates only occur during planned maintenance windows and reduce service disruption, schedule Connector updates for a preferred time and day of the week. |
Performance recommendations
Recommendation | ID | Impact | Component | Description |
---|---|---|---|---|
Optimize Cloud Connectors for LHC mode | REC_019 | High | Cloud Connector | Some Cloud Connectors have less than four CPU cores per socket, which can impact users’ ability to enumerate and launch available resources while in LHC mode. To maximize resource availability for LHC and prevent performance bottlenecks, configure Cloud Connector machines to have at least four cores per socket. |
Enhance Cloud Connector hardware | REC_020 | High | Cloud Connector | High CPU, memory, or disk usage might impact Cloud Connector performance and availability. To prevent performance degradation and maintain reliability, increase CPU, memory, or storage for the Cloud Connectors. |
Operational excellence recommendations
Recommendation | ID | Impact | Component | Description |
---|---|---|---|---|
Upgrade VDAs to the latest version | REC_002 | Low | VDA | Some machines are using older VDA versions. Upgrade to the latest LTSR or CR VDA version to access new features, improvements, and security enhancements. |
Use Citrix Provisioning technology | REC_003 | Medium | Citrix Provisioning | All machines in the site are manually provisioned and do not use Citrix Provisioning technologies such as Machine Creation Services™ (MCS) or Provisioning Services (PVS). Use MCS or PVS to ensure VDA consistency, minimize manual tasks, and streamline environment scaling operations. |
Low functional level | REC_009 | Low | VDA | Some machine catalogs have a lower functional level than the detected VDA version, limiting access to new features on later VDA versions. To access these features, change the functional level to the latest version supported by all machines in the catalog. |
Back up your DaaS configuration | REC_011 | High | DaaS site | You don’t have a backup of your DaaS configuration. Create on-demand or scheduled backups to ensure that you have a ready-to-use copy of your Citrix configurations for quick recovery. |
Create a new backup of your DaaS configuration | REC_012 | High | DaaS site | Your last DaaS configuration backup was over three months ago. Regularly create on-demand or scheduled backups to keep an up-to-date copy of your Citrix configurations ready for quick recovery. |
Cost optimization recommendations
Recommendation | ID | Impact | Component | Description |
---|---|---|---|---|
Enable Autoscale™ for your delivery groups | REC_010 | Medium | VDA | Some eligible delivery groups aren’t using Autoscale. Enable Autoscale for consistent machine power management, maintaining availability while effectively balancing costs and user experience. |