Installing Windows VMs on the Citrix Hypervisor server requires hardware virtualization support (Intel VT or AMD-V).
Basic procedure for creating a Windows VM
The process of installing a Windows on to a VM consists of the following steps:
Selecting the appropriate Windows template
Choosing the appropriate boot mode
Installing the Windows operating system
Installing the Citrix VM Tools for Windows (I/O drivers and the Management Agent)
Windows VMs are supported only when the VMs have the Citrix VM Tools for Windows installed.
Windows VM templates
Windows operating systems are installed onto VMs by cloning an appropriate template using either XenCenter or the xe CLI, and then installing the operating system. The templates for individual guests have predefined platform flags set which define the configuration of the virtual hardware. For example, all Windows VMs are installed with the ACPI Hardware Abstraction Layer (HAL) mode enabled. If you later change one of these VMs to have multiple virtual CPUs, Windows automatically switches the HAL to multi-processor mode.
The available Windows templates are listed in the following table:
|Template Name||Supported boot modes||Description|
|Windows 8.1 (32-bit)||BIOS||Used to install Windows 8.1 (32-bit). (See note)|
|Windows 8.1 (64-bit)||BIOS||Used to install Windows 8.1 (64-bit). (See note)|
|Windows 10 (32-bit)||BIOS||Used to install Windows 10.|
|Windows 10 (64-bit)||BIOS, UEFI, UEFI Secure Boot||Used to install Windows 10 (64-bit).|
|Windows Server 2012 (64-bit)||BIOS||Used to install Windows Server 2012 (64-bit).|
|Windows Server 2012 R2 (64-bit)||BIOS||Used to install Windows Server 2012 R2 (64-bit).|
|Windows Server 2016 (64-bit)||BIOS, UEFI, UEFI Secure Boot||Used to install Windows Server 2016 or Windows Server Core 2016 (64-bit)|
|Windows Server 2019 (64-bit)||BIOS, UEFI, UEFI Secure Boot||Used to install Windows Server 2019 or Windows Server Core 2019 (64-bit)|
Windows 8 is no longer supported. Users who install Windows 8 are upgraded to Windows 8.1.
Attach an ISO image library
The Windows operating system can be installed either from an install CD in a physical CD-ROM drive on the Citrix Hypervisor server, or from an ISO image. See Create ISO images for information on how to make an ISO image from a Windows install CD and make it available for use.
Guest UEFI boot and Secure Boot
Citrix Hypervisor enables recent versions of Windows guest operating systems to boot in UEFI mode. UEFI boot provides a richer interface for the guest operating systems to interact with the hardware, which can significantly reduce Windows VM boot times.
For these Windows operating systems, Citrix Hypervisor also supports Windows Secure Boot. Secure Boot prevents unsigned, incorrectly signed or modified binaries from being run during boot. On a UEFI-enabled VM that enforces Secure Boot, all drivers must be signed. This requirement might limit the range of uses for the VM, but provides the security of blocking unsigned/modified drivers. If you use an unsigned driver secure boot fails and an alert is shown in XenCenter.
Secure Boot also reduces the risk that malware in the guest can manipulate the boot files or run during the boot process.
Guest UEFI boot was provided as an experimental feature in Citrix Hypervisor 8.0. UEFI-enabled VMs that were created in Citrix Hypervisor 8.0 are not supported in Citrix Hypervisor 8.2. Delete these VMs and create new ones with Citrix Hypervisor 8.2.
Citrix Hypervisor supports UEFI boot and Secure Boot on newly created Windows 10 (64-bit), Windows Server 2016 (64-bit), and Windows Server 2019 (64-bit) VMs. You must specify the boot mode when creating a VM. It is not possible to change the boot mode of a VM between BIOS and UEFI (or UEFI Secure Boot) after booting the VM for the first time. However, you can change the boot mode between UEFI and UEFI Secure Boot at any time.
Consider the following when enabling UEFI boot on VMs:
- Ensure that the UEFI-enabled VM has at least two vCPUs.
- You can import or export a UEFI-enabled VM created on Citrix Hypervisor as an OVA, OVF, or an XVA file. Importing a UEFI-enabled VM from OVA or OVF packages created on other hypervisors is not supported.
- To use PVS-Accelerator with UEFI-enabled VMs, ensure that you are using Citrix Provisioning 1906 or later.
- Use the UEFI settings menu to change the screen resolution of the XenCenter console. For detailed instructions, see Troubleshooting.
Consider the following when enabling UEFI Secure Boot on VMs:
- The Citrix Hypervisor server must be booted in UEFI mode. For more information, see Network boot installations
Your resource pool or standalone server must have access to Secure Boot certificates.
Only one Citrix Hypervisor server in the pool requires access to the certificates. When a server joins a pool the certificates on that server are made available to other servers in the pool.
UEFI-enabled VMs use NVME and E1000 for emulated devices. The emulation information does not display these values until after you install Citrix VM Tools for Windows on the VM. UEFI-enabled VMs also show as only having 2 NICs until after you install Citrix VM Tools for Windows.
Enabling UEFI boot or UEFI Secure Boot
You can use XenCenter or the xe CLI to enable UEFI boot or UEFI Secure Boot for your VM.
For information about creating a UEFI-enabled VM in XenCenter, see Create a VM by using XenCenter.
Using the xe CLI to enable UEFI boot or UEFI Secure Boot
When you create a VM, run the following command before booting the VM for the first time:
xe vm-param-set uuid=<UUID> HVM-boot-params:firmware=<MODE> xe vm-param-set uuid=<UUID> platform:secureboot=<OPTION>
UUID is the VM’s UUID,
MODE is either
OPTION is either ‘true’ or ‘false’. If you do not specify the mode, it defaults to
uefi if that option is supported for your VM operating system. Otherwise, the mode defaults to
BIOS. If you do not specify the
secureboot option, it defaults to ‘auto’. For UEFI-enabled VMs created on a Citrix Hypervisor server that is booted in UEFI mode and has Secure Boot certificates available, the ‘auto’ behavior is to enable Secure Boot for the VM. Otherwise, Secure Boot is not enabled.
To create a UEFI-enabled VM from a template supplied with Citrix Hypervisor, run the following command:
UUID=$(xe vm-clone name-label='Windows 10 (64-bit)' new-name-label='Windows 10 (64-bit)(UEFI)') xe template-param-set uuid=<UUID> HVM-boot-params:firmware=<MODE> platform:secureboot=<OPTION>
Do not run this command for templates that have something installed on them or templates that you created from a snapshot. The boot mode of these snapshots cannot be changed and, if you attempt to change the boot mode, the VM fails to boot.
When you boot the UEFI-enabled VM the first time you are prompted on the VM console to press any key to start the Windows installation. If you do not start the Windows installation, the VM console switches to the UEFI shell.
To restart the installation process, in the UEFI console, type the following commands.
When the installation process restarts, watch the VM console for the installation prompt. When the prompt appears, press any key.
Disabling Secure Boot
You might want to disable Secure Boot on occasion. For example, Windows debugging cannot be enabled on a VM that in Secure Boot user mode. To disable Secure Boot, change the VM into Secure Boot setup mode. On your Citrix Hypervisor server, run the following command:
varstore-sb-state <VM_UUID> setup
UEFI-enabled VMs are provisioned with a PK from an ephemeral private key, the Microsoft KEK, the Microsoft Windows Production PCA, and Microsoft third party keys. The VMs are also provided with an up-to-date revocation list from the UEFI forum. This configuration enables Windows VMs to boot with Secure Boot turned on and to receive automatic updates to the keys and revocation list from Microsoft.
Troubleshooting your UEFI and UEFI Secure Boot VMs
For information about troubleshooting your UEFI or UEFI Secure Boot VMs, see Troubleshoot UEFI and Secure Boot problems on Windows VMs.
Create a VM by using XenCenter
To create a Windows VM:
On the XenCenter toolbar, click the New VM button to open the New VM wizard.
The New VM wizard allows you to configure the new VM, adjusting various parameters for CPU, storage, and networking resources.
Select a VM template and click Next.
Each template contains the setup information that is required to create a VM with a specific guest operating system (OS), and with optimum storage. This list reflects the templates that Citrix Hypervisor currently supports.
If the OS that you are installing on your VM is compatible only with the original hardware, check the Copy host BIOS strings to VM box. For example, you might use this option for an OS installation CD that was packaged with a specific computer.
After you first start a VM, you cannot change its BIOS strings. Ensure that the BIOS strings are correct before starting the VM for the first time.
To copy BIOS strings using the CLI, see Install HVM VMs from Reseller Option Kit (BIOS-locked) Media. The option to set user-defined BIOS strings are not available for HVM VMs.
Enter a name and an optional description for the new VM.
Choose the source of the OS media to install on the new VM.
Installing from a CD/DVD is the simplest option for getting started.
- Choose the default installation source option (DVD drive)
- Insert the disk into the DVD drive of the Citrix Hypervisor server
Citrix Hypervisor also allows you to pull OS installation media from a range of sources, including a pre-existing ISO library. An ISO image is a file that contains all the information that an optical disc (CD, DVD, and so on) would contain. In this case, an ISO image would contain the same OS data as a Windows installation CD.
To attach a pre-existing ISO library, click New ISO library and indicate the location and type of ISO library. You can then choose the specific operating system ISO media from the list.
Choose a boot mode for the VM. By default, XenCenter select the most secure boot mode available for the VM operating system version.
- The UEFI Boot and UEFI Secure Boot options appear grayed out if the VM template you have chosen does not support UEFI boot.
- You cannot change the boot mode after you boot the VM for the first time.
Select a home server for the VM.
A home server is the server which provides the resources for a VM in a pool. When you nominate a home server for a VM, Citrix Hypervisor attempts to start the VM on that server. If this action is not possible, an alternate server within the same pool is selected automatically. To choose a home server, click Place the VM on this server and select a server from the list.
- In WLB-enabled pools, the nominated home server isn’t used for starting, restarting, resuming, or migrating the VM. Instead, Workload Balancing nominates the best server for the VM by analyzing Citrix Hypervisor resource pool metrics and by recommending optimizations.
- If a VM has one or more virtual GPUs assigned to it, the home server nomination doesn’t take effect. Instead, the server nomination is based on the virtual GPU placement policy set by the user.
If you do not want to nominate a home server, click Don’t assign this VM a home server. The VM is started on any server with the necessary resources.
Click Next to continue.
Allocate processor and memory resources for the VM. For a Windows 10 VM, the default is 1 virtual CPU and 2,048 MB of RAM. You can also choose to modify the defaults. Click Next to continue.
Assign a virtual GPU. The New VM wizard prompts you to assign a dedicated GPU or one or more virtual GPUs to the VM. This option enables the VM to use the processing power of the GPU. With this feature, you have better support for high-end 3D professional graphics applications such as CAD/CAM, GIS, and Medical Imaging applications.
Allocate and configure storage for the new VM.
Click Next to select the default allocation (24 GB) and configuration, or you might want to do the following extra configuration:
- Change the name, description, or size of your virtual disk by clicking Properties.
- Add a new virtual disk by selecting Add.
Configure networking on the new VM.
Click Next to select the default NIC and configurations, including an automatically created unique MAC address for each NIC. Alternatively, you might want to do the following extra configuration:
- Change the physical network, MAC address, or Quality of Service (QoS) priority of the virtual disk by clicking Properties.
- Add a new virtual NIC by selecting Add.
Review settings, and then click Create Now to create the VM and return to the Search tab.
An icon for your new VM appears under the host in the Resources pane.
On the Resources pane, select the VM, and then click the Console tab to see the VM console.
Follow the OS installation screens and make your selections.
After the OS installation completes and the VM reboots, install the Citrix VM Tools for Windows.
Install Citrix VM Tools for Windows
Citrix VM Tools for Windows provide high performance I/O services without the overhead of traditional device emulation. Citrix VM Tools for Windows consist of I/O drivers (also known as paravirtualized drivers or PV drivers) and the Management Agent. Citrix VM Tools for Windows must be installed on each Windows VM for the VM to have a fully supported configuration. A VM functions without them, but performance is significantly hampered.
To install Citrix VM Tools for Windows on a Windows VM, the VM must be running the Microsoft .NET Framework Version 4.0 or later.
Before you install the Citrix VM Tools for Windows, ensure that your VM is configured to receive the I/O drivers from Windows Update. Windows Update is the recommended way to receive updates to the I/O drivers. However, if Windows Update is not an available option for your VM, you can also receive updates to the I/O drivers through the Management Agent or update the drivers manually. For more information, see Update the I/O drivers.
To install Citrix VM Tools for Windows:
Download the Citrix VM Tools for Windows file from the Citrix Hypervisor downloads page.
The tools are available in a 32-bit and a 64-bit version.
Copy the file to your Windows VM or to a shared drive that the Windows VM can access.
managementagent.msifile to begin Citrix VM Tools installation.
Msiexec.exe /package managementagent.msi
Follow the prompts in the installer.
Follow the instructions on the wizard to accept the license agreement and choose a destination folder.
Customize the settings on the Installation and Updates Settings page. The Citrix Hypervisor Windows Management Agent Setup wizard displays the recommended settings. By default, the wizard displays the following settings:
- Install I/O Drivers Now
- Allow automatic management agent updates
- Disallow automatic I/O drivers updates by the management agent
- Send anonymous usage information to Citrix
If you do not want to allow the automatic updating of the Management Agent, select Disallow automatic management agent updates from the list.
If you would like to allow the Management Agent to update the I/O drivers automatically, select Allow automatic I/O driver updates by the management agent. However, we recommend that you use Windows Update to update the I/O drivers, not the Management Agent.
If you have chosen to receive I/O driver updates through the Windows Update mechanism, do not allow the Management Agent to update the I/O drivers automatically.
If you do not want to share anonymous usage information with Citrix, clear the Send anonymous usage information to Citrix check box. The information transmitted to Citrix contains the UUID of the VM requesting the update. No other information relating to the VM is collected or transmitted to Citrix.
Click Next and then Install to begin the Citrix VM Tools for Windows installation process.
Restart the VM when prompted to complete the installation process.
The Citrix VM Tools for Windows can request to restart with
/quiet /forcerestartspecified after the VM has already been restarted once as part of the installation.
I/O drivers are automatically installed on a Windows VM that can receive updates from Windows Update. However, we recommend that you install the Citrix VM Tools for Windows to install the Management Agent, and to maintain supported configuration.
Customers who install the Citrix VM Tools for Windows or the Management Agent through RDP might not see the restart prompt as it only appears on the Windows console session. To ensure that you restart your VM (if necessary) and to get your VM to an optimized state, specify the force restart option in RDP. The force restart option restarts the VM only if it is required to get the VM to an optimized state.
To install the Citrix VM Tools for Windows silently and to prevent the system from rebooting, run one of the following commands:
Msiexec.exe /package managementagentx86.msi /quiet /norestart Msiexec.exe /package managementagentx64.msi /quiet /norestart
Setup.exe /quiet /norestart
A non-interactive, but non-silent installation can be obtained by running:
Msiexec.exe managementagentx86.msi /passive Msiexec.exe managementagentx64.msi /passive
To customize the installation settings, use the following parameters with the silent installation commands:
|ALLOWAUTOUPDATE||YES or NO||YES||Allow automatic management agent updates|
|ALLOWDRIVERINSTALL||YES or NO||YES||Install the I/O Drivers now|
|ALLOWDRIVERUPDATE||YES or NO||NO||Allow the automatic management agent updates to install updated drivers|
|IDENTIFYAUTOUPDATE||YES or NO||YES||Send anonymous usage information to Citrix|
For example, to do a silent install of the tools that does not allow future automatic management agent updates and does not send anonymous information to Citrix, run one of the following commands:
Msiexec.exe /package managementagentx86.msi ALLOWAUTOUPDATE=NO IDENTIFYAUTOUPDATE=NO /quiet /norestart Msiexec.exe /package managementagentx64.msi ALLOWAUTOUPDATE=NO IDENTIFYAUTOUPDATE=NO /quiet /norestart
For interactive, silent, and passive installations, following the next system restart there might be several automated reboots before the Citrix VM Tools for Windows are fully installed. This behavior is also the case for installations with the
/norestart flag specified. However, for installations where the
/norestart flag is provided, the initial restart might be manually initiated.
The Citrix VM Tools for Windows are installed by default in the
C:\Program Files\Citrix\XenTools directory on the VM.
- To install Citrix VM Tools for Windows on a Windows VM, the VM must be running the Microsoft .NET Framework Version 4.0 or later.
/quietparameter applies to the installation dialogs only, but not to the device driver installation. When the
/quietparameter is specified, the device driver installation requests permission to reboot if required.
/quiet /norestartis specified, the system doesn’t reboot after the entire tools installation is complete. This behavior is independent of what the user specifies in the reboot dialog.
/quiet /forcerestartis specified, the system reboots after the entire tools installation is complete. This behavior is independent of what the user specifies in the reboot dialog.
- When the device driver installation requests permission to reboot, a tools installation with the
quietparameter specified can still be in progress. Use the Task Manager to confirm whether the installer is still running.
Installing or upgrading the Citrix VM Tools for Windows can cause the friendly name and identifier of some network adapters to change. Any software which is configured to use a particular adapter might have to be reconfigured following Citrix VM Tools for Windows installation or upgrade.
Create a Windows VM by using the CLI
To create a Windows VM from an ISO repository by using the xe CLI:
Create a VM from a template:
xe vm-install new-name-label=vm_name template=template_name
This command returns the UUID of the new VM.
Create an ISO Storage Repository:
List all of the available ISOs:
Insert the specified ISO into the virtual CD drive of the specified VM:
xe vm-cd-add vm=vm_name cd-name=iso_name device=3
Start the VM and install the operating system:
xe vm-start vm=vm_name
At this point, the VM console is visible in XenCenter.
For more information on using the CLI, see Command Line Interface.
Update Windows operating systems
This section discusses updating Windows VMs with updated operating systems.
Upgrades to VMs are typically required when moving to a newer version of Citrix Hypervisor. Note the following limitations when upgrading your VMs to a newer version of Citrix Hypervisor:
- Before migrating Windows VMs using live migration, you must upgrade the Citrix VM Tools for Windows on each VM.
- Suspend/Resume operation is not supported on Windows VMs until the Citrix VM Tools for Windows are upgraded.
- The use of certain antivirus and firewall applications can crash Windows VMs, unless the Citrix VM Tools for Windows are upgraded.
We recommend that you do not remove the Citrix VM Tools from your Windows VM before automatically updating the version of Windows on the VM.
Use Windows Update to upgrade the version of the Windows operating system on your Windows VMs.
Windows installation disks typically provide an upgrade option if you boot them on a server which has an earlier version of Windows already installed. However, if you use Windows Update to update your Citrix VM Tools, do not upgrade the Windows operating system from an installation disk. Instead, use Windows Update.
Update Citrix VM Tools for Windows
Citrix Hypervisor has a simpler mechanism to update I/O drivers (PV drivers) and the Management Agent automatically for Windows VMs. This mechanism enables customers to install updates as they become available, without having to wait for a hotfix.
Ensure that your Citrix VM Tools for Windows are regularly updated to the latest version.
We recommend using the following settings for updating the different components of the Citrix VM Tools for Windows:
- Set the value of the following registry key to a REG_DWORD value of ‘3’:
- Ensure your VM is configured to receive I/O drivers from Windows Update.
- Configure the Management Agent to automatically update itself.
The Virtualization state section on a VM’s General tab in XenCenter specifies whether the VM can receive updates from Windows Update. The mechanism to receive I/O driver updates from Windows Update is turned on by default. If you do not want to receive I/O driver updates from Windows Update, disable Windows Update on your VM, or specify a group policy.
Ensure that all requested VM restarts are completed as part of the update. Multiple restarts might be required. If all requested restarts are not completed, this might result in unexpected behavior.
The following sections contain information about automatically updating the I/O drivers and the Management Agent.
Update the I/O drivers
You can get I/O driver updates automatically from Microsoft Windows Update, provided:
You are running Citrix Hypervisor 8.2 Premium Edition, or have access to Citrix Hypervisor through Citrix Virtual Apps and Desktops entitlement.
You have created a Windows VM using XenCenter issued with Citrix Hypervisor 8.2
Windows Update is enabled within the VM
The VM has access to the internet, or it can connect to a WSUS proxy server
Windows Server Core does not support using Windows Update to install or update the I/O drivers. Instead use the Citrix VM Tools for Windows installer available from the Citrix Hypervisor downloads page
Customers can also receive I/O driver updates automatically through the automatic Management Agent update mechanism. You can configure this setting during Citrix VM Tools for Windows installation. For more information, see Install Citrix VM Tools for Windows.
Ensure that all requested VM restarts are completed as part of the update. Multiple restarts might be required. If all requested restarts are not completed, you might see unexpected behavior.
You can set a registry key that specifies the maximum number of automatic reboots that are performed when you install the drivers through Device Manager or Windows Update. After you have installed the xenbus driver version 22.214.171.124 or later, the Citrix VM Tools for Windows use the guidance provided by this registry key.
To use this feature, we recommend that you set the following registry key as soon as possible:
HLKM\System\CurrentControlSet\services\xenbus_monitor\Parameters\Autoreboot. The value of the registry key must be a positive integer. We recommend that you set the number of reboots in the registry key to 3.
When this registry key is set, the Citrix VM Tools for Windows perform as many reboots as are needed to complete the updates or the number of reboots specified by the registry key - whichever value is lower.
Before each reboot, Windows can display an alert for 60 seconds that warns of the upcoming reboot. You can dismiss the alert, but this action does not cancel the reboot. Because of this delay between the reboots, wait a few minutes after the initial reboot for the reboot cycle to complete.
This setting is required for headless servers with static IP addresses.
This automatic reboot feature only applies to updates to the Windows I/O drivers through Device Manager or Windows Update. If you are using the Management Agent installer to deploy your drivers, the installer disregards this registry key and manages the VM reboots according to its own settings.
Find the I/O driver version
To find out the version of the I/O drivers installed on the VM:
Locate the driver from the list.
Right-click the driver and select Properties and then Details.
The File version field displays the version of the driver installed on the VM.
Update the Management Agent
Citrix Hypervisor enables you to update the Management Agent automatically on both new and existing Windows VMs. By default, Citrix Hypervisor allows the automatic updating of the Management Agent. However, it does not allow the Management Agent to update the I/O drivers automatically. You can customize the Management Agent update settings during Citrix VM Tools for Windows installation. The automatic updating of the Management Agent occurs seamlessly, and does not reboot your VM. In scenarios where a VM reboot is required, a message appears on the Console tab of the VM notifying users about the required action.
You can get the Management Agent updates automatically, provided:
You are running Citrix Hypervisor 8.2 Premium Edition, or have access to Citrix Hypervisor through Citrix Virtual Apps and Desktops entitlement.
You have installed Citrix VM Tools for Windows issued with Citrix Hypervisor 7.0 or higher
The Windows VM has access to the Internet
Find the Management Agent version
To find out the version of the Management Agent installed on the VM:
XenGuestAgentfrom the list and click Properties and then Details.
The File version field displays the version of the Management Agent installed on the VM.
Manage Automatic Updates by using the CLI
Citrix Hypervisor enables you to use the command line to manage the automatic updating of the I/O drivers and the Management Agent. You can run
msiexec.exe with the arguments listed in the following table to specify whether the I/O drivers and the Management Agent are automatically updated. For information about installing Citrix VM Tools for Windows by using
msiexec.exe, see Silent installation.
For VMs managed using either PVS or MCS, automated updates are turned off automatically when the Citrix Virtual Desktops VDA is present and it reports that the machine is non-persistent.
|ALLOWAUTOUPDATE||YES/NO||Allow/disallow auto updating of the Management Agent|
|ALLOWDRIVERINSTALL||YES/NO||Allow/disallow the Citrix VM Tools for Windows installer to install I/O drivers|
|ALLOWDRIVERUPDATE||YES/NO||Allow/disallow the Management Agent to update the I/O drivers automatically|
|IDENTIFYAUTOUPDATE||YES/NO||Allow/disallow the auto update mechanism to send anonymous usage information to Citrix|
setup.exe /passive /forcerestart ALLOWAUTOUPDATE=YES ALLOWDRIVERINSTALL=NO \ ALLOWDRIVERUPDATE=NO IDENTIFYAUTOUPDATE=YES
msiexec.exe /i managementagentx64.msi ALLOWAUTOUPDATE=YES ALLOWDRIVERINSTALL=NO \ ALLOWDRIVERUPDATE=NO IDENTIFYAUTOUPDATE=YES
Redirect the Management Agent updates
Citrix Hypervisor enables customers to redirect Management Agent updates to an internal web server before they are installed. This redirection allows customers to review the updates before they are automatically installed on the VM.
To redirect the Management Agent updates:
The Management Agent uses an updates file to get information about the available updates. The name of this updates file depends on the version of the Management Agent that you use:
- For Management Agent 9.0.0.x and later use https://pvupdates.vmd.citrix.com/updates.v9.json.
- Windows 7 VMs only: For Management Agent 126.96.36.1996 and later use https://pvupdates.vmd.citrix.com/updates.json.
- For Management Agent 188.8.131.524 and earlier use https://pvupdates.vmd.citrix.com/updates.tsv.
Complete the following steps to redirect the Management Agent updates:
Download the updates file.
Download the Management Agent MSI files referenced in the updates file.
Upload the MSI files to an internal web server that your VMs can access.
Update the updates file to point to the MSI files on the internal web server.
Upload the updates file to the web server.
Automatic updates can also be redirected on a per-VM or a per-pool basis. To redirect updates on a per-VM basis:
On the VM, open a command prompt as an administrator.
Run the command
reg.exe ADD HKLM\SOFTWARE\Citrix\XenTools /t REG_SZ /v update_url /d \ url of the update file on the web server
To redirect automatic updating of the Management Agent on a per-pool basis, run the following command:
xe pool-param-set uuid=pooluuid guest-agent-config:auto_update_url=url of the update file on the web server
Disable the Management Agent updates
To disable automatic updating of the Management Agent on a per-VM basis:
On the VM, open a command prompt as an administrator.
Run the following command:
reg.exe ADD HKLM\SOFTWARE\Citrix\XenTools /t REG_DWORD /v DisableAutoUpdate /d 1
To disable automatic updating of the Management Agent on a per-pool basis, run the following command:
xe pool-param-set uuid=pooluuid guest-agent-config:auto_update_enabled=false
Modify the automatic I/O driver update settings
During Citrix VM Tools for Windows installation, you can specify whether you would like to allow the Management Agent to update the I/O drivers automatically. If you prefer to update this setting after completing the Citrix VM Tools for Windows installation process, perform the following steps:
On the VM, open a command prompt as an administrator.
Run the following command:
reg.exe ADD HKLM\SOFTWARE\Citrix\XenTools\AutoUpdate /t REG_SZ /v \ InstallDrivers /d YES/NO
To send anonymous usage information to Citrix:
During Citrix VM Tools for Windows installation, you can specify whether you would like to send anonymous usage information to Citrix. If you would like to update this setting after completing the Citrix VM Tools for Windows installation process, perform the following steps:
On the VM, open a command prompt as an administrator.
Run the following command:
reg.exe ADD HKLM\SOFTWARE\Citrix\XenTools\AutoUpdate REG_SZ /v \ IDENTIFYAUTOUPDATE /d YES/NO
Prepare to clone a Windows VM by using Sysprep
The only supported way to clone a Windows VM is by using the Windows utility
sysprep to prepare the VM.
sysprep utility changes the local computer SID to make it unique to each computer. The
sysprep binaries are in the
For older versions of Windows, the
sysprepbinaries are on the Windows product CDs in the
\support\tools\deploy.cabfile. These binaries must be copied to your Windows VM before using.
To clone Windows VMs:
Create, install, and configure the Windows VM as desired.
Apply all relevant Service Packs and updates.
Install the Citrix VM Tools for Windows.
Install any applications and perform any other configuration.
sysprep. This utility shuts down the VM when it completes.
Using XenCenter convert the VM into a template.
Clone the newly created template into new VMs as required.
When the cloned VM starts, it completes the following actions before being available for use:
- It gets a new SID and name
- It runs a mini-setup to prompt for configuration values as necessary
- Finally, it restarts
Do not restart the original, sys-prepped VM (the “source” VM) again after the
sysprepstage. Immediately convert it to a template afterwards to prevent restarts. If the source VM is restarted,
sysprepmust be run on it again before it can be safely used to make more clones.
For more information about using
sysprep, visit the following Microsoft website:
Windows VM release notes
There are many versions and variations of Windows with different levels of support for the features provided by Citrix Hypervisor. This section lists notes and errata for the known differences.
General Windows issues
When installing Windows VMs, start off with no more than three virtual disks. After the VM and Citrix VM Tools for Windows have been installed, you can add extra virtual disks. Ensure that the boot device is always one of the initial disks so that the VM can successfully boot without the Citrix VM Tools for Windows.
When the boot mode for a Windows VM is BIOS boot, Windows formats the primary disk with a Master Boot Record (MBR). MBR limits the maximum addressable storage space of a disk to 2 TiB. To use a disk that is larger than 2 TiB with a Windows VM, do one of the following things:
- If UEFI boot is supported for the version of Windows, ensure that you use UEFI as the boot mode for the Windows VM.
- Create the large disk as the secondary disk for the VM and select GUID Partition Table (GPT) format.
Multiple vCPUs are exposed as CPU sockets to Windows guests, and are subject to the licensing limitations present in the VM. The number of CPUs present in the guest can be confirmed by checking Device Manager. The number of CPUs actually being used by Windows can be seen in the Task Manager.
The disk enumeration order in a Windows guest might differ from the order in which they were initially added. This behavior is because of interaction between the I/O drivers and the Plug-and-Play subsystem in Windows. For example, the first disk might show up as
Disk 1, the next disk hot plugged as
Disk 0, a subsequent disk as
Disk 2, and then upwards in the expected fashion.
A bug in the VLC player DirectX back-end replaces yellow with blue during video playback when the Windows display properties are set to 24-bit color. VLC using OpenGL as a back-end works correctly, and any other DirectX-based or OpenGL-based video player works too. It is not a problem if the guest is set to use 16-bit color rather than 24.
The PV Ethernet Adapter reports a speed of 100 Gbps in Windows VMs. This speed is an artificial hardcoded value and is not relevant in a virtual environment because the virtual NIC is connected to a virtual switch. The Windows VM uses the full speed that is available, but the network might not be capable of the full 100 Gbps.
If you attempt to make an insecure RDP connection to a Windows VM, this action might fail with the following error message: “This could be due to CredSSP encryption oracle remediation.” This error occurs when the Credential Security Support Provider protocol (CredSSP) update is applied to only one of the client and server in the RDP connection. For more information, see https://support.microsoft.com/en-gb/help/4295591/credssp-encryption-oracle-remediation-error-when-to-rdp-to-azure-vm.
We no longer support Windows 8 guests. If you install a Windows 8 VM, it is upgraded to Windows 8.1.
In this article
- Basic procedure for creating a Windows VM
- Windows VM templates
- Guest UEFI boot and Secure Boot
- Create a VM by using XenCenter
- Install Citrix VM Tools for Windows
- Create a Windows VM by using the CLI
- Update Windows operating systems
- Update Citrix VM Tools for Windows
- Prepare to clone a Windows VM by using Sysprep
- Windows VM release notes