Advanced Concepts for Citrix Virtual Apps and Desktops
Overview
Citrix Virtual Apps and Desktops includes capabilities to handle almost every user requirement. Many of these capabilities are advanced topics, often reserved for those specific scenarios. These advanced capabilities are what makes this solution so powerful. Being able to meet every requirement within a single product.
Architecture
Learn about the components and interactions within the Citrix Virtual Apps and Desktops solution. The architecture items are helpful when planning your solution and firewall requirements.
Links | |
---|---|
![]() |
Read More: Communication Ports Used by Citrix Technologies |
![]() |
View: Citrix Virtual Apps and Desktops - On-Premises Management Plane |
App Layering
Gain a deep understanding of the Citrix Layering technology that simplifies the image management for VDI and hosted-shared environments including use cases and technical concepts.
Links | |
---|---|
![]() |
Read more: Understanding App Layering |
![]() |
View demo: User Personalization Layer |
![]() |
Follow the Guide: Using Azure Files for User Personalization Layers |
Disaster Recovery Planning
This guide assists with business continuity (BC) and disaster recovery (DR) architecture planning and considerations for both on-prem and cloud deployments of Citrix Virtual Apps and Desktops. Disaster Recovery is a significant topic in breadth of scope in and of itself. Citrix acknowledges this document is not a comprehensive guide to overall Disaster Recovery strategy. It does not consider all aspects of Disaster Recovery and at times takes a more layman’s terms perspective on various Disaster Recovery concepts.
Links | |
---|---|
![]() |
Read More: VDI and DaaS Disaster Recovery Planning |
Federated Authentication Service
The Federated Authentication Service provides single sign-on to Windows-based virtual apps and desktops when using a non-Active Directory based identity provider
Links | |
---|---|
![]() |
View demo: Federated Authentication Service |
![]() |
Follow the Guide: Federated Authentication Service with Azure Active Directory |
Google Chrome
Tech Paper focused on installation, configuration, and various optimizations for Google Chrome browser running on Citrix Virtual Apps and Desktops.
Links | |
---|---|
![]() |
Follow the Guide: Deploying Google Chrome in a Virtual Desktop Environment |
HDX
To meet different user requirements, Citrix HDX protocol allows for different graphics modes to be configured. The purpose of this article is to outline the different HDX modes and how they are configured. It gives you a starting point from where you can configure your environment to best fit the needs of your users, your workload, and the current network conditions.
Links | |
---|---|
![]() |
Read more: HDX Graphics Overview |
![]() |
View demo: Adaptive Display |
![]() |
View demo: Adaptive Throughput |
![]() |
View demo: Adaptive Transport |
![]() |
View demo: Browser Content Redirection |
![]() |
View demo: Microsoft Teams Optimization |
Image Management
Citrix Virtual Apps and Desktops provides multiple approaches for image provisioning and image lifecycle management, Machine Creation Services and Provisioning Services. The approaches used are different, resulting in different benefits for the users and admin.
Links | |
---|---|
![]() |
Read More: Image Management Tech Brief |
![]() |
Follow the Guide: Windows 10 Deployment Guide |
Remote PC Access
Remote PC Access is an easy and effective way to allow users to access their office-based, physical Windows PC. Using any endpoint device, users can remain productive regardless of their location. However, organizations want to consider the following when implementing Remote PC Access.
Links | |
---|---|
![]() |
Read More: Remote PC Access Design Considerations |
![]() |
Read More: Use Case Examples for Remote PC Access |
Security Practices
Tech paper focused on security recommendations and security practices for administrators. Use this guide to navigate security planning, implementation, and ongoing operation.
Links | |
---|---|
![]() |
Read More: Keylogger and Screen Sharing Protection Technical Overview |
![]() |
Follow the Guide: Keylogger and Screen Sharing Protection - On-Premises Control Plane |
![]() |
Read More: Security Practices for Citrix Virtual Apps and Desktops |
![]() |
Read More: Antivirus Recommendations for DaaS and VDI |
StoreFront
Learn about more advanced StoreFront design topics for enterprise deployments that must take into account Citrix Gateway for secure remote access and multi-site aggregation and application de-duplication.
Links | |
---|---|
![]() |
Read More: Designing StoreFront with Gateway Integration |
![]() |
Read More: Designing StoreFront and Multi-Site Aggregation |
User Profile Management
The use of Citrix Profile Management greatly enhances the end-user experience. Citrix Profile Management is designed to remove profile bloat and significantly speed logon times, while reducing profile corruption. Learn how to leverage profile management within a DaaS environment.
Links | |
---|---|
![]() |
Read More: Using Azure Files with Citrix User Profile Management |
Workspace Environment Management
Learn how Workspace Environment Management uses intelligent resource management and Profile Management technologies to deliver the best possible performance, desktop logon, and application response times for Citrix Virtual Apps and Desktops sessions, as well as enhances the security of the deployment.
Links | |
---|---|
![]() |
Read More: Workspace Environment Management Tech Brief |
![]() |
View demo: CPU Optimization |
![]() |
View demo: Logon Optimization |
![]() |
View demo: RAM Optimization |