Advanced Concepts for Citrix Virtual Apps and Desktops
Citrix Virtual Apps and Desktops includes capabilities to handle almost every user requirement. Many of these capabilities are advanced topics, often reserved for those specific scenarios. These advanced capabilities are what makes this solution so powerful. Being able to meet every requirement within a single product.
Learn about the components and interactions within the Citrix Virtual Apps and Desktops solution. The architecture items are helpful when planning your solution and firewall requirements.
|Read More: Communication Ports Used by Citrix Technologies|
|View: Citrix Virtual Apps and Desktops Service - Cloud-Hosted Management Plane|
|View: Citrix Virtual Apps and Desktops - On-Premises Management Plane|
Gain a deep understanding of the Citrix Layering technology that simplifies the image management for VDI and hosted-shared environments including use cases and technical concepts.
|Read more: Understanding App Layering|
|View demo: User Personalization Layer|
|Follow the Guide: Using Azure Files for User Personalization Layers|
Automated Configuration Tool
Learn how to use the Automated Configuration tool to automate moving your Citrix Virtual Apps and Desktops configuration to your Citrix Virtual Apps and Desktops Service deployment, as well as moving your configuration between Citrix Virtual Apps and Desktops Service deployments.
|Follow the Guide: Getting Started with the Automated Configuration Tool|
Disaster Recovery Planning
This guide assists with business continuity (BC) and disaster recovery (DR) architecture planning and considerations for both on-prem and cloud deployments of Citrix Virtual Apps and Desktops. Disaster Recovery is a significant topic in breadth of scope in and of itself. Citrix acknowledges this document is not a comprehensive guide to overall Disaster Recovery strategy. It does not consider all aspects of Disaster Recovery and at times takes a more layman’s terms perspective on various Disaster Recovery concepts.
|Read More: VDI and DaaS Disaster Recovery Planning|
Federated Authentication Service
The Federated Authentication Service provides single sign-on to Windows-based virtual apps and desktops when using a non-Active Directory based identity provider
|View demo: Federated Authentication Service|
|Follow the Guide: Federated Authentication Service with Azure Active Directory|
Tech Paper focused on installation, configuration, and various optimizations for Google Chrome browser running on Citrix Virtual Apps and Desktops.
|Follow the Guide: Deploying Google Chrome in a Virtual Desktop Environment|
To meet different user requirements, Citrix HDX protocol allows for different graphics modes to be configured. The purpose of this article is to outline the different HDX modes and how they are configured. It gives you a starting point from where you can configure your environment to best fit the needs of your users, your workload, and the current network conditions.
|Read more: HDX Graphics Overview|
|View demo: Adaptive Display|
|View demo: Adaptive Throughput|
|View demo: Adaptive Transport|
|View demo: Browser Content Redirection|
|View demo: Microsoft Teams Optimization|
Citrix Virtual Apps and Desktops provides multiple approaches for image provisioning and image lifecycle management, Machine Creation Services and Provisioning Services. The approaches used are different, resulting in different benefits for the users and admin.
|Read More: Image Management Tech Brief|
|Follow the Guide: Windows 10 Deployment Guide|
Learn how to migrate your on-premises Citrix Virtual Apps and Desktops environment to Citrix Virtual Apps and Desktops service utilizing Citrix Cloud
|Follow the Guide: Migrate from On-Premises Citrix Virtual Apps and Desktops to the cloud-based service|
|Follow the Guide: Migrate from On-Premises VMware to Citrix Virtual Apps and Desktops Service with Microsoft Azure|
Remote PC Access
Remote PC Access is an easy and effective way to allow users to access their office-based, physical Windows PC. Using any endpoint device, users can remain productive regardless of their location. However, organizations want to consider the following when implementing Remote PC Access.
|Read More: Remote PC Access Design Considerations|
|Read More: Use Case Examples for Remote PC Access|
Tech paper focused on security recommendations and security practices for administrators. Use this guide to navigate security planning, implementation, and ongoing operation.
|Read More: Keylogger and Screen Sharing Protection Technical Overview|
|Follow the Guide: Keylogger and Screen Sharing Protection - On-Premises Control Plane|
|Read More: Security Practices for Citrix Virtual Apps and Desktops|
|Read More: Antivirus Recommendations for DaaS and VDI|
Learn how to integrate ServiceNow within your Citrix Virtual Apps and Desktops environment including key technical concepts and use cases. The integration helps automate, monitor, and manage Citrix Virtual Apps and Desktops environments seamlessly and easily with ServiceNow.
|Read More: Integrating ServiceNow with Citrix Virtual Apps and Desktops|
Learn about more advanced StoreFront design topics for enterprise deployments that must take into account Citrix Gateway for secure remote access and multi-site aggregation and application de-duplication.
|Read More: Designing StoreFront with Gateway Integration|
|Read More: Designing StoreFront and Multi-Site Aggregation|
User Profile Management
The use of Citrix Profile Management greatly enhances the end-user experience. Citrix Profile Management is designed to remove profile bloat and significantly speed logon times, while reducing profile corruption. Learn how to leverage profile management within a DaaS environment.
|Read More: Using Azure Files with Citrix User Profile Management|
Workspace Environment Management
Learn how Workspace Environment Management uses intelligent resource management and Profile Management technologies to deliver the best possible performance, desktop logon, and application response times for Citrix Virtual Apps and Desktops sessions, as well as enhances the security of the deployment.
|Read More: Workspace Environment Management Tech Brief|
|View demo: CPU Optimization|
|View demo: Logon Optimization|
|View demo: RAM Optimization|