Product Documentation

Home tab

Mar 27, 2018

The Home tab contains the following controls:  

Connect. Connect administration console to specified infrastructure server. In the New Infrastructure Server Connection dialog specify:

Infrastructure server name. Name of the infrastructure server you wish to connect to.

Administration port. Port on which you wish to connect to the infrastructure service. Default value of 8284 is pre-populated.

Disconnect. Disconnect administration console from current infrastructure service. This allows the administrator to manage multiple infrastructure services from a single console, by disconnecting from one and connecting to another.

Configuration set. Switch from one Workspace Environment Management site (configuration set) to another.

Create. Open the Create configuration set window.

Name. Site (configuration set) name as it will appear in the configuration set list in the Ribbon.

Description. Site (configuration set) description as it appears in the site edition window.

Site State. Toggles whether the site (configuration set) is Enabled or Disabled. When Disabled, Citrix Workspace Environment Management Agents cannot connect to the site (configuration set).

Edit. Open the Edit configuration set window, with similar options to the Create configuration set window.

Delete. Delete the site (configuration set). Note that you cannot delete "Default site" because it is required for Workspace Environment Management to function. You can, however, rename it.

Refresh. Refresh the site (configuration set) list. Note: The list does not refresh automatically when sites are created from different administration consoles.

Backup. Open the Backup Wizard to back up the current configuration in a special Workspace Environment Management XML format. You can then use this backup to Restore settings into a Workspace Environment Management installation. You can back up actions, settings or security settings in each operation. 

Actions. Back up selected Workspace Environment Management actions. Each type of action is exported as a separate XML file.

Settings. Back up selected Workspace Environment Management settings. Each type of setting is exported as a separate XML file.

Security Settings. Back up all Security tab settings in your current configuration set. Each type of rule is exported as a separate XML file.

Restore. Open the Restore Wizard to restore settings you previously created using the Workspace Environment Management Backup wizard into your current configuration set. Select a folder containing Workspace Environment Management XML format backup files. Actions restored from the backup file are added to existing actions. Settings restored from the backup file replace existing settings.

Security Settings. Restore all  Security tab settings. The settings in the backup file(s) replace the existing settings in your current configuration set. When you switch to or refresh the Security tab, any invalid application security rules are detected. These rules are automatically deleted and listed in a report dialog, which you can export.

In the Confirm Application Security Rule Assignment dialog, select Yes or No to indicate how you want restore to handle application security rule assignments:

  • if you select Yes, restore attempts to restore rule assignments to users and user groups in your current configuration set. Reassignment only succeeds if the backed up users or groups are present in your current configuration set or active directory. Any mismatched rules are restored but remain unassigned, and they are listed in a report dialog which you can export in CSV format.
  • if you select No, all rules in the backup are restored without being assigned to users and user groups in your current configuration.

Import. Open the Import Wizard to import settings into the current configuration set from outside Workspace Environment Management. Import preserves your existing settings. For example, if you import settings from Windows AppLocker (Import AppLocker Rules), they are added to any existing rules in the Security tab. Any invalid application security rules are automatically deleted and listed in a report dialog, which you can export.