Free Essay

Xendesktop

In:

Submitted By krt132
Words 5942
Pages 24
Customize

© 2012 Citrix Systems, Inc. All rights reserved. Terms of Use | Trademarks | Privacy Statement

Contents

Customize Delegating Administration Tasks Printing with XenDesktop Configuring USB Support Support for USB Mass Storage Devices Optimizing the User Experience Enhancing the User Experience With HDX Configuring HDX MediaStream Flash Redirection Configuring HDX MediaStream Flash Redirection on the Server Configuring HDX MediaStream Flash Redirection on the User Device Configuring Audio Avoiding Echo During Multimedia Conferences With HDX RealTime HDX RealTime Webcam Video Compression for Video Conferencing Improving Responsiveness in Low Bandwidth Conditions by Compressing Colors Configuring Time Zone Settings Configuring Connection Timers Workspace Control in XenDesktop Removing the Shut Down Command

3 4 6 7 10 11 12 13 14 17 20 22 23 25 27 28 29 30

2

Customizing Your XenDesktop Environment
After completing the initial setup tasks, you can customize and optimize your XenDesktop deployment:

q

Create additional administrators for the site, if necessary. Set up any general Citrix policies that you require, including policies for printing. See Working with XenDesktop Policies for details of configuring policies. Configure USB support. Optimize the user experience by ensuring that settings for desktops and users are appropriate.

q

q

q

3

Delegating Administration Tasks
This topic explains how to display information about administrative rights and how to create additional XenDesktop administrators.

Displaying Administration Rights
You can display the administrative rights associated with a particular administrator using Desktop Studio. To display administration rights 1. Launch Desktop Studio. 2. Choose Configuration > Administrators. A list of administrators appears together with their roles. 3. Select an administrator to display information about their role and permissions.

Delegating Administration Tasks
To manage your XenDesktop environment efficiently, you may need to create additional administrators. Only an administrator with full administration rights can create further full or delegated administrators. For more information about the different XenDesktop administrator roles, see Delegated Administration. To create a XenDesktop administrator: 1. Launch Desktop Studio. 2. Choose Configuration > Administrators. 3. Choose Action > Add Administrator. The Add Administrator dialog box appears. Follow the instructions on-screen. To edit a XenDesktop administrator: 1. Launch Desktop Studio. 2. Choose Configuration > Administrators. 3. Select the administrator you want to edit and choose Action > Edit. The Edit Administrator dialog box appears. Follow the instructions on-screen. To delete a XenDesktop administrator: 1. Launch Desktop Studio.

4

Delegating Administration Tasks 2. Choose Configuration > Administrators. 3. Select the administrator you want to delete and choose Action > Delete Administrator. 4. Click Yes to confirm deletion.

5

Printing with XenDesktop
XenDesktop provides the same printing features as XenApp. For details of how to configure and manage printing, see the relevant topics in XenApp 6 for Windows Server 2008 R2. Citrix printing policies are described in Policy Settings Reference. XenDesktop 5 incorporates the features available in the XenApp Printing Optimization Pack.

6

Configuring USB Support
You can enable users to interact with a wide range of USB devices during a XenDesktop session. The level of support provided depends on the client installed on the user device; see the relevant client documentation for further details. Isochronous features in USB devices such as webcams, microphones, speakers, and headsets are supported in typical low latency/high speed LAN environments. This allows these devices to interact with packages such as Microsoft Office Communicator and Skype. The following types of device are supported directly in a XenDesktop session, and so do not use USB support:

q

Keyboards Mice Smart cards

q

q

Note: Specialist keyboards and mice (for example, Bloomberg keyboards, and 3D mice) can be configured to use USB support. For more information about configuring Bloomberg keyboards, see http://support.citrix.com/article/ctx122615. By default, certain types of USB device are not supported for remoting through XenDesktop. For example, a user may have a network interface card attached to the system board by internal USB. Remoting this would not be appropriate. The following types of USB device are not supported by default for use in a XenDesktop session: q Bluetooth dongles Integrated network interface cards USB hubs USB graphics adaptors

q

q

q

USB devices connected to a hub can be remoted, however the hub itself cannot be remoted. USB support allows virtual desktops access to USB devices that are connected to the user device. In environments where security separation between client and server is needed, users should connect only appropriate USB devices. You can also set policies at the virtual desktop and user device that restrict the types of USB devices that will be made available to the virtual desktop. For information on all USB devices tested with XenDesktop, see http://support.citrix.com/article/ctx123569. For further general information on setting up Citrix policies, see Working with XenDesktop Policies.

7

Configuring USB Support If you are using XenApp, see USB Drive Mapping Limitations. If you are using thin clients, please consult the manufacturer for details of USB support and any configuration you may need to carry out.

To Enable USB Support q Enable the USB policy rule, which is in the USB Devices Policy Settings section of the ICA Policy Settings. Enable USB support when you install the client on user devices.

q

To Update the Range of USB Devices Supported
To change the default range of USB devices, you must update the device rules on both the client and the Virtual Desktop Agent: q Edit the client registry (or the .ini files in the case of the Receiver for Linux). For information about how to do this, see the relevant client documentation. An ADM file is included on the installation media to allow you to make changes to the client through Active Directory Group Policy: dvd root \os\lang\Support\Configuration\icaclient_usb.adm. Edit the administrator override rules in the Virtual Desktop Agent registry on the computer(s) hosting the desktops. Information about how to do this is included in the rest of this section.

q

Caution: Using Registry Editor incorrectly can cause serious problems that can require you to reinstall the operating system. Citrix cannot guarantee that problems resulting from incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk. Make sure you back up the registry before you edit it. Device rules are enforced on both the client and the Virtual Desktop Agent, so you must make changes on both sides otherwise devices may not be allowed through. An ADM file is included on the installation media to allow you to make changes to the Virtual Desktop Agent through Active Directory Group Policy: dvd root \os\lang\Support\Configuration\vda_usb.adm. The product default rules are stored in HKLM\SOFTWARE\Citrix\PortICA\GenericUSB Type=String Name="DeviceRules" The default policy configuration is as follows:

DENY: DENY: DENY: DENY: DENY: 8

class=02 # Communications and CDC-Control class=09 # Hub devices class=0a # CDC-Data class=0b # Smartcard class=e0 # Wireless controller

Configuring USB Support ALLOW: # Otherwise allow everything else Do not edit the product default rules. The recommended way to change them is to use the GPO overrides described below, because these are evaluated before the default rules. The administrator override rules are stored in: HKLM\SOFTWARE\Policies\Citrix\PortICA\GenericUSB Type=String Name="DeviceRules" When you are creating new policy rules, refer to the USB Class Codes, available from the USB Web site at http://www.usb.org/. Policy rules take the format {Allow:|Deny:} followed by a set of tag=value expressions separated by white space. The following tags are supported:

Tag VID PID REL Class SubClass Prot

Description Vendor ID from the device descriptor Product ID from the device descriptor Release ID from the device descriptor Class from either the device descriptor or an interface descriptor Subclass from either the device descriptor or an interface descriptor

Protocol from either the device descriptor or an interface descriptor When creating new policy rules, be aware of the following: q Rules are case-insensitive. Rules may have an optional comment at the end, introduced by #. A delimiter is not required and the comment is ignored for matching purposes. Blank and pure comment lines are ignored. White space is used as a separator, but cannot appear in the middle of a number or identifier. For example, Deny: Class = 08 SubClass=05 is a valid rule; Deny: Class=0 Sub Class=05 is not. Tags must use the matching operator =. For example, VID=1230. Each rule must start on a new line or form part of a semicolon-separated list. Important: If you are using the Administrative (ADM) template, you must create rules on a single line, as a semicolon-separated list.

q

q

q

q

q

This example shows a set of administrator-defined USB policy rules:

Allow: VID=1230 PID=0007 # ANOther Industries, ANOther Flash Drive Deny: Class=08 SubClass=05 # Mass Storage

9

Support for USB Mass Storage Devices
For mass storage devices only, remote access is also available through client drive mapping, where the drives on the user device are automatically mapped to drive letters on the virtual desktop when users log on. The drives are displayed as shared folders with mapped drive letters. To configure client drive mapping, use the Client removable drives setting in the File Redirection Policy Settings section of the ICA Policy Settings. The main differences between the two types of remoting policy are:

Feature Enabled by default Read-only access configurable Safe to remove device during a session

Client drive mapping Yes Yes No

USB rule No No

Yes, provided users follow operating system recommendations for safe removal If both client drive mapping and the USB rule are enabled, then if a mass storage device is inserted before a session starts, it will be redirected using client drive mapping first, before being considered for redirection through USB support. If it is inserted after a session has started, it will be considered for redirection using USB support before client drive mapping. Automatic support of devices upon insertion, however, depends on the client being used and the individual user preferences; for further information, see the relevant client documentation.

10

Optimizing the User Experience
This section describes how to configure: q HDX technologies to optimize users' audio and multimedia experience. Time zone settings to allow users to see their local time when using desktops. Connection timers to provide appropriate durations for uninterrupted connections, idle sessions, and disconnected sessions. Workspace control to enable users to roam between different user devices. Removing the Shut Down command to prevent users from powering off their desktops, which would then require a manual restart by an administrator. This is not necessary for VM-based desktop groups.

q

q

q

q

For the best user experience, consider preinstalling frequently used software, such as a Flash player or other browser plug-ins in your desktops. Also consider enabling Microsoft ClearType or other font-smoothing technologies by default in users' profiles.

11

Enhancing the User Experience With HDX
Citrix HDX includes a broad set of technologies designed to provide a high-definition user experience. HDX builds on existing technologies in Citrix products, extending them with new innovations for today’s media-rich user environments.

Quick Links q Configuring HDX MediaStream Flash Redirection Configuring Audio HDX RealTime Webcam Video Compression for Video Conferencing Improving Responsiveness in Low Bandwidth Conditions by Compressing Colors

q

q

q

12

Configuring HDX MediaStream Flash Redirection
HDX MediaStream Flash Redirection allows you to move the processing of most Adobe Flash content to LAN-connected user's Windows devices rather than using server resources. This includes animations, videos, and applications. By moving the processing to the user device, Flash Redirection reduces server and network load, resulting in greater scalability while ensuring a high definition user experience.

System Requirements for HDX MediaStream Flash Redirection q Any operating system supported by Citrix XenApp 6 for Windows Server 2008 R2 and Citrix XenDesktop 5. Citrix online plug-in 12.1, 12.0.3, or 11.2 is installed on the user device. Low latency LAN-type network connection between the user's Windows device and the XenDesktop Virtual Desktop Agent platform Adobe Flash Player 10 or 10.1 is installed on the user device and on the servers running XenApp. Note: If an earlier version of the Flash Player is installed on the user device, or the Flash Player is not installed on the user device, Flash content is rendered on the server.

q

q

q

q

Windows Internet Explorer 7 or 8 with Active X capabilities. The browser must be available to the user device from the server.

Caution: Flash Redirection requires significant interaction between the user device and server components. Therefore, this feature should be used only in environments where security separation between the user device and server is not needed. User devices should be configured to use the Flash Redirection feature only with trusted servers. Flash Redirection requires the Flash Player to be installed on the user device. Therefore, Flash Redirection should be enabled only if the Flash Player itself is secured.

13

Configuring HDX MediaStream Flash Redirection on the Server
You can configure HDX MediaStream Flash Redirection settings on the server through the Policies node of the Citrix Desktop Studio. You control the settings for the Flash Redirection features through the following Citrix User Policy settings: q Flash acceleration Flash event logging Flash latency threshold Flash server-side content fetching whitelist Flash URL blacklist

q

q

q

q

To enable and disable HDX MediaStream Flash Redirection from the server
Flash Redirection is enabled on the server for client-side rendering by default. You can enable and disable Flash Redirection from the server through the Citrix User Policy setting Flash acceleration, in the HDX MediaStream for Flash (client side) category. Configure the Flash acceleration setting by selecting Enabled, which is the default, or Disabled. When Enabled is selected, all Flash content from sites not blocked by the Flash URL blacklist is rendered on the user device. If Disabled is selected, all Flash content is rendered on the server.

To enable server-side event logging
Flash Redirection uses Windows event logging on the server to log Flash events. You can review the event log to determine whether Flash Redirection is being used and gather details about any issues. The following are common to all events logged by Flash Redirection: q Flash Redirection reports events to the Application log The Source value is Flash The Category value is None

q

q

In addition to the Windows event log, on computers with Windows 7 or Windows Vista, a Flash Redirection-specific log appears in the Applications and Services Logs node. If 14

Configuring HDX MediaStream Flash Redirection on the Server Windows XP is used, Flash Redirection log information is found only in the Windows event log. Configure the Flash event logging setting by selecting Enabled, which is the default, or Disabled.

To set the Flash latency threshold
Flash Redirection measures the round trip latency between the server and user device the first time an individual browser or browser tab accesses an embedded Flash Player. This measurement includes both the latency of the network connection and any other latency in the data path. If the latency is determined to be within an acceptable threshold, Flash Redirection is used to render Flash content on the user device. If the latency is above this threshold, the Flash content is rendered on the network server if a Flash player is available there and delivered over the virtual channels. The default threshold setting is 30 milliseconds. Increasing the value over 30 milliseconds may result in a degraded user experience. For typical use, it is best practice not to increase the latency threshold setting. Configure the Flash latency threshold setting by typing a value between 0 and 30 in the Value field.

To identify Web sites for server-side content fetching
Flash Redirection downloads Flash content to the user device where it is played. The Flash server-side content fetching whitelist setting allows you to specify Web sites whose Flash content can be downloaded to the server then sent to the user device. This setting works in conjunction with the Enable server-side content fetching setting on the user device. This setting is frequently used when the user device does not have direct access to the Internet. The XenApp or XenDesktop server provides that connection. Consider the following when configuring the Flash server-side content fetching whitelist setting: q Add the URL of the Flash application; not the top-level .html page that instantiates the Flash Player to the whitelist. Use an asterisk character at the beginning or end of the URL as a wildcard to expand your list. Use a trailing wildcard to allow all child URLs, for example http://www.sitetoallow.com/*. The prefixes http:// or https:// are used when present, but they are not required.

q

q

q

Configure the Flash server-side content fetching whitelist setting by clicking New to add new URLs to the whitelist. Important: The Enable server-side content fetching setting on the user device must also be enabled for the Flash server-side content fetching whitelist on the server to work.

15

Configuring HDX MediaStream Flash Redirection on the Server

To block Web sites from working with HDX MediaStream Flash Redirection
Block specified Web sites from playing on user devices with Flash Redirection by adding the sites' URLs to a blacklist. Instead, the blocked Flash content plays on the server. Consider the following when configuring the Flash URL blacklist setting: q Add the top-level .html page that instantiates the Flash Player to the blacklist; not the URL of the Flash application. Use an asterisk character at the beginning or end of the URL as a wildcard to expand your list. Use a trailing wildcard to block all child URLs, for example http://www.sitetoblock.com/*). The prefixes http:// or https:// are used when present, but they are not required. Add sites containing Flash content that does not render correctly on the user device to the blacklist.

q

q

q

q

Configure the Flash URL blacklist setting by clicking New to add new URLs to the blacklist.

16

Configuring HDX MediaStream Flash Redirection on the User Device
After installation on user devices and in the absence of any overriding policy settings on the client, HDX MediaStream Flash Redirection is ready for use by your users. No further configuration is needed. If you want to change the default settings on the user device, you can do so with the Group Policy Object Editor.

To configure HDX MediaStream Flash Redirection on the User Device with Group Policy Objects
1. Create or select an existing Group Policy Object. 2. Import and add the HDX MediaStream for Flash - Client administrative template (HdxFlash-Client.adm), available in: q For 32-bit computers: %Program Files%\Citrix\ICA Client\Configuration\language. For 64-bit computers: %Program Files (x86)%\Citrix\ICA Client\Configuration\language.

q

Note: For details on creating Group Policy Objects and importing and adding templates, see the Microsoft Active Directory documentation at http://www.microsoft.com.

To enable HDX MediaStream Flash Redirection on the user device
Configure Enable HDX MediaStream for Flash on the user device to determine whether Flash Redirection is enabled on your users' Windows devices. If no configuration is set, one of the following will occur, based on your users' environment: q XenDesktop Viewer is used: Flash Redirection is disabled by default. XenDesktop Viewer is not used: The user receives a dialog box the first time they access Flash content in each session in which the user can enable HDX MediaStream Flash Redirection. Locked Desktop Appliance is used: Flash Redirection is enabled by default.

q

q

1. In the Group Policy Object Editor, expand either the Computer Configuration or User Configuration node. 2. Expand the Administrative Templates and Classic Administrative Templates (ADM) nodes and select HDX MediaStream for Flash - Client. 17

Configuring HDX MediaStream Flash Redirection on the User Device 3. From the Setting list, select Enable HDX MediaStream for Flash on the user device and click policy setting. 4. Select Not Configured, Enabled, or Disabled. 5. If you selected Enabled, from the Use HDX MediaStream for Flash list, select Always, Ask, or Never. Note: Selecting Ask results in users receiving a dialog box the first time they access Flash content in each session in which the user can enable HDX MediaStream Flash Redirection. If the user does not enable HDX MediaStream Flash Redirection, the Flash content is played on the server. Selecting Always and Never do not result in this dialog box. Select Always to always use HDX MediaStream Flash Redirection to play Flash content on the user device. Select Never to never use HDX MediaStream Flash Redirection and have Flash content play on the server. 6. For the policy to take effect: q Computer Configuration: Changes take effect as computers in the organizational unit restart. User Configuration: Users in the organizational unit must log off and then log on to the network.

q

To enable synchronization of the client-side HTTP cookies with the server-side
Enable synchronization of the client-side HTTP cookies with the server-side in order to download HTTP cookies from the server. These HTTP cookies are then used for client-side content fetching and available to be read, as needed, by sites containing Flash content. Client-side cookies are not replaced during the synchronization; they remain available if the synchronization policy is later disabled. 1. In the Group Policy Object Editor, expand either the Computer Configuration or User Configuration node. 2. Expand the Administrative Templates and Classic Administrative Templates (ADM) nodes and select HDX MediaStream for Flash - Client. 3. From the Setting list, select Enable synchronization of the client-side HTTP cookies with the server-side and click policy setting. 4. Select Not Configured, Enabled, or Disabled. 5. For the policy to take effect: q Computer Configuration: Changes take effect as computers in the organizational unit restart. User Configuration: Users in the organizational unit must log off and then log on to the network.

q

18

Configuring HDX MediaStream Flash Redirection on the User Device

To enable server-side content fetching
By default, HDX MediaStream Flash Redirection downloads Adobe Flash content to and plays the content on the user device. Enabling server-side content fetching causes the Flash content to download to the server and then send it to the user device. Unless there is an overriding policy, such as a blacklist, the content will play on the user device. This setting is frequently used when the user device does not have direct access to the Internet. The XenApp or XenDesktop server provides that connection. Important: The Flash server-side content fetching whitelist setting on the server must be enabled and populated with target URLs for server-side content fetching to work. 1. In the Group Policy Object Editor, expand either the Computer Configuration or User Configuration node. 2. Expand the Administrative Templates and Classic Administrative Templates (ADM) nodes and select HDX MediaStream for Flash - Client. 3. From the Setting list, select Enable server-side content fetching and click policy setting. 4. Select Not Configured, Enabled, or Disabled. 5. For the policy to take effect: q Computer Configuration: Changes take effect as computers in the organizational unit restart. User Configuration: Users in the organizational unit must log off and then log on to the network.

q

19

Configuring Audio
You can configure audio through the Policies node of the Citrix Desktop Studio. You control the settings for the audio features through the following Citrix User Policy settings: q Audio quality Client audio redirection Client microphone redirection Audio redirection bandwidth limit Audio redirection bandwidth limit percent

q

q

q

q

To set audio quality
Generally, higher sound quality requires more bandwidth and greater server CPU utilization. You can use sound compression to balance sound quality and overall session performance. Use policy settings to configure the compression levels you want to apply to sound files. Consider creating separate policies for groups of dial-up users and for those who connect over a LAN. Over dial-up connections, where bandwidth typically is limited, users likely care more about download speed than sound quality. For such users, create a policy for dial-up connections that applies high compression levels to sound and another for LAN connections that applies lower compression levels. Configure the Audio quality setting by choosing from these audio quality levels: q Low - for low speed connections. Audio playback consumes a maximum of 11 kbps of bandwidth. With both audio playback and recording total bandwidth consumption is 22 kbps at maximum. Ideal for multimedia conferences when using low speed connections. Medium - optimized for speech. Audio playback consumes a maximum of 16.8 kbps of bandwidth. With both audio playback and recording total bandwidth consumption is 33.6 kbps at maximum. Ideal for multimedia conferences. High - high definition audio. Audio playback consumes a maximum of 96 kbps of bandwidth. With both audio playback and recording total bandwidth consumption is 166 kbps at maximum. Ideal for music and video playback. Note: High definition increases bandwidth requirements by sending more audio data to user devices and increases server CPU utilization.

q

q

20

Configuring Audio

To disable speakers
You can allow users to receive audio from an application on a server through speakers or other sound devices, such as headphones, on their client devices. Client audio mapping can cause excessive load on the servers and the network. Configure the Client audio redirection setting by choosing Allowed, the default, or Prohibited. Important: When Client audio redirection is disabled, all audio functionality is disabled.

To activate user device microphones
You can allow users to record audio using input devices such as microphones on the user device. To record audio, the user device needs either a built-in microphone or a device that can be plugged into the microphone jack. If audio is disabled on the client software, this setting has no effect. The Client audio redirection setting must be enabled for an enabled Client microphone redirection to work. For security, users are alerted when servers that are not trusted by their user devices try to access microphones. Users can choose to accept or not accept access. Users can disable the alert on the Citrix online plug-in. Configure the Client microphone redirection setting by choosing Allowed, the default, or Prohibited.

To set audio redirection bandwidth limits
You can set limits on the allowed bandwidth in kilobits for playing and recording audio. Use the Audio redirection bandwidth limit setting to identify a specific maximum kilobit per second bandwidth for a session. Use the Audio redirection bandwidth limit percent to identify the maximum percentage of the total available bandwidth to be used. If both settings are configured, the one with the lowest bandwidth limit is used. Configure the Audio redirection bandwidth limit and Audio redirection bandwidth limit percent by typing a number in the Value field.

21

Avoiding Echo During Multimedia Conferences With HDX RealTime
When users take part in audio or video conferences, they may hear an echo in their audio. Echoes usually occur when speakers and microphones are too close to each other. For that reason, Citrix recommends the use of headsets for audio and video conferences. HDX RealTime provides an echo cancellation option, enabled by default, which minimizes echo during a conference. For echo cancellation to be most effective, the user should select either Medium - optimized for speech or Low - for low-speed connections audio quality. The High - high definition audio setting is intended for music playback, rather than conference speech and should be avoided for conferences. The effectiveness of echo cancellation is sensitive to the distance between the speakers and the microphone. These devices must not be too close to each other or too far from each other. Echo cancellation is available with only Citrix Online Plug-in 12.1 and 12.0.3 for Windows and Web Interface 5.3.

To enable or disable echo cancellation
1. For 32-bit computers: On the user device, open the registry and navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Citrix\ICA Client\Engine\Configuration\Advanced\Modules\ClientAudio\EchoCancellation. For 64-bit computers: On the user device, open the registry and navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Citrix\ICA Client\Engine\Configuration\Advanced\Modules\ClientAudio\EchoCancellation. Caution: Editing the Registry incorrectly can cause serious problems that may require you to reinstall your operating system. Citrix cannot guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk. Be sure to back up the registry before you edit it. 2. In the Value data field, type TRUE or FALSE to enable or disable echo cancellation.

22

HDX RealTime Webcam Video Compression for Video Conferencing
HDX RealTime provides a webcam video compression option to improve bandwidth efficiency during video conferencing

System Requirements for HDX RealTime Webcam Video Compression
To use the HDX RealTime webcam video compression feature: q Install Citrix online plug-in 12.1 or 12.0.3 for Windows on the user device. Install Microsoft Office Communications Server 2007 on the XenDesktop site. Install Microsoft Office Communicator 2007 on the Virtual Desktop Agent. Ensure the user device has the appropriate hardware to produce sound. Use the web camera default settings. Install drivers for web cameras on the user device. Where possible, use drivers obtained from the camera manufacturer, rather than from a third party. Note: Only one web camera is supported at a time. If a device has multiple web cameras attached, the cameras are tried in succession until a connection is made.

q

q

q

q

q

q

Enable the following Citrix Policy settings in the Citrix Desktop Studio: q Client audio redirection HDX MediaStream Multimedia Acceleration

q

Configuring Client Audio redirection
Client audio redirection is a Citrix User Policy setting. It allows or prevents the redirection of sound from a hosted application to a sound device on the user device. When enabled, users can also record sound from their devices. Client audio redirection is enabled by default.

23

HDX RealTime Webcam Video Compression for Video Conferencing

Configuring HDX MediaStream Multimedia Acceleration
HDX MediaStream Multimedia Acceleration is a Citrix Machine Policy setting. Use this setting to allow or prohibit the delivery of streaming audio and video to users. HDX MediaStream Multimedia Acceleration is enabled by default.

24

Improving Responsiveness in Low Bandwidth Conditions by Compressing Colors
By default, Citrix's HDX features provide a high quality graphics experience in Windows 7 desktops with an efficient use of bandwidth. If you experience low bandwidth, you can improve responsiveness by enabling extra color compression. This compression results in lower quality graphics, however. When you enable this compression, you also set a bandwidth threshold at which extra color compression occurs. High quality images are delivered as long as the bandwidth remains above the threshold. If the bandwidth drops below the threshold, extra color compression occurs, reducing graphic quality and improving responsiveness. The extra color compression ends and high quality graphics resume when the bandwidth rises above the threshold again. The two extra color compression settings, which you configure on the server through the HDX Policies node of the Citrix Desktop Studio, are: q Extra Color Compression Extra Color Compression Threshold

q

To improve responsiveness by compressing colors
Extra color compression is disabled by default in order to provide high quality graphics to Windows 7 desktops. You can enable and disable extra color compression from the Desktop Studio through the Citrix User Policy setting Extra Color Compression, in the Image compression category. When Enabled is selected, extra color compression begins, reducing the bandwidth needed to present graphics, while concurrently reducing the quality of those graphics. If Disabled is selected, high quality graphics are delivered and more bandwidth is consumed. After configuring Extra Color Compression set the bandwidth threshold with the Extra Color Compression Threshold setting.

To set a threshold to activate extra color compression
After changing the Extra Color Compression setting to Enable, specify a threshold at which the compression occurs. If the bandwidth is below the threshold, extra color compression occurs. If the bandwidth is above the threshold, extra color compression does not occur and high quality graphics are delivered to the users' Windows 7 desktops. Set the Extra Color Compression Threshold setting by typing a kbps rate in the Value field. Alternatively, click Use default value to use 2,000 kbps. 25

Improving Responsiveness in Low Bandwidth Conditions by Compressing Colors

26

Configuring Time Zone Settings
By default, when non-privileged users connect to Windows XP desktops, they see the time zone of the system running the desktop instead of the time zone of their own user device. This does not apply to Windows Vista or Windows 7, which have a separate time zone privilege. To allow Windows XP users to see their local time you need to give them rights to: q Change the time on the system on which the desktop is running. To do this, set up a Group Policy with rights given to non-privileged users to change system time settings. For further information about how to do this, see http://msdn2.microsoft.com/en-us/library/ms813808.aspx. Change the time zone registry area. For information about how to do this, see http://support.microsoft.com/kb/300022/.

q

After you do this, users who connect to Windows XP desktops see their local time zone reflected in the desktop. When they log off or disconnect, the time zone of the desktop is reset to what it was before they logged on. You can configure time zone settings through Citrix policies. Use the Use local time of client policy setting in the Time Zone Control section of the ICA Policy Settings folder.

27

Configuring Connection Timers
You can configure three connection timers: q A maximum connection timer. This setting determines the maximum duration of an uninterrupted connection between a user device and a virtual desktop. Use the Session connection timer and Session connection timer interval policy settings to configure this. A connection idle timer. This setting determines how long an uninterrupted user device connection to a virtual desktop will be maintained if there is no input from the user. Use the Session idle timer and and Session idle timer interval policy settings to configure this. A disconnect timer. This setting determines how long a disconnected, locked virtual desktop can remain locked before the session is logged off. Use the Disconnected session timer and Disconnected session timer interval policy settings to configure this.

q

q

If you need to update any of these settings, ensure that settings are consistent across your deployment.

28

Workspace Control in XenDesktop
The workspace control feature provides users with the ability to roam. They can disconnect quickly from all running applications and desktops, reconnect to them, and log off from them. Workspace control enables users to move between user devices and gain access to all of their desktops or open applications when they log on. In a XenDesktop environment, you can use workspace control in two ways: q In XenDesktop sessions, workspace control is disabled by default. For instructions on enabling it, see the Web Interface documentation. In XenApp sessions within XenDesktop sessions, workspace control is enabled by default. For information on this scenario, see VM Hosted Apps.

q

29

Removing the Shut Down Command
Citrix recommends that you apply this Microsoft policy to all XenDesktop users. This prevents users from selecting Shut Down within a XenDesktop session and powering off the desktop, which would require manual intervention from the system administrator. Locate this policy under User Configuration\Administrative Templates\Start Menu & Taskbar\Remove and prevent access to the Shut Down command and set it to Enabled.

30

Similar Documents

Free Essay

Virtualization Across the Board

...Strayer University Assignment 3: Virtualization Across the Board Dennis R. Roque CIS512: Advanced Computer Architecture Professor Amir Afzal 4 March 2013 Table of Contents 1. Compare & contrast the AMP & SMP architectures 3 2. Determine if hardware virtualization helps businesses and organizations in terms of: 3 Cost management 3 Systems performance and scalability 4 Systems management and administration 4 3. Determine if software virtualization helps businesses and organizations in terms of: 4 Cost management 4 Systems performance and scalability 4 Systems management and administration 5 4. Compare and contrast VMware, Microsoft, and Citrix in terms of:…………………………………….5 Market adoption 5 Technical architecture 6 Technical support 8 5. Determine which vendor you would recommend for a virtualization strategy and explain why: 8 References:……………………………………………………………………………………………………………………………9 1. Compare & contrast the AMP & SMP architectures While symmetric multiprocessing (SMP) plays an important role in multi-core systems, the packet processing performance curve in an SMP configuration can flatten after only a few cores, yielding diminishing returns as more system resources are allocated to networking tasks. Wind River’s asymmetric multiprocessing (AMP) technologies provide a clean separation of control plane and data plane functions, which enable greater efficiency of multiple processing cores. The data...

Words: 2359 - Pages: 10

Premium Essay

Bsit Technical Writing / Capstone Wgu

...Technical Writing Project Cover Sheet Capstone Proposal Project Name: Network Infrastructure Upgrade Proposal Student Name: FRANK RIZZO Degree Program: BSIT Mentor Name: REJINA WIDENER Table of Contents Captone Proposal Summary 3 Review of Other Work 6 Rationale and Systems Analysis 8 Goals and Objectives 10 Project Deliverables 12 Project Plan and Timelines 14 References…………………………………………………………………………………………………………………………………………….17 Capstone Proposal Summary United Luxury Housing LLC. (Hereinafter referred to as “ULH” or “the company”) prides itself on being one of the fastest growing property management companies in the United States. ULH owns and or manages luxury apartment communities in eight states currently and is projected to double in size over the next three to five years. ULH takes pride in their unique luxury properties that include amenities such as 24 hour maintenance and pool access, top-of-the-line workout facilities, on-site stores with groceries and commonly used household goods, luxurious club houses, movie theaters, and free high-speed internet. ULH experienced most of its growth over the last 18 months and until now had not realized that their outdated network infrastructure could possibly inhibit future growth. ULH is seeking proposals to upgrade their IT infrastructure to be able to better meet existing demand and future growth. This proposal and project will consist of the following five phases: 1. Project...

Words: 3634 - Pages: 15

Premium Essay

Resume

...operated breadboard through the use of power supply instruments and circuit components. • Operated electronic devices to measure and compute for varying values at multiple locations using wires and solving any unknown data. • Digital Application and Logic Circuits with 7-Segment Displays Designed circuits involving logic gates formulated K-maps and used Boolean Algebra to simplify and translate equations. • Systems analysis/testing, instrument calibration, prototype development/ testing, circuit design/layout, and report writing. • Designed, simulated, and built an operational amplifier using transistors. Technical Skills: • Operating Systems: Microsoft Windows (98,2000,XP, Vista, 7, MAC OS) • Multisim • Visual Studios • XenDesktop • Microsoft Office • Monitoring/Repairing • MATLAB • Familiar in Java and Access • Quartus II • Engineering: Function Generator • Oscilloscope • DMM Readings • Circuit Building/Testing/Evaluating Core Competencies: • Excellent communication skills with ability to build rapport across the organization with peers, subordinates and supervisors, both written and verbal. • Supervisor experience / Strategic Planning • Electrical Testing / Analysis • Documentation • Project...

Words: 619 - Pages: 3

Free Essay

Mobile Working in Indonesia

...Mobile Working di Indonesia MAKALAH Oleh : Apriani Situmorang 1401165172 Program Sarjana Ilmu Komputer PROGRAM STUDI SARJANA SISTEM INFORMASI JENJANG S1 UNIVERSITAS BINA NUSANTARA JAKARTA 2012 Abstrak Karyawan yang sukses cenderung ekstrovert yang tangguh. Mereka terbuka untuk pengalaman baru dan mudah beradaptasi. Dengan stereotip mereka yang sangat terorganisir dan berpikiran independen maka produktivitas dan kemampuan beradaptasinya akan mengalami peningkatan dan perubahan yang konstan. Tapi mereka juga membutuhkan bantuan dalam menjaga keseimbangan kehidupan kerja, dan menjaga kepercayaan diri mereka. Oleh karenanya, perusahaan jelas perlu membekali pekerja dengan lebih dari sekedar teknologi, juga perlu menyediakan perhatian dan layanan yang terbaik. MII sebagai perusahaan yang selalu berinovasi untuk membuat suasana kerja yang nyaman untuk para karyawannya dan memberikan layanan yang lebih responsif serta lebih cepat bagi pelanggannya. Oleh karena karyawan perusahaan sering bekerja di luar kantor, maka perusahaan merasa perlu untuk menerapkan solusi mobile office. Solusi mobile office ini diharapkan membuat karyawan dapat bekerja dengan mudah di mana saja dan kapan saja serta menggunakan device apa saja. Dalam rangka meningkatkan layanan kepada para pelanggan dan membantu kebutuhan para karyawannya yang seringkali berkerja di luar kantor, MII menerapkan solusi mobile office, dengan menggunakan teknologi virtualisasi Citrix. Key word :...

Words: 4515 - Pages: 19

Premium Essay

Computer

...Group 1 & 2 Case study 1 Can This Bookstore Be Saved? Barnes & Noble (B&N) has been portrayed in the past as a big bully that drove small independent bookstores out of business with aggressive pricing tactics and an unbeatable inventory of books. Today, B&N finds its role reversed as the company fights a fierce battle to survive in the inevitable era of e-books. Booksellers were one of the many industries disrupted by the Internet and, more specifically, the rise of e-books and e-readers. B&N hopes to change its business model to adapt to this new environment before it suffers a similar fate as many of its competitors, like Borders, B. Dalton, and Crown Books, or their peers in other industries, like Blockbuster, Circuit City, and Eastman Kodak. More than ever, consumers are reading books on electronic gadgets—e-readers, iPods, tablets, and PCs—instead of physical books. Although B&N still depends on its physical, brick-and-mortar stores to drive its business (B&N operates 691 bookstores in 50 states, as well as 641 college bookstores), the company has thrown its energies behind development and marketing of the Nook series of e-readers and tablets. Once simply a bookseller, B&N now styles itself as a seller of e-books, devices to read them on, and apps that enhance the reading experience. The company has had success gaining market share, but at a steep cost, and to stay afloat, it will need to contend with increased competition from Amazon, Apple, and Google—not...

Words: 3118 - Pages: 13

Premium Essay

Global Pharmaceutical Industry

...SA SERIES SSL VPN APPLIANCES PRODUCT LINE PRESENTATION Submitted by: RADIUS Consulting Ghana Limited AGENDA 1. SSL VPN Market Overview 2. SSL VPN Use Cases 3. Access Control and AAA 4. End-to-End Security 5. Junos Pulse 6. Secure Meeting 7. Business Continuity with SSL VPN 8. Hardware, Management and High Availability 2 www.radiusconsultingghana.com Copyright © 2010 Juniper Networks, Inc. www.juniper.net BUSINESS CHALLENGE: GRANT ACCESS VS. ENFORCE SECURITY Maximize Productivity with Access...  Allow partner access to applications (Extranet portal)  Increase employee productivity by providing anytime, anywhere access (Intranet, E-mail, terminal services) …While Enforcing Strict Security  Allow access only to necessary applications and resources for certain users  Mitigate risks from unmanaged endpoints  Customize experience and access for diverse user groups (partners, suppliers, employees)  Enable provisional workers (contractors, outsourcing)  Enforce consistent security policy  Support myriad of devices (smartphones, laptops, kiosks) …And the Solution Must Achieve Positive ROI  Minimize initial CAPEX costs  Lower ongoing administrative and support OPEX costs 3 www.radiusconsultingghana.com Copyright © 2010 Juniper Networks, Inc. www.juniper.net THE SOLUTION: JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES Mobile User – Cafe  Secure SSL access to remote users from any device or location  Easy access from Web-browsers – no client software to manage...

Words: 3503 - Pages: 15

Free Essay

Virtualization

...Virtualization Across the Board CIS512 Enterprise Architecture Technology is one aspect of business that can universally enhance any company’s capabilities and add resources to offer a positive impact on the bottom line. However, information technology comes with its own implementation barriers that can complicate matters when making IT investments with an expectation to generate a return on that investment. The biggest impact of virtualization in cost structures is the radical change in how technology is implemented and paid for. Previously, any new technology could require a capital investment, lead times for setup and training, and continuing overhead in the form of support and maintenance personnel. In order to justify this risk, the return on investment had to be exceptionally strong and the company would require excess free capital. All virtualization services are offered without the need for any capital outlay or lead time; once a subscription plan is worked out, the resources are automatically available through any internet connection (Kishore 2012). For companies with existing IT departments, additional servers or services can be brought online immediately and seamlessly. The services offered also allow businesses to enjoy economies of scale, even for miniscule implementations. This also means that companies have access to the latest technology upgrades and updates along with security features and protocols without having...

Words: 1616 - Pages: 7

Free Essay

Nurse

...APA
VDI
Solution

 Research
Report
 
 
 
 Tony
Habash,
CIO
ITS

 American
Psychological
Association
 
 
 | 
 | American
Psychological
Association
 | 
 | | | 
 | 
 | February
4,
2013
 | 
 | | 

 | Prepared
by:
 John
Doe,
Manager
ITS
Network
Systems
Engineering
 
 
 Table
of
Contents
 Executive
Summary
........................................................................................................................
1
 Introduction
....................................................................................................................................
1
 Results
of
Research
........................................................................................................................
3
 Completed
Work
........................................................................................................................
3
 1.
 Gain
clear
understanding
of
Virtual
Desktop
Infrastructure
(VDI)
...............................
3
 2.
 Find
out
which
VDI
solution(s)
is
cost
effective
for
APA
..............................................
5
 3.
 Identify
applications
that
will
not
function
with
VDI
....................................................
5
 4.
 Investigate
required
VDI
training
.................................................................................
6
 Conclusion
......................................................................................................................................
7
 ...

Words: 2645 - Pages: 11

Premium Essay

Infrastructure Hardware

...Information Technology Infrastructure P A R T II 4 IT Infrastructure: Hardware and Software 5 Foundations of Business Intelligence: Databases and Information Management 6 Telecommunications, the Internet, and Wireless Technology 7 Securing Information Systems Part II provides the technical foundation for understanding information systems by examining hardware, software, databases, networking technologies, and tools and techniques for security and control. This part answers questions such as these: What technologies and tools do businesses today need to accomplish their work? What do I need to know about these technologies to make sure they enhance the performance of my firm? How are ISBN 1-269-41688-X these technologies likely to change in the future? 107 Essentials of Management Information Systems, Tenth Edition, by Kenneth C. Laudon and Jane P. Laudon. Published by Prentice Hall. Copyright © 2013 by Pearson Education, Inc. IT Infrastructure: Hardware and Software LEARNING OBJECTIVES C H A P T E R 4 STUDENT LEARNING OBJECTIVES After completing this chapter, you will be able to answer the following questions: 1. 2. What are the components of IT infrastructure? What are the major computer hardware, data storage, input, and output technologies used in business? What are the major types of computer software used in business? What are the most important contemporary hardware and software trends? What are the principal issues in...

Words: 21212 - Pages: 85

Premium Essay

Virtualization

...Virtualization and Its Benefits Virtualization and Its Benefits AITP – Research and Strategy Advisory Group Christine, Leja, CCP, Chair Richard C. Barnier Charles L. Brown, CCP Paul F. Dittmann Paul Koziel Mark Welle J.T. Westermeier, JD, CCP Abstract Virtualization provides many benefits – greater efficiency in CPU utilization, greener IT with less power consumption, better management through central environment control, more availability, reduced project timelines by eliminating hardware procurement, improved disaster recovery capability, more central control of the desktop, and improved outsourcing services. With these benefits, it is no wonder that virtualization has had a meteoric rise to the 2008 Top 10 IT Projects! This white paper presents a brief look at virtualization, its benefits and weaknesses, and today’s “best practices” regarding virtualization. The Association of Information Technology Professionals (AITP) recommends these “best practices” to obtain the benefits that virtualization offers. Copyright 2008, Association of Information Technology Professionals. Permission to copy for personal non-commercial use granted. When the paper is referenced or quoted, direct the reader to www.aitp.org. Special thanks to the following editor: Mike Hinton, Southwestern Illinois College AITP Research and Strategy Advisory Group October 14, 2008 Page 1 of 40 Virtualization and Its Benefits Executive Summary Virtualization has quickly evolved from concept...

Words: 16382 - Pages: 66