Escolar Documentos
Profissional Documentos
Cultura Documentos
Webinar Series
10 Tips Every XenDesktop Admin Should Know
Mick Glover Sr. Readiness Specialist, Worldwide Support Readiness
January 30, 2014
Objectives
At the end of this webinar, you will be able to:
Customize your PoSH working environment
Validate the true state of FMA services and identity possible issues
Generate and apply Schema update scripts against Site DB
Logically group machines using Broker tags
Manage computer a/cs and naming schemes for MCS Catalogs
Explicitly Control access to desktops through PoSH
Configure aspects of XD using built-in Citrix PSProviders
Configure advanced PMGMT features
Create service DB scripts of various types to facilitate XD Deployments
2012 Citrix | Confidential Do Not Distribute
Tip Number 10
Creating a customized XD PoSH $profile
Tip Number 9
Service MGMT (Checking The state of FMA
services through PoSH)
DBMissingOptionalFeature
DBRejectedConnection
DBUnconfigured
Meaning
OK
DBUnconfigured
DBRejectedConnection
InvalidDBConfigured
DBNotFound
DBMissingOptionalFeature
DBMissingMandatoryFeature
2012 Citrix | Confidential Do Not Distribute
Meaning
DBNewerVersionThanService
DBOlderVersionThanService
DBVersionChangeInProgress
OK
PendingFailure
Failed
Unknown
Tip Number 8
Checking & Updating DB Schema versions
manually through PoSH
DB Schemas
background
Each Service has its own DB Schema and set of tables that it communicates
with
DB Schema version should match the version of the service itself for optimal
performance
Lets take a look and see what the problem is
Any controller can essentially be turned off (disconnect from the DB)by unconfiguring the services
You could also stop the Broker Service
2012 Citrix | Confidential Do Not Distribute
Tip Number 7
Machine Tagging
Machine Tagging
The Nuts and Bolts
Machine tagging first introduced in XD 5.x
Can be used to create a logical grouping of machines within a site
Across Delivery Groups & OUs
Tip Number 6
Managing the Identity Pool StartCount and
NamingScheme Parameters for MCS Catalogs
Identity Pools
Created and managed by the AD Identity Service
Associated with Catalogs
Observation
IdentityPoolName & ProvisioningSchemeName matching values
Reverting NamingScheme
Considerations
StartCount will not change
Tip Number 5
Controlling Access To Resources
XD Site Policies
Overview
Entitlement Policies (Pooled/Shared Desktops)
Get-BrokerEntitlementPolicyRule
Get-BrokerAppEntitlementPolicyRule
Access Policy
Get-BrokerAccessPolicyRule (Discussed during Tip# 2)
Tip Number 4
Exploring Citrix PowerShell Providers
Enable Setting
Example: ReadonlyClipboard
PS Webinar:\user\training\Settings\ica> Set-ItemProperty ReadonlyClipboard
-Name State -Value enabled
Running dir under the Ica folder will return the following
Validate Functionality
Through Registry
HKLM\Software\Policies\Citrix\<s
ession#\User\VCPolicies.
Tip Number 3
Configuring Extended Disconnect/Logoff settings
Tip Number 2
Using the Site Access Policy to Restrict Access to
Resources
Similar to the Entitlement and Assignment site policy rules, Site access policy
rules control access to resources
What is the key difference?
Entitlement & Assignment policy rules control user access (included/excluded users)
Access policy rules control the wider conditions
(Clientnames/ClientIPs/SmartAccessFilters)
Tip Number 1
Manually Joining a Controller to an existing Site
2
3
2012 Citrix | Confidential Do Not Distribute
3
2012 Citrix | Confidential Do Not Distribute
Before I Finish
XD Tipster Blogs
Just a selection
http://blogs.citrix.com/2013/09/19/xd-tipster-introducing-the-new-xd7-xendesk
top-posh-module
/
http://blogs.citrix.com/2013/08/29/xd-tipster-machine-tagging-and-hdx-policies/
http://blogs.citrix.com/2013/08/21/xd-tipster-changing-delivery-group-icons-revi
sited-xd7
/
http://blogs.citrix.com/2013/08/20/xd-tipster-manually-joining-a-new-controllerto-an-existing-db-3-simple-steps
/
http://blogs.citrix.com/2013/10/01/xd-tipster-creating-hdx-policies-through-posh/
http://blogs.citrix.com/2013/10/22/xd-tipster-removing-controllers-from-an-xd-si
2012 Citrix | Confidential Do Not Distribute
te-using-posh
About
Citrix Services
Citrix Services
make sure
you succeed with
your
virtualization
programs.