Monitoring the Integrity of Files
In Large environments you can monitor the integrity of files by checking the changes that occur to a file. For example if a file changes in size, its signature or its checksum it could be a normal...
View ArticleChanging IMA username credentials via ODBC or IMA Helper Tool – Product...
Changing ODBC connection Where: Windows Server 2008 R2 Where in Server: Administrative tools-> ODBC ->File Dsn->go to path C:\Program Files\Citrix\IMA.-> Select mf20.dsn Click on Configure...
View ArticleSetting UP Remote PC Access using XenApp/XenDesktop 7.9
Scenario: Let’s say Mr Jones, the accountant for your company, works from home once a week and decides to access his work machine while at home. You could have him using one of these good 3rd party...
View ArticleWhat is “Zettabyte era” ?
Definition: Zettabyte is a unit of information equal to one sextillion (1021) or, strictly, 270 bytes. (source: define:zettabyte – Google) The zettabyte is a multiple of the unit byte for digital...
View ArticleDifferences between Citrix UPM Folder Redirection and Microsoft Folder...
First a quick intro: When users logon to a Windows machine, they need to have a profile loaded By default if you logon to a windows workstation (Windows 7, 8, 8.1 or 10) you get a local profile If you...
View ArticleWhat is a Citrix Roll UP Pack?
Have you heard of Microsoft Service Packs? Citrix Roll UP Packs are the same equivalent, but in the Citrix world. Citrix provides several types of hotfixes for its line of products Private release...
View ArticleWhat is a leap second?
Leap Seconds – Leap seconds have been added 26 times since 1972. They’re inserted at the end of the last day of either June or December. The leap second will be added to the world’s clocks at 23 hours,...
View ArticleReceiver Android Logs
When it comes to Citrix Receiver Android logs, the collection of the logs per say, may not provide any insights or conclusive evidence of a connection issue between an Android device and a Store...
View ArticleThe 98 verbs of Power Shell
Powershell contains 7 different groups of commands, as follows: Common commands: 34 verbs Data Commands: 24 verbs Lifecycle Commands: 20 verbs Diagnostics commands: 7 verbs Communication commands: 6...
View ArticleHow to enable debug view for Android Logs
Android devices have a unique way of providing USB debugging mode See this link for complete article including nice screenshots: How to Enable USB Debugging Mode on Android This is a summary of the...
View ArticlePositional Parameters in Power Shell: understand them but don’t over use them
This PosH guru blog makes a good point; use Positional parameters in a interactive PoSh console but don’t use in scripts. Your goal is to write a better, clear and consistent code and positional...
View ArticleSSL and TLS under Citrix
In Citrix environments the theme security is always considered a top priority. As a matter in fact one of the mottos of the company is “We securely Deliver application and data” Citrix flagship...
View ArticleSpeedScreenLatency Reduction Manager Client Side
Speed Screen Latency Reduction Manager (SLR) 101: Make sure to read this full article from BrianMadden article which has a great explanation of SLR. I pasted most of it further below under “Read More”...
View ArticleUnable to RDP to a 2012 R2 server
I have a Citrix Delivery Controller (DDC) and a Server VDA (SVDA) in my lab, as part of my XenApp 7.11 environment. Both servers are 2012 R2 servers. I have Terminal Services role enabled by default...
View ArticleUsing ADSI Edit to validate an object SID such as an user or a computer
Scenario Let’s say you found an object SID but need to validate if that object SID is related to a AD component Canonical Name (CN) . Example: Domain users have a object SID attribute like:...
View ArticleThe Boot Time components of a PVS server
Boot time is when you Turn on the target device up to the point where it downloads the bootstrap file. The bootstrap file contains the BOOTSTRAP PROGRAM But what is a BOOTSTRAP PROGRAM? A target device...
View ArticleDeleting the WebCache database – The IE browser cache
How to delete the webcache file: Read this blog for a clever way of deleting the webcache file Database, the WebCacheV01.dat file located in the %LocalAppData%\Microsoft\Windows\WebCache\ folder Create...
View ArticleLicensing Diagnosis in 2012 R2
Unlike 2008 R@ RDS servers where the RDS Session Host Configuration contains the Licensing diagnosis screen, on 2012 R2 RDs servers , in order to check RDS licenses you need to issue this command:...
View ArticleThe three types of caches used by IE 10 and IE 11 on Windows 8 and later and...
IE 10 and 11 have thre types of cache to be aware: #1 AppData\Local\Microsoft\Windows\INetCache (temporary Internet files) #2 AppData\Local\Microsoft\Windows\WebCache (IE browser cache) # 3 Password...
View ArticleSome components of the Logon process in RDS/Citrix environments
smss.exe – Session Manager subsystem – As the name suggests, this process is in charge of managing the session creation and logoff Winlogon – “Winlogon handles interface functions that are independent...
View Article