What are Citrix Policies? Polices are used to build a secure XenApp environment that is also providing the necessary access to the users. Citrix policies are often used with Windows Group policies to build the best possible structure.
User Policies – ICA:
Computer Polices:
All Polices can be configured either within Citrix AppCenter or within Group Policy Management Console. When XenApp is first installed, it extends the Citrix Policy configuration to the Group Policy Management Console. We can see this when opening GPMC
Within the Citrix AppCenter, the Polices tab can be found under Citrix Resources ->XenApp -> Farm -> Policies
On the next post, part 9, we’ll go over configuring and applying the policies.
User Policies – ICA:
- Adobe Flash Delivery
- Audio
- Bandwidth
- Desktop UI
- File Redirection
- Multi-Stream Connections
- Port Redirection
- Printing
- Security
- Session Limits
- Shadowing
- Time Zone Control
- TWAIN Devices
- USB Devices
- Visual Display
- Server Session Settings
Computer Polices:
- ICA
- Licensing
- Power and Capacity Management
- Server Settings
- Virtual IP
- XML Service
- Configuring Farms
- User and User Groups
- Configuring Client Devices with sound quality
- Providing the necessary access for users to access to their local drives within a Citrix session
- Access Control (Access Gateway)
- Access to windows clipboard
- Configuring Encryption for Plug-ins
- Configure session importance level
- Local policies/GPO’s
- XenApp Policies
- Site GPO’s
- Domain GPO’s
- Organization Unit GPO’s
- Organizational Unit GPO’s
- Domain GPO’s
- Site GPO’s
- XenApp policies
- Local Policies/GPO’s
All Polices can be configured either within Citrix AppCenter or within Group Policy Management Console. When XenApp is first installed, it extends the Citrix Policy configuration to the Group Policy Management Console. We can see this when opening GPMC
Within the Citrix AppCenter, the Polices tab can be found under Citrix Resources ->XenApp -> Farm -> Policies
On the next post, part 9, we’ll go over configuring and applying the policies.
No comments:
Post a Comment