Browse Month

November 2016

Citrix Connection Leasing

Citrix makes use of SQL Server AlwaysOn, mirroring or clustering abilities within SQL and clustering at the Hypervisor level to ensure that Delivery Controllers have a constant connection to the SQL site database. Citrix Connection Leasing in XenApp/XenDesktop 7.6+ pushes the availability further ensuring that if in the event the database is innaccessible, users most recent connections to desktops and applications are cached on Delivery Controllers and connections can continue to be brokered. Keep Reading

Updating a Unidesk OS Layer 3.x

When you need to patch the base OS or update any applications such as Hypervisor tools or .NET installed on the OS Layer you create a new OS Layer version and perform this work with the use of an Installation Machine. Keep Reading

Creating Unidesk Desktops 3.x

You can create persistent, non-persistent and Session Host desktops using Unidesk 3.4 for Hyper-V. These desktops can in turn be used within your Citrix XenApp or XenDesktop farms. In this post I will show you how to create a persistent desktop using Unidesk. Keep Reading

Get an A+ rating score on NetScaler 11.1-12.1

Whilst this guide specifically uses NetScaler v11.1 many of the tweaks that secure the NetScaler configuration can be applied to prior versions or later versions. This has also been tested on NetScaler 12.0.57.24. This guide shows how to obtain an A+ rating score from SSL Labs for your NetScaler Gateway vServer.

Keep Reading

Unidesk OS Layer image creation process 3.x

Creating the OS Layer is the foundation to creating multiple persistent and/or non-persistent desktops within a Unidesk environment. In this post I’ll show the steps involved to create and prepare a Windows 7 image and convert it in to a Unidesk OS Layer.

Keep Reading

Azure Multi-Factor Authentication with NetScaler Unified Gateway

MFA/Azure Multi Factor Authentication (previously PhoneFactor) is a multi-factor authentication technology that can be used with IIS, VPNs, OWA, ADFS, Office 365 and NetScaler to name a few using either the LDAP or RADIUS protocols from Azure cloud or on-premise. MFA has the ability to verify a users identity by calling their phone, texting their phone or using an app for verification. Using a phone for the second factor allows you to make use of something everyone will likely already have without additional bits of hardware whilst making it a great deal harder for attackers to break into accounts.

Keep Reading