

Servers, Published Applications, ICA connections, network configuration, client devices, end users. What are the components of the XenApp Security Model? A

Implementing security based on the XenApp Security Model will assist you in protecting your network from different threats and different users. Why is XenApp security broken down by the XenApp Security Model? A Each environment differs from the next the performance of the server hardware and the number of physical hosts across which the load will be spread should be considered when considering how many virtual desktops should be started at one time – basically you will need to test this, but you can try a “MaximumTransitionRate” of 20 as a starting point.Įdit the file “C:\Program Files\Citrix\VmManagement\.”

Limiting the concurrent commands prevents the Desktop Delivery Controller from starting too many virtual desktops simultaneously. The booting of virtual desktops can be throttled by altering the number of concurrent commands that may be executed. Additionally, it is recommended A to stagger booting of virtual desktops in large environments, as this prevents placing an undue load on the physical servers. Meets federal government FIPS 140-2 criteriaīooting multiple virtual desktops simultaneously can place a load on the hypervisor (the physical servers). Provides limited access for noncompliant devices Uses Citrix AppCompress technology and integrated SSL hardware acceleration Simplifies management in large organizations and support multiple admins

Supports deployment of a high-availability pair of appliances, providing redundancy Protects resources by authenticating users with smart cards Gives admins visibility into all resources and services accessed by clients Provides “landing page” for users to access their applications, files and resources Policy-based technology determines what resources can be accessed Information is protected using SSL/TLS encryption No need to pre-install or manage complex client softwareĪutomatically reconnects users as soon as the network connection is restoredĮnsures the client device meets appropriate standards before connecting Provides access to all applications and data from anywhere
