CTX126099 – How to Configure Time Zone Redirection in XenApp 6.0 Using the Windows Group Policy Management Editor – Citrix Knowledge Center

Summary This article describes how to properly configure Citrix Time Zone Redirection in XenApp 6.0 using the Windows Group Policy Management Console. Citrix eDocs link: Time Zone Control Policy Setting Requirements Windows Server Administration knowledge. Understanding of Group Policy Objects and Resulting Set of Policies. Understanding of the Windows Group Policy Management Console. Understanding of the Windows Group Policy Management Editor. Understanding of the Citrix Delivery Services Console. Background Windows Group Policy Management Console. This Console enumerates Domain Group Policy Objects but only retrieves Settings from the local machine. (Keep this in mind when running this console on a Domain […]

Read more

CTX127806 – ‘Add To Favorites Bar’ Icon Does Not Work in Published Internet Explorer 8 – Citrix Knowledge Center

Symptoms The following symptoms have been observed in published Internet Explorer 8 browser when using folder redirection on XenApp 6 2008 R2: The Add To Favorites Bar icon does not add the open Web page to the Favorites Bar when clicked. When the users profile directory is checked, it appears the favorite has been added, however it is not displayed in the published Internet Explorer 8 browser. If another instance of the browser is launched then the favorite appears. Cause The Turn off Change Notify requests feature has been enabled on the server; this might have been implemented to reduce […]

Read more

CTX129585 – Application Enumeration Process and the Application Launch Process in XenApp 6 – Citrix Knowledge Center

Summary This article describes the main steps describing the application enumeration process and the application launch process in XenApp 6. Application Enumeration Process The application enumeration process is as follows: A user launches a Web browser then connects to Web Interface. The Web Interface returns the logon page. The user types in credentials. The user’s credentials are forwarded from XML then to IMA service in HTTP (or HTTPS) form. The IMA then forwards them to local Lsass.exe. The Lsass.exe encrypts the credentials then passes them to the domain controller. The domain controller returns the SIDs (user’s SID and the list […]

Read more