Jump to content

Jeff Riechers

Members
  • Posts

    776
  • Joined

  • Last visited

  • Days Won

    39

Posts posted by Jeff Riechers

  1. Caching does make the profiles balloon up.  But there are ways to keep them as lean as possible.

     

    1. Exclude temp and cache from roaming with the profile. (Edge, Chrome, and Teams are a big waste of space.)

    2. Use Files on Demand to only roam down from OneDrive items that are being used.

    3. Dehydrate your OneDrive so that if things fall out of time frame they get sent back to cloud only.

    4. Compact profiles so that empty space is returned to the system.

     

    I wrote up a huge article on this that works really well.  The majority of my profiles are under 1 GB, and only a few people that do a lot of Office work have the profiles over 5 GB.

     

    https://www.jeffriechers.com/wiki/keeping-fslogix-profiles-small/

  2. The sessions are a webshell, so you would only see it as something running in memory, and if it is there you are compromised.  Other sessions like LB, Gateway, etc would just migrate around the cluster.  So I would do a rolling reboot and scan the device directly.

  3. Administrative access to the Netscaler is only to the NSIP or a SNIP configured with management access.

     

    NetScaler does have AAA for both authentication and Gateway access.  These do not use the nsroot account as an authentication point.

     

    There have been security flaws with NetScaler code released in June and October.  So if you are on an unpatched version you are potentially compromised.

  4. From the GUI

    Under Settings-->Administration--> Network Configurations --> IP Address  you can adjust the IP there.

    From the CLI

    login with nsrecover for the username nsroot for the password.  Then execute ./networkconfig to get the cli setup for setting the base ip.

     

    NetScalers also can be offline from the license server for up to 30 days and still work.  So if DR instances are going to be shorter than that I wouldn't worry too much about DR of it.

     

    • Like 1
  5. If you aren't using FAS then the SSO token would come from your AD hybrid communication, so no worries about doing any of the Certificate setup with Azure AD.

     

    So getting the PVS target device set to do the workplace join on startup, and you have the workplace join also set to run on user logon, then it should connect everything.

     

    Test from a desktop, and see if a dsregcmd /status shows Azure AD connectivity.

     

    If you are using published apps, make sure to have the shellbridge settings set as well, so that the authentication links up correctly with the azure AD.

     

    https://support.citrix.com/article/CTX267071/password-field-not-displayed-when-publishing-any-office-365-application-such-as-excel-or-word-on-server-2019-or-windows-10

     

    The only items you need to set on the VDA are

     

    HKEY_LOCAL_MACHINE\SOFTWARE\Citrix\Citrix Virtual Desktop Agent Name: Shellbridge Type: REG_DWORD Value: 1

     

    Even though that article talks about hidden password fields, I also have had to enable shellbridge for proper Edge sign-ins as well.

    • Like 1
×
×
  • Create New...