Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Getting Started with XenDesktop 7.x

You're reading from   Getting Started with XenDesktop 7.x Deliver desktops and applications to your end users, anywhere, anytime, with XenDesktop 7.x.

Arrow left icon
Product type Paperback
Published in Apr 2014
Publisher Packt
ISBN-13 9781849689762
Length 422 pages
Edition Edition
Arrow right icon
Author (1):
Arrow left icon
Craig Thomas Ellrod Craig Thomas Ellrod
Author Profile Icon Craig Thomas Ellrod
Craig Thomas Ellrod
Arrow right icon
View More author details
Toc

Table of Contents (27) Chapters Close

Getting Started with XenDesktop 7.x
Credits
Notice
About the Author
About the Reviewers
www.PacktPub.com
Preface
1. Designing a XenDesktop Site FREE CHAPTER 2. Installing XenDesktop 3. Managing Machine Catalogs, Hosts, and Personal vDisks 4. Managing Delivery Groups 5. Managing Policies 6. Managing Printing 7. Virtualizing USB Support 8. Virtualizing Storage and Backup 9. High Definition Experience (HDX) 10. Application Delivery 11. Working with the XenDesktop SDK 12. Working with Citrix ReceiverTM and Plugins 13. Securing XenDesktop 14. Managing and Monitoring XenDesktop 15. VDI in the Cloud Creating a Domain Certificate Authority
XenDesktop Policy Settings Reference Creating Self-signed Certificates for NetScaler Gateway Using Public CA-signed SSL Wildcard Certificates on NetScaler Gateway Index

Chapter 5. Managing Policies

Everything in XenDesktop is done with policies, at least when it comes to giving users access and managing sessions. At this point in the book, we have provided everything you need to know when it comes to giving users access and managing sessions. Now, we need to manage the policies created in the previous chapters. Citrix policies are the best way to control connections, security, and other settings in XenDesktop, and we will discuss them in this chapter.

XenDesktop policies are very flexible; you can create policies for users, groups of users, specific devices, or types of connections. A policy can include several settings; for example, you might want to create policies to perform the following tasks:

  • Monitor CPU usage

  • Monitor Independent Computing Architecture (ICA) latency

  • Monitor profiles

  • Permit user's access to the documents on their local devices

  • Permit/block users from saving data to their hard drives

  • Permit/block users from accessing clipboard and USB drives...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime