{"id":32156,"date":"2023-04-13T15:17:20","date_gmt":"2023-04-13T15:17:20","guid":{"rendered":"https:\/\/greaterinsights.in\/?page_id=32156"},"modified":"2023-09-11T04:19:27","modified_gmt":"2023-09-11T04:19:27","slug":"citrix-presentation-server-2","status":"publish","type":"page","link":"https:\/\/greaterinsights.in\/citrix-presentation-server-2\/","title":{"rendered":"Citrix Presentation Server"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t\t
<\/div>\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t

Citrix Presentation Server<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\n\n\t<\/path>\n\t<\/path>\n\t<\/path>\n\t<\/path>\n\t<\/path>\n\t<\/path>\n\t<\/path>\n\t<\/path>\n\t<\/path>\n\t<\/path>\n\t<\/path>\n\t<\/path>\n\t<\/path>\n\t<\/path>\n\t<\/path>\n\t<\/path>\n\t<\/path>\n\t<\/path>\n\t<\/path>\n<\/g>\n<\/svg>\n\t\t<\/div>\n\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t
\n\n\t\t\t\t\t\t
\n\t\t\t\t\n\t\t\t\t<\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t
\n\n\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tCloudLabs\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t
\n\n\t\t\t\t\t\t
\n\t\t\t\t\n\t\t\t\t<\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t
\n\n\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tProjects\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t
\n\n\t\t\t\t\t\t
\n\t\t\t\t\n\t\t\t\t<\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t
\n\n\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tAssignment\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t
\n\n\t\t\t\t\t\t
\n\t\t\t\t\n\t\t\t\t<\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t
\n\n\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t24x7 Support\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t
\n\n\t\t\t\t\t\t
\n\t\t\t\t\n\t\t\t\t<\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t
\n\n\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\t\n\t\t\t\t\t\t\tLifetime Access\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\t.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t
<\/div>\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t

Course Overview<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t

Citrix Presentation Server includes public interfaces that allow Citrix administrators and partners to customize most aspects of managing Presentation Server through an Application Programming Interface (API). Many of the operations that you can perform through the Presentation Server consoles can be customized using these interfaces.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t

At the end of the training, participants will be able to:<\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t

Pre-requisite<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t
  1. CTX-1455AW Citrix Access Suite 4.0: Common Management Platform Administration<\/li>
  2. CTX-1255AW Citrix Presentation Server 4.0: Architectural Overview<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
    \n\t\t\t\t
    \n\t\t\t\t\t

    Duarion<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
    \n\t\t\t\t
    \n\t\t\t\t\t\t\t\t\t

    5 days<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

    \n\t\t\t\t
    \n\t\t\t\t\t

    Course Outline<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
    \n\t\t\t\t
    \n\t\t\t\t\t\t\t
    \n\t\t\t\t\t\t\t
    \n\t\t\t\t\t
    \n\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/i><\/span>\n\t\t\t\t\t\t\t\t<\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\tIntroducing and Installing Citrix Presentation Server<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t
    1. Introducing Citrix Presentation Server<\/li>
    2. Presentation Server Features<\/li>
    3. Presentation Server Components, Services and Protocol<\/li>
    4. Identifying Hardware and Software Requirements<\/li>
    5. Choosing a Data Store Database<\/li>
    6. Data Store Overview<\/li>
    7. Data Store Access Mode<\/li>
    8. Installing Presentation Server<\/li>
    9. Definitions and Considerations<\/li>
    10. Performing a Presentation Server Installation<\/li>
    11. Installing and Configuring the Citrix Presentation Server Clients<\/li>
    12. The Citrix Presentation Server Client Software<\/li>
    13. The Clients<\/li>
    14. The Citrix Presentation Server Client for Win32<\/li>
    15. The Features of the Client for Win32<\/li>
    16. Key Features of the Client for Win32<\/li>
    17. Installing the Client for Win32<\/li>
    18. Installation Requirements<\/li>
    19. The Client Packager<\/li>
    20. Installing the Clients Manually<\/li>
    21. Installing the Clients From a Network Share<\/li>
    22. Deploying the Clients Using Active Directory or Microsoft Systems Management Server<\/li>
    23. ICA Client Update Database<\/li>
    24. Creating a New ICA Client Update Database<\/li>
    25. Configuring and Modifying the ICA Client Update Database<\/li>
    26. The Clients for Win32<\/li>
    27. Accessing Published Resources with the Client for Web<\/li>
    28. Accessing Published Resources with Program Neighborhood<\/li>
    29. Accessing Published Resources and the Server Desktop with Program Neighborhood<\/li><\/ol><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t
      \n\t\t\t\t\t
      \n\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/i><\/span>\n\t\t\t\t\t\t\t\t<\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\tConfiguring ICA Connections and Session<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t
      1. ICA Connection Configurations<\/li>
      2. Configuring ICA-TCP Connections<\/li>
      3. Setting Security Permissions Procedure<\/li>
      4. Configuring Client Settings<\/li>
      5. Configuring Advanced ICA Connection Settings<\/li>
      6. Configuring ICA Settings<\/li>
      7. Configuring ICA Sessions for Improved Performance<\/li>
      8. Enabling SpeedScreen Browser Acceleration<\/li>
      9. Enabling SpeedScreen Multimedia Acceleration<\/li>
      10. Enabling SpeedScreen Flash Acceleration<\/li>
      11. Enabling SpeedScreen Latency Reduction<\/li>
      12. Enabling SpeedScreen Image Acceleration<\/li>
      13. Configuring Audio for ICA Sessions<\/li><\/ol><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t
        \n\t\t\t\t\t
        \n\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/i><\/span>\n\t\t\t\t\t\t\t\t<\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\tManaging Server and Server Farm Settings<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t
        1. Managing Presentation Server Administrator Accounts and Folders<\/li>
        2. Adding Administrator Accounts<\/li>
        3. Configuring Administrator Privileges<\/li>
        4. Using Folders to Manage Applications and Servers<\/li>
        5. Configuring Server and Server Farm Settings<\/li>
        6. Specifying a License Server<\/li>
        7. Integrating with Novell Directory Services or eDirectory<\/li>
        8. Configuring Server and Server Farm Communication Options<\/li>
        9. Configuring the Presentation Server Farm<\/li>
        10. Configuring Data Collectors<\/li>
        11. Optimizing CPU Utilization<\/li>
        12. Optimizing Virtual Memory Utilization<\/li>
        13. Configuring Virtual IP Addresses for Applications and Sessions<\/li>
        14. Configuring Connection Limits<\/li>
        15. Configuring ICA Keep-Alive Settings<\/li>
        16. Configuring ICA Settings<\/li>
        17. Management Console for Citrix Access Suite<\/li>
        18. Configuring My View in the Access Suite Console<\/li>
        19. Launching Management Consoles<\/li>
        20. Viewing Server and Server Farm-Related Information<\/li><\/ol><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t
          \n\t\t\t\t\t
          \n\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/i><\/span>\n\t\t\t\t\t\t\t\t<\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\tPublishing Resources<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t
          1. Publishing Applications and Desktops<\/li>
          2. Considerations for Publishing Resources<\/li>
          3. Integrating Published Applications with Other Products<\/li>
          4. Using the Application Publishing Wizard to Publish Applications and Desktops<\/li>
          5. Using the Application Publishing Wizard to Publish Content<\/li>
          6. Managing Published Resources<\/li>
          7. Configuring Published Resource Properties<\/li>
          8. Configuring Published Resource Name, Type, Location and Appearance<\/li>
          9. Assigning Published Resources to Users<\/li>
          10. Organizing Published Resources for Users<\/li>
          11. Assigning Published Applications or Desktops to Servers<\/li>
          12. Implementing Published Application Connection Controls and Resource Limits<\/li>
          13. Disabling or Hiding a Published Resource<\/li>
          14. Copying and Organizing Published Resources for Administration<\/li>
          15. Viewing Published Application Usage<\/li>
          16. Configuring Content Redirection<\/li>
          17. Configuring Client-to-Server Redirection<\/li>
          18. Configuring Server-to-Client Redirection<\/li>
          19. Configuring Published Content with Content Redirection<\/li><\/ol><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t
            \n\t\t\t\t\t
            \n\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/i><\/span>\n\t\t\t\t\t\t\t\t<\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\tConfiguring Citrix Presentation Server Policies<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t
            1. Presentation Server Policies<\/li>
            2. Creating Presentation Server Policies<\/li>
            3. Applying Policies Using Filters<\/li>
            4. Managing Presentation Server Policies<\/li>
            5. Prioritizing Policies<\/li>
            6. Enabling Shadowing Through Policy Rules<\/li><\/ol><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t
              \n\t\t\t\t\t
              \n\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/i><\/span>\n\t\t\t\t\t\t\t\t<\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\tConfiguring Load Manager<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t
              1. Reviewing the Load Management Process<\/li>
              2. Configuring Rules<\/li>
              3. Configuring and Managing Load Evaluators<\/li>
              4. Using Default or Advanced Load Evaluators<\/li>
              5. Creating a Custom Load Evaluator<\/li>
              6. Attaching Load Evaluators to Servers or Applications<\/li>
              7. Logging and Monitoring Load Evaluators<\/li>
              8. Viewing Load Evaluators in Use<\/li>
              9. Viewing Load Evaluator Rule Activity<\/li>
              10. Logging and Monitoring Access Attempts<\/li><\/ol><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t
                \n\t\t\t\t\t
                \n\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/i><\/span>\n\t\t\t\t\t\t\t\t<\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\tDeploying Applications with Installation Manager<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t
                1. Installing Applications in a Multi-User Environment<\/li>
                2. The Shadow Key Replication Process<\/li>
                3. Installation Manager Communication Process<\/li>
                4. Installation Manager Packaging<\/li>
                5. Installation Manager Packaging Process<\/li>
                6. Rolling Back the Packager<\/li>
                7. Creating a Package<\/li>
                8. Packaging an Unattended Installation<\/li>
                9. Packaging an Application<\/li>
                10. Deploying Packages to Servers<\/li>
                11. Application Deployment<\/li>
                12. Configuring Installation Manager Properties<\/li>
                13. Creating Server Groups<\/li>
                14. Adding a Package to the Installation Manager Database<\/li>
                15. Creating and Scheduling Package Groups<\/li>
                16. Scheduling and Installing a Package<\/li>
                17. Viewing Package Status<\/li>
                18. Publishing a Package<\/li>
                19. Uninstalling a Package<\/li><\/ol><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t
                  \n\t\t\t\t\t
                  \n\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/i><\/span>\n\t\t\t\t\t\t\t\t<\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\tConfiguring Printing<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t
                  1. Configuring Printers<\/li>
                  2. Importing Print Servers<\/li>
                  3. Configuring Printing for Users<\/li>
                  4. Configuring Client Printer Policies<\/li>
                  5. Assigning Network Printers to Users with Session Printers Policies<\/li>
                  6. Managing Print Drivers<\/li>
                  7. Replicating Print Drivers<\/li>
                  8. Using Universal Driver Printing Policies<\/li>
                  9. Using Universal Printing<\/li>
                  10. Maintaining Print Driver Compatibility Lists<\/li>
                  11. Configuring Print Driver Mappings<\/li>
                  12. Assigning Printer Creation Settings to Published Applications<\/li>
                  13. Managing Printer Bandwidth<\/li><\/ol><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t
                    \n\t\t\t\t\t
                    \n\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/i><\/span>\n\t\t\t\t\t\t\t\t<\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\tEnabling Web Access to Published Resources<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t
                    1. Configuring the Web Interface<\/li>
                    2. Configuring and Running Discovery<\/li>
                    3. Creating Sites<\/li>
                    4. Customizing Site Appearance for the User<\/li>
                    5. Configuring Authentication<\/li>
                    6. Configuring Explicit Authentication<\/li>
                    7. Configuring Pass-Through<\/li>
                    8. Configuring Smart Card Authentication<\/li>
                    9. Workspace Control Functionality<\/li>
                    10. Configuring Workspace Control<\/li>
                    11. Configuring Server<\/li>
                    12. Configuring DMZ Settings<\/li>
                    13. Configuring Client-Side Proxy Settings<\/li>
                    14. Configuring Client Connection Settings<\/li>
                    15. Configuring Client Deployment Configuring Client Deployment Method<\/li>
                    16. Configuring Web Client Settings<\/li>
                    17. Configuring Client for Java Settings<\/li>
                    18. Configuring Client Launch Settings<\/li>
                    19. Program Neighborhood Agent<\/li><\/ol><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t
                      \n\t\t\t\t\t
                      \n\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/i><\/span>\n\t\t\t\t\t\t\t\t<\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\tSecuring Access to Published Resources<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t
                      1. Securing Citrix Presentation Server<\/li>
                      2. Securing Access with ICA Encryption<\/li>
                      3. Securing Access with the Citrix SSL Relay<\/li>
                      4. Configuring Citrix SSL Relay Securing Access with the Secure Gateway<\/li>
                      5. Identifying the Secure Gateway Components<\/li>
                      6. Identifying the Secure Gateway Deployment Options<\/li>
                      7. Reviewing the Secure Gateway Communication<\/li>
                      8. Preparing a Secure Gateway Deployment<\/li>
                      9. Completing the Pre-Installation Checklist<\/li>
                      10. Installing Digital Certificates Configuring the Secure Gateway<\/li>
                      11. Configuring the Secure Gateway<\/li>
                      12. Configuring Default Network Access<\/li>
                      13. Configuring Client Address and Access Methods<\/li>
                      14. Configuring Secure Gateway<\/li>
                      15. Configuring Address Translation<\/li>
                      16. Managing the Secure Gateway<\/li><\/ol><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
                        \n\t\t\t
                        \n\t\t\t\t\t\t
                        \n\t\t\t\t
                        \n\t\t\t\t\t