O'Reilly logo

Citrix XenDesktop 5.6 Cookbook by Gaspare A. Silvestri

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. XenDesktop Tuning and Security

In this chapter we will cover:

  • Configuring the XenDesktop policies
  • Configuring the Citrix Access Gateway virtual appliance
  • Configuring the XenDesktop logging

Introduction

Citrix XenDesktop offers itself as a secure and performant architecture. This does not mean that it's not possible to increase and develop both the levels; Citrix platforms or different vendor systems permit you to have a deeper protection and avoid performance issues by enabling the right policies.

During this chapter we will discuss the configuration of the XenDesktop infrastructural policies and we'll use critical platforms such as Citrix Access Gateway.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required