Industry news

Selling to a Security Executive

Citrix employee blogs - Fri, 01/05/2018 - 13:30

There is no doubt that for any customer you speak with today, security is top of mind. I know; I live it every day as the newly named CSIO (lots of fancy letters that stand for Chief Security Information Officer). …

  Related Stories
Categories: Citrix, Virtualisation

!ArtWorks 2.X3 released

The Iconbar - Fri, 01/05/2018 - 07:35
The London Show saw the welcome return of Martin and the latest update to !Artworks. You could buy this as the show and from the website.

As with previous releases, the latest !ArtWorks is a mixture of keeping the product current and running on the latest hardware, some tweaks and some new goodies.

If you are running !Artworks on the latest RaspberryPi, IGEPv5 or Titanium machines, the color modes all work correctly. With their extra speed, these should be your tool of preference now for most RISC OS activities.....

The Single pixel nudging option is a nice to have which makes it easier to move objects in single pixel increments with the ctrl key pressed. Apply ClipView now lets you wrap and object into a clip View where you can edit it with the new shape painter/eraser tool.

This is the big new feature which lets you paint and edit clip shapes. You can control the accuracy (how many control points you want) and effectively draw big irregular clips very easily which you can then tweak by editing the shape. At the London Show, Martin showed how easy this made it to cut images out of a background which can then be used as part of a drawing as if they were just an image with a transparent background. You can also use it to edit any Vector shape, taking a bite out of the iconic !ArtWorks apple...

!ArtWorks has always been a favourite tool of mine, both for work and fun. Now it runs really nicely on my Titanium and the new Shape tool is a really nice addition to its featureset. I look forward to 2.X4!

As with all previous releases, there are discounts to upgrade from a previous version.

New features summary

Ordering details

No comments in forum

Categories: RISC OS

Experience #CitrixSummit 2018 with Live Streaming Keynotes

Citrix employee blogs - Thu, 01/04/2018 - 21:00

In a perfect world, all of our partners would be with us at Citrix Summit 2018, in Anaheim, California, next week for our official 2018 sales and enablement kickoff. But if you can’t be with us in person, you …

  Related Stories
Categories: Citrix, Virtualisation

Kicking off the New Year with a Tech Preview: XenMotion of NVIDIA GPU-Accelerated VMs!

Citrix employee blogs - Thu, 01/04/2018 - 17:00
Live Migration of Virtual Machines is old news. But what about GPU-accelerated VMs? Do you still have to power them down during migration? No. Today, that’s changing — but only if you use Citrix XenServer!

NVIDIA first announced GPU virtualization …

  Related Stories
Categories: Citrix, Virtualisation

Industry-Wide Computer Processor Vulnerability – What To Know, What To Do

Citrix employee blogs - Thu, 01/04/2018 - 14:00

Google Project Zero, a team of security analysts at Google charged with identifying new vulnerabilities, reported a new class of security vulnerability in computer processors that have certain advanced optimization capabilities. This is an industry-wide issue with the processor …

  Related Stories
Categories: Citrix, Virtualisation

3 Pillars of DaaS Success — Webinar FAQ

Citrix employee blogs - Thu, 01/04/2018 - 13:00
Desktops-as-a-Service (DaaS) is a hot topic. Thank you to all that attended the December 13 webinar, Getting to the State of OPEX: 3 Pillars of DaaS Success, and for the insightful questions you raised.

Due to the great participation …

  Related Stories
Categories: Citrix, Virtualisation

The Top Technology Predictions for 2018

Theresa Miller - Thu, 01/04/2018 - 06:30

2017 was a great year in IT bringing much change in the focus of how businesses are consuming IT.  For example, cloud for many organization is no longer if but when.  We are also now looking at data analytics, virtual reality, artificial intelligence in new ways that benefit the business and not just in ways […]

The post The Top Technology Predictions for 2018 appeared first on 24x7ITConnection.

How To: Add a Server Identifier to the StoreFront Page Footer

Citrix employee blogs - Wed, 01/03/2018 - 21:00
In this blog post, I review the steps for customizing StoreFront to include a unique server identifier on the page footer. This is a common requirement for customers who have multiple StoreFront servers behind a load balancer. In this scenario, …   Related Stories
Categories: Citrix, Virtualisation

HTML5 Multimedia Redirection: State of the Union Part II

Citrix employee blogs - Wed, 01/03/2018 - 19:00
In the first installment in this series, we laid out the context for the latest set of technologies in HDX MediaStream Multimedia Redirection, and explained what’s in 7.16. In this post, we will explain the differences between HTML5 Video …   Related Stories
Categories: Citrix, Virtualisation

The Way We Work: How the Move to Cloud Services Is Transforming Citrix Procurement

Citrix employee blogs - Wed, 01/03/2018 - 15:00
You may have seen how Citrix has embraced the transformative power that cloud services can bring to a business. As we have shifted our focus, putting Citrix Cloud at the center of our product strategy, we are also seeing the …   Related Stories
Categories: Citrix, Virtualisation

Voting is Now Open for the 2018 Citrix Innovation Award for Partners!

Citrix employee blogs - Wed, 01/03/2018 - 13:00
Watch the finalist videos and vote now! Voting closes Tuesday, Jan. 9 at 12 pm PT.

Citrix partners are the under-sung heroes in helping business around the world bring digital transformations to life. In a recent blog post, Citrix …

  Related Stories
Categories: Citrix, Virtualisation

How Stratodesk and Citrix Help Customers Unify & Standardize VDI Endpoints

Citrix employee blogs - Tue, 01/02/2018 - 19:00

As a Citrix Ready partner, Stratodesk has been pioneering the cause of helping Citrix’ customer base enhance the user experience with endpoint devices. Today, I am pleased to bring you a guest post by Joseph Anderson from Stratodesk. Read on

  Related Stories
Categories: Citrix, Virtualisation

Knowledge Center Highlights – December 2017

Citrix employee blogs - Tue, 01/02/2018 - 18:08

Hello Citrix community! Welcome to the December 2017 edition of Citrix Knowledge Center Highlights. This is a collection of new and updated articles, trending articles, and other updates from the Citrix Knowledge Center team.

Knowledge Center Highlights

We have organized …

  Related Stories
Categories: Citrix, Virtualisation

A great way to collect logs for troubleshooting

Microsoft Virtualisation Blog - Fri, 10/27/2017 - 23:30

Did you ever have to troubleshoot issues within a Hyper-V cluster or standalone environment and found yourself switching between different event logs? Or did you repro something just to find out not all of the important Windows event channels had been activated?

To make it easier to collect the right set of event logs into a single evtx file to help with troubleshooting we have published a HyperVLogs PowerShell module on GitHub.

In this blog post I am sharing with you how to get the module and how to gather event logs using the functions provided.

Step 1: Download and import the PowerShell module

First of all you need to download the PowerShell module and import it.

Step 2: Reproduce the issue and capture logs

Now, you can use the functions provided as part of the module to collect logs for different situations.
For example, to investigate an issue on a single node, you can collect events with the following steps:

Using this module and its functions made it a lot easier for me to collect the right event data to help with investigations. Any feedback or suggestions are highly welcome.


Categories: Microsoft, Virtualisation

DHCP – Activate Filter “Allow” & import MAC address from SCCM by WMI request - Tue, 08/29/2017 - 12:08

Hello folks,
Recently, i have post a script to interroge SCCM and find the MAC address informations. In this post, i show you how activate DHCP Filter “Allow” to protect your DHCP delivery lease to deny access to your network (i know, there is NAP or NAC but, it is a simple way to block the issuance of a DHCP lease).


First, you need to create a Active Directory user and give to this account rights “DHCP Administrator”.

In SCCM console, add this users to group “Read-only Analyst” .

Activate filter “Allow” on DHCP server

Connect to your DHCP Server and open the management consoleOn the IPV4 tab, open the drop-down menu, and then select the “Filters” option and right-click the “Allow” folder and select “Enable”.

From now, the DHCP server no longer delivers leases.

On the DHCP Server, launch this script for retreive and add the MAC Address informations from SCCM Server to filter list “Allow”.

Source code   # Connection information $SiteName = "FR1" $ServerSite = "sccm" # WMI Request $ImportSCCM = $(Get-WmiObject -Class SMS_R_SYSTEM -Namespace "root\sms\site_$SiteName" -computerName $ServerSite) # Create collection $Mycoll = @() foreach ($obj in $ImportSCCM) { Write-Host $obj.NetbiosName $obj.MACAddresses $obj.OperatingSystemNameandVersion $Mydetails = "" | Select-Object PCName, MacAddress, OS If ($([String]$obj.MACAddresses) -eq "") { $Mydetails.PCName = $obj.NetbiosName $Mydetails.MacAddress = "Nul" $Mydetails.OS = $obj.OperatingSystemNameandVersion } Else { $Mydetails.PCName = $obj.NetbiosName $Mydetails.MacAddress = [String]$obj.MACAddresses -replace ":","-" $Mydetails.OS = $obj.OperatingSystemNameandVersion } $Mycoll += $Mydetails } #Add MacAddress into DHCP Filter foreach ($objects in $Mycoll) { Add-DhcpServerv4Filter -List Allow -MacAddress $objects.MacAddress -Description $objects.PCName -Confirm:$false -Force -Verbose } # Remove Obsolete entries Compare-Object $(($Mycoll | Select-Object MacAddress).MacAddress) $(Get-DhcpServerv4Filter -ComputerName $DHCPServer -List Allow | Select-Object MacAddress).MacAddress -IncludeEqual | % { if ($_.SideIndicator -eq "=>") { Remove-DhcpServerv4Filter -ComputerName $DHCPServer -MacAddress $_.InputObject -Confirm:$false -Verbose } }

When the script is finished, you can see into the management console of DHCP Server, the entries are add into the “Allow” list.

The DHCP server correctly delivers the lease of the device whose MAC Address is allowed.


Categories: Community, Virtualisation

SCCM – Find Devices MAC Address - Fri, 08/25/2017 - 12:56

Hello Folks,

This week I needed to export from SCCM, the devices name and MAC Address to a CSV file.

I need this file to create green list into DHCP server. The Green list give permission to have a lease from DHCP server. I will speak of this subject in a futur post.

To find informations on devices into SCCM, we can work with WMI Class of SCCM. This script is based on WMI request.

Source code   $SiteName = "FR1" $ServerSite = "sccm" $Mycoll = @() foreach ($obj in (Get-WmiObject -Class SMS_R_SYSTEM -Namespace "root\sms\site_$SiteName" -computerName $ServerSite)) { Write-Host $obj.NetbiosName $obj.MACAddresses $obj.OperatingSystemNameandVersion $Mydetails = "" | Select-Object PCName, MacAddress, OS If ($([String]$obj.MACAddresses) -eq "") { $Mydetails.PCName = $obj.NetbiosName $Mydetails.MacAddress = "Nul" $Mydetails.OS = $obj.OperatingSystemNameandVersion } Else { $Mydetails.PCName = $obj.NetbiosName $Mydetails.MacAddress = [String]$obj.MACAddresses $Mydetails.OS = $obj.OperatingSystemNameandVersion } $Mycoll += $Mydetails } $Mycoll | Out-GridView



Categories: Community, Virtualisation

FCUGC – 3ème edition - Sat, 04/29/2017 - 07:54

FCUGC Rencontre du 3eme type !

Pour sa troisième rencontre, le French Citrix User Group Community (FCUGC) lâche l’ancre au 47 Quai de la Tournelle 75005 Paris – Péniche Henjo – pour une soirée de discussion sur des sujets autour de Citrix avec le partenaire de cet évènement, NUTANIX


La soirée sera composée de 3 présentations suivies d’un échange autours de 2 ou 3 sujets comme nous avons maintenant pris l’habitude de faire.

La communauté est un excellent moyen pour se lancer dans des présentations, le public est ouvert et tous les échanges sont constructifs, si tu veux te lancer, c’est le moment ! Donc tu souhaites présenter lors de cet évènement, prends contact avec Samuel Legrand ou moi même ! (formulaire de contact, email, twitter, téléphone, bref, tu trouveras un moyen de nous joindre)

A bientôt !

Pour s’inscrire, clique sur l’image :

Encore un merci aux précédents sponsors des deux précédentes éditions :

Control UP et Activlan


Categories: Community, Virtualisation

Active Directory Certificate Services [Part1] - Mon, 04/17/2017 - 09:45

In this post, I will tell you the information to prepare for the installation of a future two-tier PKI infrastructure.

What is it AD CS Services

Active Directory Certificate Services (AD CS) provide customizable services for issuing and managing certificates that are used in software security systems that use public key technologies.

Features of AD CS services
  • Certification authorities: Root and secondary certification authorities are used to issue certificates to users, computers, and services, as well as to manage the validity of certificates.
  • Registration of certification authority via the Web: registration via the Web allows users to connect to a certification authority using a Web browser to request certificates and retrieve revocation lists from Certificates.
  • Online Responder: The Online Responder service accepts revocation status requests for specific certificates, evaluates the status of these certificates, and returns a signed response containing the requested information about the certificate status.

The applications supported by the AD CS services include the S/MIME (Secure/Multipurpose Internet Mail Extensions) extensions, secure wireless networks, virtual private networks (VPNs), Internet Protocol security (IPSEC), the EFS files, smart card logon, SSL/TLS (Secure Socket layer/Transport layer Security), and digital signatures.

Standards PKC Availability of infrastructure

The PKI infrastructure is separated into different components, each with its own service-level agreement (SLA).

  • Enrolment: This feature is considered non-critical within the infrastructure in terms of the use of certificates. A failed enrolment can always be postponed.
  • Revocation: This feature is critical. A compromise certificate must be revoked as quickly as possible. The SLA for this feature also depends on the status check feature due to the fact that the revocation information is given by the CRL (or the token of an OCSP responder if available).
  • Status check: Checking the status of a certificate depends on the availability of a valid CRL. This means that at minima a CRL file must be available and valid. For this, the CRL will be generated each day for a period of validity of 7 days.
What you need before start installation ?

Before start installation you need to take more informations to set your CA environnement. These settings are needed to prepare correctly your documents and your installation.

Define attributs for CA Root

First, define correctly the differents attributs of the CA Root :

Define Path CRL and AIA

Define attributs for Enterprise Subordinate CA

Define Path CRL and AIA

How to define the DN of certificates

You can help you with this array to define correctly your certificates DN :

Firewall rules

This array define the rules to activate on security firewall of your compagny.

To avoid opening all dynamic RPC ports, you can set the certificate authority’s DCOM port.

Fixed DCOM port :

If you want to set the CA server to use a static DCOM port, follow these steps :

  • Connect to the CA server with an account with local Administrator privileges
  • Open the “Component Services” MMC (DCOMCNFG)
  • In the left panel, unwind Component Services, Computers, My computer, and click DCOM Config
  • In the right pane, select “CertSrv Request” and right click and select “Properties”
  • In the “Endpoints” tab, click the “ADD” button
  • Select “Use Statistic endpoint” and add the port you want, example “49152” and, double-click OK
  • Restart the service of the Certificate Authority :
    • net stop certSvc
    • net start certsvc
  • To check the listening port, run the command “netstat-anob”, check the port linked to the “certsrv” process


Now that we have defined all of the prerequisites, you still have to define the infrastructure of your PKI two levels. The Root CA is not resource consuming and can be turned off at the end of the installation. It is autonomous and should not have an IP address in practice.
The point of attention comes to the intermediate CA. You must define in relation to the number of users, devices, the size of the CRL file. Whether you want to install all of your components on the same server or, if you want to separate the roles and for example install one or more IIS servers separately from the PKI.
I did not mention an element that simplifies the query of the CRL, the OCSP service. If you want to integrate this feature, you will need to set the service access URL.
We are ready to move on to the installation of our 2 tier PKI infrastructure. I would detail the installation of the components in a next post.





Categories: Community, Virtualisation

Block Windows XP using selective Ciphers on Citrix NetScaler

Henny Louwers Blog - Tue, 05/06/2014 - 09:48
As you probably know Windows XP is no longer being supported by Microsoft. No (security) updates will be made available for Windows XP making it possibly vulnerable for future exploits. As an organization you will have to decide what you are going to do about these (probably unmanaged) Windows XP workplaces. There will still be […]
Categories: Virtualisation


Subscribe to aggregator