Solved

Path to Streaming Profile files (UNC v DFS)

Posted on 2009-05-19
1
997 Views
Last Modified: 2012-06-27
Hi

We are about to publish some apps on our Citrix 4.5 farm for Application Streaming.

Apparently, when we publish the app, the location of the profiler file has to be in UNC format, e.g. \\server1\Citrixfiles\outlook.profile

Can we also present this as a DFS link, or is this not recommended in Citrix?

What's the difference between DFS and UNC, surely they point to the same thing?
0
Comment
Question by:kam_uk
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 8

Accepted Solution

by:
LKaushal earned 500 total points
ID: 24429626
Yes, you can use DFS.
Check Best pratice guide from Citrix for all your answers: - http://support.citrix.com/article/ctx114664 
0

Featured Post

Prepare for your VMware VCP6-DCV exam.

Josh Coen and Jason Langer have prepared the latest edition of VCP study guide. Both authors have been working in the IT field for more than a decade, and both hold VMware certifications. This 163-page guide covers all 10 of the exam blueprint sections.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
After seeing many questions for JRNL_WRAP_ERROR for replication failure, I thought it would be useful to write this article.
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question