Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Citrix Questions

Posted on 2011-03-06
1
Medium Priority
?
278 Views
Last Modified: 2012-06-21

Citrix - What is XenDesktop, Xen Server.


How do you use XenDesktop in general?

How do you use XenServer in general?

Do you create one image on xendesktop and send it somehow to all computers on the network?  If so, how is that different than windows domain server with clients joined to network? Does it still require licenses?

Do you still need a domain environment?

0
Comment
Question by:communitypc
1 Comment
 
LVL 14

Accepted Solution

by:
amichaell earned 2000 total points
ID: 35055229
1. XenDesktop is utilized to (mainly) provide access to hosted virtual desktops.  XenServer is a hypervisor utilized to run virtual machines (servers or desktop) similar to VMWare and Hyper-V.  A typical XenDesktop deployment will involve virtual desktops (XP, Vista, or 7) running on XenServer.

2. A good solution for XenDesktop involves placing thin clients at user workstations rather than traditional PCs.  The users connect to a session broker that hands them an instance of a virtual desktop.  The user will perform most, if not all, of their work in the virtual desktop.  This solution works toward centralized management with a minimal amount of work being done at the user desktop.

3. XenServer is used to run virtual servers or desktops.  Server virtualization is gaining popularity as a method to reduce the number of physical servers in a data center due to maintenance, electricity, space, heating, cooling, etc.

4. Still requires licensing.  

5. You can use a single "Golden Image" with XenDesktop to manage virtual desktops.  Citrix Provisioning Services is traditionally utilized to provide this functionality.

6. Yes, you need a Windows domain.
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is an issue that we can get adding / removing permissions in the vCSA 6.0. We can also have issues searching for users / groups in the AD (using your identify sources). This is how one of the ways to handle this issues and fix it.
David Varnum recently wrote up his impressions of PRTG, based on a presentation by my colleague Christian at Tech Field Day at VMworld in Barcelona. Thanks David, for your detailed and honest evaluation!
In this video tutorial I show you the main steps to install and configure  a VMware ESXi6.0 server. The video has my comments as text on the screen and you can pause anytime when needed. Hope this will be helpful. Verify that your hardware and BIO…
This course is ideal for IT System Administrators working with VMware vSphere and its associated products in their company infrastructure. This course teaches you how to install and maintain this virtualization technology to store data, prevent vuln…
Suggested Courses

783 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question