[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now


Importing ICAadm template to GPMC

Posted on 2015-01-03
Medium Priority
Last Modified: 2015-01-15
I have imported ICAadm template to GPMC, however I noticed the settings for citrix included in the template are not all as the once in the citrix AppCenter policies.
I mean there are many settings missing.

Any idea?

Thank you
Question by:jskfan
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 53

Assisted Solution

by:Will Szymkowski
Will Szymkowski earned 500 total points
ID: 40529703
For ICA ADM template it should be a straightforward import. Ensure that all steps have been done correctly. Link below illustrates all of the steps .


I personally like to keep my Citrix Policies and Domain Policies separate. This is to ensure consistancy throughout the Citrix Farm. You can also easily isolate individual servers with the Citrix policies.


Author Comment

ID: 40530076
The problem is not the import. I have already imported the template to GPMC.
I am talking about what settings the templates has is different what policies in Appcenter shows.
I mean if you open Citrix  Appcenter/policies and you create new policies, you will see in the right pane tons of policies that you can configure. In the template you import to GPMC there are not many. it is limited....
LVL 25

Accepted Solution

Sekar Chinnakannu earned 1000 total points
ID: 40530844
ICA adm files has limited policy settings only, mostly user for profile management and as you mentioned most of the policy are under app center wont be in adm. for more info details https://apttech.wordpress.com/2011/12/29/what-is-the-icaclient-adm-and-how-to-use-it/
Are your AD admin tools letting you down?

Managing Active Directory can get complicated.  Often, the native tools for managing AD are just not up to the task.  The largest Active Directory installations in the world have relied on one tool to manage their day-to-day administration tasks: Hyena. Start your trial today.


Author Comment

ID: 40530872
And citrix policies override AD policies......................I thought it was the other way around
LVL 25

Assisted Solution

by:Sekar Chinnakannu
Sekar Chinnakannu earned 1000 total points
ID: 40530883

Assisted Solution

milind_dr earned 500 total points
ID: 40532946
Hi jskfan,

Are you ICA ADM template for XenApp servers? it is meant for Client-Receiver setting. You have to follow below article.


Author Comment

ID: 40533589
I have downloaded that, when I tried to install it , it says a newer version is already install .


Author Closing Comment

ID: 40550875
Thank you

Featured Post

Problems using Powershell and Active Directory?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
Active Directory can easily get cluttered with unused service, user and computer accounts. In this article, I will show you the way I like to implement ADCleanup..
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question