Latest Posts

Updating Provisioning Server target agent in VMWare

U

A quick post – nothing ground breaking really but I encountered a customer at the start of this year who encountered this problem but couldn’t seem to find any information online to help so I thought I’d put some info up here. There are a number of other articles on the net that cover the same subject, I’ve included a few within this post. Provisioning server is a great product for reducing...

Access Gateway Enterprise – Disabling cookies prevents the secondary authentication field displaying

A

As expected this blog has gone a significant amount of time without update. This is mostly because I’ve not had anything particularly interesting to say. So yesterday an Access Gateway Enterprise question was posed to me so I thought I would run through it in case anyone else encounters the same problem. It may not be that interesting Issue A user reported that the secondary authentication...

Powershell – Part 2: Check ICA response, Check for exiestence of file and uptime of multiple remote servers

P

As always over time scripts get updated and evolve – bring a bit of a powershell novice my scripts could probably do with a great deal of evolution but here’s version 2 of the script I posted previously I imagine this will only really be interestng to me but I thoguht I’d post it anyway – no ones forcing you to read! (if someone is forcing you to read leave a comment and...

Powershell – Check ICA response, Check for exiestence of file and uptime of multiple remote servers

P

Following on my previous post I spent some time today refining our ability to check the ICA listener across the farm and created a little powershell script that I thought I’d share. It probably wont be much use to anyone else as it only does a few fairly specific checks but here it is. It’s by no means perfect but does what I need it to Script will: 1. output servers that do not...

The importance of encryption – Web Interface

T

The following is an extract from a document I wrote a while ago which was written to try and highlight the importance of encryption: I’ve played with this type of thing before but it I believe Firesheep, although it may be used with questionable motives, has highlighted to the world quite well the importance of securing your web traffic by creating an exploit packaged so that it can be used...

Ardbp32.bin Load Balancing – HTTP

A

Thought it was time for an update – This is something I’d previously written when implementing Provisioning Services 5.6 sp1 and XenServer 5.6 FP1 into a a reasonable sized Presentation Server 4.5 farm that wanted to move away from their currrent physical servers to embrace the wonders of virtualization. It’s been said before but load balancing TFTP is difficult, and as...

Stu Carroll

Citrix CTA & Director of Enterprise Technologies @ Coffee Cup Solutions

Get in touch

Need help? Get in touch

Secured By miniOrange