Tuesday, November 3, 2015

Some Citrix stuff

1. What will happen if Data store down in Citrix?

If Data store is down then MetaFrame administrators will not be able to edit any configurations in

the Management Console such as publishing applications and new MetaFrame Presentation or

xenapp Servers cannot be added to the farm.

2. What are different load evaluators are available in Citrix?

Load evaluators managing the load and load balancing, we have Advance and default load

evaluators by default.

3. What is the requirement for Citrix server installation?

Os, terminal server, and citrix presentation or xenapp server dump.

4.  What are the query commands in Citrix?

1) qfarm

2) querydc

3) queryds

4) queryhr

5) qfarm /App………etc……..

5. What are the different ports uses in Citrix?

Function Ports

ICA (Default) TCP: 1494

IMA TCP: 2512

CMC TCP: 2513

SSL TCP: 443

STA (IIS) TCP: 80

TCP Browsing UDP: 1604

XML (Default) TCP: 80

Citrix License Management Console TCP: 8082

Presentation Server Licensing TCP: 27000

ICA session w/ Session Reliability enabled TCP: 2598

RDP 3389

Network Manager SNMP UDP: 161, 162

SQL(named pipes) TCP: 1443

Oracle 2049

6.  What will you check when any user is not able to launch Citrix application?

1) First we will identify it is single user issue or multiple users issue.

2) If it is multiple users issue launch same application from Citrix server (on which you installed and

published) if it is working on citrix servers or Xenapp servers then add same application to admin ID

and try to launch application thru client, if it is working for administrators then

3) Check user permissions for Applications.

4) if it is single user issue, then we will check the port 1494 form client PC, If it is open then

5) Verify that latest Citrix client software installed at user PC.

7.  How do you repair the IMA localhost cache?

The data store server must be available dsmaintrepairlhc command if fails to repair then we will

create new lhc file thrudsmaintrecreatelhccommand. If the data store is not available, the IMA

service cannot start.

8. What will happen if Citrix License server goes down?

If Citrix License Servers goes down, Citrix application will work until 720 hrs of basic grace period of

the Citrix License server. To know the grace period edit the license file in notepad and type GP= then

you will get the grace period of the license.

9. What is DC and DS

Data Collector:- Data collector is responsible to collect all dynamic information like user login

information, which server is having least load, number of active sessions and number of

disconnected sessions etc…

Data Store:- Data Store is a static collection of data like Server Farm Name, List of published

application, policies, servers in the farm, administrators of the farm and their rights, installable

packages, load balancing rulesect.. . All server farm configurations are maintained in the data store

which is only readable through the CMC. Data Store can be created on Oracle, IBM DB2, SQL, MSDE

and Access. Access is default (mf20.mdb). Access database or the MSDE database the method of

accessing the database is indirect. For all other databases it is direct.

10. What is IMA and what is  ICA

Independent Management Architecture:– It runs as a service. It is a collection of subsystems (*.dll) that

communicate with each other to provide the services/ functions of the Presentation Server. It uses two

ports – 2512 and 2513. 2512 is used as a port for communication between servers and 2513 is used as a

port to communicate with the CMC.

Or

Independent Management Architecture is configuration database which holds static data.

Independent Computing Architecture:-ICA is communication protocol between client and xenapp

servers.

11. What are the parameter of Resource Manager

Resources manager database summary, realtime monitoring, creating historical reports, billing

reports, alerts, report center and dashboards, calculating summary database sign

12. What is Farm

Collection of servers sharing the same data store

13. What is Zone

Logical subgrouping of xenapp servers in a farm.

14. Web interface process

1. A user launches a Web browser then connects to Web Interface.

1. The Web Interface returns the logon page.

1. The user types in credentials.

1. The user’s credentials are forwarded from XML then to IMA service in HTTP (or HTTPS) form.

1. The IMA then forwards them to local Lsass.exe.

1. The Lsass.exe encrypts the credentials then passes them to the domain controller.

1. The domain controller returns the SIDs (user’s SID and the list of group SIDs) back to Lsass.exe and to IMA.

1. IMA used the SIDs to search the Local Host Cache (LHC) for a list of applications and the Worker Group

Preference policy for that authenticated user.

1. The list of the applications together with the user’s worker group preference policy are returned to the Web

Interface.

1. The Web Interface returns the web page to the web browser. (This completes the application enumeration

process).

The application launch process is as follows:

1. User selects the application by clicking the application icon (such as Microsoft Word).

1. The selected application data (Microsoft Word) is passed back to Web Interface.

1. Web Interface passes the Microsoft Word information together with the user’s Worker Group Preference

policy back to Web Interface then to IMA on the XML broker server.

1. It then forwards to the IMA service on the Zone Data Collector.

1. The Zone Data Collector tries to find out a least loaded server according to the Worker Group preference list.

1. When it finds the least loaded server, it sends a query to the Citrix Service Manager of that server to verify

whether the server has the required application installed, if the answer is yes, it then provides this server’s

host ID to the XML broker.

1. The XML broker translates this host ID into it’s IP address by searching the Local Host Cache.

1. The IP address is then provided to Web Interface (this completes the application resolution).

1. Web Interface uses this IP address to create the ICA file.

1. The ICA file is then returned to Web browser on the client machine.

1. Citrix online Web plug-in uses the ICA file to launch an ICA connection to the least loaded XenApp server.

1. The XenApp server launches the application for the user

15. Differences between 4.0 and 4.5

1. IMA encryption

2. Configuration login

3. Farm settings, application publishing etc.. have been moved to CMC to AMC console

4. Load throttling feature has been added

5. Appearance has been changed from java to .net.

6. Application streaming.

7. Health monitoring and recovery..etc…

16. Error:  ICA File Not Found

Users may receive the ICA File Not Found error when launching published applications through

NFuse (Web Interface).

The following scenarios are known to produce the ICA File Not Found error:

1.  Web pages are served with HTTPS and client can not save encrypted pages to disk

When a user clicks an application icon, the launch.ica file is downloaded from the web server

and then executed by the local ICA client. If the NFuse web server is using SSL (https://...) and

your browser is configured not to save encrypted pages to disk, the launch.ica file can not be

written to disk and the ICA client has no file to open.

To resolve this issue, at the client machine:

 In Internet Explorer select go Tools > Internet Options

 Select the Advanced tab Beneath the Security section of options, uncheck the option called Do

Not save encrypted pages to disk

2. Excessive internet cache

On Windows computers with large hard drives, the Temporary Internet Files folder used by

Internet Explorer can become excessively large, causing too much of a delay in the time required

to save the launch.ica file and then retrieve it for use by the ICA client.

To resolve this isue, clear the browser cache:

 In Internet Explorer select go Tools > Internet Options

 Select the General tab

 In the Temporary Internet files section of options, click the Delete Files button.

17. How to change XML port number

 Open a ‘Command Prompt’ window

 Run ctxxmlss /r[Port Number] (Notice that there is no space between the switch “/r” and the port

number.

18. How do I remove a dead server from the Citrix Management Console?

dscheck /full servers Hostname /deleteall

19. Changing Farm Membership of Servers 

Using chfarm

Executing chfarm

Executing chfarm does the following on the host server:

1. Attempts to remove the server from the farm.

2. Stops the IMA service.

3. Uninstalls the IMA service and removes the local IMA settings.

4. Executes the IMA installation component of the MetaFrame XP installation program. The Setup

program is a wizard that gathers farm configuration information:

 Data store setup includes the choices Create a new server farm or Join an existing server farm.

 To create a new server farm, the Data Store Configuration page presents options for the data

store database.

 To join an existing server farm, the Data Store Type page presents options for direct or indirect

connection to the data store.

 When creating a new server farm, you enter the farm nSame. When joining an existing server

farm, you enter the information necessary to connect to the farm data store.

 The wizard asks for the name of the zone in which to install the server.

5. Reinstalls and starts the IMA service.

19. Creating isolation environment.

For each application you want to isolate you need to create a separate Isolation Environment. This is

done from “Isolation Environments” node in the Presentation Server Management Console. Right click

it, choose “New” and type in a name for your AIE. This only needs to be done once for each Server Farm.

You are now ready to either install or run an application in the AIE.

Installing into and Running from an AIE

There are two ways to install an application into an AIE. This can be done in an automated way via

Installation Manager or manually using the AIESETUP executable with the appropriate parameters.

Installing to an AIE through Installation Manager is pretty easy. Simply select the .MSI of .WFS file like

you would normally do and in the “Schedule Job” screen you now have the option to select in which

“Isolation Environment” you want to install the application to.

Using the AIESETUP command is a little more work but is the best way to really get familiar with AIE. The

syntax of this command is pretty easy. (Type AIESETUP /? to see the options.) In the following example I

will install Acrobat Reader into an AIE called “Acrobat Reader” with an Installer named

“c:\AdbeRdr70_enu.exe”.

AIESETUP "Acrobat Reader" c:\AdbeRdr70_enu.exe

The setup starts and I decide to install to C:\Program Files\Adobe\Acrobat 7.0\

I’m actually monitoring the C:\Program Files\ folder while the installation is taking place. I don’t see an

Adobe folder appearing. Also after the installation finishes successfully no Adobe folder is present under

C:\Program Files\. All Files and Registry have been redirected. Here’s the folder where the application

files actually are present:



The reason you see 3 folders here is because this application installs files outside the entered installation

path. This includes Shortcuts, Common Files, a couple of DLL’s in the Windows Folder, etc. This is proof

that everything an application tries to do is redirected and not only the installation path of an

application.

Now that the application has been installed, you need to run it. There are two ways this can be done:

 You can publish AIE applications

 You can run them via a special command line

Publishing an AIE application is fairly straightforward. You simply publish it through the Presentation

Server Console and in the “Specify what to publish” screen select “Isolate Application.” Then click on

settings, select the correct AIE, select “Application was installed into environment” and select the

appropriate shortcut from the dropdown menu. The rest is the same as “normal” application publishing.

Now you can run the application from a Citrix client.

The second way of running the application is through the AIERUN executable command. This is the way

you would run an AIE application from the console or .from a published desktop

To do this I run the application using the AIERUN executable command with a very long parameter:

AIERUN.EXE “Acrobat Reader” “C:\Program Files\Citrix\AIE\Acrobat Reader\Device\C\Program

Files\Adobe\Acrobat 7.0\Reader\Acrord32.exe”

If you want to provide your users access to this application from a published desktop then simply create

a shortcut to the AIERUN command as shown above.

The application starts. Now from within the application I browse (through File -> Open) to C:\Program

Files\ and here I see the Virtualized (redirected) folder Adobe.

From the regular Windows Explorer I still don’t see the Adobe folder under C:\Program Files\.

The Isolation Environment is actually a basic form of application virtualization since the AIE makes the

OS and the application executable think it’s running from its native location. (Notice I say it’s a “form” of

virtualization. It’s actually very different than “true” virtualization that companies like Softricity provide.)

Running a “normally” installed application in an AIE

The second way of working with AIE is to run a “normally” installed application in AIE. This can solve a

lot of multi-user application issues such as when an application stores user-specific settings in Local

Machine registry. AIE really can help you with these kinds of situations.

First of you have to create an AIE in the Presentation Server Console as mentioned earlier in which you

won’t install any application code. Then you can either publish the application or run it with the AIERUN

command. When publishing through the PSC in the “Specify what to publish” screen simply browse to

the already installed executable and then select in which AIE you want it to run.

For demonstration purposes I created an AIE named “User Settings Demo.” I published regedt32.exe

and selected the AIE “User Settings Demo.” Now I run the published application with an ICA Client from

the server console. I also start regedt32.exe from the server console. (Keep in mind that the Local

Machine registry is the same from the server console as from within a published application as long

you’re running on the same server, which I am.) During the logon script for the published application I

create two empty subkeys under HKLM\Software named “usersetting1” and “usersetting2”. This is what

a “bad” application could do during startup or while working with the application. The following is the

result:

The left is the registry editor running on the server console. The right is the registry editor running

through a published application on the same server .at the same time

The new registry keys I just created are actually saved in the user’s registry under

HKCU\Software\Citrix\AIE\%AIENAME% even though for the application they appear to be under the

HKLM\Software registry. This means machine settings are saved per user from now on and multiple

concurrent users on the same server can have different machine settings.

What will not work with ISOLATION?

AIE (Application Isolation Environment) is great, but of course there are limitations. (I think we will find

out in the field the hard way what the “real” limitations are.)

OS patches, drivers, and really deeply integrating applications probably won’t work, especially installing

into an AIE. (Although all application isolation, virtualization, and redirection software I’ve come across

have some sort of limitations like these.)

What can Isolation solve?

Application Conflicts

 Run multiple version of the same application

 Run multiple version of the same DLL

Multi User Issues

 Solves configuration issues with hard coded path to .INI files

 Solves configuration issues with HKLM registry keys

Give users more “virtual” rights to an application

20. What is presentation\ Xenapp server.

Citrix Metaframe Presentation Server is a technology that can allow remote users to connect to

applications that are actually installed on a remote computer. It uses a mix of technology that results in

that remote application looking and behaving just as though it was installed on the local machine.

Presentation Server is used to make applications available to users and can be managed and configured

centrally. The other features include load balancing, resource manager, network manager, installation

manager.

21. Function of the Local Host Cache

Each XenApp server stores a subset of the data store in the Local Host Cache (LHC). The LHC performs

two primary functions:

1. Permits a server to function in the absence of a connection to the data store.

2. Improves performance by caching information used by ICA Clients for enumeration and

application resolution.

The LHC is an Access database, Imalhc.mdb, stored, by default, in the

c:\ProgramFiles\Citrix\Independent Management Architecture folder.

The following information is contained in the local host cache:

All servers in the farm, and their basic information.

All applications published within the farm and their properties.

(Or)

All Windows network domain trust relationships within the farm.

All information specific to itself. (Product code, SNMP settings, licensing information)

On the first startup of the member server, the LHC is populated with a subset of information from the

data store. In future, the IMA service is responsible for keeping the LHC synchronized with the data

store. The IMA service performs this task through change notifications and periodic polling of the data

store.

If the data store is unreachable, the LHC contains enough information about the farm to allow normal

operations for an indefinite period of time, if necessary. However, no new static information can be

published, or added to the farm, until the farm data store is reachable and operational again.

22. Citrix commands

acrcfg - Configure auto reconnect settings

altaddr - Specify server alternate IP address

app - Run application execution shell

apputil - Add servers to Configured Servers list for published applications (FR3 Only)

auditlog - Generate server logon/logoff reports

change client - Change ICA Client device mapping

chfarm - Change the server farm membership of the server

clicense - Maintain MetaFrame XP licenses

cltprint - Set the number of ICA Client printer pipes

ctxxmlss - Change the XML Service port number

driveremap - Remap the server’s drive letters

dscheck - Validate the server farm’s data store’s integrity

dsmaint - Configure the server farm’s data store

dsverify - Clean errors in the farm’s data store

icaport - Configure TCP/IP port number

imaport - Change IMA ports

23. Xenapp server editions.

Presentation Server comes in three editions. They are:

1.  Standard – Application Management (presentation server) (not available in 6.0 and 6.5)

2.  Advanced – Application Management (presentation server)& Load Balancing

3.  Enterprise - Application Management (presentation server), Load Balancing, Installation

Manager, Resource Manager, Network Manager

4.  Platinum - Provides an end-to-end application delivery system for all Windows applications. It

includes all the features of the Enterprise Edition, including streaming enabled Client-side

Application Virtualization, and adds the fallowing capabilities that enhance security and auditing,

enable performance management.

1. Application Performance Monitoring powered by Citrix EdgeSight

2. Smart Access™, powered by Citrix Access Gateway™

3. Single Sign-On, powered by Citrix Password Manager™

4. Smart Auditor

5. EasyCall

Briefly, the various functions of the editions can be described as follows:

1. Application Management – Application Management is the core functionality of the

Presentation Server and is available across all its editions. It allows for deploying, configuring and

managing applications and making them available to multiple users. The feature has been enhanced

to also make single-user applications multi-user friendly.

2. Load Balancing – In Presentation Server, load balancing is the feature by which the user is

directed towards the least loaded server. The server load is calculated on a set of criteria that are

completely configurable by the administrators.

3. Installation Manager – It is the feature which is used to package and deploy applications to all

servers in a server farm

4. Resource Manager – It is the enhanced version of the Windows Server Performance Monitor.

Apart from monitoring the CPU, Memory and Page File usage, the Presentation Server Resource

Manager also tracks things like disk space, network cards, and connection to the data store etc. All

the monitoring data can be collected for trend analysis in a database.

5. Network Manager – It is just a plug-in to other network manager tools like HP OpenView.

6. Application Performance Monitoring, for visibility into the access experience. Powered by Citrix

EdgeSight software, the monitoring capabilities in XenApp enable IT to pinpoint quickly and

troubleshoot server, network and application issues impacting the user experience.

7. SmartAccess, for access security and control. Powered by the Citrix Access Gateway product line

of SSL VPN appliances, SmartAccess™ provides granular access control policies and integrated

endpoint analysis.

8.  Single Sign-On, for strongest application security. Secure logons to desktop and virtualized

applications with Single Sign-On, powered by Citrix Password Manager. Withautomated

application logons, password policy control, and self-service password reset, you can enhance

the security ofall password-protected Windows applications delivered by XenApp.

9. SmartAuditor, provides session recording for ensuring regulatory compliance and improving risk

management.

SmartAuditor uses flexible, customer-driven policies to triggerrecordings of XenApp sessions

automatically. IT can now monitor and examine user activity, demonstrate internalcontrol, ensure

regulatory compliance and conduct successful security audits of applications – including financial

operations and healthcare patient information systems.SmartAuditor also improves technical

support through fasterproblem identification and time-to-resolution

10. EasyCall, for communication-enabling applications. Imagineproviding remote communications

capability without having to install and support softphones. EasyCall, powered by the Citrix

EasyCall Gateway, enables users to click on anytelephone number, look-up anyone in the

directory, or justtype in a number and make a call using the regular telephone network. Users

specify the originating phone number that EasyCall will call before making the outbound call to

the desired party.

To provide any or all the above functionality of the Presentation Server, the following

components may or may not be required (the requirement of the component depends upon the

functionality that is to be provided):

1. Presentation Server

2. Presentation Server Clients (Program Neighborhood, Program Neighborhood Agent,

Web Client, Java Client)

3. Web Interface Server

4. Data Store Server (may be on the same server as the Presentation Server but not

preferred)

5. License Server (may be on the same server as the Presentation Server but not preferred)

The above components of the Presentation Server can be managed by the following tools:

1. Citrix Management Console – Used to publish applications, delegate administrators, define load

balancing parameters, deploy packed applications, configure policies, track the resource usage of

the servers in a server farm. All the configuration made through the Citrix Management console is

stored in a data store. This console can be installed on any workstation and used by the

administrator.

2. Access Suite Console – It is a java based console. This console is primarily used to view alerts

generated by applications and server, configure web interface server, configure program

neighborhood Agent and Conference Manager. This is an integrated console for monitoring all the

products of the Citrix Access Suite from a single console. This console can be installed on any

workstation and used by the administrator.

3. ICA Toolbar – It is a collection of tools which allow the administrator to configure farm wide

settings. Client update database, connection configuration tool, Shadow Taskbar etc are made

available to the administrator through this toolbar.

4. License Management Console - Used to manage licenses being used by the various products of

the Citrix Access Suite Console.

Before we proceed further with the detailed discussion on the features of Presentation Server it is

mandatory to explain certain terms and concepts of Citrix Technology. Following is a brief

description of the same

24. What is Client Lock Down

Lockdown greatly enhances security by preventing unauthorized executables from running on

your Terminal Servers

25. What is Speed Screen

Use this toll to configure local text echo, it improves user preforms in low networks

26.  What is Printer driver replicationa and mapping

Two different printers can use same drivers, we can use drivemapping to reduce number driver

copies in citrix server

27. What is the requirement of Installation Manager and what kind of extension its 

support.

Installation manager is a tool where we can distribute simple applications, hot fixes, patches,

and file/registry updates

It supports extensions like ADF, MSI and MSP

28. What do you mean by Content Redirection in Citrix?

 It allows us to specify whether clients open published contact, applications, browsers and

media players locally or remotely. There are two types of content redirection: From server to

Client and from client to Server.

Server to Client redirection: When we enable It, Embedded URLs are intercepted on the server

running MFPS and sent to the Client using the ICA Control virtual Channel. The user’s locally

installed browser is used to play the URL. Users cannot disable this feature.

Note: If the client device fails to connect to a URL, the URL is redirected back to the server.

Client to Server Redirections: When we enables it. Users running the ICA Win32 PN Agent open

all files of the associated type encountered in locally running applications with applications

published on the server. We must use the Web Interface to allow users to connect to published

applications with the PN Agent.

Note: Content Redirection from client to server is available only with MFPS Advanced or

Enterprise Editions. Not working on MFPS Standard version.

29. What is ICA file? What it contents? Where is it located?

A text file(.ica) containing information about a published application. ICA files are written in

Windows Ini files format and organize published application information in a standard way that

MFPS Clients can interpret. When a client receives an ICA file, It initializes a session running the

specified application on the server specified in the file.

30. What is Citrix SSL Relay?

A Windows service that runs on a server to support an SSL, secure connection between a server

running the Web Interface for MFPS and a server running MFPS.

31. Citrix force removal command.

msiexec /x MPS.msi /l*v c:\output.log CTX_MF_FORCE_SUBSYSTEM_UNINSTALL=Yes

You need to execute this command where MPS.msi file location.

To uninstall, complete the following steps:

1. Exit all applications running on the server.

1. Select Start>Control Panel>Add/Remove Programs.

1. Select Change or Remove Programs.

1. Select Citrix Presentation Server.

1. Select Change.

1. Select Remove in the Application Maintenance Wizard that appears and follow the onscreen

instructions.

Citrix recommends that you uninstall the Citrix Server and its components in the following

order:

a. Citrix Presentation Server—Presentation Server Reports.

b. Citrix Access Management Console—Presentation Server Report Center.

c. All Citrix Access Management Console extensions, as follows:

        Citrix Access Management Console—Diagnostics

        Citrix Access Management Console—Hotfix Management

        Citrix Access Management Console Knowledge Base

        Citrix Access Management Console Legacy Tools

        Citrix Access Management Console—Web Interface

d. Citrix Presentation Server Administration Snap-In.

e. Citrix License Server Administration.

f. Citrix Access Management Console Framework.

g. Presentation Server Console, which is also known as the Management Console for

Presentation Server.

h. Citrix Presentation Server.

i. Citrix Web Interface.

j. Citrix Licensing.

k. Citrix Presentation Server Document Center, if installed.

1. Stop and disable all Citrix services.

1. Open Computer Management > Local Users and Groups and delete all local user accounts

created by Citrix during the installation such as, Anon000…Anon014, CTX_SmaUser, and

ctx_cpsvcuser.

1. Search the drive for the following Citrix files and delete them:

CDM

CTX **see note below

ICA

IMA

MF

MFXP

If there is a question about whether or not the file belongs to Citrix, view the Version tab within

the property settings of the file. When in doubt, it is better not to delete the file.

Note: One of the CTX prefixed files is the CTXGina.dll. Once deleted, you must go to the Registry

and locate the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows

NT\CurrentVersion\Winlogon key and delete the two REG_SZ keys for GinaDLL and CtxGinaDll.

When you reboot the computer, the system then defaults to the msgina. By default, these keys

do not exist before the installation of Presentation Server.

1. Delete the following items in the registry using Regedt32.exe (take ownership of subkeys if

required):

HKEY_CURRENT_USER\SOFTWARE\Citrix

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Star

t Menu\Programs\Citrix

HKEY_LOCAL_MACHINE\SOFTWARE\Citrix (x32)

HKEY_LOCAL_MACHINE\SOFTWARE\W0w6432Node\Citrix (x64)

HKEY_LOCAL_MACHINE\SOFTWARE\Citrix Systems, Inc.

HKEY_LOCAL_MACHINE\SOFTWARE\citrixservices

HKEY_LOCAL_MACHINE\SOFTWARE\FLEXlm License Manager\CitrixLicensing

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\(folders labeled with Citrix, IMACOM, MetaFrame,

and ImUtil)

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\control\citrix

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\control\citrixservices

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ADF Installer

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\CdfSvc

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Cdm

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\CdmService

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Citrix*

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ctx*

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\CPSVC

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ICABrowser

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\IcaCDD

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\icareduc

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\IMAAdvanceSrv

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\imaservice

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MetaFrameXP

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MFCom

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PDCOMP

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pdcrypt1

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pdcrypt2

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pdframe

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PDRELI

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pdrframe

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PnSson

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RadeSvc

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ResourceManagerMail

1. Edit the computer environment variables and remove Citrix references from paths. Then run the

Autoruns utility from Microsoft Sysinternals and remove all references to Citrix and restart the

server.

1. Delete the following folders, if present:

\Programs Files\Citrix

\Programs Files\Common Files\Citrix

\Windows\System32\Citrix

\Documents and Settings\All Users\Start Menu\Programs\Citrix

1. Search the drive for *.del* and delete all files marked for deletion.

Note: When you attempt to delete some files, you might receive the following error message:

“Cannot delete file: The specified file is being used by Windows.”

1. Restart the server before you reinstall Presentation Server. When you delete all the files and

registry entries listed in the previous step, new installation proceeds normally. Restart the

server.

1. Ensure that all Citrix programs and software are effectively removed from Control Panel > Add

or Remove Programs. If Citrix components still appear, download and run the Windows Installer

Cleanup utility from Microsoft.

1. Verify if any Citrix services still appear. If so, use the sc command to remove them.

For example: sc delete “1. What will happen if Data store down in Citrix?

If Data store is down then MetaFrame administrators will not be able to edit any configurations in

the Management Console such as publishing applications and new MetaFrame Presentation or

xenapp Servers cannot be added to the farm.

2. What are different load evaluators are available in Citrix?

Load evaluators managing the load and load balancing, we have Advance and default load

evaluators by default.

3. What is the requirement for Citrix server installation?

Os, terminal server, and citrix presentation or xenapp server dump.

4.  What are the query commands in Citrix?

1) qfarm

2) querydc

3) queryds

4) queryhr

5) qfarm /App………etc……..

5. What are the different ports uses in Citrix?

Function Ports

ICA (Default) TCP: 1494

IMA TCP: 2512

CMC TCP: 2513

SSL TCP: 443

STA (IIS) TCP: 80

TCP Browsing UDP: 1604

XML (Default) TCP: 80

Citrix License Management Console TCP: 8082

Presentation Server Licensing TCP: 27000

ICA session w/ Session Reliability enabled TCP: 2598

RDP 3389

Network Manager SNMP UDP: 161, 162

SQL(named pipes) TCP: 1443

Oracle 2049

6.  What will you check when any user is not able to launch Citrix application?

1) First we will identify it is single user issue or multiple users issue.

2) If it is multiple users issue launch same application from Citrix server (on which you installed and

published) if it is working on citrix servers or Xenapp servers then add same application to admin ID

and try to launch application thru client, if it is working for administrators then

3) Check user permissions for Applications.

4) if it is single user issue, then we will check the port 1494 form client PC, If it is open then

5) Verify that latest Citrix client software installed at user PC.

7.  How do you repair the IMA localhost cache?

The data store server must be available dsmaintrepairlhc command if fails to repair then we will

create new lhc file thrudsmaintrecreatelhccommand. If the data store is not available, the IMA

service cannot start.

8. What will happen if Citrix License server goes down?

If Citrix License Servers goes down, Citrix application will work until 720 hrs of basic grace period of

the Citrix License server. To know the grace period edit the license file in notepad and type GP= then

you will get the grace period of the license.

9. What is DC and DS

Data Collector:- Data collector is responsible to collect all dynamic information like user login

information, which server is having least load, number of active sessions and number of

disconnected sessions etc…

Data Store:- Data Store is a static collection of data like Server Farm Name, List of published

application, policies, servers in the farm, administrators of the farm and their rights, installable

packages, load balancing rulesect.. . All server farm configurations are maintained in the data store

which is only readable through the CMC. Data Store can be created on Oracle, IBM DB2, SQL, MSDE

and Access. Access is default (mf20.mdb). Access database or the MSDE database the method of

accessing the database is indirect. For all other databases it is direct.

10. What is IMA and what is  ICA

Independent Management Architecture:– It runs as a service. It is a collection of subsystems (*.dll) that

communicate with each other to provide the services/ functions of the Presentation Server. It uses two

ports – 2512 and 2513. 2512 is used as a port for communication between servers and 2513 is used as a

port to communicate with the CMC.

Or

Independent Management Architecture is configuration database which holds static data.

Independent Computing Architecture:-ICA is communication protocol between client and xenapp

servers.

11. What are the parameter of Resource Manager

Resources manager database summary, realtime monitoring, creating historical reports, billing

reports, alerts, report center and dashboards, calculating summary database sign

12. What is Farm

Collection of servers sharing the same data store

13. What is Zone

Logical subgrouping of xenapp servers in a farm.

14. Web interface process

1. A user launches a Web browser then connects to Web Interface.

1. The Web Interface returns the logon page.

1. The user types in credentials.

1. The user’s credentials are forwarded from XML then to IMA service in HTTP (or HTTPS) form.

1. The IMA then forwards them to local Lsass.exe.

1. The Lsass.exe encrypts the credentials then passes them to the domain controller.

1. The domain controller returns the SIDs (user’s SID and the list of group SIDs) back to Lsass.exe and to IMA.

1. IMA used the SIDs to search the Local Host Cache (LHC) for a list of applications and the Worker Group

Preference policy for that authenticated user.

1. The list of the applications together with the user’s worker group preference policy are returned to the Web

Interface.

1. The Web Interface returns the web page to the web browser. (This completes the application enumeration

process).

The application launch process is as follows:

1. User selects the application by clicking the application icon (such as Microsoft Word).

1. The selected application data (Microsoft Word) is passed back to Web Interface.

1. Web Interface passes the Microsoft Word information together with the user’s Worker Group Preference

policy back to Web Interface then to IMA on the XML broker server.

1. It then forwards to the IMA service on the Zone Data Collector.

1. The Zone Data Collector tries to find out a least loaded server according to the Worker Group preference list.

1. When it finds the least loaded server, it sends a query to the Citrix Service Manager of that server to verify

whether the server has the required application installed, if the answer is yes, it then provides this server’s

host ID to the XML broker.

1. The XML broker translates this host ID into it’s IP address by searching the Local Host Cache.

1. The IP address is then provided to Web Interface (this completes the application resolution).

1. Web Interface uses this IP address to create the ICA file.

1. The ICA file is then returned to Web browser on the client machine.

1. Citrix online Web plug-in uses the ICA file to launch an ICA connection to the least loaded XenApp server.

1. The XenApp server launches the application for the user

15. Differences between 4.0 and 4.5

1. IMA encryption

2. Configuration login

3. Farm settings, application publishing etc.. have been moved to CMC to AMC console

4. Load throttling feature has been added

5. Appearance has been changed from java to .net.

6. Application streaming.

7. Health monitoring and recovery..etc…

16. Error:  ICA File Not Found

Users may receive the ICA File Not Found error when launching published applications through

NFuse (Web Interface).

The following scenarios are known to produce the ICA File Not Found error:

1.  Web pages are served with HTTPS and client can not save encrypted pages to disk

When a user clicks an application icon, the launch.ica file is downloaded from the web server

and then executed by the local ICA client. If the NFuse web server is using SSL (https://...) and

your browser is configured not to save encrypted pages to disk, the launch.ica file can not be

written to disk and the ICA client has no file to open.

To resolve this issue, at the client machine:

 In Internet Explorer select go Tools > Internet Options

 Select the Advanced tab Beneath the Security section of options, uncheck the option called Do

Not save encrypted pages to disk

2. Excessive internet cache

On Windows computers with large hard drives, the Temporary Internet Files folder used by

Internet Explorer can become excessively large, causing too much of a delay in the time required

to save the launch.ica file and then retrieve it for use by the ICA client.

To resolve this isue, clear the browser cache:

 In Internet Explorer select go Tools > Internet Options

 Select the General tab

 In the Temporary Internet files section of options, click the Delete Files button.

17. How to change XML port number

 Open a ‘Command Prompt’ window

 Run ctxxmlss /r[Port Number] (Notice that there is no space between the switch “/r” and the port

number.

18. How do I remove a dead server from the Citrix Management Console?

dscheck /full servers Hostname /deleteall

19. Changing Farm Membership of Servers

Using chfarm

Executing chfarm

Executing chfarm does the following on the host server:

1. Attempts to remove the server from the farm.

2. Stops the IMA service.

3. Uninstalls the IMA service and removes the local IMA settings.

4. Executes the IMA installation component of the MetaFrame XP installation program. The Setup

program is a wizard that gathers farm configuration information:

 Data store setup includes the choices Create a new server farm or Join an existing server farm.

 To create a new server farm, the Data Store Configuration page presents options for the data

store database.

 To join an existing server farm, the Data Store Type page presents options for direct or indirect

connection to the data store.

 When creating a new server farm, you enter the farm nSame. When joining an existing server

farm, you enter the information necessary to connect to the farm data store.

 The wizard asks for the name of the zone in which to install the server.

5. Reinstalls and starts the IMA service.

19. Creating isolation environment.

For each application you want to isolate you need to create a separate Isolation Environment. This is

done from “Isolation Environments” node in the Presentation Server Management Console. Right click

it, choose “New” and type in a name for your AIE. This only needs to be done once for each Server Farm.

You are now ready to either install or run an application in the AIE.

Installing into and Running from an AIE

There are two ways to install an application into an AIE. This can be done in an automated way via

Installation Manager or manually using the AIESETUP executable with the appropriate parameters.

Installing to an AIE through Installation Manager is pretty easy. Simply select the .MSI of .WFS file like

you would normally do and in the “Schedule Job” screen you now have the option to select in which

“Isolation Environment” you want to install the application to.

Using the AIESETUP command is a little more work but is the best way to really get familiar with AIE. The

syntax of this command is pretty easy. (Type AIESETUP /? to see the options.) In the following example I

will install Acrobat Reader into an AIE called “Acrobat Reader” with an Installer named

“c:\AdbeRdr70_enu.exe”.

AIESETUP "Acrobat Reader" c:\AdbeRdr70_enu.exe

The setup starts and I decide to install to C:\Program Files\Adobe\Acrobat 7.0\

I’m actually monitoring the C:\Program Files\ folder while the installation is taking place. I don’t see an

Adobe folder appearing. Also after the installation finishes successfully no Adobe folder is present under

C:\Program Files\. All Files and Registry have been redirected. Here’s the folder where the application

files actually are present:



The reason you see 3 folders here is because this application installs files outside the entered installation

path. This includes Shortcuts, Common Files, a couple of DLL’s in the Windows Folder, etc. This is proof

that everything an application tries to do is redirected and not only the installation path of an

application.

Now that the application has been installed, you need to run it. There are two ways this can be done:

 You can publish AIE applications

 You can run them via a special command line

Publishing an AIE application is fairly straightforward. You simply publish it through the Presentation

Server Console and in the “Specify what to publish” screen select “Isolate Application.” Then click on

settings, select the correct AIE, select “Application was installed into environment” and select the

appropriate shortcut from the dropdown menu. The rest is the same as “normal” application publishing.

Now you can run the application from a Citrix client.

The second way of running the application is through the AIERUN executable command. This is the way

you would run an AIE application from the console or .from a published desktop

To do this I run the application using the AIERUN executable command with a very long parameter:

AIERUN.EXE “Acrobat Reader” “C:\Program Files\Citrix\AIE\Acrobat Reader\Device\C\Program

Files\Adobe\Acrobat 7.0\Reader\Acrord32.exe”

If you want to provide your users access to this application from a published desktop then simply create

a shortcut to the AIERUN command as shown above.

The application starts. Now from within the application I browse (through File -> Open) to C:\Program

Files\ and here I see the Virtualized (redirected) folder Adobe.

From the regular Windows Explorer I still don’t see the Adobe folder under C:\Program Files\.

The Isolation Environment is actually a basic form of application virtualization since the AIE makes the

OS and the application executable think it’s running from its native location. (Notice I say it’s a “form” of

virtualization. It’s actually very different than “true” virtualization that companies like Softricity provide.)

Running a “normally” installed application in an AIE

The second way of working with AIE is to run a “normally” installed application in AIE. This can solve a

lot of multi-user application issues such as when an application stores user-specific settings in Local

Machine registry. AIE really can help you with these kinds of situations.

First of you have to create an AIE in the Presentation Server Console as mentioned earlier in which you

won’t install any application code. Then you can either publish the application or run it with the AIERUN

command. When publishing through the PSC in the “Specify what to publish” screen simply browse to

the already installed executable and then select in which AIE you want it to run.

For demonstration purposes I created an AIE named “User Settings Demo.” I published regedt32.exe

and selected the AIE “User Settings Demo.” Now I run the published application with an ICA Client from

the server console. I also start regedt32.exe from the server console. (Keep in mind that the Local

Machine registry is the same from the server console as from within a published application as long

you’re running on the same server, which I am.) During the logon script for the published application I

create two empty subkeys under HKLM\Software named “usersetting1” and “usersetting2”. This is what

a “bad” application could do during startup or while working with the application. The following is the

result:

The left is the registry editor running on the server console. The right is the registry editor running

through a published application on the same server .at the same time

The new registry keys I just created are actually saved in the user’s registry under

HKCU\Software\Citrix\AIE\%AIENAME% even though for the application they appear to be under the

HKLM\Software registry. This means machine settings are saved per user from now on and multiple

concurrent users on the same server can have different machine settings.

What will not work with ISOLATION?

AIE (Application Isolation Environment) is great, but of course there are limitations. (I think we will find

out in the field the hard way what the “real” limitations are.)

OS patches, drivers, and really deeply integrating applications probably won’t work, especially installing

into an AIE. (Although all application isolation, virtualization, and redirection software I’ve come across

have some sort of limitations like these.)

What can Isolation solve?

Application Conflicts

 Run multiple version of the same application

 Run multiple version of the same DLL

Multi User Issues

 Solves configuration issues with hard coded path to .INI files

 Solves configuration issues with HKLM registry keys

Give users more “virtual” rights to an application

20. What is presentation\ Xenapp server.

Citrix Metaframe Presentation Server is a technology that can allow remote users to connect to

applications that are actually installed on a remote computer. It uses a mix of technology that results in

that remote application looking and behaving just as though it was installed on the local machine.

Presentation Server is used to make applications available to users and can be managed and configured

centrally. The other features include load balancing, resource manager, network manager, installation

manager.

21. Function of the Local Host Cache

Each XenApp server stores a subset of the data store in the Local Host Cache (LHC). The LHC performs

two primary functions:

1. Permits a server to function in the absence of a connection to the data store.

2. Improves performance by caching information used by ICA Clients for enumeration and

application resolution.

The LHC is an Access database, Imalhc.mdb, stored, by default, in the

c:\ProgramFiles\Citrix\Independent Management Architecture folder.

The following information is contained in the local host cache:

All servers in the farm, and their basic information.

All applications published within the farm and their properties.

(Or)

All Windows network domain trust relationships within the farm.

All information specific to itself. (Product code, SNMP settings, licensing information)

On the first startup of the member server, the LHC is populated with a subset of information from the

data store. In future, the IMA service is responsible for keeping the LHC synchronized with the data

store. The IMA service performs this task through change notifications and periodic polling of the data

store.

If the data store is unreachable, the LHC contains enough information about the farm to allow normal

operations for an indefinite period of time, if necessary. However, no new static information can be

published, or added to the farm, until the farm data store is reachable and operational again.

22. Citrix commands

acrcfg - Configure auto reconnect settings

altaddr - Specify server alternate IP address

app - Run application execution shell

apputil - Add servers to Configured Servers list for published applications (FR3 Only)

auditlog - Generate server logon/logoff reports

change client - Change ICA Client device mapping

chfarm - Change the server farm membership of the server

clicense - Maintain MetaFrame XP licenses

cltprint - Set the number of ICA Client printer pipes

ctxxmlss - Change the XML Service port number

driveremap - Remap the server’s drive letters

dscheck - Validate the server farm’s data store’s integrity

dsmaint - Configure the server farm’s data store

dsverify - Clean errors in the farm’s data store

icaport - Configure TCP/IP port number

imaport - Change IMA ports

23. Xenapp server editions.

Presentation Server comes in three editions. They are:

1.  Standard – Application Management (presentation server) (not available in 6.0 and 6.5)

2.  Advanced – Application Management (presentation server)& Load Balancing

3.  Enterprise - Application Management (presentation server), Load Balancing, Installation

Manager, Resource Manager, Network Manager

4.  Platinum - Provides an end-to-end application delivery system for all Windows applications. It

includes all the features of the Enterprise Edition, including streaming enabled Client-side

Application Virtualization, and adds the fallowing capabilities that enhance security and auditing,

enable performance management.

1. Application Performance Monitoring powered by Citrix EdgeSight

2. Smart Access™, powered by Citrix Access Gateway™

3. Single Sign-On, powered by Citrix Password Manager™

4. Smart Auditor

5. EasyCall

Briefly, the various functions of the editions can be described as follows:

1. Application Management – Application Management is the core functionality of the

Presentation Server and is available across all its editions. It allows for deploying, configuring and

managing applications and making them available to multiple users. The feature has been enhanced

to also make single-user applications multi-user friendly.

2. Load Balancing – In Presentation Server, load balancing is the feature by which the user is

directed towards the least loaded server. The server load is calculated on a set of criteria that are

completely configurable by the administrators.

3. Installation Manager – It is the feature which is used to package and deploy applications to all

servers in a server farm

4. Resource Manager – It is the enhanced version of the Windows Server Performance Monitor.

Apart from monitoring the CPU, Memory and Page File usage, the Presentation Server Resource

Manager also tracks things like disk space, network cards, and connection to the data store etc. All

the monitoring data can be collected for trend analysis in a database.

5. Network Manager – It is just a plug-in to other network manager tools like HP OpenView.

6. Application Performance Monitoring, for visibility into the access experience. Powered by Citrix

EdgeSight software, the monitoring capabilities in XenApp enable IT to pinpoint quickly and

troubleshoot server, network and application issues impacting the user experience.

7. SmartAccess, for access security and control. Powered by the Citrix Access Gateway product line

of SSL VPN appliances, SmartAccess™ provides granular access control policies and integrated

endpoint analysis.

8.  Single Sign-On, for strongest application security. Secure logons to desktop and virtualized

applications with Single Sign-On, powered by Citrix Password Manager. Withautomated

application logons, password policy control, and self-service password reset, you can enhance

the security ofall password-protected Windows applications delivered by XenApp.

9. SmartAuditor, provides session recording for ensuring regulatory compliance and improving risk

management.

SmartAuditor uses flexible, customer-driven policies to triggerrecordings of XenApp sessions

automatically. IT can now monitor and examine user activity, demonstrate internalcontrol, ensure

regulatory compliance and conduct successful security audits of applications – including financial

operations and healthcare patient information systems.SmartAuditor also improves technical

support through fasterproblem identification and time-to-resolution

10. EasyCall, for communication-enabling applications. Imagineproviding remote communications

capability without having to install and support softphones. EasyCall, powered by the Citrix

EasyCall Gateway, enables users to click on anytelephone number, look-up anyone in the

directory, or justtype in a number and make a call using the regular telephone network. Users

specify the originating phone number that EasyCall will call before making the outbound call to

the desired party.

To provide any or all the above functionality of the Presentation Server, the following

components may or may not be required (the requirement of the component depends upon the

functionality that is to be provided):

1. Presentation Server

2. Presentation Server Clients (Program Neighborhood, Program Neighborhood Agent,

Web Client, Java Client)

3. Web Interface Server

4. Data Store Server (may be on the same server as the Presentation Server but not

preferred)

5. License Server (may be on the same server as the Presentation Server but not preferred)

The above components of the Presentation Server can be managed by the following tools:

1. Citrix Management Console – Used to publish applications, delegate administrators, define load

balancing parameters, deploy packed applications, configure policies, track the resource usage of

the servers in a server farm. All the configuration made through the Citrix Management console is

stored in a data store. This console can be installed on any workstation and used by the

administrator.

2. Access Suite Console – It is a java based console. This console is primarily used to view alerts

generated by applications and server, configure web interface server, configure program

neighborhood Agent and Conference Manager. This is an integrated console for monitoring all the

products of the Citrix Access Suite from a single console. This console can be installed on any

workstation and used by the administrator.

3. ICA Toolbar – It is a collection of tools which allow the administrator to configure farm wide

settings. Client update database, connection configuration tool, Shadow Taskbar etc are made

available to the administrator through this toolbar.

4. License Management Console - Used to manage licenses being used by the various products of

the Citrix Access Suite Console.

Before we proceed further with the detailed discussion on the features of Presentation Server it is

mandatory to explain certain terms and concepts of Citrix Technology. Following is a brief

description of the same

24. What is Client Lock Down

Lockdown greatly enhances security by preventing unauthorized executables from running on

your Terminal Servers

25. What is Speed Screen

Use this toll to configure local text echo, it improves user preforms in low networks

26.  What is Printer driver replicationa and mapping

Two different printers can use same drivers, we can use drivemapping to reduce number driver

copies in citrix server

27. What is the requirement of Installation Manager and what kind of extension its

support.

Installation manager is a tool where we can distribute simple applications, hot fixes, patches,

and file/registry updates

It supports extensions like ADF, MSI and MSP

28. What do you mean by Content Redirection in Citrix?

 It allows us to specify whether clients open published contact, applications, browsers and

media players locally or remotely. There are two types of content redirection: From server to

Client and from client to Server.

Server to Client redirection: When we enable It, Embedded URLs are intercepted on the server

running MFPS and sent to the Client using the ICA Control virtual Channel. The user’s locally

installed browser is used to play the URL. Users cannot disable this feature.

Note: If the client device fails to connect to a URL, the URL is redirected back to the server.

Client to Server Redirections: When we enables it. Users running the ICA Win32 PN Agent open

all files of the associated type encountered in locally running applications with applications

published on the server. We must use the Web Interface to allow users to connect to published

applications with the PN Agent.

Note: Content Redirection from client to server is available only with MFPS Advanced or

Enterprise Editions. Not working on MFPS Standard version.

29. What is ICA file? What it contents? Where is it located?

A text file(.ica) containing information about a published application. ICA files are written in

Windows Ini files format and organize published application information in a standard way that

MFPS Clients can interpret. When a client receives an ICA file, It initializes a session running the

specified application on the server specified in the file.

30. What is Citrix SSL Relay?

A Windows service that runs on a server to support an SSL, secure connection between a server

running the Web Interface for MFPS and a server running MFPS.

31. Citrix force removal command.

msiexec /x MPS.msi /l*v c:\output.log CTX_MF_FORCE_SUBSYSTEM_UNINSTALL=Yes

You need to execute this command where MPS.msi file location.

To uninstall, complete the following steps:

1. Exit all applications running on the server.

1. Select Start>Control Panel>Add/Remove Programs.

1. Select Change or Remove Programs.

1. Select Citrix Presentation Server.

1. Select Change.

1. Select Remove in the Application Maintenance Wizard that appears and follow the onscreen

instructions.

Citrix recommends that you uninstall the Citrix Server and its components in the following

order:

a. Citrix Presentation Server—Presentation Server Reports.

b. Citrix Access Management Console—Presentation Server Report Center.

c. All Citrix Access Management Console extensions, as follows:

        Citrix Access Management Console—Diagnostics

        Citrix Access Management Console—Hotfix Management

        Citrix Access Management Console Knowledge Base

        Citrix Access Management Console Legacy Tools

        Citrix Access Management Console—Web Interface

d. Citrix Presentation Server Administration Snap-In.

e. Citrix License Server Administration.

f. Citrix Access Management Console Framework.

g. Presentation Server Console, which is also known as the Management Console for

Presentation Server.

h. Citrix Presentation Server.

i. Citrix Web Interface.

j. Citrix Licensing.

k. Citrix Presentation Server Document Center, if installed.

1. Stop and disable all Citrix services.

1. Open Computer Management > Local Users and Groups and delete all local user accounts

created by Citrix during the installation such as, Anon000…Anon014, CTX_SmaUser, and

ctx_cpsvcuser.

1. Search the drive for the following Citrix files and delete them:

CDM

CTX **see note below

ICA

IMA

MF

MFXP

If there is a question about whether or not the file belongs to Citrix, view the Version tab within

the property settings of the file. When in doubt, it is better not to delete the file.

Note: One of the CTX prefixed files is the CTXGina.dll. Once deleted, you must go to the Registry

and locate the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows

NT\CurrentVersion\Winlogon key and delete the two REG_SZ keys for GinaDLL and CtxGinaDll.

When you reboot the computer, the system then defaults to the msgina. By default, these keys

do not exist before the installation of Presentation Server.

1. Delete the following items in the registry using Regedt32.exe (take ownership of subkeys if

required):

HKEY_CURRENT_USER\SOFTWARE\Citrix

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Star

t Menu\Programs\Citrix

HKEY_LOCAL_MACHINE\SOFTWARE\Citrix (x32)

HKEY_LOCAL_MACHINE\SOFTWARE\W0w6432Node\Citrix (x64)

HKEY_LOCAL_MACHINE\SOFTWARE\Citrix Systems, Inc.

HKEY_LOCAL_MACHINE\SOFTWARE\citrixservices

HKEY_LOCAL_MACHINE\SOFTWARE\FLEXlm License Manager\CitrixLicensing

HKEY_LOCAL_MACHINE\SOFTWARE\Classes\(folders labeled with Citrix, IMACOM, MetaFrame,

and ImUtil)

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\control\citrix

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\control\citrixservices

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ADF Installer

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\CdfSvc

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Cdm

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\CdmService

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Citrix*

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ctx*

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\CPSVC

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ICABrowser

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\IcaCDD

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\icareduc

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\IMAAdvanceSrv

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\imaservice

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MetaFrameXP

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MFCom

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PDCOMP

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pdcrypt1

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pdcrypt2

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pdframe

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PDRELI

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\pdrframe

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\PnSson

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RadeSvc

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\ResourceManagerMail

1. Edit the computer environment variables and remove Citrix references from paths. Then run the

Autoruns utility from Microsoft Sysinternals and remove all references to Citrix and restart the

server.

1. Delete the following folders, if present:

\Programs Files\Citrix

\Programs Files\Common Files\Citrix

\Windows\System32\Citrix

\Documents and Settings\All Users\Start Menu\Programs\Citrix

1. Search the drive for *.del* and delete all files marked for deletion.

Note: When you attempt to delete some files, you might receive the following error message:

“Cannot delete file: The specified file is being used by Windows.”

1. Restart the server before you reinstall Presentation Server. When you delete all the files and

registry entries listed in the previous step, new installation proceeds normally. Restart the

server.

1. Ensure that all Citrix programs and software are effectively removed from Control Panel > Add

or Remove Programs. If Citrix components still appear, download and run the Windows Installer

Cleanup utility from Microsoft.

1. Verify if any Citrix services still appear. If so, use the sc command to remove them.

For example: sc delete “Citrix SMA service”

1. Restart the server again.

1. Open Event Viewer and ensure that the Application and System logs do not contain events

referring to Citrix.

1. If imaging software is used, this is the moment to create a new image or backup of the server,

because at this point the server is as clear as technically possible of all Citrix software.

1. Reinstall the product normally, or create a log of the installation.

Example msiexec command:

msiexec /i "D:\Citrix Presentation Server\MPS.msi" /l*v c:\log.txt

32. What will happen if LHC in Citrix corrupted?

If LHC is corrupted,IMA service would fail to start and server communication with the datastore

would be affected ; as a result, server will not be able to handle user requests for applications,

you will have recreate LHC using this commanddsmaintrecreatelhc. SMA service”

1. Restart the server again.

1. Open Event Viewer and ensure that the Application and System logs do not contain events

referring to Citrix.

1. If imaging software is used, this is the moment to create a new image or backup of the server,

because at this point the server is as clear as technically possible of all Citrix software.

1. Reinstall the product normally, or create a log of the installation.

Example msiexec command:

msiexec /i "D:\Citrix Presentation Server\MPS.msi" /l*v c:\log.txt

32. What will happen if LHC in Citrix corrupted?

If LHC is corrupted,IMA service would fail to start and server communication with the datastore

would be affected ; as a result, server will not be able to handle user requests for applications,

you will have recreate LHC using this commanddsmaintrecreatelhc.

No comments:

Post a Comment