Profile Management 1912 LTSR

Total Page:16

File Type:pdf, Size:1020Kb

Load more

Profile Management 1912 LTSR Citrix Product Documentation | docs.citrix.com September 29, 2021 Profile Management 1912 LTSR Contents What’s new 3 Cumulative Update 3 (CU3) 3 Fixed issues in 1912 LTSR CU3 3 Cumulative Update 2 (CU2) 4 Fixed issues in 1912 LTSR CU2 4 Cumulative Update 1 (CU1) 5 Fixed issues in 1912 LTSR CU1 6 About this release 7 Fixed issues in 1912 LTSR 7 Known issues 8 System requirements 9 Quick start guide 12 How Profile Management works 15 About profiles 16 Assign profiles 18 Profile Management architecture 19 Profile Management use cases 23 Access multiple resources 26 Logon diagram 27 Logoff diagram 29 Plan your deployment 31 Decide on a configuration 31 Pilot? Production? 32 © 1999–2021 Citrix Systems, Inc. All rights reserved. 2 Profile Management 1912 LTSR Migrate profiles? New profiles? 34 Persistent? Provisioned? Dedicated? Shared? 35 Mobile? Static? 37 Which applications? 38 Review, test, and activate Profile Management 42 Plan for multiple platforms 42 Share Citrix user profiles on multiple file servers 44 Administer profiles within and across OUs 46 Domain and forest support in Profile Management 47 High availability and disaster recovery with Profile Management 47 Scenario 1 ‑ Basic setup of geographically adjacent user stores and failover clusters 48 Scenario 2 ‑ Multiple folder targets and replication 52 Scenario 3 ‑ Disaster recovery 54 Scenario 4 ‑ The traveling user 57 Scenario 5 ‑ Load‑balancing user stores 57 Plan folder redirection with Profile Management 59 Third‑party directory, authentication, and file services 60 FAQs about profiles on multiple platforms and Profile Management migration 61 Install and set up 64 Files included in the download 68 Create the user store 69 Test Profile Management with a local GPO 71 Upgrade and migrate 72 Upgrade Profile Management 75 © 1999–2021 Citrix Systems, Inc. All rights reserved. 3 Profile Management 1912 LTSR Migrate user profiles 77 Configure 79 Manage 79 Resolve conflicting profiles 79 Specify a template or mandatory profile 80 Choose a migration policy 81 Enable Profile Management 82 Configuration precedence 83 About the Profile Management .ini file 83 Include and exclude items 85 Default inclusions and exclusions 87 Include and exclude items 90 Use wildcards 93 Enable logon exclusion check 94 Define which groups’ profiles are processed 95 Specify the path to the user store 96 Migrate user store 99 Automatic migration of existing application profiles 100 Store certificates 102 Stream user profiles 103 Configure folder redirection 105 Manage cookie folders and other transactional folders 106 Configure offline profiles 109 Configure the Customer Experience Improvement Program (CEIP) 111 © 1999–2021 Citrix Systems, Inc. All rights reserved. 4 Profile Management 1912 LTSR Configure active write back 112 Configure cross‑platform settings 112 Operating systems and applications supported by cross‑platform settings 115 Create a definition file 117 Application definition file structure 120 Cross‑platform settings ‑ Case study 126 Initial configuration 127 Plan the new site 128 Execute the plan 129 Other considerations 134 Force user logoffs 135 Synchronize file security attributes 135 Enable large file handling 135 Enable application profiler 136 Enable native Outlook search experience 137 Automatic backup and restore of Outlook search index database 140 Profile container 141 Policies 143 Profile Management policies 144 Profile Management policy descriptions and defaults 151 Integrate 170 Profile Management and Citrix Virtual Apps 171 Profile Management and Citrix Virtual Desktops 172 Profile Management and VDI‑in‑a‑Box 176 © 1999–2021 Citrix Systems, Inc. All rights reserved. 5 Profile Management 1912 LTSR Profile Management and UE‑V 176 Profile Management and Citrix Content Collaboration 176 Profile Management and App‑V 177 Profile Management and Provisioning Services 178 Preconfigure Profile Management on provisioned images 180 Profile Management and Self‑service Plug‑in 181 Profile Management and VMware 182 Profile Management and Outlook 183 Using Windows profiles with Password Manager and single sign‑on 183 Firefox browser 187 Google Chrome browser 187 Secure 188 Troubleshoot 191 Enable logging for troubleshooting 192 Profile Management log files 195 Events logged by Profile Management 197 Log file checklist 214 Troubleshoot without logging 214 Advanced troubleshooting checklist 216 Troubleshoot common issues 217 Collect diagnostic information 222 Contact Citrix Technical Support 224 Profile Management best practices 224 Glossary 230 © 1999–2021 Citrix Systems, Inc. All rights reserved. 6 Profile Management 1912 LTSR What’s new May 12, 2021 Cumulative Update 3 (CU3) is the latest release of the Profile Management 1912 LTSR. CU3 adds seven fixes compared to the 1912 CU2 release of Profile Management. Cumulative Update 3 (CU3) May 12, 2021 Release date: May 12, 2021 About this release CU3 adds seven fixes compared to the 1912 CU2 release of Profile Management. Profile Management 1912 LTSR Cumulative Update 2 Profile Management 1912 LTSR Cumulative Update 1 Profile Management (initial release) Known issues in this release Deprecation and removals Citrix Product Subscription Advantage Eligibility Dates Fixed issues in 1912 LTSR CU3 May 12, 2021 Compared to: Profile Management 1912 LTSR CU2 Profile Management 1912 LTSR CU3 contains all fixes included in the 1912 LTSR initial release, CU1, CU2, plus the following, new fixes: • When you navigate to Control Panel > System and Security > System > Advanced system settings > User Profiles, the profile for the logged‑in user shows a question mark for the Size field. The other user profiles show the correct sizes. [CVADHELP‑13993] • When a folder on the Folders to Mirror list is not present in the user store during logons, the local user profile is deleted. [CVADHELP‑15248] © 1999–2021 Citrix Systems, Inc. All rights reserved. 7 Profile Management 1912 LTSR • When you enable the Automatic migration of existing application profiles policy and migrate the existing profiles, Microsoft Outlook settings might be lost. The issue occurs during the sec‑ ond and subsequent logons after the migration. [CVADHELP‑15723] • With Desktop added to the Exclusion list – directories policy, an error might occur when users attempt to save any changes in a published application or desktop. [CVADHELP‑15792] • Windows user credentials might remain after being removed from the Credential Manager. [CVADHELP‑16083] • Folders created before enabling Delete excluded files or folders through the Logon Exclusion Check policy but excluded by the Exclusion list – directories or Enable Default Exclusion list – directories policy might not be deleted. [CVADHELP‑16439] • New files created with the Large File Handling ‑ Files to be created as symbolic links policy setting, might not sync during logoff. [CVADHELP‑16526] Cumulative Update 2 (CU2) November 24, 2020 Release date: November 19, 2020 About this release CU2 adds nine fixes compared to the 1912 CU1 release of Profile Management. Profile Management 1912 LTSR Cumulative Update 1 Profile Management (initial release) Known issues in this release Deprecation and removals Citrix Product Subscription Advantage Eligibility Dates Fixed issues in 1912 LTSR CU2 November 19, 2020 Compared to: Profile Management 1912 LTSR CU1 Profile Management 1912 LTSR CU2 contains all fixes included in the 1912 LTSR initial release, CU1, plus the following, new fixes: © 1999–2021 Citrix Systems, Inc. All rights reserved. 8 Profile Management 1912 LTSR • When you add Appdata\local\temp to the Exclusion list ‑ directories, Profile Management does not create the Appdata\local\temp folder in the user profile and runtime errors occur for some applications such as Microsoft Outlook. The issue occurs during second or subsequent logons with the Delete locally cached profiles on logoff policy enabled. [CVADHELP‑14054] • When you log on to a session using a temporary profile, an empty user profile folder might be created under C:\Users. Profile Management deletes the temporary profile on logoff, leaving behind the empty user profile folder. [CVADHELP‑14297] • With the Redirect the AppData(Roaming) folder redirection policy enabled, some tiles might disappear from the Start menu. The issue occurs when you log on to a Windows Server 2016 or 2019 machine running Citrix Virtual Apps and Desktops 1912 or earlier. [CVADHELP‑14336] • With search index roaming for Outlook enabled for a VDA for multi‑session OS using Profile Management, logons might be slow and attempts to launch published applications might fail. [CVADHELP‑14610] • Profile Management does not synchronize the subkeys of a registry key present in the Registry inclusion list. For example, when you add Software\Citrix to the Registry inclusion list, only HKEY_CURRENT_USER\SOFTWARE\Citrix is saved in the user store. The subkeys are not stored. [CVADHELP‑14815] • When Citrix Virtual Apps Optimization is in use, Profile Management might fail to save registry changes. The issue occurs when the path to Citrix Virtual Apps optimization definitions is not ac‑ cessible or the path file is invalid. Registry changes are also not saved when the Enable Virtual Apps Optimization and the Active write back policies are enabled. [CVADHELP‑15087] • Attempts to mount the OutlookOST.vhdx or the OutlookSearchIndex.vhdx file might fail inter‑ mittently with a 0x80070020 error. The issue occurs when you log off from a session and launch another session immediately. [CVADHELP‑15145]
Recommended publications
  • Add Administrator to Roaming Profile Group Policy

    Add Administrator to Roaming Profile Group Policy

    Add Administrator To Roaming Profile Group Policy Imputative and unfashioned Ignacius intruded his waterproofing instigating grump expansively. Shifting and colory Vince burkes while transeunt Tedrick departmentalises her hausfrau long and estranged thenceforth. Carangoid and ex-directory Redford outsum her Gloucestershire pats or annoys disgracefully. Is done to take advantage of horizon agent redirection to administrators group on as the properties panel is created an external network computer settings roaming to profile group policy We have change. The Administrator account so by default the only direction that is enabled Mirroring. The salvage to user store location you define via policy always include AD. Computer group that profile is summoned to add you administrator groups can query and. After checking for roaming policies? By default groups in administrator to a policy is a new gpo icon or implementing new profile version is specified by this is reduce and delegation pane. Not sure if that goal possible can the GUI. System User Profiles Add the Administrators security group to roaming user profiles Enabled. This method allows you to granularly configure a users roaming profile path location however coverage is option lot more laborious process of ensure those they are handsome with your folder redirection policy period is also applied to the users. A junior administrator deleted a GPO accidentally but violet had backed it up. No changes made to statistically evaluate the local credentials from this process more efficient way it allows you to roaming. File share name of roaming. Which adds to administrators can without any policy! Allocate sufficient storage and roaming to add profile group policy provides the footprints and.
  • “Windows 10 October 2020 Update” Update Verification Status January 8, 2021

    “Windows 10 October 2020 Update” Update Verification Status January 8, 2021

    “Windows 10 October 2020 Update” Update Verification status January 8, 2021 1. Tested Systems and verification results Product Name Verification status UH-X Verified CH Verified 2. Limitations Item Issue descriptions Workarounds No 1 Please update both WLAN driver Please update both WLAN driver and and Bluetooth driver before you Bluetooth driver before you update your update your systems to Windows systems to Windows 10, version 20H2. 10, version 20H2. 2 Design change of network status When your PC connect to networks which does icon on Task tray. not have internet access, network status icon on task tray is same with the state No internet connection. If you wish to check network status in this circumstance, you can check it with flyout menu which is pulled out with right click on network icon. 3 Brightness and color setting value Brightness and color settings value in settings in Settings app does not follows to app does not follows actual display brightness actual display brightness change by change. This value does not depend on power power source status. source status between AC and Battery. 4 Design change of "BitLocker" Following group policy design has been Group policy. changed. If you wish to enable Hardware based encryption, please turn on this group policy. [Computer Configuration] - [Administrative Templates] - [Windows Components] - [BitLocker Drive Encryption] - [Operating System Drives] - [Configure use of hardware-based encryption for operating system drives] 1 Previous design: If the policy is not enabled, Hardware based encryption is enabled as default. New design: If the policy is not enabled, Software based encryption is enabled as default.
  • Windows 7 Operating Guide

    Windows 7 Operating Guide

    Welcome to Windows 7 1 1 You told us what you wanted. We listened. This Windows® 7 Product Guide highlights the new and improved features that will help deliver the one thing you said you wanted the most: Your PC, simplified. 3 3 Contents INTRODUCTION TO WINDOWS 7 6 DESIGNING WINDOWS 7 8 Market Trends that Inspired Windows 7 9 WINDOWS 7 EDITIONS 10 Windows 7 Starter 11 Windows 7 Home Basic 11 Windows 7 Home Premium 12 Windows 7 Professional 12 Windows 7 Enterprise / Windows 7 Ultimate 13 Windows Anytime Upgrade 14 Microsoft Desktop Optimization Pack 14 Windows 7 Editions Comparison 15 GETTING STARTED WITH WINDOWS 7 16 Upgrading a PC to Windows 7 16 WHAT’S NEW IN WINDOWS 7 20 Top Features for You 20 Top Features for IT Professionals 22 Application and Device Compatibility 23 WINDOWS 7 FOR YOU 24 WINDOWS 7 FOR YOU: SIMPLIFIES EVERYDAY TASKS 28 Simple to Navigate 28 Easier to Find Things 35 Easy to Browse the Web 38 Easy to Connect PCs and Manage Devices 41 Easy to Communicate and Share 47 WINDOWS 7 FOR YOU: WORKS THE WAY YOU WANT 50 Speed, Reliability, and Responsiveness 50 More Secure 55 Compatible with You 62 Better Troubleshooting and Problem Solving 66 WINDOWS 7 FOR YOU: MAKES NEW THINGS POSSIBLE 70 Media the Way You Want It 70 Work Anywhere 81 New Ways to Engage 84 INTRODUCTION TO WINDOWS 7 6 WINDOWS 7 FOR IT PROFESSIONALS 88 DESIGNING WINDOWS 7 8 WINDOWS 7 FOR IT PROFESSIONALS: Market Trends that Inspired Windows 7 9 MAKE PEOPLE PRODUCTIVE ANYWHERE 92 WINDOWS 7 EDITIONS 10 Remove Barriers to Information 92 Windows 7 Starter 11 Access
  • Reference & Manual

    Reference & Manual

    DynaPDF 4.0 Reference & Manual API Reference Version 4.0.59 September 16, 2021 Legal Notices Copyright: © 2003-2021 Jens Boschulte, DynaForms GmbH. All rights reserved. DynaForms GmbH Burbecker Street 24 D-58285 Gevelsberg, Germany Trade Register HRB 9770, District Court Hagen CEO Jens Boschulte Phone: ++49 23 32-666 78 37 Fax: ++49 23 32-666 78 38 If you have questions please send an email to [email protected], or contact us by phone. This publication and the information herein is furnished as is, is subject to change without notice, and should not be construed as a commitment by DynaForms GmbH. DynaForms assumes no responsibility or liability for any errors or inaccuracies, makes no warranty of any kind (express, implied or statutory) with respect to this publication, and expressly disclaims any and all warranties of merchantability, fitness for particular purposes and no infringement of third-party rights. Adobe, Acrobat, and PostScript are trademarks of Adobe Systems Inc. AIX, IBM, and OS/390, are trademarks of International Business Machines Corporation. Microsoft, Windows, and Windows NT are trademarks of Microsoft Corporation. Apple, Mac OS, and Safari are trademarks of Apple Computer, Inc. registered in the United States and other countries. TrueType is a trademark of Apple Computer, Inc. Unicode and the Unicode logo are trademarks of Unicode, Inc. UNIX is a trademark of The Open Group. Solaris is a trademark of Sun Microsystems, Inc. Tru64 is a trademark of Hewlett-Packard. Linux is a trademark of Linus Torvalds. Other company product and service names may be trademarks or service marks of others.
  • Profileunity Release Notes

    Profileunity Release Notes

    Release Notes ProfileUnity™ and ProfileUnity FlexApp™ Change Log/Release Notes Version Table V 6.8.4.7654, RELEASED DECEMBER 16TH, 2020 .................................................................................................. 2 V 6.8.4.7647, RELEASED DECEMBER 9TH, 2020 .................................................................................................... 6 V 6.8.3.7468 R2, RELEASED JUNE 17 TH, 2020 .................................................................................................. 17 V 6.8.3.7311, RELEASED JANUARY 8TH, 2020 .................................................................................................... 25 V 6.8.2.7074, RELEASED MAY 17TH, 2019 ........................................................................................................ 35 V 6.8.1.7044, RELEASED APRIL 17TH, 2019 ....................................................................................................... 40 V 6.8.0.6886, RELEASED NOVEMBER 28TH, 2018 ............................................................................................... 48 V 6.7.7.6701, RELEASED MAY 8TH, 2018 ........................................................................................................... 57 V 6.7.6.6684, RELEASED APRIL 23RD, 2018 ....................................................................................................... 61 V 6.7.5.6663, RELEASED APRIL 4TH, 2018 ......................................................................................................... 65 V 6.7.0.6422,
  • Enable the Always Offline Mode to Provide Faster Access to Files

    Enable the Always Offline Mode to Provide Faster Access to Files

    Enable the Always Offline Mode to Provide Faster Access to Files 13 out of 16 rated this helpful - Rate this topic Published: April 18, 2012 Updated: July 3, 2013 Applies To: Windows 8, Windows 8.1, Windows Server 2012, Windows Server 2012 R2 This document describes how to use the Always Offline mode of Offline Files to provide faster access to cached files and redirected folders. Always Offline also provides lower bandwidth usage because users are always working offline, even when they are connected through a high- speed network connection. In this document Prerequisites Enabling the Always Offline mode Prerequisites To enable the Always Offline mode, your environment must meet the following prerequisites. An Active Directory Domain Services (AD DS) domain, with client computers joined to the domain. There are no forest or domain functional-level requirements or schema requirements. Client computers running Windows 8.1, Windows 8, Windows Server 2012 R2, or Windows Server 2012. (Client computers running earlier versions of Windows might continue to transition to Online mode on very high-speed network connections.) A computer with Group Policy Management installed. Enabling the Always Offline mode To enable the Always Offline mode, use Group Policy to enable the Configure slow-link mode policy setting and set the latency to 1 (millisecond). Doing so causes client computers running Windows 8 or Windows Server 2012 to automatically use the Always Offline mode. Note Computers running Windows 7, Windows Vista, Windows Server 2008 R2, or Windows Server 2008 might continue to transition to the Online mode if the latency of the network connection drops below one millisecond.
  • Microsoft | MCSE Certified Solution Expert

    Microsoft | MCSE Certified Solution Expert

    Microsoft | MCSE Certified Solution Expert MCSE MCSA Introduction to Windows Compare windows editions Install windows from DVD and Iso File Intro vmware Workstation Hardware Requirment Network adapter setting in vmware Install windows on VHD Dual Boot BCDEdit Deploying windows Explain installation over network Intro install wim boot wim File Create Winpe Boot Create Custom Windows image Sysprep Deplying Image using WDS server Managing Drivers and Devices Sign and unsign drivers Device management Utilities verifier sigverif pnputil driverquery msinfo dxdiag Managing Application and Group policy Local Group Policy Software restriction Applocker Networking IPv addressing Subneting VLSM Network profile Easy Transfer USMT Home group Network discovery Network Adapter properties Name resolution cache flushdns IPv Troubleshooting Security Windows firewall Create Firewall Rules Firewall Command line tools Netsh Security Policy User Right Assignment Remote Management Remote desktop Remote assistance Remote management with WinRM Resource Sharing Share permission NTFS permission EFS Recovery agent Branchcache Offline File File Protection Work Folders Disk Management MBR vs GPT Basic vs Dynamic Create Primary and Extended Partitions Create Volumes Mount Partition File Systems Disk Quota Disk CleanUP Disk Defragmenter Bitlocker Storage Space Configure authorization and authentication Acount policy and Password Policy User account control credential Manager Configure system and data recovery Configure system restore Windows Backup And Restore Configure
  • Windows 10 Rollout Programme

    Windows 10 Rollout Programme

    Windows 10 Rollout Programme Key decision points for consideration 1. Folder Redirection 2. Admin Rights 3. Roaming Profiles 4. Data Ownership W10 - Key Decision 1 - Folder Redirection We are consulting with College and Service Group Representatives on Folder Redirection for Windows 10 as follows: 1) Please respond by accepting the only offered solution option 1 below 2) Or by rejecting with reasons for that response. Options: Option 1 – Folder redirection ON for desktop clients but OFF for mobile clients. This is the same as the existing SD7 “Windows 7” and “MDSD Windows 8” folder redirection configuration. This “option” is recommended by the service team. W10 - Key Decision 2 - Admin Rights 1) Please respond by choosing one or more from the options presented below. 2) Or by rejecting all options with reasons for that response. Option 1 – Admin rights for end users are enabled on request, are not reviewed, and are rarely revoked. This is the current solution. Enables users to install any application they want, which means that: The estate is vulnerable to threats posed by Potentially Unwanted Applications (PUAs). Applications which install to provide some stated function but modify the OS in unknown ways, e.g. install as search toolbar but harvest web activity. The estate is vulnerable to threats from unmanaged applications. E.g. Applications dependant on insecure versions of Java, Flash or .Net. End user’s files, data and information is unprotected. E.g. PUA’s which inspect html traffic on client and inject paid advertisements. Enables users to change a range of setting on a device, which means that: The state of estate is uncontrolled and unknown.
  • ERNW Newsletter 31 / June 2010 Secure Configuration of Microsoft

    ERNW Newsletter 31 / June 2010 Secure Configuration of Microsoft

    ERNW Newsletter 31 / June 2010 Dear Partners, dear Colleagues, Welcome to the 31th edition of the ERNW Newsletter with the title: Secure Configuration of Microsoft Internet Explorer, Version 8 Version 1.0, 11th of June 2010 By: Enno Rey ([email protected]) Christopher Werny ([email protected]) Oliver Röschke ([email protected]) Abstract This newsletter evaluates configuration options, reflecting security and possible usability impact, incorporating typical large scale enterprise usage of browser based content. The evaluation was done for a globally operating enterprise. Note We provide some supporting files, namely: some regfiles containing the settings we recommended for the given environment. Use at your own risk and only if you fully understand the impact! an XLS with the recommended settings, based on the Microsoft XLS doc on GPO settings. miscellaneous stuff, e.g. an XLS with some documentation on potentially needed CLSIDs. A ZIP file with these can be found at http://www.ernw.de/download/ernw_nl_31_ie8config_supporting_docs.zip Disclaimer: the recommended settings are deployed in a sufficiently large global network. So they "work in production". Still, your mileage might vary. Please use the stuff cautiously. Any use is at your own risk. Definition – Umsetzung – Kontrolle 1 1 INTRODUCTION ............................................................................................. 5 1.1 Project Goals ............................................................................................................ 5 1.2 Technical goals ........................................................................................................
  • Understanding Device Configurations | 3

    Understanding Device Configurations | 3

    Understanding Device LESSON 1 Configurations OBJECTIVE DOMAIN MATRIX TECHNOLOGY SKILL OBJECtIVE DOMAIN DEsCRIPtION OBJECtIVE DOMAIN NUMBER Configuring Device Options Configure device options 1.1 • Understanding Microsoft Accounts • Configuring Control Panel • Configuring System Options • Changing Date and Time • Managing Devices Configuring Desktop Settings Configure desktop settings 1.2 • Configuring the Start Menu • Configuring User Profiles • Configuring Display Settings • Configuring Shortcuts • Understanding Group Policy Configuring Drive Encryption Configure drive encryption 1.3 • Preparing for File Encryption • Configuring BitLocker Configuring Updates Configure updates 1.4 • Understanding Windows Update • Understanding App Updates • Understanding Device System Updates COPYRIGHTED MATERIAL KEY TERMS Action Center Computer Configuration node encryption Active Directory accounts decryption Group Policy Administrative Tools device driver Group Policy objects (GPOs) BitLocker Drive Encryption Device Manager Internet Protocol Security (BDE) Devices and Printers folder (IPsec) Cortana domain‐based accounts Jump List Control Panel Encrypting File System (EFS) live previews 1 MOAC_Exam_98-368_c01.indd 1 12/26/2015 2:29:42 PM 2 | Lesson 1 live tiles Recycle Bin user account local user accounts resolution user profile local user profile roaming user profile User State Migration Tool mandatory user profile shortcut Windows Easy Transfer Microsoft accounts Secure Sockets Layer (SSL) Windows Server Update Microsoft Management Transport Layer Security (TLS) Service (WSUS) Console (MMC) Trusted Platform Module Windows Update Patch Tuesday (TPM) pin User Configuration node You work as an IT technician for the Contoso Corporation, which has hundreds of computers with a good mix between desktop computers and laptop computers. In addi‑ tion, several users use smartphones and tablets to access their emails and documents. As an administrator, you need to ensure that your computers are fully functional and secure.
  • Installation Guide for REBOUND on Win10

    Installation Guide for REBOUND on Win10

    Installation guide for REBOUND on win10 The open source software package REBOUND is officially only supported for macOS and Linux. In the following, we present the necessary steps to install rebound on win10. We do not guarantee 100% success. These steps have been tested using a VM on macOS. Installation on Linux and macOS The installation on macOS and Linux is straight forward and simple, especially for python. I recommend to use a virtual environment via the venv module and install the rebound module via pip. 1 python3-m venv ${HOME}/local/python3_venv Activate the virtual environment 1 source ${HOME}/local/python3_venv/bin/activate and install all important modules via pip 1 pip install matplotlib rebound numpy scipy The installation of the C version is also straight forward 1 git clone http://github.com/hannorein/rebound&& cd rebound/examples/shearing_sheet&& make&&./rebound For more information about the installation on macOS and Linux, please see the official docs. Installation on win10 Windows Subsystem for Linux First, we have to install the Windows Subsystem for Linux. The official guide can be found here. I recommend to update to Windows 10 version 2004 Build 19041 first (check your Windows version by selecting the Windows logo key + R, type winver, select OK), since you can then install WSL2 (quoting from microsoft WSL 2 uses the latest and greatest in virtualization " technology to run a Linux kernel inside of a lightweight utility virtual machine (VM)\). Before installing the subsystem, you have to enable the Virtual Machine Platform\ feature of Win10. Open a PowerShell as Administrator(!) and run " 1 dism.exe/online/enable-feature/featurename:VirtualMachinePlatform/all/norestart Restart your machine to complete the WSL installation and update to WSL 2 via the following command (again PowerShell with Administrator permissions) 1 wsl--set-default-version2 Linux distribution Now, open the microsoft store and select your favourite Linux distribution (debian!).
  • Optimizing Windows 10, Build 2004, for a Virtual Desktop Role

    Optimizing Windows 10, Build 2004, for a Virtual Desktop Role

    Optimizing Windows 10, Build 2004, for a Virtual Desktop role Written by Robert M. Smith, Program Manager, Azure Global Customer Engineering Date Created: May 12, 2020 Date Updated: July 08, 2020 Date Published: tbd Contributors: Tim Muessig, Senior Premier Field Engineer; Narklis Engler, Principal Program Manager Version 1.2 Document Change History Version Changes 1.0 Adding verbiage for Windows Virtual Desktop, and Windows 10 build 2004 specifically 1.1 Additional updates for 2004 1.2 Final pass, updated group policy, services, tasks, and added info about Storage Sense for disk cleanup. Introduction This article is intended to provide suggestions for configurations for Windows 10, build 2004, for optimal performance in Virtualized Desktop environments, including Virtual Desktop Infrastructure (VDI) and Windows Virtual Desktop (WVD). All settings in this guide are suggested optimization settings only and are in no way requirements. The information in this guide is pertinent to Windows 10, version 2004, operating system (OS) build 19041. The guiding principles to optimize performance of Windows 10 in a virtual desktop environment are to minimize graphic redraws and “effects”, background activities that have no major benefit to the virtual desktop environment, and generally reduce running processes to the bare minimum. A secondary goal is to reduce disk space usage in the base image to the bare minimum. With virtual desktop implementations, the smallest possible base, or “gold” image size, can slightly reduce memory utilization on the host system, as well as a small reduction in overall network operations required to deliver the desktop environment to the consumer. No optimizations should reduce the user experience.