Citrix-Workspace-App-For-Windows.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Citrix-Workspace-App-For-Windows.Pdf Citrix Workspace app for Windows Citrix Product Documentation | docs.citrix.com September 30, 2021 Citrix Workspace app for Windows Contents About this release 3 System requirements and compatibility 44 Install and Uninstall 50 Deploy 61 Update 67 Get started 75 Configure 94 Authenticate 178 Secure communications 196 Storebrowse 206 Citrix Workspace app Desktop Lock 214 SDK and API 219 ICA Settings Reference 221 © 1999–2021 Citrix Systems, Inc. All rights reserved. 2 Citrix Workspace app for Windows About this release September 29, 2021 What’s new in 2109 Adaptive audio With Adaptive audio, you don’t need to configure the audio quality policies on the VDA. Adaptive au‑ dio optimizes settings for your environment and replaces deprecated audio compression formats to provide an excellent user experience. Note: If UDP audio delivery is required for the real‑time audio application, Adaptive audio must be disabled on the VDA to allow fallback to UDP audio delivery. For more information, see Adaptive audio. Citrix Workspace browser The Citrix Workspace browser is a native browser running on the client machine. It lets users open web and SaaS applications from within the Citrix Workspace app in a secure manner. © 1999–2021 Citrix Systems, Inc. All rights reserved. 3 Citrix Workspace app for Windows With a continued focus on enriching the user‑experience, the new browser brings you an enhanced and a more native browser‑like user experience, complete with the following features: • VPN‑less access to internal webpages • Microphone and webcam support • Tabbed browsing experience • Multi‑window views • Editable omnibox • Bookmarks • Shortcuts on the new tab page • Customizable settings • Proxy authentication support • Analytics Admins can enable Secure Workspace Access (SWA) or App protection policies including anti‑ keylogging, anti‑screen capture, download, printing, clipboard restrictions, and watermarking functionalities in varying combinations on a per‑URL basis. For more information, see Overview. StoreFront to Workspace URL migration As your organization transitions from on‑prem StoreFront to Workspace, end users are required to manually add the new Workspace URL to the Workspace app on their end points. This feature en‑ ables the administrators to seamlessly migrate users from a StoreFront store to a Workspace store with minimal user interaction. For more information about this feature, see StoreFront to Workspace URL Migration. Support for custom web stores With this release, you can access your organization’s custom web store from the Citrix Workspace app for Windows. To use this feature, the administrator must add the domain or the custom web store to the list of allowed URLs in the Global App Configuration Service. Once this is done, you can provide the custom web store URL in the Add Account screen in the Citrix Workspace app. The custom web store opens in the native Workspace app window. For more information about configuring custom web store, see Custom web store. © 1999–2021 Citrix Systems, Inc. All rights reserved. 4 Citrix Workspace app for Windows Support for Windows Hello & FIDO2 Security Keys based authentication With this release, you can authenticate to Citrix Workspace using Windows Hello and FIDO2 security keys. For more information, see Other Ways to authenticate to Citrix Workspace. Single Sign‑On (SSO) to Citrix Workspace app from Microsoft Azure Active Directory (AAD) joined machines with AAD as identity provider With this release, you can single sign‑on to Citrix Workspace app from Azure Active Directory (AAD) joined machines with AAD as the identity provider. For more information, see Other Ways to authenticate to Citrix Workspace. Support for Conditional Access with Azure Active Directory With this release, Workspace administrators can configure and enforce Azure Active Directory condi‑ tional access policies for users authenticating to Citrix Workspace app. For more information, see Support for Conditional access with Azure AD. Support for Service continuity This release supports service continuity with Citrix Workspace Web Extensions. You can use Workspace Web Extensions for Google Chrome or Microsoft Edge with Workspace app for Windows 2109. These extensions are available at Google Chrome web store and the Microsoft Edge Add‑on website. The Workspace app communicates with the Citrix Workspace Web extension using the native mes‑ saging host protocol for browser extensions. Together, the Workspace app and the Workspace Web extension use Workspace connection leases to give browser users access to their apps and desktops during outages. See Service continuity for more information. Microsoft Teams enhancements The following features are available only after the roll‑out of an update from Microsoft Teams. When the update is rolled‑out by Microsoft, you can check CTX253754 for the documentation update and the announcement. • Support for WebRTC: This release supports WebRTC 1.0 for a better video conferencing experi‑ ence along with Gallery View. © 1999–2021 Citrix Systems, Inc. All rights reserved. 5 Citrix Workspace app for Windows • Screen sharing enhancement: You can share individual applications, windows, or full screen using the screen sharing feature in Microsoft Teams. Citrix Virtual Delivery Agent 2109 is apre‑ requisite for this feature. • App Protection compatibility: When App Protection is enabled, you can now share content through Microsoft Teams with HDX optimization. With this feature, you can share an application window running in the virtual desktop. Citrix Virtual Delivery Agent 2109 is a prerequisite for this feature. Note: Full monitor or desktop sharing is disabled when App Protection is enabled for the delivery group. • Live captions: This release supports real‑time transcription of what the speaker is saying when Live Captions is enabled in Microsoft Teams. Microsoft Teams optimization This release supports peer‑to‑peer audio and video call, conference call, and screen sharing in opti‑ mized Microsoft Teams on VM hosted apps. Support for Bloomberg keyboard 5 This release includes support for Bloomberg keyboard 5. What’s new in 2108 Revamped Add Account Screen This release introduces a revamped Add Account screen. © 1999–2021 Citrix Systems, Inc. All rights reserved. 6 Citrix Workspace app for Windows Inactivity Timeout for Citrix Workspace sessions Admins can configure the inactivity timeout value to specify the amount of idle time allowed before the user is automatically signed out of the Citrix Workspace session. You are automatically signed out of Workspace if there is no activity from the mouse, keyboard, or touch for the specified interval of time. The inactivity timeout does not affect the already running Citrix Virtual Apps and Desktops sessions or the Citrix StoreFront stores. For more information see Inactivity Timeout for Workspace Sessions Note: Admins can configure the inactivity timeout only for Workspace (cloud) sessions. Support for custom web stores [Technical preview] With this release, you can access your organization’s custom web store from the Citrix Workspace app for Windows. To use this feature, the admin must add the domain or the custom web store to the list of allowed URLs in the Global App Configuration Service. Once this is done, you can provide the custom © 1999–2021 Citrix Systems, Inc. All rights reserved. 7 Citrix Workspace app for Windows web store URL in the Add Account screen in Citrix Workspace app. The custom web store opens in the native Workspace app window. For information about configuring custom web stores, see Custom web stores Note: Technical previews are available for customers to test in their non‑production or limited produc‑ tion environments, and to give them an opportunity to share feedback. Citrix does not accept support cases for feature previews but welcomes feedback for improving them. Citrix may or may not act on feedback based on its severity, criticality, and importance. It is advised that Beta builds not be deployed in production environments. StoreFront to Workspace URL Migration [Technical preview] As your organization transitions from on‑prem StoreFront to Workspace, end users are required to manually add the new Workspace URL to the Workspace app on their end points. This feature enables administrators to seamlessly migrate users from a StoreFront store to a Workspace store with minimal user interaction. For more information about this feature, see StoreFront to Workspace URL Migration [Technical pre‑ view] Note: Technical previews are available for customers to test in their non‑production or limited produc‑ tion environments, and to give them an opportunity to share feedback. Citrix does not accept support cases for feature previews but welcomes feedback for improving them. Citrix may or may not act on feedback based on its severity, criticality, and importance. It is advised that Beta builds not be deployed in production environments. What’s new in 2107 EPA enhancement Starting with this release, Citrix Workspace app can download and install the EPA plug‑in in Workspace deployments. After the installation completes, the Advanced Endpoint Analysis (EPA) scans thedevice for endpoint security requirements configured on the Citrix Gateway. When the scan completes, the Citrix Workspace app login window appears. Note: This feature works only if you have configured nFactor authentication in your environment. For more information on the EPA scan, see Advanced Endpoint Analysis scans. © 1999–2021 Citrix Systems, Inc. All rights
Recommended publications
  • Through the Looking Glass: Webcam Interception and Protection in Kernel
    VIRUS BULLETIN www.virusbulletin.com Covering the global threat landscape THROUGH THE LOOKING GLASS: and WIA (Windows Image Acquisition), which provides a WEBCAM INTERCEPTION AND still image acquisition API. PROTECTION IN KERNEL MODE ATTACK VECTORS Ronen Slavin & Michael Maltsev Reason Software, USA Let’s pretend for a moment that we’re the bad guys. We have gained control of a victim’s computer and we can run any code on it. We would like to use his camera to get a photo or a video to use for our nefarious purposes. What are our INTRODUCTION options? When we talk about digital privacy, the computer’s webcam The simplest option is just to use one of the user-mode APIs is one of the most relevant components. We all have a tiny mentioned previously. By default, Windows allows every fear that someone might be looking through our computer’s app to access the computer’s camera, with the exception of camera, spying on us and watching our every move [1]. And Store apps on Windows 10. The downside for the attackers is while some of us think this scenario is restricted to the realm that camera access will turn on the indicator LED, giving the of movies, the reality is that malware authors and threat victim an indication that somebody is watching him. actors don’t shy away from incorporating such capabilities A sneakier method is to spy on the victim when he turns on into their malware arsenals [2]. the camera himself. Patrick Wardle described a technique Camera manufacturers protect their customers by incorporating like this for Mac [8], but there’s no reason the principle into their devices an indicator LED that illuminates when can’t be applied to Windows, albeit with a slightly different the camera is in use.
    [Show full text]
  • Semi-Automated Parallel Programming in Heterogeneous Intelligent Reconfigurable Environments (SAPPHIRE) Sean Stanek Iowa State University
    Iowa State University Capstones, Theses and Graduate Theses and Dissertations Dissertations 2012 Semi-automated parallel programming in heterogeneous intelligent reconfigurable environments (SAPPHIRE) Sean Stanek Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/etd Part of the Computer Sciences Commons Recommended Citation Stanek, Sean, "Semi-automated parallel programming in heterogeneous intelligent reconfigurable environments (SAPPHIRE)" (2012). Graduate Theses and Dissertations. 12560. https://lib.dr.iastate.edu/etd/12560 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Graduate Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. Semi-automated parallel programming in heterogeneous intelligent reconfigurable environments (SAPPHIRE) by Sean Stanek A dissertation submitted to the graduate faculty in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Major: Computer Science Program of Study Committee: Carl Chang, Major Professor Johnny Wong Wallapak Tavanapong Les Miller Morris Chang Iowa State University Ames, Iowa 2012 Copyright © Sean Stanek, 2012. All rights reserved. ii TABLE OF CONTENTS LIST OF TABLES .....................................................................................................................
    [Show full text]
  • APK Files) on Your Android Phone
    How to Install Applications (APK Files) on Your Android Phone Overview An Android application is stored in an APK file (i.e., a file named by {Application Name}.apk). You must install the APK on your Android phone in order to run it. There are three different ways to install APK files on your phone: • The easiest way is simply to download the application from the Android Market or from a web site directly to the SD card mounted in your phone, then click on the APK file to install it. • The second way is to download the APK file to your computer, mount your phone’s SD card in the computer (or connect the phone with the SD inserted in it to the computer via USB cable) and copy the APK file to the SD card, then insert the SD card in the phone and install the APK file from the SD card using an Application Installer or File Manager that you download from the Android Market. This method is useful for installing non-market applications (i.e., applications not available on the Android Market). • The third way is to install the Android Software Development Kit (SDK ) on your computer, then connect the phone via USB cable to the computer and use the Android Debug Bridge (contained in the SDK) to install the APK on the phone. This method is more suitable for developers and technical users who need to install non-market applications. Note: Because of the diversity in Android devices, some methods may not be supported on your phone.
    [Show full text]
  • In-Depth Evaluation of Redirect Tracking and Link Usage
    Proceedings on Privacy Enhancing Technologies ; 2020 (4):394–413 Martin Koop*, Erik Tews, and Stefan Katzenbeisser In-Depth Evaluation of Redirect Tracking and Link Usage Abstract: In today’s web, information gathering on 1 Introduction users’ online behavior takes a major role. Advertisers use different tracking techniques that invade users’ privacy It is common practice to use different tracking tech- by collecting data on their browsing activities and inter- niques on websites. This covers the web advertisement ests. To preventing this threat, various privacy tools are infrastructure like banners, so-called web beacons1 or available that try to block third-party elements. How- social media buttons to gather data on the users’ on- ever, there exist various tracking techniques that are line behavior as well as privacy sensible information not covered by those tools, such as redirect link track- [52, 69, 73]. Among others, those include information on ing. Here, tracking is hidden in ordinary website links the user’s real name, address, gender, shopping-behavior pointing to further content. By clicking those links, or or location [4, 19]. Connecting this data with informa- by automatic URL redirects, the user is being redirected tion gathered from search queries, mobile devices [17] through a chain of potential tracking servers not visible or content published in online social networks [5, 79] al- to the user. In this scenario, the tracker collects valuable lows revealing further privacy sensitive information [62]. data about the content, topic, or user interests of the This includes personal interests, problems or desires of website. Additionally, the tracker sets not only third- users, political or religious views, as well as the finan- party but also first-party tracking cookies which are far cial status.
    [Show full text]
  • Spamming Botnets: Signatures and Characteristics
    Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten+,IvanOsipkov+ Microsoft Research, Silicon Valley +Microsoft Corporation {yxie,fangyu,kachan,rina,ghulten,ivano}@microsoft.com ABSTRACT botnet infection and their associated control process [4, 17, 6], little In this paper, we focus on characterizing spamming botnets by effort has been devoted to understanding the aggregate behaviors of leveraging both spam payload and spam server traffic properties. botnets from the perspective of large email servers that are popular Towards this goal, we developed a spam signature generation frame- targets of botnet spam attacks. work called AutoRE to detect botnet-based spam emails and botnet An important goal of this paper is to perform a large scale analy- membership. AutoRE does not require pre-classified training data sis of spamming botnet characteristics and identify trends that can or white lists. Moreover, it outputs high quality regular expression benefit future botnet detection and defense mechanisms. In our signatures that can detect botnet spam with a low false positive rate. analysis, we make use of an email dataset collected from a large Using a three-month sample of emails from Hotmail, AutoRE suc- email service provider, namely, MSN Hotmail. Our study not only cessfully identified 7,721 botnet-based spam campaigns together detects botnet membership across the Internet, but also tracks the with 340,050 unique botnet host IP addresses. sending behavior and the associated email content patterns that are Our in-depth analysis of the identified botnets revealed several directly observable from an email service provider. Information interesting findings regarding the degree of email obfuscation, prop- pertaining to botnet membership can be used to prevent future ne- erties of botnet IP addresses, sending patterns, and their correlation farious activities such as phishing and DDoS attacks.
    [Show full text]
  • Hidemyapp : Hiding the Presence of Sensitive Apps on Android
    HideMyApp : Hiding the Presence of Sensitive Apps on Android Anh Pham Italo Dacosta Eleonora Losiouk John Stephan EPFL, Switzerland EPFL, Switzerland University of Padova, Italy EPFL, Switzerland Kévin Huguenin Jean-Pierre Hubaux University of Lausanne, Switzerland EPFL, Switzerland Abstract patients [23], and there are around 325,000 mHealth apps available in major mobile app stores.2 Millions of users rely on mobile health (mHealth) apps to Given the sensitivity of medical data, the threats of pri- manage their wellness and medical conditions. Although the vacy leakage are one of the main hindrances to the success of popularity of such apps continues to grow, several privacy and mHealth technologies [37]. In this area, a serious and often security challenges can hinder their potential. In particular, overlooked threat is that an adversary can infer sensitive infor- the simple fact that an mHealth app is installed on a user’s mation simply from the presence of an app on a user’s phone. phone can reveal sensitive information about the user’s health. Previous studies have shown that private information, such as Due to Android’s open design, any app, even without per- age, gender, race, and religion, can be inferred from the list of missions, can easily check for the presence of a specific app installed apps [22,29,47]. With the increasing popularity of or collect the entire list of installed apps on the phone. Our mHealth apps, an adversary can now infer even more sensitive analysis shows that Android apps expose a significant amount information. For example, learning that a user has a diabetes of metadata, which facilitates fingerprinting them.
    [Show full text]
  • How to Convert Desktop Apps to Universal Windows Platform Apps with Desktop Bridge
    How to convert desktop apps to Universal Windows Platform apps with Desktop Bridge If you're looking to bring your traditional app to the Universal Windows Platform, this guide walks you through the steps to use the DesktopAppConverter to convert your app. On Windows 10, Microsoft is not only adding new features and making the operating system more secure, but it's also investing on making the Windows Store the single place for users to acquire apps. The caveat with the Windows Store is that it doesn't include support for distribution of traditional desktop applications -- you're only able to download Universal Windows Platform (UWP) apps. However, Microsoft is making some changes, and now thanks to Desktop Bridge, we're slowly starting to see desktop apps and tools available in the Store. What's Desktop Bridge? How does Desktop Bridge works? Things you need before converting an app How to prepare your computer to convert apps How to convert desktop apps into Windows Store apps How to install a converted app on Windows 10 What's Desktop Bridge? It's all part of an initiative called Project Centennial, which now you know as Desktop Bridge. The new approach is essentially a "bridge" that let developers take traditional desktop applications and convert them into Universal Windows Platform (modern) apps. The idea behind Desktop Bridge is that great apps take time and effort, and if they're already working, Microsoft doesn't want you to abandon that code. With Desktop Bridge, you can take your existing desktop application (Win32, WPF, and Windows Forms), make a little modification (if necessary), and bring that great code to the new platform, which can also take advantage of many new features.
    [Show full text]
  • Introduction to Windows 7
    [Not for Circulation] Introduction to Windows 7 This document provides a basic overview of the new and enhanced features of Windows 7 as well as instructions for how to request an upgrade. Windows 7 at UIS Windows 7 is Microsoft’s latest operating system. Beginning in the fall of 2010, UIS will upgrade all classroom and lab PCs to Windows 7. Any new PC that is ordered will automatically come installed with Windows 7. To request an upgrade, contact the Technology Support Center (TSC) at 217/206-6000 or [email protected]. The TSC will evaluate your machine to see if it’s capable of running Windows 7. (Your computer needs a dual core processor and at least 2 GB of RAM.) Please note that University licensing does NOT cover distribution of Windows 7 for personally owned computers. However, it is available for a discounted price via the WebStore at http://webstore.illinois.edu. What to Consider Before Upgrading There is no direct upgrade path from Windows XP to Windows 7. Therefore, the TSC will take your computer, save your files, and install Windows 7 on a clean hard drive. Please budget a couple days for this process. In some cases, you may have older devices that will not work with Windows 7. While many vendors are providing and will continue to provide drivers for their hardware, in some cases, printers, scanners, and other devices that are more than 5 years old may have issues running on Windows 7. To check the compatibility of your devices with Windows 7, visit the Microsoft Windows 7 Compatibility Center at http://www.microsoft.com/windows/compatibility/windows-7/en-us/default.aspx.
    [Show full text]
  • Run-Commands-Windows-10.Pdf
    Run Commands Windows 10 by Bettertechtips.com Command Action Command Action documents Open Documents Folder devicepairingwizard Device Pairing Wizard videos Open Videos Folder msdt Diagnostics Troubleshooting Wizard downloads Open Downloads Folder tabcal Digitizer Calibration Tool favorites Open Favorites Folder dxdiag DirectX Diagnostic Tool recent Open Recent Folder cleanmgr Disk Cleanup pictures Open Pictures Folder dfrgui Optimie Drive devicepairingwizard Add a new Device diskmgmt.msc Disk Management winver About Windows dialog dpiscaling Display Setting hdwwiz Add Hardware Wizard dccw Display Color Calibration netplwiz User Accounts verifier Driver Verifier Manager azman.msc Authorization Manager utilman Ease of Access Center sdclt Backup and Restore rekeywiz Encryption File System Wizard fsquirt fsquirt eventvwr.msc Event Viewer calc Calculator fxscover Fax Cover Page Editor certmgr.msc Certificates sigverif File Signature Verification systempropertiesperformance Performance Options joy.cpl Game Controllers printui Printer User Interface iexpress IExpress Wizard charmap Character Map iexplore Internet Explorer cttune ClearType text Tuner inetcpl.cpl Internet Properties colorcpl Color Management iscsicpl iSCSI Initiator Configuration Tool cmd Command Prompt lpksetup Language Pack Installer comexp.msc Component Services gpedit.msc Local Group Policy Editor compmgmt.msc Computer Management secpol.msc Local Security Policy: displayswitch Connect to a Projector lusrmgr.msc Local Users and Groups control Control Panel magnify Magnifier
    [Show full text]
  • Apple Business Manager Overview Overview
    Getting Started Guide Apple Business Manager Overview Overview Contents Apple Business Manager is a web-based portal for IT administrators to deploy Overview iPhone, iPad, iPod touch, Apple TV, and Mac all from one place. Working Getting Started seamlessly with your mobile device management (MDM) solution, Apple Configuration Resources Business Manager makes it easy to automate device deployment, purchase apps and distribute content, and create Managed Apple IDs for employees. The Device Enrollment Program (DEP) and the Volume Purchase Program (VPP) are now completely integrated into Apple Business Manager, so organizations can bring together everything needed to deploy Apple devices. These programs will no longer be available starting December 1, 2019. Devices Apple Business Manager enables automated device enrollment, giving organizations a fast, streamlined way to deploy corporate-owned Apple devices and enroll in MDM without having to physically touch or prepare each device. • Simplify the setup process for users by streamlining steps in Setup Assistant, ensuring that employees receive the right configurations immediately upon activation. IT teams can now further customize this experience by providing consent text, corporate branding or modern authentication to employees. • Enable a higher level of control for corporate-owned devices by using supervision, which provides additional device management controls that are not available for other deployment models, including non-removable MDM. • More easily manage default MDM servers by setting a default server that’s based on device type. And you can now manually enroll iPhone, iPad, and Apple TV using Apple Configurator 2, regardless of how you acquired them. Content Apple Business Manager enables organizations to easily buy content in volume.
    [Show full text]
  • Organizing Windows Desktop/Workspace
    Organizing Windows Desktop/Workspace Instructions Below are the different places in Windows that you may want to customize. On your lab computer, go ahead and set up the environment in different ways to see how you’d like to customize your work computer. Start Menu and Taskbar ● Size: Click on the Start Icon (bottom left). As you move your mouse to the edges of the Start Menu window, your mouse icon will change to the resize icons . Click and drag the mouse to the desired Start Menu size. ● Open Start Menu, and “Pin” apps to the Start Menu/Taskbar by finding them in the list, right-clicking the app, and select “Pin to Start” or “More-> “Pin to Taskbar” OR click and drag the icon to the Tiles section. ● Drop “Tiles” on top of each other to create folders of apps. ● Right-click on Tiles (for example the Weather Tile), and you can resize the Tile (maybe for apps you use more often), and also Turn On live tiles to get updates automatically in the Tile (not for all Tiles) ● Right-click applications in the Taskbar to view “jump lists” for certain applications, which can show recently used documents, visited websites, or other application options. ● If you prefer using the keyboard for opening apps, you probably won’t need to customize the start menu. Simply hit the Windows Key and start typing the name of the application to open, then hit enter when it is highlighted. As the same searches happen, the most used apps will show up as the first selection.
    [Show full text]
  • Quick Guide Page | 1
    Quick Guide Page | 1 Contents Welcome to Windows 10 ................................................................................................................................................................................................... 3 Key innovations ...................................................................................................................................................................................................................... 3 Cortana ................................................................................................................................................................................................................................. 3 Microsoft Edge .................................................................................................................................................................................................................. 4 Gaming & Xbox ................................................................................................................................................................................................................ 5 Built-in apps ....................................................................................................................................................................................................................... 7 Enterprise-grade secure and fast ...................................................................................................................................................................................
    [Show full text]