Remote-access Guide

using citrix for remote access

by Jedidiah Klocko IV Published 2 years ago Updated 2 years ago
image

Remote PC Access is a feature of Citrix Virtual Apps and Desktops that enables organizations to easily allow their employees to access corporate resources remotely in a secure manner. The Citrix platform makes this secure access possible by giving users access to their physical office PCs.May 31, 2022

Full Answer

How to log into Citrix from home?

Users can log on by using any of the following Citrix Workspace apps:

  • Citrix Workspace app for Web
  • Citrix Workspace app for Windows
  • Citrix Workspace app for Mac
  • Citrix Workspace app for iOS
  • Citrix Workspace app for Android

How to get on to Citrix our remote applicaton server?

What Programs are accessible through the Remote Application Server?

  • EMS
  • Real VNC
  • Remote Desktop

How to install and configure Citrix remote PC?

This guide will showcase how to perform the following actions:

  • Create a Citrix Cloud account (if you don’t have one already)
  • Obtain a Citrix Virtual Desktops service account
  • Create a new Resource Location (your office) and install the Citrix Cloud Connectors in it
  • Install Citrix Virtual Delivery Agent on the Remote PC Access hosts
  • Create a Machine Catalog in Citrix Virtual Desktops service
  • Create a Delivery Group

More items...

How do I install Citrix on my computer?

Install and Uninstall

  • Using a Windows-based installer. By default, the installer logs are at %temp%\CTXReceiverInstallLogs*.logs. ...
  • Using command-line parameters. You can customize the Citrix Workspace app installer by specifying different command-line options. ...
  • List of command-line parameters. ...
  • Reset Citrix Workspace app. ...
  • Uninstall. ...

image

Is Citrix remote access?

Citrix Gateway is an on-premises solution that makes remote access simple without compromising employee experience—all while protecting access to apps and resources in a secure, easy-to-manage solution.

What is the difference between Citrix and remote desktop?

Citrix performs better than RDS because: There's no need to share limited server resources; Citrix offers better scalability for the number of concurrent users you have; It offers better data compression resulting in faster performance.

What is the difference between Citrix and VPN?

The primary difference is that on Citrix, users gain access to their virtual workstation and resources. Meanwhile, the VPN operates directly with the device used and all of its software and applications.

Is Citrix remote desktop free?

Citrix Workspace app is the easy-to-install client software that provides seamless, secure access to everything you need to get work done. With this free download, you easily and securely get instant access to all applications, desktops and data from any device, including smartphones, tablets, PCs and Macs.

How does Citrix Remote Desktop work?

Remote PC Access is a feature of Citrix Virtual Apps and Desktops that enables organizations to easily allow their employees to access corporate resources remotely in a secure manner. The Citrix platform makes this secure access possible by giving users access to their physical office PCs.

Is Citrix more secure than RDP?

Security Comparison Citrix has stronger embedded security. Citrix also offers a secure browser service which protects the corporate network by isolating web browsing from the corporate network. Essentially, users are able to access the internet, yet the web browser is still isolated from the corporate network.

Can Citrix replace VPN?

Security is augmented with Citrix Secure Private Access service, which replaces traditional VPN appliances with a fully managed, globally available, cloud-based service. Complex network security policies are removed by providing protected access to applications and data.

Is Citrix remote access a VPN?

Citrix Gateway is a full SSL VPN solution that provides users, access to network resources. With both full tunnel VPN as well as options for clientless VPN, users can access applications and data deployed on-premises, or in a cloud environment.

What is the purpose of Citrix?

Citrix Server uses Microsoft Remote Desktop Services to bring their customers a virtual desktop to remote staff and other users. Citrix is a company that helps workforces access desktops and applications remotely and securely through a remote server as if the layout were on your computer.

What is difference between Citrix Receiver and Citrix Workspace?

Citrix Workspace app is a new client from Citrix that works similar to Citrix Receiver and is fully backward-compatible with your organization's Citrix infrastructure. Citrix Workspace app provides the full capabilities of Citrix Receiver, as well as new capabilities based on your organization's Citrix deployment.

How expensive is Citrix?

Citrix charges US $15 per user, per month. It is a comprehensive digital workspace solution that expands on on-premises deployments to create an open architecture that supports public or hybrid deployments. Citrix charges US $25 per user, per month.

What is the difference between Citrix Receiver and workspace?

Citrix Workspace app is a new client from Citrix that works similar to Citrix Receiver and is fully backward-compatible with your organization's Citrix infrastructure. Citrix Workspace app provides the full capabilities of Citrix Receiver, as well as new capabilities based on your organization's Citrix deployment.

What is the use of Citrix?

Installed on user devices and other endpoints (such as virtual desktops), Citrix Workspace app provides users with quick, secure, self-service access to documents, applications, and desktops. Citrix Workspace app provides on-demand access to Windows, Web, and Software as a Service (SaaS) applications.

Is Citrix a Windows server?

In Citrix Virtual Apps and Desktops and Citrix DaaS (formerly Citrix Virtual Apps and Desktops service) deployments, Server VDI is supported on Windows Server 2022, Windows Server 2019, and Windows Server 2016. All Server VDI deployments support the user personalization layer technology.

How is Citrix different from VMware?

The main difference between the two is the intended usage of the software. The Citrix XenServer is used by personal users and small to medium-sized businesses, while VMware vSphere ESXi is only intended for small to medium-sized businesses and is not structured for personal use.

What is remote access in Citrix?

Remote PC Access is a feature of Citrix Virtual Apps and Desktops that enables organizations to easily allow their employees to access corporate resources remotely in a secure manner. The Citrix platform makes this secure access possible by giving users access to their physical office PCs. If users can access their office PCs, they can access all the applications, data, and resources they need to do their work. Remote PC Access eliminates the need to introduce and provide other tools to accommodate teleworking. For example, virtual desktops or applications and their associated infrastructure.

Can I use remote access on my laptop?

Ensure that the Delivery Controllers or Cloud Connectors can be reached from the Wi-Fi network. You can use Remote PC Access on laptop computers. Ensure the laptop is connected to a power source instead of running on the battery. Configure the laptop power options to match the options of a desktop PC.

Can Linux VDA be used in 3D mode?

Linux VDA considerations. These considerations are specific to the Linux VDA: Use the Linux VDA on physical machines only in non-3D mode. Due to limitations on NVIDIA’s driver, the local screen of the PC cannot be blacked out and displays the activities of the session when HDX 3D mode is enabled.

How does secure remote access work?

Enabling remote access means walking a tightrope between usability and cybersecurity. Every remote worker needs a way to connect with remote desktop services and applications that won't slow down their workflows. At the same time, IT administrators must manage those connections to ensure they don't leave the network open to threats.

Why is secure remote access important to remote work security?

Secure remote access approaches are so vital because it’s now impossible to control security at the endpoint. Each user in a remote or hybrid workforce is connecting to the network from a different type of computer or smartphone, and they’re using a variety of internet connections to log in.

What are the options for secure remote access?

Multiple solutions go into a comprehensive secure remote access package—and each one delivers vital functionality that reflects the way companies use their networks today. These features work together to protect users, data, and network assets in a distinct way.

Next-gen remote access solutions for a secure digital workspace

Learn how remote access solutions can secure digital workspaces and enhance the user experience.

Citrix solutions for secure remote access

Citrix secure access solutions take several forms to give companies a balanced selection of options based on their specific requirements. Whatever level of engagement with remote work these businesses have, there is a secure remote access solution for the situation.

Overview

Citrix announced the addition of Remote PC Access within Citrix Virtual Desktops service on April 30, 2020. This Proof of Concept guide is designed to help you quickly configure Citrix Virtual Desktops service to include Remote PC Access in your environment.

Scope

In this Proof of Concept guide, you will experience the role of a Citrix administrator and you will create a connection between your organization’s on-premises deployment of physical desktops and the Citrix Virtual Desktops service.

Prerequisites

The in-office workstations that your users must connect to are Windows single-session operating system machines, and are joined to a Windows Active Directory (AD) domain.

Subscribe to the Citrix Virtual Desktops service

Enter username and password. Click Sign In. (If your account manages more than one customer select the appropriate one)

Create a new Resource Location

While the service is being provisioned, we can keep going. Return to the Citrix Cloud administration page. Scroll up, under Resource Locations Click Edit or Add New

Install Citrix Virtual Delivery Agent on the Remote PC Access hosts

We now install the Citrix Virtual Desktops, Virtual Delivery Agent on the physical machines that we are going to give users access to. If you want to install the Citrix Virtual Delivery Agent using scripts or a deployment tool like SCCM follow the appropriate links.

Create a machine catalog in Citrix Virtual Desktops service

Use Citrix Virtual Desktops service to create a catalog of the physical machines

What happens if a Citrix office PC is not powered on?

If the office PC is not powered on with the VDA registered, the user’s session cannot be brokered. Citrix recommends putting in place processes to ensure the machines that users need to connect to are powered-on. If available, modify the PC’s BIOS setting to automatically power on in the event of a power failure.

What is remote access?

Remote PC Access is an easy and effective way to allow users to access their office-based, physical Windows PC. Using any endpoint device, users can remain productive regardless of their location. However, organizations want to consider the following when implementing Remote PC Access.

What version of Citrix is compatible with Windows 10?

For deployment on Windows 10, customers should use the Citrix Virtual Apps and Desktops 1912 LTSR VDA or a supported Current Release VDA. Citrix version compatibility for Windows 10 builds can be found in CTX224843.

Can Citrix access my work PC?

Users can remotely access their work PC with an untrusted, personal device. Organizations can use integrated Citrix Virtual Apps and Desktops policies to protect against: Endpoint Risks: Key loggers secretly installed on the endpoint device can easily capture a user name and password.

Where are computing resources shared?

In certain situations, users need to share a set of computing resources, often found in computing labs at schools, colleges, and universities. Users are randomly assigned to an available physical PC.

Does Citrix require profile management?

In a Remote PC Access deployment, most implementations do not require profile management . However, Citrix User Profile Manager also captures performance metrics, which are useful for administrators to identify and fix performance-related issues. User Profile Manager does not have to be configured, it just needs to be deployed to capture metrics.

What is Citrix Remote PC Access?

The Citrix Remote PC Access solution enables end users to securely access their physical windows desktops and laptops in their office from anywhere and from any device using the full stack of HDX capabilities for the best user experience.

What is Citrix Cloud Virtual Apps and Desktops Service?

An existing Citrix Cloud Virtual Apps and Desktops Service customer who is looking to gain more value from Citrix to enable exciting new ways to deliver remote access to Office PCs alongside their existing Citrix deployment.

What is the Operations Layer in Citrix?

This Layer focuses on the tools and components which are required to manage the Citrix workloads and Remote PC Access desktops within Resource Locations. For the on-premises environment, the operations layer focuses on the tools like Citrix Studio and Citrix Director which helps in controlling the infrastructure and monitoring the complete Citrix environment.

What is the control plane on Citrix?

In this architecture, the control plane is hosted on Citrix Cloud and managed by Citrix along with Workspace. The on-premises Gateway is included to enable the users to connect to the Remote PC Access solution over the internet.

How does VPN work in an enterprise?

An enterprise organization has a VPN solution to allow their employees to access the enterprise network remotely. To achieve this requirement, the network administrator has enabled VPN tunnels with dual-factor authentication. After the VPN authentication, users then create their own RDP links to access the machines which reside on the LAN. Users access the remote desktop and applications via the VPN secure connection. In this solution, administrators need to apply Network Access Controls to ensure users are connecting from allowed systems and apply policies to enable/disable certain protocols to restrict the data access. Organization security policy insists that the user connection will be allowed only when pre-authentication scans are valid in remote user’s PCs, and sometimes require certain OS patch levels to maintain a secure perimeter from viruses and malware. The organization has found that the users are unhappy with the VPN solution due to frequent disconnection and rejection of VPN connections when antivirus updates occur and other security failures.

Is Citrix translated?

The official version of this content is in English. Some of the Citrix documentation content is machine translated for your convenience only. Citrix has no control over machine-translated content, which may contain errors, inaccuracies or unsuitable language. No warranty of any kind, either expressed or implied, is made as to the accuracy, reliability, suitability, or correctness of any translations made from the English original into any other language, or that your Citrix product or service conforms to any machine translated content, and any warranty provided under the applicable end user license agreement or terms of service, or any other agreement with Citrix, that the product or service conforms with any documentation shall not apply to the extent that such documentation has been machine translated. Citrix will not be held responsible for any damage or issues that may arise from using machine-translated content.

What are Windows login rights?

The Windows logon rights are: log on locally, log on through Remote Desktop Services, log on over the network (access this computer from the network), log on as a batch job, and log on as a service. For computer accounts, grant computers only the logon rights they require.

What is a user environment?

Your user environment can contain either user devices that are unmanaged by your organization and completely under the control of the user, or user devices that are managed and administered by your organization. The security considerations for these two environments are generally different.

What is a logon rights?

Manage logon rights. Logon rights are required for both user accounts and computer accounts. As with Microsoft Windows privileges, logon rights continue to be applied to desktops in the usual way: configure logon rights through User Rights Assignment and group memberships through Group Policy.

What is pooled desktop?

If a desktop is a pooled desktop rather than a dedicated desktop, the user must be trusted in respect of all other users of that desktop, including future users. All users of the desktop need to be aware of the potential permanent risk to their data security posed by this situation.

What is managed user device?

Managed user devices are under administrative control; they are either under your own control, or the control of another organization that you trust. You may configure and supply user devices directly to users; alternatively, you may provide terminals on which a single desktop runs in full-screen-only mode. Follow the general security best practices described above for all managed user devices. This release has the advantage that minimal software is required on a user device.

Can a device be under administrative control?

User devices that are not managed and administered by a trusted organization cannot be assumed to be under administrative control. For example, you might permit users to obtain and configure their own devices, but users might not follow the general security best practices described above. This release has the advantage that it is possible to deliver desktops securely to unmanaged user devices. These devices should still have basic antivirus protection that will defeat keylogger and similar input attacks.

Is Citrix SecureICA encrypted?

In addition, communication between user devices and desktops is secured through Citrix SecureICA, which is configured by default to 128-bit encryption. You can configure SecureICA when you are creating or updating a Delivery Group. Note:

Citrix Access Gateway (CAG)

CAG is designed for users that do not have VA Government Furnished Equipment (GFE). CAG is a good option to allow users access to general applications such as email and chat.

Cisco AnyConnect VPN

The Cisco AnyConnect VPN Client is only for use on VA Government Furnished Equipment (GFE) and is installed on all GFE laptops.

Azure Virtual Desktop

Azure Virtual Desktop (AVD) is designed for users with a Windows 10 (either VA-furnished or privately-owned) or personal Windows 11 computer. This is a good option for users who need access to a standardized VA desktop (PIV or eToken required).

PIV Issues?

Using the yourIT Self Service, you can now initiate your own 24-hour PIV exemption!

Tips for Telework

Place your router in a central area of your home and elevate it off the floor in an upright position.

image
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9