Articles In Infrastructure

By Timothy Karl, Posted in Infrastructure, Storage, Support

One of the common issues I see in VDI are FSLogix profile disks taking up a lot of space. Users’ profiles grow organically over time as they use VDI. If an IT administrator doesn’t monitor and perform regular maintenance on the profile shares, they can run out of space. When this happens, users are unable to log on and active profiles start to become corrupted. Adding more storage can temporarily get things back online; however, that might not always be an option as adding more storage and expan... read more.

  • September 16, 2021

By Nancy Rand, Posted in Infrastructure, Security

On August 5, 2021, the PCI DSS Council and the Cloud Security Alliance (CSA) issued a joint statement on the importance of cloud scoping. Best practices focus areas are discussed: Data protection, Authentication, Systems management, DevOps & DevSecOps, Data governance and Resiliency. These best practices are important to the security of clou... read more.

  • September 02, 2021

By Ed Bratter, Posted in Infrastructure, Security

One of the benefits of Microsoft 365 is the ability for users to collaborate and share with co-workers, clients, vendors, partners, and people external to the organization. This benefit, however, comes with a downside; users can either purposely or inadvertently expose information that the organization would not want shared externally.   To complicate matters, newly established tenants leave the door wide-open for publishing data to external entities. As a result, users can share data with outside ind... read more.

  • July 27, 2021

By Timothy Karl, Posted in Infrastructure, Security

With anti-malware scanning software it is very important to have the proper malware exclusions in place. A misconfiguration of these settings may lead to performance issues which can may cause outages of critical applications and services due to file contention and locking. IT administrators need to find a balance between a malware-free environment and affecting the reliability and performance of any applications or services. Anti-malware exclusions can come from a variety of sources. Each anti-malwar... read more.

  • July 02, 2021

By Nancy Rand, Posted in Infrastructure, Security

The Cloud Security Alliance released two new research documents to provide guidance on Cloud Incident Response and Consuming and Providing APIs. Cloud Incident Response provides a framework for handling the lifecycle of a security incident in the cloud and discusses what information is shared inte... read more.

  • May 18, 2021

By Timothy Karl, Posted in Infrastructure, Support

Today, over 85% of organizations worldwide operate on Microsoft Active Directory. In many cases, Active Directory has been in place for decades and has not been well maintained for security posture. Hackers often target Active Directory as an easy way for gaining access to a customer’s environment. Gotham has developed an Active Directory Security Risk Assessment offering to provide specific actionable guidance to mitigate security risks in your Active Directory environment. The assessment focuses on... read more.

  • March 31, 2021

By Monica Jimenez, Posted in Infrastructure, Security

The combinations of authentication apps and thin clients are endless nowadays. With the many different types of technologies out there though, not every combination has been documented. At a recent customer engagement, there was a combination of products that isn’t very common, at least not yet, being implemented in an IGEL environment.  Customer Environment: IGEL devices on firmware using the built-in default Citrix Workspace client are deployed within an environment configured fo... read more.

  • March 02, 2021

By Hank Smith, Posted in Infrastructure

That question came up recently for a customer when all of their vSphere hosts (8 in total) were pegged at 100% CPU. Customer Environment The environment consists of eight Nutanix nodes (servers) within a cluster running VMware vSphere 6.7 U3. The Nutanix clusters host core services (AD, SQL, File & Print, etc.) along with a Citrix Virtual Apps and Desktops 7.15 LTSR environment. Users access the environment via a pair of Citrix ADC VPX 200s. The user load is split between Virtual App sessions and Wind... read more.

  • January 25, 2021

By Hank Smith, Posted in Infrastructure, Virtualization

Windows Virtual Desktop (WVD), was released in September 2019, and is seen as the next step in the evolution of Microsoft’s OS. Microsoft Azure really doesn’t offer native management of WVD, and that is where Citrix, VMware, NetApp VDS (formerly CloudJumper), and Nerdio come in. CitrixAnyone familiar with Citrix Cloud can easily create WVD desktops as it is just another target. Citrix supports a variety of features with the use of WVD, specifically the HDX protocol, integration with other target... read more.

  • June 29, 2020

By Kamran Ahmad, Posted in Infrastructure

Last December, Citrix released Citrix Virtual Apps and Desktops 1912 Long Term Service Release (LTSR), formerly known as XenApp/XenDesktop. Cumulative Update 1 was released last month with new features and fixes that are described in this article. When Citrix Virtual Apps and Desktop 1912 LTSR was first released, customers using XenApp and XenDesktop 7.15 LTSR were required to upgrade to Cumulative Update 5. However, the Cumulative Update for Citrix Virtual Apps and Desktops 7 LTSR 1912 allows customers to... read more.

  • June 18, 2020