Blogs from myself

writing about cool stuff...

While running UPM 5.8 in a Windows 32-bit OS, customer may suffer a periodical UserProfileManger.exe crash, every 7 days exactly. Windows Application Event will log event 1000 for that crash with exception code 0xc0000005, which indicates memory Access Violation. https://support.citrix.com/article/CTX224931

Continue Reading  

As CBs are not tested properly and are not enterprise ready Citrix doesn’t support CBs. We only support CBBs and LTSBs. If your Windows 10 version is a CB then you have to switch to a CBB or LTSB version and then proceed further with the VDA installation process https://support.citrix.com/article/CTX224843  

Continue Reading  

After Synergy I’m also attend E2EVC for the first time this year. First of all many thanks to Alex Cooper (the Organisator) since many years for this great event. Full house with 50 people on the first day with awesome presentations the hole day. With Trond Eirik Haaverstein (aka Erik) from xenappblog and my private developer […]

Continue Reading  

Working on the next Version of BIS-F 6.0.3 it’s supporting Hyper-V UEFI, BIS-F using ImagingWizard instead of P2PVS to convert the Disk to the attached vDisk and also supports Citrix Optimizer Engine (CTXOE). But for the next Major Release 6.1.x we have a big list prepared with Features, Issues, and Bugs. Is that we really need or […]

Continue Reading  

In past design decisions, the customer would like often to configure a single FQDN for both Netscaler (external) and StoreFront (internal) deployment. First off all the customer must have the same DNS Zone for external and internal access to fulfill this solution. In the picture and in the PDF (you can download below) I have add […]

Continue Reading  

If you working with our Base Image Script Framework (BIS-F) and you have some trouble or develop own scripts to extend BIS-F, you can help your trouble with some easy steps. Enable debugmode one CLI comand are also available, if you start BIS-F in debugmode you must press any key after an logentry is written. […]

Continue Reading