WinRM for XenDesktop
Website Visitors:Windows Remote Management (WinRM) is the Microsoft implementation of WS-Management Protocol(a protocol developed by a group of hardware and software manufacturers as a public standard for remotely exchanging management data with any computer device that implements the protocol.), a standard Simple Object Access Protocol (SOAP)-based, firewall-friendly protocol that allows hardware and operating systems, from different vendors, to interoperate.
The WS-Management protocol specification provides a common way for systems to access and exchange management information across an IT infrastructure. WinRM and Intelligent Platform Management Interface (IPMI), along with the Event Collector are components of the Windows Hardware Management features.
(OR)
WinRM is short for Windows Remote Management. It is Microsoft’s new remote management standard which allows administrators to remotely manage and remotely execute programs on windows machines. Prior to this Remote Procedure Calls (RPC) had to be used for everything by collecting data from the COM and DCOM services.
One of the best features of a XenDesktop 5.5/5.6 is the Virtual Desktop management via the Desktop Director. It provides Admins, Support/NOC folks with an excellent overview on what is going on inside your deployment which can be utilized for user connection troubleshooting. What is really nice, is that it gives you information on user sessions including Audio, USB devices, Flash Redirection, Printing as well as others. One of the best features is to allow connections (AKA Shadowing) directly to XD sessions.
To use this feature you must configure WinRM, if this is not set up on your XD’s, you will receive an error when establishing a connection.
WinRM Configuration:
Configure WinRM Listeners through Quick Configure.
- Configuration HTTP listener and other actions to enable this machine for remote management:
winrm qc
- Configuration HTTPS listener and other actions to enable this machine for remote management:
winrm qc –transport:https
Note: this command requires a valid server authentication certificate present in machine MY store.
Configure WinRM HTTP listener through Group Policy.
- Launch Group Policy Management on Windows Server 2008 Domain Controller machine.
- Create a new Starter GPO.
- Right click “Starter GPOs” and click “New” and give a name (for example “turn on winrm http listener”) and comment if needed.
- Right click the created Starter GPO and click “Edit”. A window “Group Policy Starter GPO Editor” pops up.
- Browse the tree on left pane of “Group Policy Starter GPO Editor” to “Administrative Templatesà Windows ComponentsàWindows Remote Management (WinRM) à WinRM Service”
- Double click the policy setting “Allow automatic configuration of listeners”. A window “Allow automatic configuration of listeners” will show up.
- Check “Enabled” button. In the options field, put filter for IPv4 and IPv6. For example, fill “*” in both IPv4 and IPv6 text boxes and click OK.
- Close the “Group Policy Starter GPO Editor”.
- Click setting tab in the right pane of “Group Policy Management” and refresh the setting. You setting will show up in the right pane.
- Create a new Group Policy Object.
- Right click “Group Policy Objects” and click “New”.
- Give a name to the GPO and select the Starter GPO created in step 2.
- Click OK.
- Link the new Group Policy object to the domain.
- Right click your domain name and click “Link an existing GPO.”
- In the “select GPO” dialogue, select the GPO created in step 3.
- Click OK.
- On the client machine in the domain, run “gpupdate /force” or wait the group policy to be deployed to the client machine.
- On the client machine, enumerate the winRM listeners (winrm e winrm/config/listener). A new GPO source listener should be created automatically.
Configure WinRM HTTP listener without quick configure and Group Policy.
- Create an instance of HTTP Listener on all IPs:
winrm create winrm/config/Listener?Address=*+Transport=HTTP
- Create instance of HTTPS Listener on all IPs:
winrm create winrm/config/Listener?Address=*+Transport=HTTPS @{Hostname=“HOST”;CertificateThumbprint=“XXXXXXXXXX”}
Note: XXXXXXXXXX represents a 40-digit hex string; see help config.
Want to learn more on Citrix Automations and solutions???
Subscribe to get our latest content by email.