

This results in much better performance over any links with latency. To know more refer to the XenApp and XenDesktop product documentationĪpplications dynamically detect a webcam being plugged in or removed on the client. Smartcard v3 is a new smartcard virtual channel that accesses the card at a higher level in the stack, reducing the number of calls. While Citrix improved smartcard logon times with the smartcard v2 release, smartcard access could still suffer from performance issues due to link latency.

To learn more on the configuration, please refer to the product documentation Fast Smartcard Deprecation of TLS/DTLS cipher suites which do not offer forward secrecy.Support for DTLS version 1.2 (Direct Connections).The new Citrix Receiver for Windows 4.12 contains two important changes pertaining to TLS/DTLS secure communications protocol: We heard you loud and clear… and we’ve answered with with enhanced security. Citrix continues to enhance the security of its products to match the current standards. In addition to improved quality (because we work continually to make things better), Receiver for Windows 4.12 has lots in store. Guess what? The latest version of Receiver for Windows 4.12 is here! NetScaler Application Delivery Management.NetScaler App Delivery and Security Service.
#CITRIX RECEIVER 4.12FOR WINDOWS 10 UPGRADE#
Upgrade to Citrix Receiver for Windows 4. Ii) Customers currently on the 7.6CU version of XenDesktop are advised to upgrade to a newer version, as some session launches might fail in this version with the latest receiver.Ĭitrix intends to offer a smooth and seamless upgrade to the latest version of receiver with minimal efforts expected from your end, while ensuring secure end-to-end communication. Please upgrade the Netscaler gateway to higher version or change the cipher suite of VDA to “ANY”. I) These settings will not be applicable for NetScaler 10.5.x version when the cipher suite is set to “GOV” on 7.18 VDA. You can refer to the article for detailed steps regarding cipher order configuration on the NetScaler Gateway. Citrix may completely remove these deprecated ciphers in future release.Ĭonfiguring ciphersuites on the Netscaler Gateway: To prioritize the order in which cipher suites are chosen by the VDA, and if session launch failures are encountered, you should configure the cipher suites on NetScaler Gateway, to ensure appropriate, cryptographically strong cipher suites are used for communication.

This ensures that by default the deprecated Ciphers will still work, however it is not recommended to continue using them. But, to enable the other two above mentioned cipher suites, or disable any of the above options, configure the same through the Group Policy, along with TLS_RSA_ flag checked . The TLS_RSA_ flag is enabled as the default setting. This is to ensure seamless backward compatibility with older VDAs that still need these ciphers for connection. Use the toggle options to Enable/Disable the ciphers.In the Group Policy Editor, under the Computer Configuration node, go to Administrative Template > Citrix Component > Citrix Receiver > Network Routing > Deprecated cipher suites.In case of an upgrade, the existing settings are retained when the latest files are imported. Refer to the document for detailed instructions. Add the Receiver GPO template if it is not added to the local GPO.Below is the list of these deprecated ciphers:Ĭonfiguration for backward compatibility: Citrix provides three flags in the group policy to configure these cipher suites, namely: In the new update, all cipher suites whose names begin with TLS_RSA_ have been deprecated, as they are considered cryptographically weak. NetScaler Application Delivery ManagementĬitrix continues to enhance the security of its products to match the current standards.
