Citrix DaaS™

Citrix Advisor

Citrix Advisor is a service that helps you optimize DaaS deployment and enhance its overall health and readiness. It automates environment checks and delivers actionable recommendations, empowering you to proactively identify configuration issues, inefficiencies, resource wastes, deviations from best practices, and more.

Advisor landing page

Note:

  • This service is available exclusively to Full Administrators.
  • We recommend submitting your feedback using the feedback icon in the top-right corner of the page.

Benefits

With Advisor, you can:

  • Proactively identify and resolve issues: Detect potential problems, configuration drift, and deviations from best practices before they impact users, disrupt business operations, or compromise security.
  • Optimize environment performance and stability: Fine-tune configurations, optimize resource allocation, and implement best practices to enhance the stability, security, and performance of your Citrix deployments.
  • Streamline operations and reduce overhead: Automate routine checks, simplify complex remediation tasks, and receive guided assistance, thus reducing operational overhead and freeing up administrative resources.
  • Optimize costs and resource utilization: Identify areas of overspending, uncover opportunities for resource optimization, and ensure efficient utilization of Citrix technologies to minimize the total cost of ownership.
  • Maintain compliance and adherence to best practices: Ensure that your Citrix deployments adhere to Citrix best practices, security standards, and industry regulations, reducing risk and improving overall governance.
  • Simplify complex tasks: Simplify administrative tasks to support a healthy, optimized environment.

Check for recommendations

To check your site for Advisor recommendations, follow these steps:

  1. Sign in to Citrix Cloud using an account with the Full Administrator role.
  2. Click the DaaS tile.
  3. In the left pane, select Advisor.
  4. Click Check site.
  5. On the Check site page, select the categories you want Advisor to check.

    Category Description Reference
    Security Recommendations for detecting threats and vulnerabilities that might lead to security breaches. Security recommendations
    Reliability Recommendations for ensuring and improving the continuity of your business-critical applications. Reliability recommendations
    Performance Recommendations for enhancing performance across applications and desktops to deliver faster, more responsive experiences for end users. Performance recommendations
    Operational excellence Recommendations for helping you achieve process and workflow efficiency, resource manageability, and deployment best practices. Operational excellence recommendations
    Cost optimization Recommendations for reducing overall spending by right-sizing resources, minimizing waste, and aligning capacity with actual usage needs. Cost optimization recommendations
  6. Click Run check to run a site check and generate updated recommendations based on the current configuration.

    All recommendations appear in the list.

    Access Advisor

Filter recommendations

You can filter recommendations by Impact, Category, or Component to focus on the information most relevant to your deployment.

  1. In Advisor, locate the filters at the top right of the recommendation list.

    Advisor Categories

  2. Click a filter (for example, Category) to view available options.

  3. Select one or more checkboxes to apply the filter. The list updates automatically to display only the recommendations that match your selections.

  4. Use multiple filters together to narrow down the list.

    Advisor filters

Review and act on recommendations

Use the recommendations list to understand configuration issues and improvement opportunities in your deployment. You can take the following actions on recommendations:

View recommendation details

To review a recommendation, select a recommendation to view its details in the lower pane.

Advisor Details

To implement the recommended actions for a recommendation, follow these steps:

  1. Select a recommendation.
  2. Click Fix now in the action bar.
  3. Follow the recommended steps to make the necessary updates.

    Sometimes, you’re directed to supporting documentation when automated configuration isn’t supported or feasible. We want to make sure that Advisor is designed to provide automated actions directly within the UI wherever possible, minimizing the need for manual setup.

  4. After making updates, click Recheck to update the status of the affected targets.

Fix recommendation

Note:

The UI and steps vary depending on the recommendation. The screenshot shown is for illustration purposes only.

Dismiss recommendations

If a recommendation isn’t relevant to your deployment or doesn’t require action, you can remove it from the current list and future check results:

  1. Select the recommendation.
  2. Click Dismiss in the action bar.

Tip:

To restore a dismissed target in a recommendation, click the Gear icon in the upper-right corner above the recommendation list, and select Manage dismissed items

Dismiss specific affected targets in a recommendation

If a recommendation includes affected targets that are intentionally non-compliant with best practices (for example, test, validation, or temporary resources), you can remove them from this recommendation (granular dismissal).

Note:

Granular dismissal is supported only for the following targets: machine catalogs, delivery groups, application groups, and zones.

Detailed steps are as follows:

  1. Select the recommendation.
  2. Click the Affected targets field of the recommendation. The recommendation page displays all affected targets.
  3. Hover over the affected target that you want to dismiss. A Dismiss icon appears in the top-right corner of the target.

    granular dismissal

  4. Click the Dismiss icon. A dismissal confirmation dialog box appears.

  5. Enter a note for the dismissal if needed, and then click Dismiss. The affected target is removed from the recommendation page.

Tip:

To restore a dismissed target in a recommendation, click the Gear icon in the upper-right corner above the recommendation list, and select Manage dismissed items.

Customize check rules

You can customize Advisor check rules for the following recommendations:

  • Enhance Cloud Connector hardware: Adjust thresholds for CPU, memory, and disk usage, and exclude specific disks.
  • Release unused resources: Define custom unused time thresholds for machines and applications.
  • Optimize GPO configuration for VDAs: Modify the GPO processing time threshold.

To customize the check rule for a single recommendation, follow these steps:

  1. Select a recommendation and click Customize in the action bar.

    Customize check rule

  2. On the Customize page, update the check settings as needed.
  3. Click Save. Changes take effect the next time you run the check.

To customize check rules for all three recommendations from a central location, follow these steps:

  1. Click the Gear icon in the upper-right corner above the recommendation list, and select Customize rules. The three recommendations appear.
  2. Click the Edit icon next to a recommendation.
  3. Update the check settings as needed.
  4. To update check rules for the remaining recommendations, repeat steps 2–3.
  5. Click Save. Changes take effect the next time you run the check.

View the full site check report

The full report provides a summary of all Advisor recommendations from the latest site check. It includes passed, dismissed, and unresolved checkpoints, helping you assess the overall health and optimization opportunities in your DaaS site.

To view the full report, click the View full report icon at the top right of the recommendation list.

Advisor full report

References

This section lists all Citrix Advisor recommendations by category to help you understand their purpose and impact.

Security recommendations

Recommendation ID Impact Component Description
Upgrade VDAs that reached End of Life REC_001 High VDA Some machines are using VDA versions that have reached End of Life and are no longer supported by Citrix. Upgrade affected machines to the latest LTSR or CR VDA version.
Assign resources to security groups REC_016 Medium General Some resources are assigned to individual users. It is a Citrix best practice only to assign user access through security groups to streamline management and enhance security. Reconfigure the user assignment for delivery and application groups to include only security groups.
Upgrade Citrix Workspace app versions that reached End of Life REC_017 High Workspace app Some endpoint devices use a Citrix Workspace app version that reached End of Life. Upgrade devices to the latest Workspace app version to reduce supportability and security risks. For simplified version management and automatic update control, use Global App Configuration Service. Additionally, consider using endpoint analysis solutions to enforce a minimum Workspace app version to access the store.
Implement device posture policies REC_021 Medium Secure Private Access The current Secure Private Access configuration lacks device posture policies, allowing unrestricted access to internal applications from any device. To mitigate this risk and enhance security, implement device posture policies that classify devices as: Compliant, Non-compliant, and Denied access.
Implement adaptive access policies REC_022 Medium Secure Private Access The current Secure Private Access configuration lacks adaptive access policies, allowing potentially insecure access to applications. To enhance security, implement adaptive access policies that dynamically control access to enterprise web, SaaS, TCP, and UDP apps based on context. For granular controls, enable restricted access to enterprise web and SaaS apps by adding the security restrictions: Clipboard, Screen capture, Printing, Key logging protection, Downloads, Uploads, Watermark, and Open in remote browser.
Upgrade operating systems that reached End of Life REC_024 High VDA Some machines are running operating systems (OS) that have reached End of Life. This poses significant security risks and may result in loss of support from both Citrix and the OS vendor. To maintain a secure and stable environment, ensure all your VDAs run a supported operating system.
Upgrade hypervisor versions that reached End of Life REC_025 Security Hypervisor Details: Some hypervisors are running versions that have reached End of Life. This poses a risk to environment stability and limits Citrix’s ability to provide full support. To maintain a secure, supportable environment, upgrade to a vendor-supported hypervisor version. Regularly review vendor release notes and compatibility documentation to stay aligned with leading practices and platform requirements.
Use HTTPS for host connections REC_039 Medium General Some host connections are currently configured with HTTP instead of HTTPS. To ensure secure communication with your hypervisor, update these connections to use HTTPS. This requires enabling HTTPS on your hypervisor and ensuring valid TLS certificates are in place.
Address VDA security vulnerabilities REC_040 High VDA Security vulnerabilities impact some of your VDA versions. Review the Citrix Security Bulletin and apply the necessary fixes or mitigations to ensure system integrity and compliance.
Address Citrix Workspace app security vulnerabilities REC_041 High Workspace app Security vulnerabilities impact some Citrix Workspace app versions on endpoint devices. Review the Citrix Security Bulletin and apply the necessary fixes or mitigations to ensure system integrity and compliance.
Upgrade StoreFront server versions that reached End of Life REC_043 High StoreFront Some StoreFront servers are running versions that have reached End of Life and are no longer supported by Citrix. To maintain a secure, supportable environment, upgrade all affected StoreFront servers to the latest LTSR or CR version.
Use HTTPS for StoreFront base URL REC_044 High StoreFront Some StoreFront base URLs are currently configured with HTTP instead of HTTPS. To protect user credentials and sensitive data, configure your StoreFront servers and associated load balancers to use HTTPS. Make sure the base URL begins with ‘https://’. This ensures all communications are encrypted and helps prevent security threats such as man-in-the-middle attacks.
Use HTTPS for communication between StoreFront and Cloud Connectors REC_045 High StoreFront Traffic between StoreFront and Cloud Connectors is currently transmitted over unencrypted HTTP, which can expose user credentials to security threats. To protect your environment, enable HTTPS on Cloud Connectors and configure StoreFront to use secure connections.
Review StoreFront stores with anonymous access enabled REC_052 Medium StoreFront Anonymous access is enabled for some StoreFront stores, allowing users to launch applications without authentication. To mitigate potential security risks, review these stores and remove unused ones.

Reliability recommendations

Recommendation ID Impact Component Description
Configure restart schedules for multi-session delivery groups REC_004 High VDA Some multi-session delivery groups do not have restart schedules configured. Scheduled restarts help maintain optimal performance, stability, and resource availability across multi-session OS VDAs. To ensure service continuity and reduce downtime, create at least two restart schedules. Alternate restart schedules with tag restrictions by tagging VDAs into groups, such as ‘Even’ and ‘Odd.’
Alternate restart schedules for multi-session delivery groups REC_005 Medium VDA Some multi-session delivery groups only have one restart schedule configured. To ensure service continuity and reduce downtime, create at least two restart schedules. Alternate restart schedules with tag restrictions by tagging VDAs into groups, such as ‘Even’ and ‘Odd.’
Host applications on multiple VDAs REC_006 High VDA Some published applications are hosted on only a single VDA, which can impact service continuity and lead to downtime risks. Ensure that each application is hosted on multiple VDAs in a delivery group to help maintain availability and reliability.
Enable service continuity for Citrix Workspace REC_007 High Citrix Workspace Service continuity isn’t enabled, which means that during a service disruption, users might not be able to launch sessions. Enable service continuity to improve availability by adding an extra layer of resiliency that maintains end-user access to apps and desktops despite network or service health.
Upgrade VDAs to match the catalog functional level REC_008 High VDA Some machines use an earlier VDA version not supported by the minimum catalog functional level, which can prevent them from registering. To avoid registration issues, upgrade earlier VDA versions to match the catalog functional level.
Deploy Cloud Connectors in your zones REC_014 High Cloud Connector Fewer than two Cloud Connectors are deployed in some of your zones (resource locations). Deploy at least two Cloud Connectors per resource location to maintain availability and resiliency during Connector updates. Resource locations should follow the N + 1 model, where N is the baseline requirement based on deployment size and the additional 1 provides redundancy.
Schedule Connector updates REC_015 Medium Cloud Connector Some zones (resource locations) don’t have a scheduled start time for Connector updates. To ensure that updates only occur during planned maintenance windows and reduce service disruption, schedule Connector updates for a preferred time and day of the week.
Place Cloud Connectors in the same domain REC_028 Medium Cloud Connector Some zones (resource locations) contain Cloud Connectors joined to different domains. This setup can lead to delayed or failed VDA registrations, especially when in Local Host Cache (LHC) mode. To improve reliability and reduce risk, ensure all Cloud Connectors within a given zone belong to the same domain.
Enable communication between Cloud Connectors for reliable LHC performance REC_029 High Cloud Connector Some zones (resource locations) have multiple elected Local Host Cache (LHC) brokers. This can cause VDA registrations to be divided among the Cloud Connectors in LHC mode, leading to intermittent launch failures. To prevent this, ensure all Cloud Connectors in each affected zone can communicate with one another at http://:80/Citrix/CdsController/ISecondaryBrokerElection.
Check resiliency configurations REC_030 Medium General Your deployment resiliency configurations have not been verified recently. Maintaining proper resiliency configurations is critical for ensuring uninterrupted access to apps and desktops, especially during unexpected service disruptions. Check your resiliency configurations regularly to ensure your deployment is properly set up to handle potential disruptions and safeguard user productivity.
Enable advanced health check for StoreFront stores REC_036 Medium StoreFront One or more stores on some StoreFront servers do not have advanced health check enabled. StoreFront uses the additional information from the advanced health check results to ensure launch requests are sent to the appropriate resource location (zone) in Local Host Cache (LHC) mode. Without advanced health check, launches may fail when in LHC mode. To improve the resiliency of your Citrix environment, enable advanced health check for all stores on the StoreFront servers.
Add all Cloud Connectors as STA servers on StoreFront and NetScaler Gateway REC_037 Medium Cloud Connector Some Cloud Connectors are not configured as Secure Ticket Authority (STA) servers, which is preventing them from receiving STA requests from StoreFront. To avoid launch failures in Local Host Cache mode, ensure all Cloud Connectors are added as STA servers on both StoreFront and NetScaler Gateway.
Ensure StoreFront server redundancy REC_042 High StoreFront Some StoreFront server groups contain only one server, creating a single point of failure and a lack of redundancy in the event of an outage. For better resiliency, deploy at least two StoreFront servers in a server group and front them with a load balancer to ensure seamless failover and uninterrupted access.

Performance recommendations

Recommendation ID Impact Component Description
Optimize Cloud Connectors for LHC mode REC_019 High Cloud Connector Some Cloud Connectors have less than four CPU cores per socket, which can impact users’ ability to enumerate and launch available resources while in LHC mode. To maximize resource availability for LHC and prevent performance bottlenecks, configure Cloud Connector machines to have at least four cores per socket.
Enhance Cloud Connector hardware REC_020 High Cloud Connector High CPU, memory, or disk usage might impact Cloud Connector performance and availability. To prevent performance degradation and maintain reliability, increase CPU, memory, or storage for the Cloud Connectors.
Rightsize high resource-consuming machines REC_023 Medium VDA Some machines show signs of performance strain, such as high CPU or memory utilization, or a high session count. This indicates machines are undersized to handle the workloads they support, which can lead to a poor user experience and reduced performance. Consider changing the machine size to increase the allocated resources for the machine or relocating power users to a delivery group that has high-performance machines.
Reduce the number of host connections in your zones REC_026 High General The number of host connections in some zones (resource locations) exceeds the recommended limit, which might result in performance degradation. Reduce the number of host connections in the zones to no more than the recommended limit.
Reduce the number of VDAs in your zones REC_027 High VDA The number of VDAs in some zones (resource location) exceeds the recommended limit, increasing the risk of failed VDA registrations and degraded session brokering, especially when in Local Host Cache (LHC) mode. To mitigate these risks, redistribute VDAs by moving some to other zones. Ensure your method for configuring VDA registration is updated accordingly.
Evaluate resource allocation for PVS servers REC_031 Medium Citrix Provisioning Some Citrix Provisioning (PVS) servers show signs of performance strain, such as high CPU or memory utilization. Insufficient server resource allocation may result in poor performance and extended boot times. Consider increasing the CPU and memory allocation for these PVS servers as needed.
Increase resource allocation for PVS servers REC_032 High Citrix Provisioning Some Citrix Provisioning (PVS) servers show signs of performance strain, such as critical CPU or memory utilization. Insufficient server resource allocation may result in poor performance and extended boot times. Consider increasing the CPU and memory allocation for these PVS servers as needed.
Evaluate write cache disk size for PVS target devices REC_033 Medium VDA The write cache disk usage on some Citrix Provisioning (PVS) target devices is nearing the threshold. To avoid performance issues and user session failures, evaluate the current write cache disk size and increase it as needed.
Optimize GPO configuration for VDAs REC_035 Medium VDA Some user sessions experienced prolonged GPO processing during logon, impacting performance. To increase control over environment settings, block Group Policy inheritance for your VDA organizational units and apply only relevant policies and security configurations. Additionally, consider leveraging Citrix Workspace Environment Management to process settings asynchronously for faster session logons.
Enable socket pooling for StoreFront stores REC_046 Medium StoreFront Some StoreFront stores don’t have socket pooling enabled. Socket pooling enhances efficiency by maintaining a pool of readily available network connections (sockets) for communication with Delivery Controllers or Cloud Connectors. Instead of creating a new socket for every request and then closing it (a high-overhead process), StoreFront reuses an existing connection from the pool. To enhance overall environment performance and efficiency, enable socket pooling on all stores, particularly for Transport Layer Security (TLS) connections.

Operational excellence recommendations

Recommendation ID Impact Component Description
Upgrade VDAs to the latest version REC_002 Low VDA Some machines are using older VDA versions. Upgrade to the latest LTSR or CR VDA version to access new features, improvements, and security enhancements.
Use Citrix Provisioning technology REC_003 Medium Citrix Provisioning All machines in the site are manually provisioned and do not use Citrix Provisioning technologies such as Machine Creation Services™ (MCS) or Provisioning Services (PVS). Use MCS or PVS to ensure VDA consistency, minimize manual tasks, and streamline environment scaling operations.
Low functional level REC_009 Low VDA Some machine catalogs have a lower functional level than the detected VDA version, limiting access to new features on later VDA versions. To access these features, change the functional level to the latest version supported by all machines in the catalog.
Back up your site configuration REC_011 High General You don’t have a backup of your site configuration. Create on-demand or scheduled backups to ensure you have a ready-to-use copy of your Citrix configurations for quick recovery.
Create a new backup of your site configuration REC_012 High General Your last site configuration backup was over three months ago. Regularly create on-demand or scheduled backups to keep an up-to-date copy of your Citrix configurations ready for quick recovery.
Simplify catalog configuration with a machine profile REC_038 Low Provisioning Some machine catalogs would benefit from using a machine profile. With a machine profile, Machine Creation Services (MCS) captures hardware properties and hypervisor-specific features from the profile and efficiently provisions new virtual machines (VMs) in the catalog with the same configuration.
Reset tainted Active Directory accounts REC_049 Medium Provisioning Some machine catalogs contain AD accounts marked as ‘tainted’ in the AD Identity Service. These accounts must be reset to be available for subsequent provisioning operations.
Replace deprecated beacon point for StoreFront REC_050 Medium StoreFront Citrix Workspace app uses beacon points configured within StoreFront to determine whether users are connected to internal or external networks. You are using ping.citrix.com as a beacon, which has been deprecated and is no longer reachable. Replace it with a reachable, public-facing URL in the StoreFront management console.
Disable XenApp Services URL for StoreFront stores REC_053 High StoreFront The XenApp Services URL (also known as PNAgent) is enabled for some StoreFront stores. This feature is deprecated. For compatibility and security, configure Citrix Workspace app to connect to StoreFront using the Store URL, and disable XenApp Services on the server. If you have legacy devices that require PNAgent, ignore this recommendation.
Deprecate unsupported StoreFront sites REC_054 High StoreFront Some StoreFront stores are linked to unsupported site types. Migrate resources to supported sites and deprecate the unsupported sites.
Disable Kerberos delegation for StoreFront stores REC_055 Low StoreFront Kerberos delegation is enabled for some StoreFront stores. Kerberos delegation is deprecated and can only be used with XenApp 6.5 and earlier. Disable Kerberos delegation for these StoreFront stores.

Cost optimization recommendations

Recommendation ID Impact Component Description
Enable Autoscale for your delivery groups REC_010 Medium VDA Some eligible delivery groups aren’t using Autoscale. Enable Autoscale for consistent machine power management, maintaining availability while effectively balancing costs and user experience.
Release unused resources REC_013 Medium General Some dedicated workloads, such as machines or applications, have not been used for over 30 days. To reduce unnecessary spending and optimize costs, release unused machines back to the available pool and manage unused applications.
Citrix Advisor