RES ONE Workspace 2015 SR1 Administration Guide

RES ONE Workspace 2015 SR1
Administration Guide
9.10.1.0
Disclaimer
Whilst every care has been taken by RES to ensure that the information contained in this document is correct and complete,
it is possible that this is not the case. RES provides the information "as is", without any warranty for its soundness, suitability
for a different purpose or otherwise. To the maximum extent permitted by applicable law, RES is not liable for any damage
which has occurred or may occur as a result of or in any respect related to the use of this information. RES may change or
terminate this document at any time without further notice and shall not be responsible for any consequence(s) arising there
from. Subject to this disclaimer, RES is not responsible for any contributions by third parties to this information.
Copyright Notice
Copyright © 1998-2016 Real Enterprise Solutions Development B.V.. All rights reserved. The software licensed by RES
Software B.V. or Real Enterprise Synergy, Inc. is covered by patents, any patents pending, identified on
www.ressoftware.com/legal-statements. Commercial Computer Software documentation/data - Restricted Rights.
ii
Contents
Chapter 1: Introduction
Welcome to the RES ONE Workspace 2015 Administration Guide. This document provides detailed
information about the installation and configuration of RES ONE Workspace 2015 features and
components.
Note that the content of this Administration Guide is based on the latest available version of
RES ONE Workspace 2015.
For additional documents and information, please refer to our website
http://www.ressoftware.com and to our Success Center https://success.ressoftware.com.
For feedback about the RES ONE Workspace 2015 Administration Guide, please contact the RES
Software documentation team at documentation@ressoftware.com.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
iii
Chapter 1:
1.1
1.2
1.3
Chapter 2:
2.1
Chapter 3:
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11
3.12
3.13
3.14
iv
Introduction
iii
RES Software Training ............................................................................. 1
RES Software Support ............................................................................. 2
Contacting RES Software.......................................................................... 3
About RES ONE Workspace
4
Architecture......................................................................................... 5
Components ......................................................................................... 5
Communication Model ........................................................................... 10
The RES ONE Workspace Agent Service and its sub processes ........................... 11
The RES ONE Workspace Agent Cache ........................................................ 12
Scalability and performance ................................................................... 13
Installation and Licensing
16
Prerequisites ...................................................................................... 16
Installation ........................................................................................ 18
Install RES ONE Workspace Agent Service under different account ..................... 20
Unattended Installation ......................................................................... 20
Configuring the Shell ............................................................................ 26
Where to find Shell Configuration ............................................................ 26
Configuring Agents ............................................................................... 26
Manual Configuration ............................................................................ 26
Server-based Computing ........................................................................ 27
Setting up the Datastore ........................................................................ 29
Configuring the Datastore ...................................................................... 29
Datastore Management ......................................................................... 30
Where to find the Datastore ................................................................... 30
Connections ....................................................................................... 31
Datastore Split/Join Wizard .................................................................... 34
Advanced Settings ............................................................................... 35
Custom Resources ................................................................................ 38
Maintenance ...................................................................................... 39
Configuration Wizard ............................................................................ 41
Dynamic Datastore configuration for Agents ................................................ 43
Where to find Dynamic Datastore Configuration ........................................... 43
Configuring the Datastore dynamically ...................................................... 43
Example ............................................................................................ 44
Agents .............................................................................................. 45
Where to find Agents ............................................................................ 45
Agents Settings ................................................................................... 45
Licensing ........................................................................................... 50
Where to find Licensing ......................................................................... 51
Licensing Model .................................................................................. 51
Selecting RES ONE Workspace modules ...................................................... 54
Licensing Process ................................................................................. 55
VDX Licensing ..................................................................................... 57
Keeping RES ONE Workspace up to date ..................................................... 58
RES ONE Workspace modules .................................................................. 60
Relay Servers ..................................................................................... 62
Where to find Relay Servers ................................................................... 62
Configuring Relay Servers ...................................................................... 62
Dynamic Relay Server configuration .......................................................... 64
Troubleshooting Relay Servers ................................................................. 65
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4:
4.1
4.2
4.3
4.4
4.5
4.6
4.7
4.8
Dynamic Configuration
68
Desktop Transformation ........................................................................ 68
Desktop Sampler ................................................................................. 69
Workspace Designer ............................................................................. 71
Workspace Model ................................................................................. 72
User Context ...................................................................................... 73
Directory Services ................................................................................ 73
Connection States ................................................................................ 77
Languages ......................................................................................... 78
Access Control based on context .............................................................. 79
Where to find Access Control .................................................................. 79
Identity ............................................................................................ 80
Locations and Devices: Zones .................................................................. 81
Date and Time .................................................................................... 89
Applications ....................................................................................... 90
Where to find Applications ..................................................................... 90
Start Menu tab .................................................................................... 90
Application List tab .............................................................................. 90
Settings tab ....................................................................................... 91
Defaults for new applications .................................................................. 99
Properties ......................................................................................... 99
Configuration .................................................................................... 112
Workspace Extensions .......................................................................... 119
RES ONE Workspace Applications for end users ........................................... 121
Making Control Panel Applets (CPL files) available as applications .................... 138
Actions ............................................................................................ 151
Drive and Port Mappings ....................................................................... 152
Drive Substitutes ................................................................................ 156
Folder Redirection .............................................................................. 157
Folder Synchronization ......................................................................... 160
Printers ........................................................................................... 162
User Registry ..................................................................................... 166
Execute Command .............................................................................. 172
Microsoft System Center Configuration Manager Software Distributions.............. 174
LANDesk........................................................................................... 175
Automation Tasks ............................................................................... 176
Environment Variables ......................................................................... 178
Linked Actions ................................................................................... 180
Desktop ........................................................................................... 181
Where to find Desktop ......................................................................... 181
Shell ............................................................................................... 181
Background ....................................................................................... 182
Lockdown and Behavior ........................................................................ 182
Screensaver ...................................................................................... 192
User Settings ..................................................................................... 193
Where to find User Settings in the RES ONE Workspace Console ....................... 194
Zero Profile Modes .............................................................................. 194
Migration settings when switching to another Zero Profile mode ...................... 203
Flex Profile Kit INI files ........................................................................ 204
What is saved as part of a Targeted Item .................................................. 204
Storage of users' User Setting data .......................................................... 205
Additional User Setting options ............................................................... 209
Microsoft App-V applications .................................................................. 215
Citrix streamed applications .................................................................. 216
Integration ....................................................................................... 217
Application Virtualization ..................................................................... 217
LANDesk........................................................................................... 237
Microsoft System Center ....................................................................... 238
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
v
4.9
4.10
4.11
4.12
Chapter 5:
5.1
5.2
5.3
Chapter 6:
6.1
6.2
Chapter 7:
7.1
7.2
7.3
vi
RES Software ..................................................................................... 240
Web Portal ....................................................................................... 246
The order of events when a session starts.................................................. 248
The order of events at a session refresh .................................................... 251
The order of events when a session ends ................................................... 252
Building the end-user's Start Menu, Desktop and Quick Launch bar ................... 254
The Shell and the setting 'Windows Shell shortcut creation' ............................ 254
What happens at session logon ............................................................... 255
What happens at session logoff ............................................................... 258
What happens at session refresh ............................................................. 259
Delegation and Compliance
260
Advanced Administration ...................................................................... 260
Audit Trail ........................................................................................ 260
Administrative Roles ............................................................................ 261
Integration ....................................................................................... 264
Filtering ........................................................................................... 269
Application Managers ........................................................................... 271
Tracking & Reporting ........................................................................... 272
Usage Tracking .................................................................................. 272
User Sessions ..................................................................................... 274
Managed Applications License Metering .................................................... 276
Workspace Model Overview ................................................................... 277
Errors .............................................................................................. 278
Workspace Branding ............................................................................ 278
Where to find Workspace Branding .......................................................... 278
Adaptive Security
279
Security ........................................................................................... 279
Applications ...................................................................................... 280
Data ............................................................................................... 290
Authorized Files ................................................................................. 294
User Sessions security .......................................................................... 296
Network Connections security ................................................................ 298
Performance ..................................................................................... 303
Access Balancing ................................................................................ 303
CPU Optimization ............................................................................... 305
Instant LogOff ................................................................................... 307
Memory Optimization .......................................................................... 309
Management
313
Building Blocks ................................................................................... 313
Where to find Building Blocks in the RES ONE Workspace Console ..................... 313
Creating Building Blocks ....................................................................... 314
Importing Building Blocks ...................................................................... 314
Command line parameters .................................................................... 317
Information excluded from Building Blocks ................................................ 317
The structure of Building Blocks ............................................................. 317
Instant Reports .................................................................................. 320
Where to find Instant Reports ................................................................ 320
Instant Report format .......................................................................... 320
Customizing the contents and presentation ................................................ 320
Information excluded from Instant Reports ................................................ 321
Workspace Containers .......................................................................... 322
Where to find Workspace Containers ........................................................ 322
Computer Control ............................................................................... 323
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
7.4
Chapter 8:
8.1
8.2
8.3
8.4
8.5
8.6
8.7
8.8
8.9
8.10
8.11
8.12
8.13
8.14
8.15
8.16
8.17
8.18
8.19
8.20
8.21
8.22
8.23
8.24
8.25
8.26
8.27
8.28
8.29
8.30
8.31
8.32
8.33
8.34
8.35
8.36
8.37
8.38
8.39
8.40
8.41
8.42
8.43
8.44
8.45
8.46
8.47
Access Control on Workspace Containers ................................................... 323
Using Workspace Control to create different configurations for an application or
the user session ................................................................................. 324
Using Workspace Containers to configure exceptions to the global settings of a
feature ........................................................................................... 327
Workspace Analysis ............................................................................. 328
Where to find Workspace Analysis ........................................................... 328
General information about users ............................................................. 328
Detailed information about users ............................................................ 329
Workspace Simulation Wizard ................................................................ 332
Registry settings
334
ActiveSetupTimeout ............................................................................ 334
BlockPicaSvcFix .................................................................................. 334
CorrectTaskbar .................................................................................. 335
ChangePasswordTimeout ...................................................................... 335
CheckDisabledFolders .......................................................................... 335
CheckShutDown ................................................................................. 336
CheckUpdateOSDFile ........................................................................... 336
ConsoleNoAppIcons ............................................................................. 337
CorrectWorkArea ................................................................................ 337
CTX_PFDesktopUsesPwrstart .................................................................. 337
CTX_PublishAppCmdLineFlag ................................................................. 338
CTX_PNLaunchUsesFarmName ................................................................ 338
DirectoryServiceRetryLimit .................................................................... 338
DisableDHCP ..................................................................................... 339
DisableExternalGroupCheck ................................................................... 339
DisableFolderSyncLocalCheck ................................................................. 340
DisableIconRefresh .............................................................................. 340
DoNotAllowOverlappedDesktopItems ........................................................ 340
DoNotAnalyseDB ................................................................................. 341
EnableMultipleIE ................................................................................ 341
ExcludeProcesses ................................................................................ 342
ExcludeSubscribedTasks ....................................................................... 342
ForceComputername ........................................................................... 343
ForceDisconnectOnIdle ......................................................................... 343
ForcePrinterConnections ...................................................................... 343
ForceLogoff ...................................................................................... 344
ForceShutdown .................................................................................. 345
IncludeProcesses ................................................................................ 345
Instrumentation ................................................................................. 346
InterceptManagedApps ......................................................................... 347
KeepSeamlessHostAgent ....................................................................... 348
KeepSharesWithROB ............................................................................ 348
KeepTmpDDEMacros ............................................................................ 348
KeepUnicodePath ............................................................................... 349
KeepUserDefaultMAPIProfile .................................................................. 349
KeepWordRunning ............................................................................... 350
LingerDisconnectTimerInterval ............................................................... 350
LingerTerminateTimerInterval ................................................................ 351
LocalCacheOnDisk ............................................................................... 352
LocalCachePath ................................................................................. 352
LocatePrintersByIP .............................................................................. 353
LogPerformance ................................................................................. 353
MSLimitOnProcIDs ............................................................................... 354
NoAgentScreenSaver ............................................................................ 354
NoFullScreenKiosk .............................................................................. 355
NoListConcurrentUsers ......................................................................... 355
NoPrecedingSlashInPNFolder .................................................................. 355
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
vii
8.48
8.49
8.50
8.51
8.52
8.53
8.54
8.55
8.56
8.57
8.58
8.59
8.60
8.61
8.62
8.63
8.64
8.65
8.66
8.67
8.68
8.69
8.70
8.71
8.72
8.73
8.74
8.75
8.76
8.77
8.78
Chapter 9:
9.1
9.2
9.3
9.4
9.5
9.6
9.7
Chapter 10:
10.1
10.2
10.3
10.4
10.5
Chapter 11:
viii
OutlookNotificationCheck ..................................................................... 356
PIDoNotSetEnvVars .............................................................................. 356
PwrGateAppId ................................................................................... 357
PwrGateFileMapping ............................................................................ 357
Pwrgatesleep .................................................................................... 357
PMWAutoAllowFolders .......................................................................... 358
ProtectLocalCache .............................................................................. 358
RefreshAllMappedDrives ....................................................................... 359
RemoveStartmenuPinlist ....................................................................... 359
RestoreMappingsAtLogoff ...................................................................... 360
RunCPUShld ...................................................................................... 360
RunWMSync....................................................................................... 361
SCCMDelayBeforeRunningProgram ........................................................... 362
SessionCheckInterval ........................................................................... 362
ShowSearchFieldAlways ........................................................................ 363
SilentRefresh ..................................................................................... 363
SkipCloseWFShell ................................................................................ 364
SkipCLSID ......................................................................................... 364
SkipDSWhenOffline.............................................................................. 365
SkipFullNames ................................................................................... 365
SpecialFoldersFromRegistry ................................................................... 366
StartHiddenPexplorer .......................................................................... 366
StartWithShortCut .............................................................................. 366
SuppressShowDesktopButton .................................................................. 367
SuppressUnknownRequestMessage ........................................................... 367
Tracing ............................................................................................ 368
UseClassicLogoff ................................................................................ 369
UseMsgBox ........................................................................................ 369
UseOnlyComputerNameForShadow .......................................................... 370
WaitBeforeStart ................................................................................. 370
WaitForUpdatedCache ......................................................................... 371
Registry settings for Relay Servers
372
CertificateAlgorithm ............................................................................ 372
CertificateKeyLength ........................................................................... 372
CustomCertificate .............................................................................. 373
DBCleanupDuration ............................................................................. 375
DoNotAcceptSelfSignedCert ................................................................... 375
RemoveObsoleteLogFiles ...................................................................... 376
RSConnectTimeout .............................................................................. 376
Command line Options
377
Pwrgate ........................................................................................... 377
Pwrtech ........................................................................................... 378
Building Blocks and using FIPS compliant security algorithms .......................... 378
Import file hashes ............................................................................... 378
Obtain hashed version of Environment password ......................................... 382
Process Building Blocks and Custom Resources in batches .............................. 382
Republish a published application ........................................................... 386
Setprint ........................................................................................... 387
Application executables ....................................................................... 387
Pwrgatekeepalive ............................................................................... 387
Network Security Log ........................................................................... 388
Disabled Features
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
389
Chapter 12:
Compatibility Matrix RES ONE Workspace 2015 SR1
390
Chapter 13:
Index
394
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
ix
Chapter 1: Introduction
1.1
RES Software Training
RES Software has developed a mixture of learning materials for our customers and channel partners
to help you get the most out of our products. Our goal is to give you a choice in how you learn;
whether that is in the classroom, online using our tutorials and virtual workshops, or downloading
our self-study kits.
Please visit the Academy at RES Success Center (https://success.ressoftware.com) or go to
www.ressoftware.com/support/training to find more information on Training.
Online Learning - At the Academy of the Success Center you will find all online learning possibilities
within RES Software. Online Learning provides an engaging way to learn about RES Software
products and technologies. It consists of various video tutorials, including practice questions,
informative links and more. These tutorials cover a broad range of subjects: from planning,
installing and configuring an environment to using the functionality of RES ONE Workspace.
Workshops - RES Software organizes free interactive online workshops for customers and partners.
These 3-hour workshops are intended for experienced users of our software and deal with specific
use cases and troubleshooting for a select number of topics.
Training Classes - For customers and partners RES Software have developed several technical
courses that deal with the installation and configuration of RES Software products. These technical
courses are offered by RES Software Authorized Learning Centers (RALCs).
RES Software Certification - RES Software offers a certification program designed to validate IT
professionals with the technical capabilities and expertise needed to effectively use the RES
Software product portfolio, giving companies the confidence that their IT employees have the skills
and experience needed to be successful.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
1
Chapter 1: Introduction
1.2
RES Software Support
At RES Software, our core business is to help heighten productivity in your organization. RES
Software Support helps us to achieve this goal, and has been embedded in the core principles of our
company since it was founded. RES Software is dedicated to supporting everyone who uses or wants
to use its proven products with RES Software Support, which elevates our enterprise solutions above
and beyond technology.
Please visit the RES Success Center (https://success.ressoftware.com/support) to find more
information on Support.
Support - If you are experiencing difficulties with any of our products, you may find the solution in
our Knowledge Base (Success Center > Support) or you can contact RES Software Support directly
(Success Center > Click Contact Us).
Product Upgrades and Service Releases - To upgrade your version of RES ONE Workspace to the
latest standard, you can install Product Upgrade Packs from http://www.ressoftware.com and
Service Releases from the Success Center > Downloads. The supporting documentation consist of
Online Help (available via F1 in the Console), Release Notes and Administration Guide (Success
Center > Downloads).
Solution Assurance - To protect your investment, it is mandatory that you purchase one initial year
of Solution Assurance with each license purchase. Solution Assurance unlocks access to Technical
Support, Product Updates and Upgrades and the Knowledge Base. Solution Assurance is extended
automatically, unless you specify otherwise. For more information:
http://www.ressoftware.com/support/solution-assurance.
Early Adopter Program - Participants of the Early Adopter Program are actively involved in taking
RES Software solutions to the next level. The Early Adopter Program unlocks access to interim
releases of our products. These releases are production-ready and allow you to test drive and
explore new functionality.
RES Community - RES Software invites you to become part of our community to share best practices
and tips with fellow IT professionals, find solutions and more (Success Center > Q&A).
2
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 1: Introduction
1.3
Contacting RES Software
Headquarters
RES Software USA
Radnor Financial
Center,
RES Software
Netherlands
Het Zuiderkruis 33
150 North Radnor
Chester Road, Suite
D100
Radnor, PA 19087, USA
5215 MV, 'sHertogenbosch
The Netherlands
RES Software Norway
Lysaker Torg 45
1366 Lysaker
Norway
+47 67 21 15 50
+31 (0)73 622 8800
+1 800 893 7810
RES Software UK
RES Software France RES Software Germany
1210 - Park View
Tour Ariane
Arlington Business
Park,
5, place de la
Pyramide
Theale, Berkshire
92088 Paris la
Défense
RG7 4TY
+44 (0)1189 65 7983
+49 (0) 17 27 20 17 02
France
+33 1 55 68 10 72
RES Software Australia
Level 13, 135 King
Street
Sydney,
NSW 2000 Australia
+61 411 616 443
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
3
Chapter 2: About RES ONE Workspace
Chapter 2: About RES ONE Workspace
On any regular Microsoft Windows desktop there are important items that enable productivity, such
as the application to read e-mail, access to documents shared with other people, and the ability to
print documents. There are also useful items on the desktop that make it more comfortable, such as
personalized settings for using the e-mail application, a favorite background picture, or other
preferences. These useful items do not directly affect productivity, but they make life easier.
Desktop items include:
1. Applications
2. Documents and other data
3. Printing capabilities
4. Personal settings
The availability of desktop items depends on the computer and the user account. Switching to a
different computer or using a different user account does not guarantee you the same list of
desktop items.
RES ONE Workspace User Workspace Management transforms desktops into User Workspaces.
A User Workspace is composed each time a user logs on to a Windows desktop. After composition,
the desktop contains configured Applications, Data, Printer settings and Personal Settings.
Composition of these items is dynamic and based on context: who you are (Identity), where you are
(Location), what computer you are using (Device), and when (Date and Time). Composing and
Securing a User Workspace only takes seconds and is independent from any underlying technologies.
User Workspace Management allows you to manage this process easily for many user workspaces at
once.
Once the unique User Workspace has been composed, it is secured simply and effectively by only
allowing the use of the available Applications, Data, Devices and Network connections.
The User Workspace exists until the user logs off from the Windows desktop.
The navigation map contains links to the various nodes of the Console, which makes it easier to set
up and manage the user workspace.
4
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 2: About RES ONE Workspace
2.1
Architecture
Components
RES ONE Workspace consists of a central database (Datastore) and several software-based
components. Each component relies on the Datastore for timely information regarding the user's
environment.
The RES ONE Workspace Console
The RES ONE Workspace Console is the central point of administration of the User Workspace. It is
usually run from an administrator's workstation. The Management Console stores all the provided
information in a database.
In the Management Console, the administrator can centrally manage context–aware workspaces that
contain all of the right applications, data, printing and personal settings essential for the users'
productive working. It offers the Workspace Designer and several Wizards, helping the administrator
to create workspace items according to business rules and compliance. With the Workspace Model
the administrator can control which parts should be composed and secured in the User Workspace.
Throughout the Console the size of the columns as they appear on screen can be adjusted.
Customized column width or order of columns is saved automatically on the user's home drive or, if
not available, in the user's registry. The option Reset all column properties to defaults in the
Options menu, will reset any changes that you made to the order or widths of columns in the
Console.
In every list view in the Console, one column is by default configured to autosize to fill out any
remaining screen width. If you adjust the width if an autosizing column, it will no longer autosize
and so you may end up with white space to the left of the columns.
The RES ONE Workspace Console process, pwrtech.exe, has only one instance per device.
Some of the Wizards run as a single instance subprocess called wmwizrds.exe.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
5
Chapter 2: About RES ONE Workspace
The RES ONE Workspace Datastore
The Datastore is the central database for your RES ONE Workspace environment. All computers in a
RES ONE Workspace environment connect to this database. It runs on a central database server that
you have installed prior to installing the RES ONE Workspace Console.
The Datastore can exist on any of the following database types:

Microsoft SQL Server 2005

Microsoft SQL Server 2008

Microsoft SQL Server 2008 R2

Microsoft SQL Server 2012

Microsoft SQL Server 2014

Microsoft SQL Azure

IBM DB2 9.5 or higher

IBM DB2 10.5

MySQL 5.0 or higher

Oracle 11.x
The RES ONE Workspace Agents
An important aspect of RES ONE Workspace RES ONE Workspace 2015 is the architecture of each RES
ONE Workspace Agent (i.e. each Terminal Server, workstation or laptop that runs RES ONE
Workspace). The following illustration provides a schematic overview:
Configuration data received from the Datastore is cached locally. Each RES ONE Workspace Agent
uses its cached data instead of connecting to the SQL database directly.
The data cache also stores user information (log files and monitoring data) that is collected by each
RES ONE Workspace Agent. The RES ONE Workspace Agent Service sends this data from the local
cache to the Datastore for centralized access from the Management Console.
6
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 2: About RES ONE Workspace
Read more about the RES ONE Workspace Agent Service (res.exe) and about the communication
processes to and from the Datastore in the chapter "The RES ONE Workspace communication
architecture".
Each Agent cache consists of:

log files

objects

registry settings
Log files
The log files contain monitoring files, error logs and PowerTrace data from RES ONE Workspace enduser components. These files are stored in a dedicated cache folder:
%programfiles%\RES Software\Workspace Manager\Data\DBCache\Transactions
They are forwarded to the RES ONE Workspace Datastore by the RES ONE Workspace Agent Service.
Objects
The objects stored in the local cache are XML files containing part of the RES ONE Workspace
configuration data, and various resources in different formats.
These files are stored in subfolders of %programfiles%\RES Software\Workspace
Manager\Data\DBCache:

\Objects contains XML files specifying application settings, PowerLaunch settings and other
configuration settings.

\IconCache contains icons for your programs and shortcuts.

\Resources contains a number of subfolders that store your ICA files, OSD files, ADM files,
files used as desktop images, and files used in your folder maintenance. The \Resources
folder functions much like a distributed fileshare.
The RES ONE Workspace Agent Service forwards these objects from the RES ONE Workspace
Datastore to the local cache.
Registry Settings
The remainder of the RES ONE Workspace configuration data is implemented as Registry settings.
The data is forwarded from the RES ONE Workspace Datastore to the agent cache by the RES ONE
Workspace Agent Service, and is stored in the following registry key:
HKLM\Software\Policies\RES\Workspace Manager\Settings
This concerns settings that have a restricted set of possible values, such as:

MemoryShield > "Enabled": the value of the setting can only be Yes or No.

Maximum number of simultaneous logons: the value of the setting can only be a number.
You can define exceptions per user by customizing the registry key:
HKCU\Software\Policies\RES\Workspace Manager\Settings
These exceptions can be implemented using the RES ONE Workspace Actions technology.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
7
Chapter 2: About RES ONE Workspace
RES ONE Workspace Relay Servers
The Relay Server component makes it possible to create a flexible architecture that consolidates
and centralizes all RES ONE Workspace configuration data into one central database, while ensuring
that dispersed Agents across multiple sites obtain configuration data efficiently and in a timely
manner.
Relay Servers are an optional infrastructure component. Relay Servers Cache information from the
Datastore and pass it on to Agents or to other Relay Servers. Agents can be configured to contact
the Datastore directly, or to use Relay Servers.
In a RES ONE Workspace site, both methods can be used at the same time, with some Agents
connecting to the Datastore and others using Relay Servers.
Relay Servers offer a number of advantages:

Improved scalability in all kinds of distributed network topologies.

Reduced network traffic in multiple-site environments, as fewer components connect directly to
the central Datastore over relatively slow data connections.

Reduced Datastore load, as fewer components connect directly to the central Datastore.

Agents that connect to Relay Servers do not need to have a database driver installed for the RES
ONE Workspace Datastore.
For further details about Relay Servers, see the document Getting Started with RES ONE
Workspace Relay Servers.
8
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 2: About RES ONE Workspace
The RES Workspace Composer
The RES Workspace Composer is the RES ONE Workspace-managed uniform workspace that the end
users are presented with, regardless of the technology stack used. The RES Workspace Composer
provides only the functionality that the end user needs. This includes all applications, menu items
and settings to which the user is granted access.
The desktop can be displayed using either the RES ONE Workspace Shell or the Microsoft Windows
Shell. Both shells are managed by RES ONE Workspace, but the RES ONE Workspace Shell presents a
classic windows-like shell with some additional RES ONE Workspace-only technology, whereas the
Microsoft Windows Shell is the exact shell as it is presented by Microsoft, including the various
available themes. After installation of RES ONE Workspace you need to configure the RES Workspace
Composer as the default shell for your users.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
9
Chapter 2: About RES ONE Workspace
Communication Model
RES ONE Workspace stores all configuration data and resources in an SQL-based database: the RES
ONE Workspace Datastore. You can set all your Terminal Servers, Desktops and laptops to use a
single database or you can use replication to set up multiple databases.
The RES ONE Workspace Console communicates directly with the RES ONE Workspace Datastore. All
RES ONE Workspace Agents receive a local cache of the RES ONE Workspace Datastore (optionally
through a Relay Server) and communicate with their cache rather than directly with the RES ONE
Workspace Datastore.
The local cache stores configuration data that is received from the Datastore. Each RES ONE
Workspace Agent uses its cached data instead of connecting to the SQL database directly.
The local cache also stores user information (log files and monitoring data) that is collected by each
RES ONE Workspace Agent. The RES ONE Workspace Agent Service, which runs on each RES ONE
Workspace Agent, sends this data from the local cache to the Datastore or to the Relay Server.
Local caches are updated through selective synchronization: the RES ONE Workspace Agent Service
retrieves only changed information from the Datastore to place in the local data cache. This
reduces the load on the central database significantly. This downstream communication is
asynchronous: if the Datastore/Relay Server is busy or unavailable, the request is deferred until the
Datastore/Relay Server is able to process it.
The RES ONE Workspace Datastore also stores the user information (log files and monitoring data)
that is collected by all RES ONE Workspace Agents. The RES ONE Workspace Agent Service pushes
each Agent's log files and monitoring information from the local cache to the Datastore/Relay
Server. This upstream communication is also asynchronous: if the Datastore/Relay Server is busy or
unavailable, the information remains in cache until the Datastore/Relay Server is able to receive it.
10
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 2: About RES ONE Workspace
The RES ONE Workspace Agent Service and its sub processes
Each desktop that has the RES Workspace Composer installed has an agent service that retrieves the
information from the database and stores it locally. The Workspace Composer running on the
Windows desktop will use this local information and the context of the user to compose and secure
(parts of) the User Workspace. As someone works in their User Workspace information is collected
by the Workspace Composer in transactions. These transactions are applied to the central database
by the agent service whenever it can access the central database
The RES ONE Workspace Agent Service is named Res.exe (service as local system). Res.exe and its
sub processes have only one instance per device.

The following information is stored at HKLM\Software\RES\Workspace Manager:
Root -
Datastore Connection Properties
UpdateGUIDS -
Update GUIDs
Data -
Access Balancing
The tasks of the RES ONE Workspace Agent Service (Res.exe) consist of:

Checking Datastore connectivity

Unlocking and locking the user Registry

Handle License requests (session and application)

Handle logging

Check its own running processes
The RES ONE Workspace Agent Service contains the following sub processes:

resop

Pwrcache

Pwrcache /upload

CPUShield (CPU Optimization)

isloggoff
pwrcache.exe
The tasks of the pwrcache.exe sub process are:

Update the Agent Cache from the RES ONE Workspace Datastore

Agent Cache Resources, XML and registry

Updates are based on GUID tree information
Pwrcache.exe /upload

Upload Agent/Session stored logging to the RES ONE Workspace Datastore from
%programfiles\RES Software\Workspace Manager\Data\DBCache\transactions
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
11
Chapter 2: About RES ONE Workspace
The RES ONE Workspace Agent Cache

There is one RES ONE Workspace Agent Cache per device.

The RES ONE Workspace Agent cache is located at: %programfiles%\RES Software\Workspace
Manager\Data\DBCache\

The sub folders contain the following data:
IconCache -
contains icons for programs and shortcuts
Objects -
contains XML files specifying Application, and other configuration settings
Resources -
contains a number of subfolders that store files like OSD, ICA, BMP etc.
Transactions -
Log files waiting for transfer
HKLM\Software\Policies\RES\Workspace Manager\Settings\.... - Integer values and
Booleans

A User Session only needs read permissions on Agent Cache.

The Agent Cache is protected by RES ONE Workspace Security.
12
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 2: About RES ONE Workspace
Scalability and performance
RES ONE Workspace provides a flexible architecture that can use either direct database connections
or indirect database connections through a Relay Server. Depending on the network topology, you
can either use the capacity of the chosen database platform and connect the Agents directly or use
Relay Servers to serve the Agents in a distributed network infrastructures. The database can also
use standard high availability best practices.
Network traffic generated by RES ONE Workspace is approximately 128KB per managed object upon
installation of RES ONE Workspace. This means that approximately 250MB local cache is required for
configuration data in an environment with 2000 applications. Any changes to the configuration will
be downloaded in the background.
RES ONE Workspace Composer manages the entire workspace with the use of the local cache. There
is no dependency on the Datastore or Relay Server.
This section describes sizing and performance of all RES ONE Workspace components that take care
of personalization, advanced administration and security.
Architecture Overview
This architecture overview displays the key components of RES ONE Workspace and how they relate
to each other.
RES ONE Workspace Datastore
RES ONE Workspace requires a database to store its configuration data, logging and usage tracking
information. RES ONE Workspace provides the capability to store logging and usage tracking in a
separate database from the configuration information.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
13
Chapter 2: About RES ONE Workspace
Relay Server (optional)
As of RES Workspace Manager 2012, the use of optional Relay Servers is supported. Relay Servers are
data brokers between the high-availability database server and the Agents. Relay Servers can be
chained together to support any enterprise network topology. The Relay Server is a light-weight
component with a small footprint. It stores a cache of the Datastore. Agents relay data to and from
the database via one or more Relay Servers which are automatically detected. Agents do not need a
Relay Server to operate. The Relay Server requires Windows Server 2008 or higher with Microsoft
.Net Framework 4 installed. The server is not required to be a dedicated server.
Agent
The RES ONE Workspace Agent communicates with the Relay Server or Datastore and creates the
local cache with the configuration data. The local cache is kept in sync by the Agent in the
background and does not impact the workspace composition by the Workspace Composer.
Communication intervals can be configured to optimize the network topology in place.
Please refer to Workspace communication for more detail.
Workspace Composer
The RES Workspace Composer is responsible for the context detection and workspace composition.
Any configuration data needed to manage the workspace is stored in the local cache by the Agent.
This local cache is used by the Workspace Composer to build the desktop. There is, therefore, no
direct dependency on the Relay Server or Datastore for a user to logon.
In multi-user environments, one Workspace Composer is active per session.
File Server
RES ONE Workspace stores personalization data (personal settings) on a common file server. By
default the location for the personalization data is the user’s home directory. Most Microsoft
Windows infrastructure have a home directory in place, which may prevent you from managing a
separate storage for personalization data only. If necessary, this location can be changed.
Drivers
Drivers are used for security and personalization. In multi-user environments, one instance of each
driver is active per system, shared with all sessions.
Console
RES ONE Workspace is managed through the RES ONE Workspace Console. The Console
communicates directly with the Datastore and cannot work offline.
14
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 2: About RES ONE Workspace
Distributed environment
The following illustrates an example of a distributed RES ONE Workspace infrastructure with a
central database and Relay Servers on each site:
Large sites can have multiple Relay Servers that serve Agents randomly. Placing multiple Relay
Servers on a site increases availability of Relay Servers on that site.
Relay Servers can also be chained to each other.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
15
Chapter 3: Installation and Licensing
Chapter 3: Installation and Licensing
3.1
Prerequisites
Prerequisites
Software
The following RES ONE Workspace installation file, available for
download at https://success.ressoftware.com:

RES-ONE-Workspace-2015-Installer-SR1.exe - This is an
installation package that contains the MSI files for the RES ONE
Workspace components.
Individual components can be extracted from the installer and are
also available for download.
If you want to use the Relay Server, separate installation files are
required. The installation of Relay Server requires Microsoft .NET
Framework 4.0 or higher. For more information, please refer to the
document Getting Started with RES ONE Workspace Relay Servers.
Software installed on Agent

Microsoft .NET Framework 2.0 or higher. Microsoft .NET
Framework 4 Client Profile or higher when using User Setting
caching.
One of the following operating systems:
Hardware
16

Microsoft Windows 2008 x86/x64

Microsoft Windows 2008 R2 x64

Microsoft Windows 2012 x64

Microsoft Windows 2012 R2 x64

Microsoft Windows 7 x86/x64

Microsoft Windows 8 x86/x64

Microsoft Windows 8.1 x86/x64

Microsoft Windows 10 x86/x64

Each full installation of RES ONE Workspace requires
approximately 104 MB of hard disk space for the application files.
This does not include the data stored in the local cache. The hard
disk space required for cached data entirely depends on the
configuration of your RES ONE Workspace environment.
Each Console-only installation of RES ONE Workspace requires
approximately 48 MB of hard disk space. These installations do not
require any additional disk space for the local cache.
Each Agent-only installation of RES ONE Workspace requires
approximately 64 MB of hard disk space.

Each RES ONE Workspace Agent requires 22 MB of memory. Each
user requires a small amount of network drive space on the home
drive for storing RES ONE Workspace settings. This amount will
increase if User Settings are available to the user, because User
Settings are stored in the same location. The required amount of
space then depends on the size of the stored User Settings.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
Prerequisites
Database
One of the following databases:
Microsoft SQL Server
Microsoft SQL Azure
Oracle
IBM DB2

Microsoft SQL Server 2005

Microsoft SQL Server 2008

Microsoft SQL Server 2008 R2

Microsoft SQL Server 2012

Microsoft SQL Server 2014

Microsoft SQL Azure

IBM DB2 9.5 or higher

IBM DB2 10.5

MySQL 5.0 or higher

Oracle 11.x
Database prerequisites
 Mixed Mode authentication

MDAC 2.6 or later on all Agents

A named SQL Server System Administrator login ID

If Force protocol encryption is enabled: Microsoft Native Client

Microsoft Windows Azure credentials

Microsoft SQL Server Native Client on all Agents connecting
directly to the Datastore

Oracle DBA credentials

Oracle database drivers on all Agents connecting directly to the
Datastore

An existing database and a database user with access to a table
space with a page size of at least 8k

IBM DB2 OLEDB provider on all Agents connecting directly to the
Datastore
Preparations for creating a Datastore on DB2
MySQL

Create a local user on the DB2 Server. This account will be used
to connect to the RES ONE Workspace Datastore.

Manually create a database on the DB2 Server.

Create a Table Space for the user in the new database. Specify a
buffer pool of 8KB.

Create a schema in the new database.

Add the new user to the new database.

Assign the applicable authorities, and add the schema and Table
Space you created for this user. Make sure you assign the proper
privileges.

MySQL DBA credentials

MySQL ODBC driver on the database server and on all Agents
connecting directly to the Datastore
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
17
Chapter 3: Installation and Licensing
3.2
Installation
The first step in setting up User Workspace Management is to install RES ONE Workspace 2015 SR1
on the computer on which you want to manage User Workspaces. With the installation of RES ONE
Workspace 2015 SR1, the Management Console and an Agent will be installed.

To install RES ONE Workspace 2015 SR1 on your computer, use the RES ONE Workspace Installer
(RES-ONE-Workspace-2015-Installer-SR1.exe).

The RES ONE Workspace Installer is an installation package that contains the MSI files for
the different components of RES ONE Workspace, grouped in one executable making it
easier to install all necessary RES ONE Workspace components. When using the RES ONE
Workspace Installer you can either Select and install components on the machine on which
you are currently working or Extract all components for later use.

Choosing the option Select and install components, allows you to select which
component(s) should be installed on the machine. The installation wizard of the
selected component(s) will then guide you through the actual installation. The RES ONE
Workspace Installer auto-detects whether the 64-bit or 32-bit version of the
component(s) needs to be installed.
You can install the following components:
Clients:
Workspace Composer
Management Console
Services:
Relay Server
Reporting Services
Extra:
Desktop Sampler
Language Packs

When extracting all components, individual MSI and EXE files will be saved in the specified
location.
Instead of installing RES ONE Workspace fully, you can choose to perform:

an Agent-only installation, if you want to install RES ONE Workspace without a Console (use
RES-ONE-Workspace-2015-Agent-SR1-msi).

a Console-only installation, if you do not want to install a RES ONE Workspace Agent on the
computer on which you want to manage your environment (use RES-ONE-Workspace-2015Console-SR1-msi).
Please note that it is not possible to install an Agent-only and a Console-only installation side by
side on the same machine. To go from a partial installation to a full installation, first uninstall
the Agent-only or Console-only installation, then install the full RES ONE Workspace.
18
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
When installing RES ONE Workspace, the Setup Wizard will guide you through the installation
process.

After reading and accepting the End-User License Agreement and specifying the installation
folder, you will be asked whether you want the Workspace Composer to launch the next time
someone logs on to the computer. If you have not yet created a Datastore, select No, I will
configure this later in the Management Console. This option is not available for installations
on Terminal Servers and with Console-only installations.

After the installation of RES ONE Workspace has completed, the Connection Wizard will start.
This wizard helps you to connect the installed Agent to a RES ONE Workspace environment.
Notes

Installing RES ONE Workspace on a domain controller is not recommended as this may cause performance issues
and unexpected behavior.

RES Software installation files are signed with certificates. Microsoft Windows tries to verify the certificate's
validity before installing or launching the component. On computers without Internet access, this may cause a
delay of, for example, 20-30 seconds before an installation starts. This is by design of Microsoft Windows.
To avoid this delay to occur, make sure machines can connect to the Internet. If this is not possible, implement a
(manual/automatic) distribution system to keep the publisher's certificate revocation lists up to date.
If both a connection to Internet and an automatically updated revocation list are not possible solutions, but you
would like to avoid this delay, you might want to consider configuring Microsoft Windows not to verify the
revocation list. Please note, that clearing this option will reduce the security for the logged on user.
To clear the option for the current user:

Open Microsoft Internet Explorer.

Click Tools > Internet options > Advanced.

Scroll down to the Security section and clear the option Check for publisher's certificate revocation.
Please refer to http://support.microsoft.com for more information about the option Check for publisher’s
certificate revocation (Knowledge Base "12715304 - Error message when you try to validate a copy of
Windows: The cryptographic operation failed due to a local security option setting").
Also see

Install RES ONE Workspace Agent service under different account (on page 19)

Unattended Installation (on page 20)
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
19
Chapter 3: Installation and Licensing
3.3
Install RES ONE Workspace Agent Service under different account
1. Create a domain user account and assign Log on as a service and Act as part of the operating
system through Domain Security Policy to this account.
2. Assign access privileges for this account to the database in SQL Server.
3. Use Orca MSI Editor to open the RES ONE Workspace Windows Installer Package.
4. Select Transform > New Transform from the menu.
5. Select the ServiceInstall table from the list.
6. Change StartName and Password to the user account and password of the user account.
7. Select Generate Transform... from the menu and save the MST-file.
8. Invoke Windows Installer unattended and apply the transform (msiexec /i <msi>
TRANSFORMS=<mst> /qn+) > check with msiexec command-line parameters.
3.4
Unattended Installation
It is possible to perform an unattended installation of RES ONE Workspace using a command line.
This is useful if you need to install RES ONE Workspace on several computers, and/or if you do not
want to interrupt your users.
To install RES ONE Workspace unattended on a computer, you can apply public properties to the
"RES-ONE-Workspace-2015-SR1-msi" package. Below the available public properties are grouped
per use case.
Connect RES ONE Workspace to an existing database
Public property
Value
Description
CONNECTFILE
<FILEPATH>
Specifies the path and filename of a RES ONE Workspace
Datastore connection string stored in a text file. In a
connection string the database password is encrypted to
prevent exposure.
Create the connection string file from Primary Datastore
properties at Setup > Datastore, in the Management
Console.
Example: CONNECTFILE=C:\TEMP\Connectfile.txt
Alternatively, use:
DBTYPE
DBSERVER
MSSQL, DB2,
ORACLE, MYSQL or
MSSQLAZURE
Specifies the database type.
<SERVERNAME>
Specifies the database server that RES ONE Workspace
should connect to.
Example: DBTYPE=MSSQL
Example: DBSERVER=SQLServer01
DBNAME
<DATABASENAME>
Specifies the name of the database that RES ONE
Workspace should connect to.
Example: DBNAME=RESWorkspace
DBUSER
20
<DBUSERNAME>
Specifies the database user name that RES ONE Workspace
should use to connect to the database.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
Public property
Value
Description
Example: DBUSER=RESWorkspaceUser
DBPASSWORD
<DBPASSWORD>
Specifies the plaintext password that RES ONE Workspace
should use to connect to the database.
Example: DBPASSWORD=WorkspaceUserPassword
DBPROTOCOLENCRYP YES or NO (default) Specifies whether protocol encryption should be used
TION
when connecting to Microsoft SQL Server.
SERVICEACCOUNT
NAME
<DOMAIN>\<USER>
Specifies the account name that should be used as the
Agent service account when using Windows authentication.
The service account name must be a member of the Local
Administrator group.
When not using Windows authentication, providing
SERVICEACCOUNTNAME is optional.
If not provided, the Agent service will run under the
LocalSystem account.
Example:
SERVICEACCOUNTNAME=MyDomain\AgentServiceAccount
SERVICEACCOUNT
PASSWORD
<PASSWORD>
Specifies the cleartext password that should be used if a
service account is specified for SERVICEACCOUNTNAME.
Example: SERVICEACCOUNTPASSWORD=
AgentServiceAccountPassword
Example:
Msiexec /i C:\RES-ONE-Workspace-2015-SR1-msi DBSERVER=SQLServer01
DBNAME=RESWorkspace DBUSER=RESWorkspaceUser DBPASSWORD=WorkspaceUserPassword
DBTYPE=MSSQL DBPROTOCOLENCRYPTION=No /qn
Msiexec /i C:\RES-ONE-Workspace-2015-SR1-msi CONNECTFILE=C:\TEMP\WMDBconn.txt
/qn
Example including the Agent service account:
When the server name is SQLServer01, the Database name is RESWorkspace, Agent service
account name/password is AgentServiceAccount/AgentServiceAccountPassword, the command
line would be:
Msiexec /i C:\RES-ONE-Workspace-2015-SR1-msi DBTYPE=MSSQL DBSERVER=SQLServer01
DBNAME=RESWorkspace DBPROTOCOLENCRYPTION=No
SERVICEACCOUNTNAME=MyDomain\AgentServiceAccount
SERVICEACCOUNTPASSWORD=AgentServiceAccountPassword /qn
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
21
Chapter 3: Installation and Licensing
Connect RES ONE Workspace to a Relay Server
Public
property
Value
Description
RSENVGUID
<GUID>
Specifies the GUID that uniquely identifies the RES ONE
Workspace environment that the Agent should connect to.
This GUID can be found in the Management Console, at
Administration > Relay Servers, on the Settings tab.
Example: RSENVGUID={076FC22E-B7A1-477E-A02194601893B568}
RSPASSWORD
<PASSWORD> or
<HASHED RSPASSWORD>
Specifies the (by default: plaintext) password of the RES
ONE Workspace environment that the Agent should connect
to. This password must already be set in the Administration
> Relay Servers node in the Management Console.
RSPWHASHED
YES or NO (default)
Specifies whether the value that is specified at RSPASSWORD
is hashed.
Technical managers can obtain the hashed version of the
Environment password by using one of the following
command lines on the machine running the Management
Console:

pwrtech.exe /gethashedpassword

pwrtech.exe /gethashedpassword /f=<full file
path>
With Ctrl+C, the hashed password can be copied from
the dialog box to the clipboard.
The hashed password is saved in the specified file at the
given location.
Alternatively, the hashed (encrypted) password can be
found in the XML configuration file that was generated on a
Relay Server that connects to another Relay Server.
Create the configuration file from the Relay Server
Configuration Tool, by clicking Save to XML.
Example: RSPASSWORD=<HASHED RSPASSWORD>
RSPWHASHED=YES
RSDISCOVER
YES or NO (default)
Specifies whether the Agent should discover Relay Server(s)
using multicast.
RSLIST
<SERVERNAME1>:
<PORTNUMBER>;
<SERVERNAME2>
Specifies the list of Relay Servers to connect to, separated
by a semicolon (;). When a Relay Server in this list uses a
non-default listening port, its servername should be
followed by a colon (:) and the listening port.
Example:
RS_LIST=Server1;Server2:2012;Server3.MyDomain.com
RSRESOLVE
<RELAY SERVER FQDN>
Specifies the FQDN of a Relay Server to be resolved by DNS.
Example: RSRESOLVE=relay.ressoftware.com
22
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
Examples:
Msiexec /i C:\RES-ONE-Workspace-2015-SR1-msi RSENVGUID={7C1FF8AB-5FC8-40C9-AB4CE285A788A2C0} RSPASSWORD=password RSDISCOVER=yes/no RSLIST=server1;server2
RSRESOLVE=relayserver.ressoftware.com /qn
Msiexec /i C:\RES-ONE-Workspace-2015-SR1-msi RSENVGUID={7C1FF8AB-5FC8-40C9-AB4CE285A788A2C0} RSPASSWORD=38661621371C7E0C7C10ACA1CAEA1675F8678925 RSPWHASHED=yes
RSDISCOVER=yes/no RSLIST=server1;server2 RSRESOLVE=relayserver.ressoftware.com
/qn
Inherit connection settings
Public property
Value
INHERITSETTINGS YES or NO
(default)
Description
Specifies whether the Agent should revert to inherited settings after
establishing its initial connection to the environment.
With NO (or INHERITSETTINGS not provided), the above-mentioned
settings will be set specifically for the Agent, overruling inheritance.
With YES, the Agent will initially connect to the environment with
the above-mentioned settings, but will then be set to inherit its
connection settings (from a Workspace Model or from the global
settings).
Installation public properties
Public property
Value
Description
ADDTOWORKSPACE
<CONTAINER>|<CONT Specifies the names of the Workspace Containers that
AINER>
this computer should be a member of after finishing
installation. Separate multiple Workspace Container
names using bagpipes "|" (optional).
Example:
ADDTOWORKSPACE=Desktops|Marketing|64Bit
ADDUSERTOTECHMGR
<DOMAIN>\<USER>
Optionally adds the user to the Technical Manager
Security Role.
Example: ADDUSERTOTECHMGR=DEMO\Administrator
ADDGROUPTOTECHMGR
<GROUPNAME>
Optionally adds the group to the Technical Manager
Security Role.
Example: ADDGROUPTOTECHMGR=DomainAdmins
AUTORUNCOMPOSER
YES or NO (default)
Specifies that the Workspace Composer should be
configured to automatically be set as the default
shell.
CLAIMLAPTOPLICENSE
YES or NO (default)
Specifies that a concurrent (=laptop seat) license
must be claimed and cached from a mixed license
pool.
By default, an Agent will not claim a license until a
user starts a session on that Agent. Claiming a license
requires the Agent to have connection to the
Datastore or a Relay Server. If the first session on a
laptop is offline, a license cannot be claimed and the
license policy will apply unless a license was claimed
and cached locally during the installation.
Use CLAIMLAPTOPLICENSE with the value YES to claim
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
23
Chapter 3: Installation and Licensing
Public property
Value
Description
a laptop seat license during the unattended install. (A
license will be claimed for the laptop even if no user
is logged on. Different users of the laptop use the
same claimed laptop seat license).
Other values or if left empty will result in the default
behavior, which means that the laptop will attempt
to claim a named license when a user starts a session.
CLAIMUSERLICENSE
<DOMAIN>\<USER>
Specifies that a named user license should be claimed
for a specified user and cached locally.
By default, an Agent will not claim a license until a
user starts a session on that Agent. Claiming a license
requires the Agent to have connection to the
Datastore or a Relay Server. If the first session on an
Agent is offline, a license cannot be claimed and the
license policy will apply unless a license was claimed
and cached locally during the installation.
Use CLAIMUSERLICENSE to claim and cache a named
license for the specified user during the unattended
install. When that user starts a session, a license is
available and the session will proceed.
Example: CLAIMUSERLICENSE=DEMO\ACavendish
AI_DESKTOP_SH
1 (default) or 0
Specifies if desktop shortcuts should be created
during installation of RES ONE Workspace 2015.
AI_STARTMENU_SH
1 (default) or 0
Specifies if Start menu shortcuts should be created
during installation of RES ONE Workspace 2015.
Example:
Msiexec /i C:\RES-ONE-Workspace-2015-SR1-msi ADDTOWORKSPACE=TestWorkspace
ADDUSERTOTECHMGR=DEMO\John ADDGROUPTOTECHMGR=DEMO\TestGroup
AUTORUNCOMPOSER=yes CLAIMLAPTOPLICENSE=yes /qn
Create new Database
If there is no existing database to which RES ONE Workspace can connect, you can add the following
public properties to create a new database during the unattended installation. After creating a new
database, you can optionally import a license file and Building Block. Please note that it is not
possible to create a new database when installing an Agent-only installation.
Public property
Value
Description
DBCREATE
YES or NO (default)
Specifies whether a new database should be created using
the specified values.
DBCREATEUSER
<USERNAME>
Specifies the database user name that should be used to
create the new database.
Example: DBCREATEUSER=SA
DBCREATEPASSWORD <PASSWORD>
Specifies the database password that should be used to
create the new database.
Example: DBCREATEPASSWORD=SAPassword
24
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
DBFIPS
YES or NO (default)
Specifies that FIPS compliant security algorithms should
be used to encrypt data in the database.
DBIMPORTLICENSE
<FILEPATH>
Specifies a license file to be imported after creating a
new database (optional).
Example: DBIMPORTLICENSE=C:\TEMP\License.xml
DBIMPORTBB
<FILEPATH>
Specifies a Building Block file to be imported after
creating a new database (optional).
Example: DBIMPORTBB=C:\TEMP\BuildingBlock.xml
Example:
When the server name is SQLSERVER01, the Database name is RESWorkspace, username/password is
WorkspaceUser/WorkspaceUserPassword and the license file is located at C:\license.xml, the
command line would be:
Msiexec /i C:\RES-ONE-Workspace-2015-SR1-msi DBSERVER=SQLSERVER01
DBNAME=RESWorkspace DBUSER=WorkspaceUser DBPASSWORD=WorkspaceUserPassword
DBTYPE=MSSQL DBPROTOCOLENCRYPTION=No DBCREATE=Yes DBCREATEUSER=SA
DBCREATEPASSWORD=SAPassword DBIMPORTLICENSE=c:\license.xml
DBIMPORTBB=C:\buildingblock.xml /qn
Example using FIPS compliant security algorithms:
When the server name is SQLSERVER01, the Database name is RESWorkspace, username/password is
WorkspaceUser/WorkspaceUserPassword, the license file is located at C:\license.xml, and the
Database should be FIPS compliant, the command line would be:
Msiexec /i C:\RES-ONE-Workspace-2015-SR1-msi DBSERVER=SQLSERVER01
DBNAME=RESWorkspace DBFIPS=Yes DBUSER=WorkspaceUser
DBPASSWORD=WorkspaceUserPassword DBTYPE=MSSQL DBPROTOCOLENCRYPTION=No DBCREATE=Yes
DBCREATEUSER=SA DBCREATEPASSWORD=SAPassword DBIMPORTLICENSE=C:\license.xml /qn
Dynamic Datastore configuration
When performing unattended installations of RES ONE Workspace it can also be very useful to set up
dynamic Datastore configuration in your environment. When configured, an Agent will obtain its
Datastore connection settings from a DHCP server: it is not necessary to specify these settings in a
command line when installing RES ONE Workspace unattended. See Dynamic Datastore
configuration for Agents (on page 43) for more information.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
25
Chapter 3: Installation and Licensing
3.5
Configuring the Shell
You can make the Workspace available to the users, through the Workspace Composer. The
Workspace Composer uses the data in the local data cache to build the User Workspace, including
applications, menu items and settings to which the user is granted access. It is therefore important
that the Workspace Composer starts automatically when the user logs on to a computer. In RES ONE
Workspace 2015, you can set this up in the Management Console in the Setup menu.
Where to find Shell Configuration
What
Where
Agents
Administration > Agents
Terminal Services
Configuration
Administrative Tools > Terminal Services Configuration >
Environment tab
Active Directory Users and
Computers
Administrative Tools > Active Directory Users and Computers >
User Properties > Environment tab
Configuring Agents
If you choose not to run the Workspace Composer automatically after installation of the MSI, you
may choose to change the shell later via the RES ONE Workspace Console at Administration >
Agents.
The Run Workspace Composer column reflects whether an Agent was configured to start the
Workspace Composer automatically when users log on to the Agent. This information does not apply
to Agents running on Terminal Servers.

If the column shows the value Automatic (pending) or Manual (pending), the Agent cache has
not been updated yet.
The Settings tab of the Edit RES ONE Workspace Agent window, which is shown when editing the
settings of a RES ONE Workspace Agent, features the option Run Workspace Composer. This option,
which is not available for Agents running on a server, makes it possible to choose whether the
Workspace Composer should run automatically when a user logs on to the computer on which the
Agent runs.
Manual Configuration
Setting the Run Workspace Composer option to Automatic sets specific registry keys. Of course it
is also possible to set these values manually. Use the registry key located in:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon.
Edit the value "Shell" (REG_SZ) and set the data field to the location of " pwrstart.exe" (by
default, this is at C:\Program Files\RES Software\Workspace Manager\pwrstart.exe).
If you want a user-specific Shell, you need to set the applicable registry keys manually. Use the
registry key in:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon.
Create a new value "Shell" (REG_SZ) and set the data field to the location of pwrstart.exe (by
default, this is at C:\Program Files\RES Software\Workspace Manager\pwrstart.exe).
26
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
Server-based Computing
All users
If you use server-based computing and you want all users who log on using ICA or RDP to use the RES
Workspace Composer, you can use the Terminal Services Configuration tool to replace
explorer.exe with pfwsmgr.exe. You can find this tool in the Administrative Tools folder.
For RDP:
You can configure pfwsmgr.exe on the RDP protocol at the tab Environment and fill in the path
from pfwsmgr.exe (%ProgramFiles%\RES Software\Workspace Manager\pfwsmgr.exe) at Start
the following program when the user logs on.
Note
If you are using Windows 2008 and RemoteApps, you may want to reconsider this option, because pfwsmgr.exe will start
every time a RemoteApp is started.
It is also possible to configure pfwsmgr.exe at the properties of a user in Active Directory, also at
the tab Environment.
In AD you can also configure this in a GPO. Go to User Configuration > Administrative Templates >
System > "Custom user interface", and fill in the correct path to pfwsmgr.exe.
When using one of these options, RES ONE Workspace will start as the Shell in a user session and the
Windows Desktop will not be started.
For Citrix:
At Application Virtualization > Citrix XenApp Publishing in the Setup menu, you can create a
published application for the RES ONE Workspace Desktop. Please note that RES ONE Workspace is a
desktop session and therefore needs to start full screen.
In Active Directory you can also configure this in a GPO. Go to User Configuration > Administrative
Templates > System > "Custom user interface", and fill in the correct path to pfwsmgr.exe. This
starts RES ONE Workspace when a user launches a Citrix Desktop.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
27
Chapter 3: Installation and Licensing
Specific users
If you want to enable the RES Workspace Composer for a specific user, use the Environment tab of
the User Properties window. You can open this window in the Active Directory Users and
Computers tool on the server.
Configure <path>\pfwsmgr.exe as the startup application at logon. <Path> is the path where
pfwsmgr.exe is located (by default C:\Progra~1\Ressof~1\Worksp~1\pfwsmgr.exe).
The RES Workspace Composer as a Citrix XenApp Published Application
If you are running a Citrix XenApp environment, you can also make the RES Workspace Composer
available through a Published Application.
You can launch the Citrix Management console, create a new application (RES ONE Workspace
Desktop), and enter the pathname "pfwsmgr.exe" at the location of the application. The RES
Workspace Composer will now be available through the Citrix Program Neighborhood or through
Citrix NFuse clients.
28
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
3.6
Setting up the Datastore
After installing RES ONE Workspace and optionally changing the Shell to the Workspace Composer, it
is time to create a Datastore or to connect to an existing one.
Configuring the Datastore
When you start the Console for the first time and there is no Datastore connection yet, you will be
prompted whether to create a new Datastore or to connect to an existing one.

To create a new Datastore, click Create. This opens the Datastore Wizard, which guides you
through the process.



Follow the prompts to provide:

the database server type and name and any relevant (existing) DBA credentials

a name for the database that will become the RES ONE Workspace Datastore

database file locations

a (new) user name and password to access the Datastore

the RES ONE Workspace license edition you wish to evaluate
You can create a Datastore that uses Federal Information Processing Standard (FIPS)
compliant security algorithms by selecting the option Use FIPS compliant security
algorithms on the New database properties page of the wizard.

This option is only available for new RES ONE Workspace Datastores and all Management
Consoles, Agents, and Relay Servers must be running on RES ONE Workspace 2015.

In migration scenarios, it is possible to import Building Blocks to fill your Datastore.
Please refer to the RES ONE Workspace 2015 Upgrade Guide for more information on
these Building Block scenarios.

Please note that it is not recommended to make your RES ONE Workspace environment
only use FIPS compliant security algorithms, if not all components have been upgraded.
In a mixed environment with RES Workspace Manager 2014 SR3 or lower and RES ONE
Workspace 2015 or higher, some functionalities are not working.
After clicking the Finish button in the final step of the Datastore Wizard, the Datastore will
be created. When the Datastore has been created, the Console will refresh, after which all
nodes will be available.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
29
Chapter 3: Installation and Licensing
3.7
Datastore Management
With Datastore management you can review and configure the Datastore and the Agents on which
RES ONE Workspace has been installed.
Where to find the Datastore
What
Where
Datastore
Go to Datastore in the Setup menu
Connection
Go to Datastore in the Setup menu
Advanced Settings
Advanced Settings in the Setup menu
Custom Resources
Administration > Custom Resources
Maintenance
Administration > Maintenance
30
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
Connections
Datastore in the Setup menu, shows to which primary Datastore the current RES ONE Workspace
site connects. From here, you can also connect to other existing RES ONE Workspace sites, create
new ones, migrate your Datastore, split or join primary and secondary Datastores and generate a
string of the database connection settings.
Primary Datastore

To connect to a different Datastore, click
and then click Connect. This opens the Datastore
Connection Wizard, which will guide you through the process. Instead of typing the connection
settings of the target Datastore manually, you can also copy the Datastore connection settings
of a different Datastore from the clipboard (by clicking the Copy from clipboard button) or
import these settings from a TXT file (by clicking the Import from file button).
You can also use this functionality to revert accidental changes to the connection settings of the
current Datastore or to set up Datastore location sensing for Agents.

When connecting to a Datastore that was previously migrated, you can choose between the
following options:

Select Ignore this and connect anyway to connect to the "old" Datastore. Optionally also
select Remove referral to new database to remove the Datastore already migrated
notification. Note that other Agents will not automatically also connect to this Datastore.
See Datastore Migration Wizard (on page 33) for more information.

Select Connect to the new database to connect to the migrated Datastore.

To create a new Datastore, click
and then click Create. This opens the Datastore Wizard,
which will guide you through the process. When creating a new Datastore, you can choose which
product to use. See Selecting RES ONE Workspace modules/license editions. For more
information about the features available in the modules, see RES ONE Workspace modules (on
page 60).

To migrate to a new Datastore, click
and then click Migrate. This opens the Datastore
Migration Wizard (on page 33), which will guide you through the process.

To export a string of the current database connection settings, click
and then click Export.
This opens the Export database connection string window, from which you can copy the
Datastore connection settings to the clipboard (by clicking the Copy to clipboard button) or
export these settings to a TXT file (by clicking the Export to file button).
This functionality makes it easier to transfer all connection settings to another Console or to set
up Datastore location sensing for Agents.
Secondary Datastore

It is possible to split the Datastore into two separate databases. One database is used for State
and Configuration data in- or excluding Logging and one database is used for Usage Tracking
data in- or excluding Logging.

To change the credentials or to split / join Datastores, click

To split / join Datastores, click Split/Join to start the Split/Join Datastore Wizard, which will
guide you through the process.
at Secondary Datastore.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
31
Chapter 3: Installation and Licensing
Supported databases and their prerequisites
Microsoft SQL Server
2005 and later
(including express
editions)
Microsoft SQL Azure
Oracle (11.x)
Database prerequisites
 Mixed Mode authentication

A named SQL Server System Administrator login ID

If Force protocol encryption is enabled: Microsoft Native Client

Microsoft Windows Azure credentials

Microsoft SQL Native Client

Oracle DBA credentials

Oracle database drivers on all Agents connecting directly to the
Datastore
IBM DB2 (9.5 and later, 
10.5)

An existing database and a database user with access to a table space
with a page size of at least 8k
IBM DB2 OLEDB provider on all Agents connecting directly to the
Datastore
Preparations for creating a Datastore on DB2
MySQL (5.0 and later)

Create a local user on the DB2 Server. This account will be used to
connect to the RES ONE Workspace Datastore.

Manually create a database on the DB2 Server.

Create a Table Space for the user in the new database. Specify a buffer
pool of 8KB.

Create a schema in the new database.

Add the new user to the new database.

Assign the applicable authorities, and add the schema and Table Space
you created to this user. Make sure you assign the proper privileges.

MySQL DBA credentials

MySQL ODBC driver on the database server and on all Agents connecting
directly to the Datastore
Notes

It is not possible to connect to a Datastore created by a previous version of RES ONE Workspace.

It is not possible to migrate a secondary Datastore. To move the secondary Datastore to another location: Join
the primary and secondary Datastores and create a new secondary Datastore at another location.

Verify that all of the RES ONE Workspace Agents are able to connect to your Migrated / Split Datastores.

RES ONE Workspace only supports the ANSI version of the MySQL ODBC Driver versions 5.2.2 - 5.2.4.
Tip
You can also connect to another existing RES ONE Workspace site by going to File > Connect remote database in the
Management Console menu, providing the relevant information there. It is possible to import a Database connection string
here.
32
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
Datastore Migration Wizard
The Migrate button on the Primary Datastore properties screen makes it possible to migrate your
existing RES ONE Workspace Datastore to a new type and/or location. This allows you to easily
relocate your exiting RES ONE Workspace Datastore or to, for instance, migrate from a Microsoft
SQL 2005 Datastore to a Microsoft SQL Azure Datastore. Migrations between all supported Database
types are possible. RES ONE Workspace Agents and Relay Servers running RES ONE Workspace 2015
will connect to this new Datastore as soon as they update their cache.
Configuration

To migrate to a new Datastore, click Migrate to start the Datastore Migration Wizard, which will
guide you through the process.

Optionally choose to migrate your Usage Tracking data to the new database.

After clicking Finish the Datastore will be migrated to the new location.

The last step of the wizard offers the option to transfer your RES ONE Workspace licenses to the
new database. If you select this option the old database license activation will expire in 30
days. If you do not choose to transfer your licenses the new database gets no licenses but does
get a new site ID.

Optionally you can choose to automatically create a Building Block for a RES ONE Automation
Module. You can use this Module to migrate RES ONE Workspace Agents running an older version
of RES ONE Workspace, not yet containing the Datastore Migration Wizard. This Building Block
contains the new database connection, its credentials and a Task Manage Service Properties to
restart the RES ONE Workspace Agent Service.
Warning
Do not take the migrated database offline before all directly connected agents and Relay Servers have switched to the new
database. This may take minutes to weeks depending on cache interval and off-line Agents (laptops).
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
33
Chapter 3: Installation and Licensing
Datastore Split/Join Wizard
The Split/Join... button on the Primary Datastore properties screen makes it possible to split your
existing RES ONE Workspace Datastore to a primary and secondary location. One database is used
for State and Configuration data in- or excluding Logging and one database is used for Usage
Tracking data in- or excluding Logging. Since Logging and Usage Tracking data may cause very large
database sizes, storing that data in a separate database can for instance allow the design of the
database infrastructure to be more flexible. For the secondary database all Database types are
possible. All RES ONE Workspace Agents running RES ONE Workspace 2015 will automatically connect
to this new Datastore.
Configuration

To migrate to a new Datastore, click Split/Join... to start the Split/Join Datastore Wizard,
which will guide you through the process.

Choose what data needs to be stored in your secondary database.

Choose to create a new secondary Datastore or use an existing one:

If you are creating a new Datastore, select the server and supply credentials.

If you use an existing Datastore, specify the connection settings for the existing secondary
location.

If a secondary Datastore already exists, the Split/Join Datastore Wizard will display the records
that are already available in that location.

An overview of all actions to be taken is displayed, before actually splitting or joining the
Datastore.

In the last step of the wizard you must make the changes permanent or click Cancel to revert to
the original situation. A confirmation of all choices made in the wizard will be displayed.
34
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
Advanced Settings
Item
Function
# minutes until
AutoRefresh check
Specifies the time frame in which the active users' sessions should refresh
after clicking Refresh active. E.g. if you have 10 active clients and the
interval is set to 10 minutes, approximately every minute a client will be
forced to refresh.
# days to keep log
files
Specifies how long log files should be kept.
Remove obsolete log
files every day at
Specifies the time when log files should be cleaned up, for example after
office hours. A cleanup can only run once a day. When a user starts a
session, RES ONE Workspace will check whether it has already performed a
cleanup that day. If it has not, RES ONE Workspace will check whether the
time the session was started is less than one hour after the specified time
when the log files should be cleaned up. If it is, RES ONE Workspace will
perform a cleanup of the log files. If not, the cleanup will be performed the
next day.
For Relay Servers that are connected directly to the Datastore, the duration
of the daily cleanup can be specified with the registry value
DBCleanupDuration. See the RES ONE Workspace Administration Guide
for more information.
# seconds until
timeout "Application
Not Responding"
Specifies when the user will be notified about an unresponsive application.
This setting only applies if you selected Notify user about not responding
applications at Composition > Desktop > Lockdown and Behavior.
# seconds to wait
before refreshing
after network change
or resume
Allows you to configure a delay before the Workspace Composer will
perform a network refresh after a network connectivity change or resume
occurred. For example, such a delay may be helpful in situations where a
laptop or workstation changes network connectivity within a short period of
time, e.g. when reconnecting from a WIFI to a LAN network, possibly
causing unnecessary Workspace Composer refreshes.
Item
Function
Backtrack passthrough
sessions to originating
client for Zones
Allows RES ONE Workspace to use the IP address of the originating
client to resolve Zones if a published application on a Terminal Server
is launched from another Terminal Server.
By default do not grant
concurrent/seat license
when database is not
available
Specifies the default setting for application licenses for new
applications. If selected, access to an application will be denied if
licenses and seats cannot be checked by RES ONE Workspace because
there is no database connection.
Bypass composer for
accounts matching
Specifies the mask(s) of local administrator accounts that should bypass
the Workspace Composer. Multiple accounts can be separated by a
semicolon (;).
Check validity of TEMP
location at logon
If the location of the TEMP folder is invalid, RES ONE Workspace will try
to find a valid location and log it when found.
Do not allow reset of user Disables the possibility to remotely reset User Sessions from the
sessions
Console.
Do not attempt to resolve This may prevent naming issues.
printer name when
adding network printers
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
35
Chapter 3: Installation and Licensing
Item
Function
Do not establish
communication with any
Workspace Extender
Specifies that the Workspace Extender should not be used.
Do not log security events
for RES ONE Workspace
program folders and
subfolders
If Security restrictions prevent a user from accessing the RES ONE
Workspace program folders, legitimate access to these folders by the
RES Workspace Composer is also logged as a security event. Select this
option to keep the log free of security events reporting access to the
RES ONE Workspace program folders by anyone.
This option is only available if Enterprise or Standard licenses (RES
PowerFuse 2010) are active within your environment.
Selecting this option will also keep the log clear of the security events
that are triggered by the RES ONE Workspace installation and/or cache
folders.
Do not ping print server
before connecting
printers
This is useful if the print server uses a different network protocol (e.g.
Novell print server with IPX).
Do not prevent
applications in the Run
key or RunOnce key from
starting
In Microsoft Windows, applications set in
HKCU\...\Windows\CurrentVersion\Run or
HKCU\...\Windows\CurrentVersion\RunOnce will automatically run
at start up.
By default, this mechanism is disabled in sessions running the Windows
Shell where Windows Shell shortcut creation is set to Replace all
unmanaged shortcuts (at Composition > Applications > Settings).
Select this option to allow applications to run automatically from the
Run and RunOnce keys.
The Run and RunOnce mechanism is always:

enabled in sessions running the Windows Shell with Windows Shell
shortcut creation is set to Do nothing or to Merge with
unmanaged shortcuts.

disabled in sessions running the RES ONE Workspace Shell.
Warning: Applications started from the Run key or RunOnce key
are always unmanaged applications.
Do not setup workstation
license virtual channel
When starting a terminal session from a desktop, RES ONE Workspace
will set up a virtual channel (either Citrix ICA or Microsoft RDP) to
communicate with the terminal session and to have it acquire a license
from the RES Workspace Composer. This setting prevents RES ONE
Workspace from enabling this virtual channel.
Do not verify UNC path of
security rules when
offline
If selected, RES ONE Workspace will not try to verify whether a server
in an UNC path in a security rule can be reached if the connection state
of a computer is offline. Instead, it will assume that the server can be
reached. This setting is selected by default when a new Datastore is
created. This setting requires an unqualified server name (e.g.
\\server instead of \\server.domain) that can be resolved at DNS
level. Alternatively, the authorization rule must be changed so that it
contains a fully qualified domain name in the UNC path.
36
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
Item
Function
Ping file server to verify
If selected, RES ONE Workspace will ping the file server in an UNC path
UNC path of security rules in a security rule, to determine whether the server can be reached,
when online
before it will verify the entire UNC path. By default, this setting is not
selected when a new Datastore is created. This setting requires an
unqualified server name (e.g. \\server instead of \\server.domain)
that can be resolved at DNS level. Alternatively, the authorization rule
must be changed so that it contains a fully qualified domain name in
the UNC path.
Remove policy based
registry keys before
logging off
Prevents registry tattooing for policies set by RES ONE Workspace.
After logging off, all policy-based registry keys will be removed by RES
ONE Workspace. Windows will take care of recreating Group Policies
and NT4-based policies, while RES ONE Workspace will reprocess the
policies as configured in the Management Console.
Use all valid IP addresses
when evaluating Zones
Uses all valid IP addresses on all network interfaces to evaluate Zone
rules. This is useful when using e.g multi-homed computers (a
computer with more than one IP address).
Use cached user context
if latency to AD is above:
x ms
If at session start the network latency to the domain controller is above
the specified threshold, the RES Workspace Composer will use the
cached user context. The user may experience a session refresh due to
changes in context. This is useful when high latency connections to
Active Directory cause long delays in the retrieval of user context at
session logon or refresh.
Use computer's FQDN
instead of
domain\computername in
Logs and Usage Tracking
Enables you to identify computers by their Fully Qualified Domain
Name (FQDN), rather than having identical names in Log and Usage
Tracking reports. At Administration > Agents and Diagnostics >
Agents, an extra column is displayed with the FQDN name.
Lift policy restrictions for Removes all policy-related registry keys and values for the current user
current user
of the Management Console.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
37
Chapter 3: Installation and Licensing
Custom Resources
With Custom Resources you can manage resources that are referenced by other parts of RES ONE
Workspace, but which cannot easily be placed on a centrally available fileserver or which must be
available on a laptop when it is not connected to the network.
For example, these can be image files used in Instant Mail Outlook signatures or scripts used.
Custom Resources are locally cached on all computers running RES ONE Workspace. When
referencing these resources, use the %rescustomresources% variable, which will be replaced by
RES ONE Workspace to point to the actual location of the file. The %rescustomresources% variable
will always point to the root of the folder structure.
Configuration

To configure custom resources click New to add a custom resource. This will open the Browse
for File or Folder window.

Select a file or folder and click OK. This will display the selected files and folders in the Custom
Resources list.
Example:
You have added an image file named corpimage.gif to the root of your Custom Resources (i.e. you
have not created a folder structure for your custom resources). If you want this image to be used in
you corporate e-mail signature, refer to this image as %rescustomresources%\corpimage.gif.
38
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
Maintenance
Datastore maintenance has to be performed at regular intervals. This default maintenance allows
you to remove references in the Datastore, to remove users that no longer exist, to check license
locks and to clean up or clear log files. Datastore Maintenance can be done from Administration >
Maintenance.

Licenses can be locked due to computer crashes or network connection loss. To unlock them,
click Check License lock info.

By clicking Clean up logs now, all logs older than x days will be cleaned (with the exception of
the Error Log, which has to be cleaned manually).

The x is based on the value specified at Setup > Advanced Settings, for the option # days to
keep log files.

By clicking Clear all logs now, all logs will be cleared entirely (with the exception of the Error
Log, which has to be cleared manually).

When you change a Group or User name on NT or Active Directory level, this name will not
correspond to the one used in RES ONE Workspace. The name used in RES ONE Workspace can
be updated by clicking Rename group or user.

At Old name, enter the Group or User name preceded by the Domain name, for example, DENERGY\Group1.

At New name, you can use
to select the Group or User from the Directory Service. If
entered manually, the Group or User name must also be preceded by the Domain name, for
example, D-ENERGY\Group2.

To search for non-existing users in the Datastore, click Search for non-existing users. Nonexisting users are users who have been removed from the NT Domain or the Active Directory,
but who still exist in the RES ONE Workspace Datastore. Click Remove non-existing users if any
are found.

To search for obsolete Citrix Worker Groups in the Datastore, click Search for obsolete Citrix
Worker Groups. Obsolete Citrix worker groups are worker groups that exist in the RES ONE
Workspace Datastore but are from farms for which the current RES ONE Workspace site does not
contain any Agents. The list of obsolete worker groups includes information about where in the
Management Console the obsolete worker group is being referenced, i.e. for published
applications or on the Defaults tab for Citrix XenApp Publishing Integration.
If obsolete worker groups are found, the option Remove obsolete Worker Groups becomes
available if the Administrator has write access to both the Citrix XenApp Publishing Integration
and the Applications nodes. Clicking this option will remove all reference to the obsolete
worker groups in the Management Console and Datastore.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
39
Chapter 3: Installation and Licensing

Verify database integrity - RES ONE Workspace features database integrity, a capability that
checks for any errors in the Datastore by closely monitoring all objects, resource types and
settings.
Each time the Management Console starts it will perform this consistency check and show a
message if one of the database items is missing or incomplete. Any function that may update
such an item will be set to read-only until the issue is resolved.
Each time the RES ONE Workspace cache checks for changes it will also perform this consistency
check; items that are not consistent will not be changed. This ensures the cache contains
complete data only.
Within new RES ONE Workspace sites the monitoring of database items is performed for all RES
ONE Workspace features by default. Within existing RES ONE Workspace sites the monitoring for
individual features starts only when new items are added or existing items are deleted.
Execute the Verify database Integrity action to ensure that database integrity is enforced on
all features of an existing site.

Verify SIDs for groups and users performs a check to verify each Access Control entry has a
valid SID in the Datastore when the option Account SIDs is enabled on a Directory Service in
User Context > Directory Services. Also, a check is performed to verify whether the group and
user names still match the actual account in the Directory Service. In case of missing SIDs or
incorrect names, an update option can be carried out: Update SIDs and names.
Notes

The list created using the option Search for non-existing users also specifies which users could not be checked
because the related Directory Service was not available. The option Remove non-existing users does NOT
remove users whose existence could not be checked because their Directory Service was not available.

Datastore Maintenance does not clean up or clear the Audit Trail.

For a list of possible errors resulting from the function Verify Database Integrity and from the cache update, see
http://support.ressoftware.com/Modules/KnowledgeBase "Common errors resulting from the cache
update/Database Integrity checks and solutions."
40
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
3.8
Configuration Wizard
After creating the Datastore, the configuration wizard will automatically start and guide you
through setting up a basic configuration in RES ONE Workspace in a few easy steps.
When setting up a new RES ONE Workspace site you have the choice to create scenarios and
features for either Evaluation or Production purposes. When you choose Evaluation, the
Configuration Wizard will set the options to create example objects for selected features. For
Production purposes, these options will not be set.
Configuration for a new RES ONE Workspace site

When starting the configuration wizard, an introductory window will be shown welcoming you to
the configuration wizard. You can either choose to view the online tutorial to be informed
about the concept of workspace management or click Next if you already know our product.

You will be asked to select the type of RES ONE Workspace site you wish to create.

Select one or more Workspace Containers to create. Workspace Containers are logical groups of
Agents (for instance, physical or virtual desktops, laptops or remote desktop servers). At least
one Workspace Container must be selected. Besides the Workspace Containers you selected, a
Workspace Container "Unmanaged desktops" will be created, with all features disabled. The
settings for the other Workspace Containers will be determined in the next steps of the wizard.
If you want to know more about Workspace Containers click View tutorial or click Next.

Select the features you want to start using. Depending on the module(s) you selected when
creating the Datastore, more or less features may be available. Use Ctrl + A to (de)select all
features. These features will be configured per Workspace Container. Click Next.

Specify the settings for each feature you selected in step 4. Most features can be enabled or
disabled by selecting the relevant check box under the Workspace Container heading. If you
want to create example objects for the feature you enabled, select the check box Create
example objects. Example objects are disabled by default when they are created. If you want
more information about a specific feature (for example, Workspace performance or Application
Management), click View tutorial. After you have specified the settings per feature, click Next.

Additionally, the following example objects (besides the example objects you selected with the
feature selection) can be selected:

Managed Applications

Settings executed at the start of a user session

An Administrative Role "Helpdesk"

Location-based printing
Click Next.

Your site configuration settings are shown in a summary. If you want to change any of the
settings click Back; if you agree with the settings, click Next.

The configuration process will start, showing status and result information.

In the final step, you will see that the configuration has been completed and an Action list is
shown, stating the items you still have to configure manually. The Action list must be saved or
copied on the clipboard. You can use the Action List afterwards as a reminder of the items you
still have to configure. Click Finish.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
41
Chapter 3: Installation and Licensing
After closing the configuration wizard, you will return to the top node in the Console: the
Navigation map.
Note
If you click Cancel during any of the steps of the configuration wizard, the wizard will exit without changing anything in the
configuration of the site. The next time the Console is started, the configuration wizard will start up automatically, as long
as no configuration items have been saved.
Running the Configuration Wizard in an existing site can be used to create example objects.
Configuration for an existing RES ONE Workspace site

When starting the configuration wizard, an introductory window will be shown welcoming you to
the configuration wizard. You can either choose to view the online tutorial to be informed
about the concept of workspace management or click Next if you already know our product.

The initial steps will be skipped and you can configure additional example configurations.
Example objects are disabled by default when they are created:

Managed Applications

Settings executed at the start of a user session

An Administrative Role "Helpdesk"

Location-based printing
Click Next.

Your site configuration settings are shown in a summary. If you want to change any of the
settings click Back; if you agree with the settings, click Next.

The configuration process will start, showing status and result information.

In the final step, you will see that the configuration has been completed and an Action list is
shown, stating the items you still have to configure manually. The Action list can be saved or
copied on the clipboard. You can use the Action List afterwards as a reminder of the items you
still have to configure. Click Finish.
After closing the Configuration Wizard, you will return to the top node in the Console: the
Navigation map.
Tip
In the Summary (review site configuration settings) step of the configuration wizard, you can click the Instant Report button
to show or save the Configuration Wizard summary. You can use this summary as an overview or checklist which items and
settings have been configured.
Notes

To start the configuration wizard in a production site already containing configured items, click Help >
Configuration Wizard. The steps are the same as in Creating a Production site, except for step 2 in which the
type of site you wish to create is asked, which is skipped.

If you want to clear the example data created by the Configuration Wizard, click on Clear example data at
Usage Tracking in the Setup menu. Only Usage Tracking example data created by the Configuration Wizard will
be deleted, real Usage Tracking data will not be cleared.

The Console user needs the administrative role of "Technical Manager" with full rights to all nodes in RES ONE
Workspace to be able to execute the Configuration Wizard.
42
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
3.9
Dynamic Datastore configuration for Agents
Each Agent is configured to connect to a specific Datastore when it runs a RES ONE Workspace
session. Normally, each Agent always connects to the same Datastore: the Datastore specified in the
Console at Datastore in the Setup menu. In environments with multiple, replicated Datastores, this
setup can cause problems for users on laptops or other mobile devices. In such cases, you can set up
dynamic Datastore configuration.
Dynamic Datastore configuration uses the DHCP servers in your network. A DHCP server not only
allocates IP addresses to Agents, but can also be used to provide other information. To set up
dynamic Datastore configuration, you store Datastore connection information in Server options or
Scope options on the DHCP servers in your environment. When a computer connects to the network,
the operating system ensures that the Datastore connection information on the local DHCP server is
transferred to the computer's registry. When the RES ONE Workspace Agent starts up, it will use the
information in its registry to connect to a Datastore.
Where to find Dynamic Datastore Configuration
What
Where
Datastore
Go to Datastore > Connections in the Setup menu
Terminal Services
Configuration
Administrative Tools > Terminal Services Configuration >
Environment tab
Configuring the Datastore dynamically
Note: The following procedure is based on DHCP server with Microsoft Windows Server 2003.
Procedural steps may differ for other server versions.
For each DHCP server in your environment, do the following:

Open the Console on a computer from which the Console connects to the Datastore that should
be specified by the DHCP server.

At Datastore > Connections in the Setup menu, click
. This opens the Primary Datastore
properties window. Click Export to open the Export Database connection string window,
containing an encrypted string of the Datastore connection settings.

Click the Copy to clipboard button or click the Export to file button to export the string into a
text file for later reference.

Close the Console.

Log on to the DHCP server and open the DHCP snap-in.

Select the DHCP server in the list and click Action > Set Predefined Options. This opens the
Predefined Options and Values window.

At Option class, select Microsoft Windows 2000 Options.

Click Add to add an option. This opens the Option Type window, in which you can specify a
name for the option (for example, "RES ONE Workspace").

At Data type, select String.

At Code, specify an option ID with a free number in the range from 0 until 255. See
http://www.networksorcery.com/enp/protocol/bootp/options.htm for a list of usable options.

At Description, specify a description for the option and click OK.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
43
Chapter 3: Installation and Licensing

At String, paste the database connection string that you copied from the Console and click OK.
This string may not exceed 255 characters.

Right-click either the Scope Options node or the Server Options node (depending on the option
that you want to configure) and choose Configure Options. This will open either the Scope
Options window or the Server Options window.

On the Advanced tab, select Microsoft Windows 2000 Options in the Vendor class field.

At User class, select Default User Class.

In the Available Options area, browse to the option that you created earlier and select its
check box. This will also show the string value that you specified earlier.

Click Apply and OK.

Repeat the process for all your DHCP servers, making sure that each DHCP server refers to the
correct RES ONE Workspace Datastore.
Notes

When specifying Scope options or Server options at your DHCP servers, you can only use option class Microsoft
Windows 2000 Options.

If the Datastore as specified by a DHCP server cannot be reached, the Agent will automatically revert to its last
known Datastore connection settings.

To set a specific Agent to ignore the DHCP information, set the registry key
HKEY_Local_Machine\Software\RES\Workspace Manager\DisableDHCP in the registry of the
Agent, with value "True", "yes" or "1".


In the node Administration > Agents, the Connection column reflects how an Agent obtained its Datastore
connection settings.

Local specifies that the Agent connects to the Datastore using its local settings.

DHCP specifies that the Agent connects to the Datastore using the settings of a DHCP server.

Local (DHCP disabled) specifies that the Agent connects to the Datastore using its local settings and that
location sensing has been disabled for the Agent.
Configuring location sensing in your environment can also be very useful when performing unattended
installations of RES ONE Workspace. When configured, an Agent will obtain its Datastore connection settings from
a DHCP server: it is not necessary to specify these settings in a command line when installing RES ONE Workspace
unattended. See Getting Started with RES ONE Workspace 2015 SR1 for more information.

Example
D-Energy has its head office in New York, and the RES ONE Workspace Datastore is located on a
server there. The D-Energy satellite office in Singapore uses a replicated Datastore, because Agents
in Singapore cannot connect directly to the Datastore in New York.
Amanda Cavendish is based in the New York office, and her laptop uses the New York Datastore. Wu
Shen is based in Singapore, and his desktop computer uses the Singapore Datastore.
In the setup with fixed Datastore configuration for Agents, Amanda cannot start a RES ONE
Workspace session on her laptop if she is in the Singapore office: the Agent on the laptop tries to
connect to the New York Datastore, which cannot be reached from the Singapore office. It would
make more sense for her laptop to connect to the replicated Datastore in Singapore while she is
there.
With dynamic Datastore configuration, you can create a setup where Amanda's laptop automatically
connects to the New York Datastore when she is in New York, and to the replicated Datastore in
Singapore when she is in Singapore.
44
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
3.10
Agents
The Agents node allows you to view and change the settings of all Agents in your environment and
the way in which they are identified. The Agent Overview shows a read-only overview of these
settings.
Where to find Agents
What
Where
Agents
Administration > Agents
Agents Overview
Diagnostics > Agents Overview
Agents Settings
At the Agents node, you can change the following settings:
Fetch change information
All configuration data in the Datastore is cached to the Agent. Because most RES ONE Workspace
components use this cached data instead of directly connecting to the Datastore, this significantly
reduces the load on the central Datastore and eliminates it as a single point of failure in a RES ONE
Workspace environment.
The local cache is kept up-to-date by the RES ONE Workspace Agent Service, which is also
responsible for uploading log and Usage Tracking information to the Datastore/Relay Server. If a
connection to the Datastore/Relay Server is not available, all log and Usage Tracking information
will be cached locally until the connection is re-established.
The setting Fetch change information determines the interval at which Agents check whether they
need to download any configuration changes, but also whether they need to execute any tasks. A
longer polling interval means that it takes longer before Agents execute tasks, such as remote
publishing to Citrix XenApp servers, forcing a session refresh, restoring User Settings from the RES
ONE Workspace Console, sending messages to users, and disconnect, log off and reset users.

Select Push change information to push change notifications to the Agents that are
connected through a Relay Server. These Agents then check for change notifications every 5
seconds. After the Agent has processed the change notification, configuration changes, for
example adding a printer, are fetched and applied according to the interval specified for
the option Update agent cache on change. Tasks, such as the tasks mentioned for the
option Fetch change information, are fetched and applied immediately.
The settings Fetch change information and Push change information can be configured at global
level (applies to all Agents) and for individual Agents (by editing the Settings of an Agent):

Every <period>: checking the database will occur at the selected interval. A longer interval
decreases the traffic on your network, but delays the execution of tasks and lengthens the time
during which Agents are not aware they need to update their cache in order to reflect any
changes in the Datastore.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
45
Chapter 3: Installation and Licensing
Update agent cache on change
The time span set at Update agent cache on change determines the timing for Agents to actually
download data and update their cache. A short interval may result in many Agents starting to
download data simultaneously. A long interval will spread the network load more evenly, but as a
result it will take longer before all Agents reflect the necessary changes.
Update agent cache on change can be configured at global level (applies to all Agents) and for
individual Agents (by editing the Settings of an Agent):

Immediately: each Agent will update its local cache as soon as it the fetch change information
mechanism detects a relevant change in the Datastore. If many Agents detect changes at the
same time, they may all start downloading data at the same time.
With the option Push change information enabled, it is recommended to set the option Update
agent cache on change to any other value than Immediately. Setting this option to
Immediately will cause all Agents in your environment to immediately connect to the Relay
Server and fetch the configuration changes.

Within <period>: the update of the local caches will be randomized and spread out over the
selected period. Although this decreases the traffic on your network, it also means that the
local caches on your Agents will not immediately reflect any changes in the Datastore.
You can also update Agent caches immediately from the context menu.
Synchronization policy
The synchronization policy of RES ONE Workspace determines what should happen if the
synchronization of an Agent fails. The policy that you select will first be applied when you click
Apply. The setting Synchronization policy can be configured at global level (applies to all Agents)
and for individual Agents (by editing the Settings of an Agent):

Abort on error: the synchronization process will be aborted if the synchronization of an Agent
fails (for example, because it is not possible to update the local cache or because an error
occurs). If this happens, you first have to correct the cause of the failure before the
synchronization of the Agent will be successful again. This option is selected by default.

Continue on error: the synchronization process will continue, even if an error occurs.
If a synchronization fails, RES ONE Workspace will attempt a new synchronization after minimally
one hour, irrespective of the synchronization policy that you specified.
Identify Agents by
By default, Agents are identified by Computer domain name and NetBIOS name. At Identify RES
ONE Workspace Agents, select a different method of identification if:

the operating system is re-installed on Agents.

several virtual machines use the same image.

several computers are deployed using imaging.
Automatic Agent Removal

None: inactive Agents will not be removed automatically.

After 45 / 60 / 90 / 120 days of inactivity: the RES Service or Relay Server will remove
inactive Agents after the specified number of days of inactivity (45, 60, 90, or 120)
Please note that automatically removing inactive Agents will not remove Agents on Citrix XenApp
servers, as they may be used for application publishing.
46
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
Datastore connection
You can configure the default behavior of Agents: Connect directly to the Datastore or Connect
through Relay Server. If they should connect to relay servers, you can select the Connection
method(s):

Discover (using multicast): Relay Servers in the environment will be discovered
automatically

Preconfigured (using list): Relay Servers will be selected according to the provided list. The
Relay Servers can be entered manually or previously discovered Relay Servers can be
selected from the list.

Resolve name (using DNS): The FQDN of a Relay Server will be resolved through DNS.
These connection options do not exclude one another and can be used in combination.
Run Workspace Composer automatically
You can configure Agents to run the Workspace Composer automatically from the context menu,
and by editing the Settings of an Agent:

Automatic: the Workspace Composer will run automatically when users log on.

Manual: users need to start the Workspace Composer manually (for example, from the Start
Menu).
These settings are reflected in the Run Workspace Composer column in the Agents list. If the
column shows the value Automatic (pending) or Manual (pending), the Agent cache has not been
updated yet.

This field is unavailable for Agents running on Terminal Servers. See the RES ONE Workspace
Administration Guide for information about the configuration of this feature for Terminal
Servers.

For Agents running on Citrix XenApp special considerations apply. See the document Migrating
Existing Citrix XenApp Published Applications to RES ONE Workspace, where various scenarios
are explained, depending on whether you want to republish your existing Citrix published
applications or want to manage them using the Intercept option If managed shortcut was not
used. The setting Run Workspace Composer of the Agent must be configured according to the
scenario you choose. The workings of the Intercept option are discussed in the section
Composition, Application Properties, General of this Administration Guide.
Workspace Container membership
You can configure membership of Workspace Containers of Agents at User Context > Workspace
Containers, but also by editing the Settings of an Agent.
Deleting Agents
Deleting Agents can be useful if Agents have become obsolete or if they, for some time, fail to
synchronize with a Datastore in your environment. If you delete an Agent, but it manages to reestablish a connection to a Datastore in your environment, it will automatically be included again in
the list of Agents.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
47
Chapter 3: Installation and Licensing
Notes

The Agents Overview node shows a read-only overview of all Agents and their settings.

If you use identification method MAC address of the first enabled network interface and an Agent has multiple
network cards, RES ONE Workspace will use the MAC address of the first enabled network card, based on the
order as defined on the agent by Microsoft Windows. You can find this order in Microsoft Windows by clicking
Start > Settings > Network Connections > Advanced > Advanced Settings.

When using RES ONE Workspace in combination with Citrix XenDesktop/XenApp 7.x, the XenApp version and
Server farm columns in the Agents node and Agents Overview node will only contain data if the Agent is a
member of a Citrix Delivery Group.

The FQDN column displays the Fully Qualified Domain Name, once the option Use computer's FQDN instead of
domain\computername in Logs and Usage tracking has been enabled at Advanced Settings in the Setup menu.

The columns AppGuard version, NetGuard version, RegGuard version, ImgGuard version, and WebGuard
version in the Agents node and Agents Overview node reflect the internal driver versions that RES ONE
Workspace uses. These version numbers can be used for troubleshooting purposes, should issues arise in your
environment following an upgrade or downgrade or after installing a revision.

The Synchronization status column in the Agents node and Agents Overview node shows when the last
synchronization of an agent took place and whether this was successful.

Licensing information is always updated immediately, irrespective of the settings that you specify.

When using Relay Servers, we recommend creating separate Workspace Containers for each subsite with
different Relay Server lists. This way, it is easy to identify to which Relay Server an Agent or group of Agents
normally connects.

An Agent can connect directly to the Datastore OR it can use Relay Servers.

An Agent configured to connect to Relay Servers will never connect to the Datastore directly. If it cannot
connect to a Relay Server, it will use information stored in its local cache. An Agent configured to connect to the
Datastore directly will never connect to Relay Servers. If its connections are not available, an Agent will use
information stored in its local cache.

The Push change information option has been introduced in RES ONE Workspace 2015. To use this option
successfully, all components must be running this version or higher.

In VDI environments that use a non-persistent/pooled model, and where the RES ONE Workspace Agent cache is
stored on a persistent disk, most likely the latest versions of the UpdateGUIDs and RES ONE Workspace policy
settings are not in the registry of the golden image/template. Therefore, the cache will be updated with
information from the Datastore or Relay Server, even though the most recent versions of the cache files are
already present in the RES ONE Workspace cache on the persistent disk. The update causes I/O load and network
traffic. With the registry value LocalCacheOnDisk it is possible to make the cache independent of the
Operating System's (OS) registry. Setting this registry value will convert the UpdateGUIDs and policy settings
automatically from the OS' registry to two new XML files in the RES ONE Workspace DBcache folder on the
persistent disk: UpdateGUIDs.xml and Settings.xml. See LocalCacheOnDisk (on page 351) for more
information.

48
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
Checking the connection settings of an Agent to a Datastore or Relay Server
For troubleshooting purposes, you can check the settings that Agents use to connect to a Datastore
or Relay Server. You can do this by running the command "%Program Files%\RES
Software\Workspace Manager\svc\res.exe" /config on every relevant machine.
After running the command, the RES ONE Workspace Agent - Configure connection window will
open. If necessary, use this window to make any changes to the connection settings to the Datastore
or a Relay Server. For example, you can change the settings of the Agent from a direct Datastore
connection to a connection through a Relay Server and vice versa.

In the Connection type field, select either Database or Relay Server.

If you select Database, specify the settings to connect to the RES ONE Workspace Datastore.

If you select Relay Server, specify the settings to connect to the Relay Server:



Select Discover (using multicast) to let Agents find a Relay Server (for the correct
environment) automatically.

Select Preconfigured (using list) to let Agents try connecting to a Relay Server from a
list in random order. Use semi-colons (;) to separate servers.

Select Resolve name (using DNS) to use DNS to resolve the FQDN of a Relay Server. This
is particularly useful to identify a Relay Server that can be reached by Agents connecting
from outside the network.
The specified connection methods are handled in order or appearance; the Agent will stop
looking for additional connections as soon as a valid connection is found. Therefore, if all
three methods are configured and enabled, an Agent will proceed as follows:

Did discovery yield a Relay Server? If so, it will use that Relay Server. If not, try the list.

Did the list yield a Relay Server? If so, it will use that Relay Server. If not, try the
fallback Relay Server. This means that if the options Discover and Preconfigured did not
yield a Relay Server, the Relay Server will be tried that is specified at Resolve (using
DNS).

Can DNS resolve the FQDN to a Relay Server that can be reached? If so, it will use that
Relay Server. If not, it will use local cache.
In the field Once connected to the datastore:

Select Keep using specified settings to let the Agent connect to the Datastore with the
specified settings. These settings will be stored as specific settings for the Agent: the Agent
will keep connecting with these settings from that point on.

Select Use connection settings from datastore to let the Agent initially connect to the
Datastore with the specified settings. When connection has been established, it will then
look in the Datastore to see which connection settings should actually be used (the Agent's
global settings, Workspace exceptions).
Instead of typing the connection settings of the target Datastore manually, you can also copy
the connection string from the clipboard (by clicking the Copy from clipboard button) or import
these settings from a TXT file (by clicking the Import from file button).



Copy from clipboard and Import from file buttons can be used to copy connection settings
of the target Datastore to the local Agent. The Import from file option only supports TXT
files.
To test the specified connection settings, click Test.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
49
Chapter 3: Installation and Licensing
3.11
Licensing
RES ONE Workspace offers two license types: Named User and Concurrent ("Licensing Model" on
page 51). When RES ONE Workspace is installed, an evaluation license for 25 Named Users is made
available automatically, as well as an evaluation license for RES VDX for 25 VDX clients. During the
evaluation period, you can easily switch between the different RES ONE Workspace modules (on
page 60) by clicking the Module(s) link. This allows you to try out the different sets of functionality
that RES ONE Workspace modules offer. See Selecting RES ONE Workspace modules/license
editions ("Selecting RES ONE Workspace modules" on page 53).
Evaluation licenses are valid for 45 days, after which RES ONE Workspace automatically switches to
the Express Edition. To continue using RES VDX and/or other modules of RES ONE Workspace, you
need to use the licenses purchased from your reseller.
Configuration

Click Get Licenses to obtain (additional) licenses. This opens a web page with contact details of
resellers. Alternatively, when evaluating RES ONE Workspace Express Edition, click Get Free
Licenses. This opens the Express License Wizard, which allows you to obtain free licenses for an
unlimited number of users and without expiration date.

Click View to view the details of a license (non-evaluation licenses only).

Click Delete to delete a license (non-evaluation licenses only).

Click License Wizard to import, register and activate RES ONE Workspace licenses. You can also
use this wizard for RES VDX licenses (not available when using RES ONE Workspace Express
Edition).

Use If no license available at logon to set up a licensing policy that specifies what should
happen if no license is available when a user starts a workspace session. This option is only
available when using RES ONE Workspace Gold, Silver or Bronze license editions.

Continue with limited functionality: When selected and no licenses are available when a
user logs on, a message will be shown to the user: "There is no license available. RES ONE
Workspace will start a restricted session that offers only limited functionality. Please
contact your administrator." When selecting this option, the user can still log on, but only
Express Edition functionality will be available. The event of no available licenses will also be
logged in the Event log with an exclamation mark.

Continue with reminder for 45 days: When selected and no licenses are available when a
user logs on, the user can still use RES ONE Workspace full functionality for 45 days, but a
message is logged in the User Event log and in the Error log that no license was available.
Then, a countdown is started and if, after 45 days, there is still no license available, the
user will not be able to start any session, until additional licenses have been added. In a
new site, Continue with reminder for 45 days will be the default setting.

Do not continue, log off: When selected and no licenses are available when a user logs on, a
message will be shown to the user: "No RES ONE Workspace license available for session" and
the user will be logged off automatically. This is the default setting.
Notes

The option If no license is available at logon is not available during evaluation.

If you move a RES ONE Workspace Express edition SQL database, where the database creation date changes, the
RES ONE Workspace environment will revert to Evaluation mode with a default 25 user limit. In that case, you
need to re-activate the licenses again by clicking Get Free Licenses. This will activate your licenses immediately
for an unlimited number of users and without expiration date.
50
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
Where to find Licensing
What
Where
Licensing
Go to Licensing in the Setup menu
Licensing Model
Licenses are pooled per environment and are claimed by RES ONE Workspace Agents according to
the rules outlined below.
Named User licenses
When using Named User licenses only, the following applies:

All users will claim a Named User license upon first session connect. Once the license is
claimed, the user is allowed to use any type of client (Terminal Server, desktop or laptop) with
the assigned user account.

An offline laptop will only allow the logged-on user to use RES ONE Workspace.
Licensing information is stored in the Datastore and cached locally on Agents. If, according to the
local cache, licenses are available for the session, the session is allowed. If, according to the local
cache, no licenses are available, the RES ONE Workspace licensing policy is applied.
At the Named Users tab (Licensing in the Setup menu), you can view a list of all Named User
licenses that are in use in your RES ONE Workspace environment. This tab will only be visible if
Named User licenses are used in the environment.

Click Reserve to reserve a license for a specific named user. Once a license is reserved, it will
remain reserved until released. Reserved licenses that are not claimed within 45 days are
automatically released after this period.

To release a reserved license, select it and click Release. Releasing a license is useful if the
number of available licenses is insufficient. If some licenses are reserved for named users, but
never claimed (e.g. because someone is on holiday for three weeks), you can release these
licenses again and make them available for other users.

When reserving a Named User license, please take into account that an Agent must come online
in order to obtain information about this reservation. If the relevant user logs on to an Agent
that has not been online since the license reservation was made, the license reservation will not
take effect.
Concurrent licenses
When using Concurrent licenses only, the following applies:

RES ONE Workspace claims a concurrent license for each active workspace (regardless of user
name, client name or computer name).

Each laptop claims a seat, regardless of user sessions or Datastore connection state. A license
claimed by a laptop will remain claimed whether anyone uses the laptop or not. A laptop can
only claim a license when one is available.
At the Concurrent Users tab (Licensing in the Setup menu), you can view a list of all concurrent
licenses that are in use in your RES ONE Workspace environment. This tab will only be visible when
using Concurrent licenses.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
51
Chapter 3: Installation and Licensing
Combining Named User licenses and Concurrent licenses
Concurrent licenses can be used alongside Named Licenses. Concurrent licenses are based on the
number of simultaneous User Workspace sessions. When using Concurrent licenses and Named
Licenses together, the following applies:

If a Named User license has already been claimed or reserved for the user who is logging on, this
license will be used.

If no license is claimed/reserved, RES ONE Workspace checks whether the current device is a
laptop.

On laptops, RES ONE Workspace first tries to claim a Named User license. If no Named User
license is available, the user will receive a message that no licenses are available. With the
installation public property CLAIMLAPTOPLICENSE set to "yes", you can specify that a
Concurrent license must be claimed and cached from a mixed license pool. See (Parameters
for) Unattended installation ("Unattended Installation" on page 20) for more information.

On other types of devices, RES ONE Workspace first tries to claim a Concurrent license. If no
Concurrent license is available, it will try to claim a Named User license.

If no license can be claimed, the RES ONE Workspace licensing policy is applied.

If you use several published applications, you only need a license for the first session originating
from the same client - even if the sessions run on different servers and the client has no
composer running. Prerequisite is that all sessions run using the same database.

If the originating client uses a local composer, it already has a license in use - any subsequent
remote session will not require a license, even if different databases are used.
Named or Concurrent?
RES ONE Workspace offers two license types: Named User licenses and Concurrent licenses. Which
license type, or combination of licenses you need, very much depends on the number of users,
Workspaces and devices in your environment. Concurrent licensing is mainly used in Virtual Desktop
environments and Named licensing for mobile workers (laptops). For example, when a user works on
a laptop and connects to a Virtual Desktop, a Named User license suffices to work with RES ONE
Workspace on both, as the license is associated to the user name.
It is possible to mix Concurrent and Named users in one RES ONE Workspace environment, but both
licenses need to contain the same modules. It is not possible to use different modules for different
(groups of) users. For example, for mobile workers (laptops) the Dynamic Configuration module
and for XenDesktop users the Dynamic Configuration, Delegation and Compliance, and Adaptive
Security modules. In this case, every user needs all three modules.
52
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
The following examples illustrate a number of environments with their most advantageous license
types:
Laptops
Case
Why?

1000 users: 800 laptops, 200 desktops

1000 Named licenses

Users are bound to a device, so Named is
cheaper.
Desktops
Case
Why?

1000 users: 600 desktops

600 Concurrent licenses

Less Workspaces than users, so Concurrent is
cheaper.
Terminal Services
Case
 2000 users: 1200 Workspaces at a time

1200 Concurrent licenses
Why?
 Less Workspaces than users, so Concurrent is
cheaper.
Terminal Services and Laptops (1)
Case
 800 users: 800 laptops offline, that use
Terminal services in the office

Why?
 Users are bound to a device, so Named is
cheaper.
800 Named licenses
Terminal Services and Laptops (2)
Case
 1200 users: 400 laptops, 800 Workspaces

400 Named licenses + 400 Concurrent
licenses
Why?
 Different kinds of usage. Mobile workers that
use Terminal Services in the office are better
off with Named, but the other 400 active
sessions are better off with Concurrent.

Reserve Named User licenses for laptop users!
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
53
Chapter 3: Installation and Licensing
Selecting RES ONE Workspace modules
When creating a new RES ONE Workspace Datastore at Datastore > Connections in the Setup menu,
you can choose which RES ONE Workspace modules you wish to use, depending on the required
features:

Express Edition

Dynamic Configuration module (selecting this option results in the Bronze license edition)

Delegation and Compliance module (selecting this option plus Dynamic Configuration results in
the Silver license edition)

Adaptive Security module (selecting this option plus Dynamic Configuration results in the Silver
license edition)

Selecting both Delegation and Compliance and Adaptive Security modules results in the Gold
license edition.
For full details about the features available in each module, please refer to the RES ONE
Workspace Module Comparison Chart available at
http://www.ressoftware.com/wmmodulecomparison.
During the 45-day evaluation period, go to Licensing to switch modules in the Setup menu.
Once you have imported a Silver production license, you have to make a definitive choice between
the Delegation and Compliance module and Adaptive Security module.
54
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
Licensing Process
In RES ONE Workspace licenses need to be imported, registered and activated, using the License
Wizard.
Step 1: Import all licenses
1. Save the license file that you received by e-mail to an accessible location.
2. Open the License Wizard and select Add RES Software license.
3. Follow the prompts to import the license(s) to the Datastore. All new licenses should be
imported at the same time.
4. At the end of the process, you will be prompted to activate your license(s).

Evaluation licenses and Corporate licenses need to be activated immediately.

Production licenses need to be activated within 30 days, after which they expire.
5. When you have completed the import process, your licenses and all relevant information will be
shown in the Licensing node.
Step 2: Register and activate the licenses
When you have imported all your licenses, start the License Wizard. RES ONE Workspace will scan
for any license that has not been activated and activate all of them at the same time. The Site ID
will be activated automatically when you activate your licenses: it does not need to be registered
separately.
1. In the License Wizard select Register and automatically activate RES Software license(s).
2. Follow the prompts to register and activate your licenses.
The name of your site links your licenses to your business and must therefore be a unique name.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
55
Chapter 3: Installation and Licensing
In certain situations, automatic activation of licenses is not possible. In these situations, follow the
prompts to activate your license(s) manually. The information is stored in a text file that you can
send to RES Software:

Web: e-mail the activation request from the RES Software website.

E-mail: e-mail the activation request to RES Software directly from an e-mail client on the
computer running the Console (requires a configured MAPI-compliant e-mail client).

Save to file: save the activation request as a text file that you send to
activation@ressoftware.com.
Within 24 hours during workdays, RES Software will send an activation file to the mail recipient
that you specified. Save the activation file to an accessible location, open the License Wizard
and select Import activation file for RES Software license(s).
When you have activated your licenses, the Licensing node will display an overview of your
licenses, including license type, RES ONE Workspace edition, site and license status and the number
of licenses that are available and claimed. The active RES ONE Workspace Modules are also
displayed on this node.
Warning
License files and activation files contain crucial information. Do not edit these files, because it will render them useless.
Notes

If you import any additional licenses at a later stage, they can be registered and activated using the procedure as
described above. Additional licenses must be registered under the same Site name.

Licenses that are deleted and then added to the Datastore again also need to be activated again.

After completing the licensing process, the default Site ID is automatically replaced by a true Site ID that links
your licenses to your business.

Adding a RES ONE Workspace Silver license edition to a RES PowerFuse Standard license will result in Silver
edition.
Tips

The RES Software Portal at https://success.ressoftware.com provides Solution Assurance benefits and access to
product support. The portal is available to registered customers with valid, activated licenses.

To register your company, visit https://success.ressoftware.com and enter the Site ID of your environment.
56
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
VDX Licensing
If you use RES ONE Workspace in combination with VDX, you can choose to manage VDX licensing
through RES ONE Workspace. In that case, VDX licenses are stored in the RES ONE Workspace
Datastore.
At Licensing > VDX Clients in the Setup menu, you can view a list of all VDX Client licenses that are
in use in your RES ONE Workspace environment. RES ONE Workspace offers the following
functionality for VDX Licenses:

When a user workspace session is started, the RES VDX Engine will retrieve its license through
RES ONE Workspace.

If no licenses are found or if the number of available licenses is insufficient, the RES VDX Engine
will start looking for a VDX licensing server outside the RES ONE Workspace environment.

Click Reserve to reserve a license for a specific client. Once a license is reserved, this license
will remain reserved until released or used.

To release a reserved VDX Client license, select it and click Release.
Note
For more information about RES VDX, see the RES VDX Guide, available at http://success.ressoftware.com or check out
www.reverseseamless.com.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
57
Chapter 3: Installation and Licensing
3.12
Keeping RES ONE Workspace up to date
You can keep your version of RES ONE Workspace up to date by installing RES ONE Workspace
Upgrade Packs or RES ONE Workspace Service Packs.

When a new product version is released, you can upgrade your version of RES ONE Workspace by
using an Upgrade Pack. Product releases contain new functionality and improvements of
existing functionality. Product releases are for example RES Workspace Manager 2014 and RES
ONE Workspace 2015.

When a service release becomes available, you can upgrade your version of RES ONE Workspace
by using a Service Pack. Service releases contain resolved issues and may also include
enhancements of existing functionality. They are released on a regular basis, until the release
of a new product version.
When the first service release of a product version is released, the RES ONE Workspace Service
Pack replaces the RES ONE Workspace Upgrade Pack. You can just as easily use a service pack to
get to a new product version of RES ONE Workspace as an upgrade pack.
Solution Assurance
Upgrade Packs and Service Packs require Solution Assurance. Solution Assurance is a service that you
can buy from RES Software, on the basis of a yearly subscription. If you subscribe to Solution
Assurance, you are entitled to technical support, product upgrades, and access to the Online
Knowledge Base.
When you buy RES ONE Workspace, Solution Assurance is automatically included for one year. After
that first year, your Solution Assurance subscription is automatically renewed, unless you cancel it.
For more information about Solution Assurance, please contact the Sales department.
If you are entitled to Solution Assurance, you can download Upgrade Packs and Service Packs at
http://support.ressoftware.com. Here, you can also download general and technical documents
about RES ONE Workspace.
Installation

Upgrade Packs and Service Packs need to be installed on each computer or server on which RES
ONE Workspace is installed. They can be installed by double-clicking the file and completing a
setup wizard.

Auto Upgrade Packs and Auto Service Packs are installed unattended. This does not require your
attention, and can be scheduled for a specified time.

The installation of Upgrade Packs and Auto Upgrade Packs may require a reboot of the system.

The installation of Service Packs and Auto Service Packs cause no application downtime and do
not require a reboot. If necessary, RES ONE Workspace will stop and restart the RES ONE
Workspace Agent Service.

Service Packs and Auto Service Packs can also be used to downgrade to an earlier version of RES
ONE Workspace.
58
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
The new version of RES ONE Workspace becomes available to users when they start a new session.
Warnings

Before using Auto Upgrade Packs or Auto Service Packs, you need to install at least one Upgrade Pack or Service
Pack manually once. This ensures that the Datastore is correctly updated. After this first Upgrade Pack or Service
Pack, you can install Auto Upgrade Packs or Auto Service Packs on all other computers.

If a fresh installation is done of RES ONE Workspace 2015 or higher it is not possible to downgrade to e.g. RES
PowerFuse 2010 SR3 through a service pack. This will result in an error. Please follow the steps below to
successfully downgrade from RES ONE Workspace to RES PowerFuse:

Export the HKLM\SOFTWARE\RES\Workspace Manager registry key to a file (e.g.
Workspace.reg).

Rename the Workspace Manager registry key in the exported file to PowerFuse.

Import the registry file.

Perform a regular downgrade using the Service Pack.
Note
30 days after installing RES ONE Workspace for the first time, or 30 days after creating a new Datastore, the Software
Improvement Program wizard will automatically be displayed on screen when starting the Console. The Software
Improvement Program gives you the opportunity to contribute to the design and development of RES ONE Workspace. When
you enroll in the program, RES Software collects anonymous information about your deployment, which is used to improve
product quality, reliability, and performance. At all times, you are able to control the information that is supplied to RES
Software.
On the start screen of the wizard, you can specify at what level you would like to participate in the Software Improvement
Program:

Yes, I agree that feature usage information is submitted: every 90 days usage information about your site will
be sent to RES Software

No, only submit version information: the version you are currently using will be sent to RES Software

Ask me again in 30 days: you will receive a reminder after 30 days.
Clicking More information will display the information that will be sent to RES Software.
If no level of participation has been selected, a reminder will automatically be displayed on screen after 30 days. Once Yes, I
agree that the feature usage information is submitted or No, only submit version information has been selected, the
possibility Ask me again in 30 days will not be available anymore. You can change your level of participation at any time at
Help > Software Improvement Program.
Any information that is being sent to RES Software is for internal use only. Your information will be kept entirely confidential
and used only by authorized members of RES Software staff. RES Software will never disclose your information to third
parties without your consent. The information will not be used to contact you.
Tip
When installing a service release of RES ONE Workspace, Release Notes of current and previous versions are available in the
Console under the menu Help.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
59
Chapter 3: Installation and Licensing
3.13
RES ONE Workspace modules
The RES ONE Workspace product family consists of different modules in which different sets of RES
ONE Workspace 2015 features are available to different levels:
In RES ONE Workspace, the number of modules selected determines the license edition:

The Dynamic Configuration module is the baseline module that is always included in any RES
ONE Workspace license edition. The Bronze license edition consists of this single module.

Delegation and Compliance and Adaptive Security are optional modules that offer additional
sets of features. Selecting one of these in addition to Dynamic Configuration results in the
Silver license edition. Selecting both results in the Gold license edition.
Dynamic Configuration module
Makes it possible to create a personalized (dynamic) desktop. The first step towards IT as a Service.
Users are provided with a context–aware and centrally managed workspace that contains all the
right applications, data, printing and personal settings essential for their productive working.
It contains the following technologies:

Desktop Transformation

Application Management

Zero Profile Technology

Workspace Analysis

Folder Synchronization

E-mail Settings
Delegation and Compliance module
Provides all the information to get insight of what is configured, changed, and used. The second
step towards IT as a Service.
Provides administrative insight to improve your ability to manage your infrastructure with clear logs
of changes, current status reporting, and license usage data from all users. Plus, it supports
administrators in managing different application delivery techniques, which includes presentation
and application virtualization. It contains the following technologies:

Delegation of Control

Remote Application
Integration

Alerting

Instant Reporting

Compliancy

Tracking and Reporting

Workspace Branding
60
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
Adaptive Security module
This is the third and last step towards IT as a Service.
You will be able to deliver a personalized desktop according to company business rules and
compliance. Unauthorized actions such as executing certain applications and the use of removable
disks are prevented based on the user’s context. It contains the following technologies:

Removable Disk Control

Application Access

Network Security

User Installed Applications

Locations and Devices

Dynamic Privileges
For more details, please check the RES ONE Workspace Module Comparison Chart on
http://www.ressoftware.com at the Resources section.
Notes

All modules are fully compatible. Additional functionality is enabled through license keys, so that upgrades to
other modules require no downtime or additional software deployment.

During the evaluation period, you can simply switch between modules (at Licensing in the Setup menu). You can
also switch if you have extended your evaluation period by importing evaluation licenses, or if you have NFR
licenses (RES Software partners only).

If you use a license edition other than Gold, unavailable features are masked in the Console by a brief
description of that feature. To hide unavailable sections altogether, go to Options in the menu item and clear
Show unavailable features. Alternatively, select Do not show unavailable features in one of the masked nodes.
To include unavailable features in the view, select Show unavailable features again (in the Options menu item).

Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
61
Chapter 3: Installation and Licensing
3.14
Relay Servers
Relay Servers cache information from the Datastore and pass it on to Agents upon request, so that
Agents do not need to contact the Datastore directly. Alternatively, Relay Servers can pass the
cached information from the Datastore on to other Relay Servers.
For further details about Relay Servers, see the document Getting Started with RES ONE
Workspace Relay Servers.
Tip
For optimum security, we recommend that Agents connect to Relay Servers; and that Relay Servers with a Datastore
connection use a service account (Windows credentials) and SQL encryption to connect to SQL Server.
Where to find Relay Servers
What
Where
Relay Servers
Administration > Relay Servers
Configuring Relay Servers
Relay Servers are configured to host RES ONE Workspace environments in the Relay Server
Configuration tool. For each environment you can select if the Relay Server connects to the
Datastore directly or to other Relay Servers in that environment.
When a Relay Server is assigned to an environment, specific RES ONE Workspace settings can be
configured on the Settings tab of Administration > Relay Servers.

With Fetch change information, you determine the interval at which Relay Servers check
whether they need to download any changes that have been made in the Datastore. A longer
interval reduces network traffic.

Push change information - Select to push change notifications to the Relay Servers that are
connected to another Relay Server. These Relay Servers then check for change notifications
every 5 seconds.

The time span set at Update relay server cache on change determines the timing for Relay
Servers to actually download data and update their cache. A short interval increases the speed
at which changes are reflected, but also increases network traffic. A longer interval decreases
network traffic, but there is a delay before Relay Servers reflect any configuration changes.

By default, synchronization of a Relay Server's cache with the central Datastore is aborted if an
error occurs. If this happens, the cause of the failure must be solved before Relay Servers can
be synchronized successfully. If this is undesirable, change the Synchronization policy to
Continue on error.

The Environment name is a name by which this RES ONE Workspace environment is identified in
the Relay Server Configuration tool, making it easier to select the correct environments to host
on a Relay Server.
62
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing

To secure your Relay Servers from unauthorized access, please provide an environment
password before installing the first Relay Server. All Relay Servers will require this password
before accepting a connection from an Agent or child Relay Server. To set or change the
password, choose Manage environment password.


When changing an existing password, Agents will by default automatically be updated with a
new password; and the old password will be honored during a grace period of 30 days. This
grace period ensures that Agents using the old password can connect and receive the
updated password. To change the password immediately, without any grace period, clear
the option Update Agents and Relay Servers with the new password and keep old
password valid for 30 days. You will need to manually change the password on all Agents by
running "%respfdir%\svc\res.exe /config"; and on all Relay Servers by using the Relay
Server Configuration tool.
You can export Relay Server connection information from RES ONE Workspace by clicking Export
Connection string to file. The RES ONE Workspace Relay Server window then opens and allows
you to select one or more Relay Servers to pre-populate the connection string. The Relay Server
connection string will be exported to a text file.
Some of these global settings can be overruled for individual Relay Servers.
Notes

If your RES ONE Workspace environment contains a Relay Server, Event Logs are updated asynchronously. This
can cause 'missing file' errors in Event Logs. These errors will disappear automatically when the Relay Server has
processed all data and the Event Log has been fully updated.

Event Logs are available when viewing the detailed Workspace Analysis of a user at Diagnostics > Workspace
Analysis.

As of RES Workspace Manager 2012, the traffic between two Relay Servers is compressed by default. The traffic
between Relay Servers and RES ONE Workspace Agents is compressed as well.

Upgrading Relay Servers can be done when necessary and one by one in no particular order.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
63
Chapter 3: Installation and Licensing
Dynamic Relay Server configuration
Dynamic Relay Server configuration uses the DHCP servers in your network. To configure dynamic
Relay Server configuration, you need to add Relay Server connection information as Server options
or Scope options on the DHCP servers in your environment. When computers connect to the
network, they will receive parameters defined at scope level from the DHCP servers. This allows
Relay Server connection information defined in DHCP scope to be transferred to the computer's
registry. When the RES ONE Workspace Agent starts up, it will use the information in its registry to
connect to the proper Relay Server.
You can export Relay Server connection information from RES ONE Workspace to easily add it to the
DHCP Scope. To export this data, at Administration > Relay Servers, on the Settings tab, click the
button Export Connection string to file. The RES ONE Workspace Relay Server window then opens
and allows you to select one or more Relay Servers to pre-populate the connection string. The Relay
Server connection string, in the first DHCP option 'RESWMRS=...', will automatically include all
known items (Relay Server name(s) (with port number if a different than the default port number
1942 was specified), Environment ID and password, FQDN name (DNS)).
In the connection string, if the Relay Server list exceeds 253 characters, RES ONE Workspace will
automatically generate new lines with 'RESWMRSLIST=...' for the remainder of the Relay Server
list. It is important to add all lines to the DHCP servers in your environment.
The Relay Server connection string will be exported to a text file. The lines in the text file need to
be added as Server options or Scope options on the DHCP servers in your environment.
Example - Relay Server names in the Relay Server connection string:

relay1.example.com:2012 (Relay Server name with port number 2012)

relay2 (Relay Server name without port number)
Example - an FQDN name in the Relay Server connection string:

FQDNrelayserver.res.com
For more information about how to configure your DHCP server, see Configuring the Datastore
dynamically (on page 43).
Note
A restart of the Agent service is necessary for the change in connection to take place.
64
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
Troubleshooting Relay Servers
When an item in the list of Relay Servers shows the attention flag, a possible cause can be tracked
down using the Relay Server Configuration tool and standard Microsoft Windows utilities.
Relay Server Local cache
During the configuration of a Relay Server for a RES ONE Workspace environment you can override
the default cache location (%ProgramData%\RES\Relay Server). By default, this cache store closes
when there is less than 500Mb of free disk space remaining. The store opens again when the
available disk space increases with 10% (to 550 Mb), which takes into account that a cache stage
may be needed.
When the cache store is closed the RES ONE Workspace environment will be disabled on that Relay
Server and clients will not be able to connect to the Relay Server for their cache data. The
environment will be shown as disabled in the Relay Server Configuration Tool.
You can manually configure the value for the amount of free disk space.

Open the registry editor and go to HKEY_LOCAL_MACHINE\SOFTWARE\RES\Workspace
Manager\RelayServer.

Create a new DWORD Value: MinimumFreeDiskSpace

Enter a value (Mb).
Relay Server Service
Check if the RES ONE Workspace Relay Server service has been started with an account with
sufficient permissions and is running properly. This can be done in the Services node of the
Microsoft Server Manager Management Console.
Datastore connection and port
Use the Relay Server Configuration Tool to verify the connection with the Datastore and the
listening port.
Event Log
Relay Servers log their information and error events in the Application Log of the Microsoft
Windows Event Log. The source name used for these entries is RES ONE Workspace Relay Server.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
65
Chapter 3: Installation and Licensing
Performance Monitor
To analyze the performance of a RES ONE Workspace Relay Server, the following Performance
counters are available at Performance Monitor in Microsoft's Server Manager Management
Console.
Component
Counter name
Description
Counter type
RES ONE Workspace
Caching
#cache cycles
Total number of
cache cycles
executed
PERF_COUNTER_RAWCOUNT
RES ONE Workspace
Caching
Average time in
seconds per cache
cycle
Average duration per PERF_COUNTER_COUNTER
cache cycle
execution, in seconds
RES ONE Workspace
Transactions
# transactions
processed
Total number of
transactions
processed
PERF_COUNTER_RAWCOUNT
RES ONE
# transactions
WorkspaceTransactions queued
Total number of
transactions queued
PERF_COUNTER_COUNTER
RES ONE Workspace
Transactions
Average time in
seconds per
transaction
Average duration per PERF_COUNTER_COUNTER
transaction
execution, in seconds
RES Communication
Server
#bytes/sec received
Number of bytes
received per second
RES Communication
Server
#bytes/sec send
Number of bytes send PERF_COUNTER_COUNTER
per second
RES Communication
Server
#concurrent
connections
Number of concurrent PERF_COUNTER_COUNTER
connections
RES Communication
Server
#connections/sec
Number of
connections per
second
RES Communication
Server
#operations/sec
Number of operations PERF_COUNTER_COUNTER
per second
RES Communication
Server
Average connection
time in seconds
Average connection
time, in seconds
PERF_COUNTER_COUNTER
RES Communication
Server
Average operation
execution time in
seconds
Average operation
execution time, in
seconds
PERF_COUNTER_COUNTER
RES Data Access
#db clients active
Total number of db
clients active
PERF_COUNTER_COUNTER
PERF_COUNTER_COUNTER
PERF_COUNTER_COUNTER
When adding RES ONE Workspace Caching counters to the performance monitor, each RES ONE
Workspace environment that is hosted on the Relay Server will be displayed as relay server
[<port>]{<EnvGuid>}, where EnvGuid stands for the unique environment identifier as specified on
the Settings tab at Administration> Relay Servers in the Management Console. You can choose to
add All instances (= RES ONE Workspace environments) at once, or just add one single environment.
RES ONE Workspace Transactions counters are specified in the same manner. So you can choose to
add All instances or just a single environment. The Performance Monitor legend will display relay
server[<port>]{<EnvGuid>}.
66
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 3: Installation and Licensing
RES Communication Server counters can only be added per server. This is shown as: relay server
[<port>].
The RES Data Access counter is a general purpose counter that monitors connections to the
Datastore. No further selection is required.
These performance counters can be monitored from both local and remote machines.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
67
Chapter 4: Dynamic Configuration
Chapter 4: Dynamic Configuration
4.1
Desktop Transformation
Desktop Transformation is a concept that transforms an existing desktop infrastructure into
managed user workspaces using live data and a step-by-step approach that minimizes the risk and
impact on the desktop user.
The transformation process consists of the following steps:

Gather live data from existing desktops.

Analyze the data for context.

Create workspace items and review impact.

Transform existing desktops in small steps with focus on today's challenges first.
Desktop transformation makes use of the following components:

The Desktop Sampler - collects data from unmanaged environments.

The Workspace Designer - designs managed workspace objects based on the collected data.

The Workspace Model - defines which features of RES ONE Workspace should be used.
68
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Desktop Sampler
The Desktop Sampler allows the IT administrator to collect information from a desktop. The
standalone software can be installed and launched on a desktop. It runs unobtrusively and it collects
the following information:
User Context

User name, logon domain, logon server

Domain group membership

Organizational Unit of user

Computer name, computer domain

Organizational Unit of computer

Operating System

Device Capabilities (CPU/Memory)

Network IP address
Composition

Applications exposed in Start Menu

Drive and Port Mappings

Network Printers

Drive Substitutes

Data Sources
The collected information is stored as a file on a designated file share on the network. One file is
created per unique user/computer combination. The IT administrator can configure the Desktop
Sampler to uninstall itself after a number of days.
Installing the Desktop Sampler
You need to install the Desktop Sampler on each computer that is to be sampled. This can be a
desktop, but also a Terminal Server. The Desktop Sampler installation file RES-ONE-Workspace2015-Desktop-Sampler-SR1.msi is located in the RES ONE Workspace program folder. It consists of
a single MSI file.
Installation



When you install the Desktop Sampler, it will be installed in the following directory:

%programfiles%\RES Workspace Manager Desktop Sampler (32-bit)

%programfiles(x86)%\RES Workspace Manager Desktop Sampler (64-bit)
Additionally, a DTSampler key will be added to the following registry key:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run (32-bit)

HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run (64-bit)
No shortcuts will be added to the user's Start menu.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
69
Chapter 4: Dynamic Configuration
Command line
You can install the Desktop Sampler by double-clicking the MSI file or by using a command line. If
you use a command line, you can apply the following parameters to the MSI file:
Parameter
Description
SAMPLEPATH
Specifies the location of the sampled data. This location can also be set in the
registry at HKLM\SOFTWARE\RES\Desktop Sampler. If you do not supply a location,
the sampled data will be stored in the installation folder of the Desktop Sampler.
EXPIREDAYS=
Specifies the number of days the Desktop Sampler needs to remain installed. After
the specified number of days, the Desktop Sampler will uninstall itself. If this
parameter is not used, the Desktop Sampler will continue to run until it is manually
uninstalled.
DELAY=
Specifies the number in seconds the desktop sampler should wait after a user logs
on before it starts sampling data. This is useful when logon procedures take a long
time. Specify a number in seconds. By default, the desktop sampler waits for 30
seconds.
NOICONS
Specifies that no icons will be saved to the desktop sampler files.
ALLICONS
Specifies that 256-color and 16-color icons will be saved to the desktop sampler
files.
256ICONS
Specifies that only 256-color icons will be saved to the desktop sampler files.
Example: msiexec.exe /i C:\INSTALL\RES-ONE-Workspace-2015-Desktop-Sampler-SR1.msi
SAMPLEPATH=\\fileserver\SampleData EXPIREDAYS=30 DELAY=120 /q
Command line parameters are case insensitive.
After installation, the Desktop Sampler will sample which applications, printers and data are used
by which users at which locations, irrespective of the way in which these settings are managed
(manually, scripting, RES ONE Workspace, etc.). It stores this information as a RES ONE Workspace
sample file (.dts). The Workspace Designer uses these files to analyze the sampled information.
All command line parameters can also be used directly when invoking dtsampler.exe. For example,
after the Desktop Sampler is installed it is also possible to start dtsampler.exe with the
/SAMPLEPATH parameter specifying the path of the generated sample files. This allows the Desktop
Sampler also to be distributed as a Custom Resource. This / SAMPLEPATH parameter overrules a
possible SAMPLEPATH parameter used when installing the MSI.
Example:
C:\Program Files\RES Workspace Manager Desktop Sampler\dtsampler.exe
/SAMPLEPATH="C:\Temp"
70
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Workspace Designer
You can start the Workspace Designer by clicking Workspace Designer in the Console. This starts a
wizard with which you can analyze the sample files generated by the Desktop Sampler and create
and adjust rules based on the sampled data. The Workspace Designer covers the following steps:

Selection of the type of data to be analyzed (applications, Data Source, Directory Services,
Drive & Port Mappings, Drive Substitutes, Locations and Devices, Printers)

The location of the sample files

Selection of the objects to be created

Review of the proposed context rules and their impact, based on:

Coverage: the percentage of users who currently have the setting, and who will keep it with
the suggested rules. (Ideally 100%)

Missed: the percentage of users who currently have the setting, but who will lose it with the
suggested rules. (Ideally 0%)

Slack: the percentage of users who currently do not have the setting, but who will receive it
with the suggested rules. (Ideally 0%)

Selection and automatic creation of the RES ONE Workspace objects.

Review of the workspace object, including its Type and Access Control.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
71
Chapter 4: Dynamic Configuration
Workspace Model
The Workspace Model shows you the mode in which each feature is running, and allows you to
change this if necessary. You can also make this change from the relevant node itself.
It is possible to enable specific parts of RES ONE Workspace, and to disable other parts. This makes
it possible to implement RES ONE Workspace gradually, which is very practical if RES ONE
Workspace is going to be introduced into an existing environment. Each section of the RES ONE
Workspace Management Console has an option to enable or disable it. The settings and
configurations of a disabled section are not implemented or executed.
For example, a small number of applications can now be configured in RES ONE Workspace, and
merged into the existing Start Menu presented to users. If this goes well, a couple more can be
added. In this way, the number of applications managed by RES ONE Workspace can be increased
gradually over a period of time, in a controlled manner.
You can change a feature's mode directly from the Workspace Model. However, you may prefer to
do so from the relevant node itself. There, you can see and amend any related settings, find
information about any prerequisites, and access the specific Help about that node (by pressing F1).
Diagnostics > Workspace Model Overview shows you at a glance which features are
active/enabled, which are disabled, and which are set in learning mode.
If the global settings of features are overridden by exceptions for specific Workspace Containers,
the Workspace Model node shows per Workspace Container which settings apply; either the global
settings of a feature or the settings of the exception.
Managed Applications
Managed Applications can be implemented fully, partially or not at all. In a new environment,
Managed Applications is disabled: Windows Shell shortcut creation is set to Do nothing, so that
users get the same Start Menu, Desktop and Quick Launch area in their RES ONE Workspace session
as they had outside of the RES ONE Workspace session. With this setup, RES ONE Workspace does
not manage any of the user's applications. At this point, you can configure applications in the RES
ONE Workspace Management Console, but these are not made available to any users.
If you do not want to manage applications at all, select the option Disable process interception for
unmanaged shortcuts. This operates on a global level and means that even managed applications
that have been configured with interception, will not be intercepted. For a description of the
process of intercepting applications, see General at the Properties section of Managed Applications,
If managed shortcut was not used.
When you are ready to start managing users' applications through RES ONE Workspace, you can
enable Managed Applications partially or fully:

To give users RES ONE Workspace-managed applications in addition to their existing, non-RES
ONE Workspace-managed applications, choose Windows Shell shortcut creation: Merge with
unmanaged application shortcuts. You can combine this option with setting the Unmanaged
shortcuts that point to same executable option to Replace with managed shortcut (at
Properties > Settings of a Managed Application). With this option you prevent that the user's
environment contains both managed and unmanaged shortcuts to the same application.

To give users only RES ONE Workspace-managed applications, choose Windows Shell shortcut
creation: Replace all unmanaged shortcuts. This replaces the Start Menu of your users with the
Start Menu and application shortcuts as configured in RES ONE Workspace. Unmanaged
applications are no longer available.
72
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
4.2
User Context
The Context of a user defines who the user is. Based on that context a workspace will be built that
is tailored for that specific user.
Directory Services
At the User Context > Directory Services node of the Console you can configure Directory Services.
The directory services used in your organization are the basis for your RES ONE Workspace
environment: RES ONE Workspace delivers applications and resources based on the user, OU and
group information that it retrieves from the directory services listed.
A directory service is used to store information about resources (such as printers), services (such as
e-mail) and users in a network. The directory service provides information on these objects,
organizes them, and provides authentication and validation. A well planned and well maintained
directory service reflects the hierarchical and functional structure of an organization and is a
powerful tool in the delivery of applications and resources to users.
RES ONE Workspace can retrieve information from:

Microsoft Windows Domains (also called NT Domains)

Microsoft Active Directory Services (also called AD or ADS)

Novell Directory Services (also called NDS)

the local computer
The Primary Domain of the Agent will be configured by default. However, you can use multiple
directory services concurrently. This makes it possible to use RES ONE Workspace for specific parts
of your IT environment. This can be particularly useful in very mixed environments, in environments
where different administrators manage different sections, or if you wish to introduce RES ONE
Workspace gradually rather than all at once.
Where to find Directory Services
What
Where
Directory Services
User Context > Directory Services
Configuring directory services

RES ONE Workspace will use your environment's name resolution mechanism to resolve the
selected Fully Qualified Domain Names to the correct paths.

When configuring a Security Context:

the account must be in the same domain as the directory service you are configuring.

the account requires sufficient rights to query the domain in Active Directory or in Microsoft
Windows Domain.
These credentials will only be used when viewing data in the Management Console.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
73
Chapter 4: Dynamic Configuration

If your environment does not include trusted domains, not allowing query from external
domains will make sessions start up faster.

With a Mount Point, objects in the tree above the mount point cannot be used in the
Management Console unless another directory service starts in the same tree at a higher point.

Group Nesting determines whether Access Control based on a parent group also applies to
members of a subgroup. For example, suppose that Access Control for an application depends
on membership of the group "AppUsers", and that this group contains the subgroup "AppAdmins".


Without support for group nesting, users must be member of the group "AppUsers" in order
to get the application. Users who are only member of the subgroup "AppAdmins" do not get
the application.

With support for group nesting, users who are only member of the group "AppAdmins" also
get the application.
You can select the method of resolving users and groups:
Account names is preferable if user and group names do not change often. Renamed users and
groups lose their current access because RES ONE Workspace cannot find a match for their
name. This method is recommended if Building Blocks are used to transfer objects from test to
production environments, since names then are the same, but SIDs are not.
Account SIDs is preferable if user and group names change frequently. If a user or group is
renamed, the account name changes but its SID does not. With Access Control based on SID,
renamed users and groups keep their existing access and the Console reflects their new names.
When importing a Building Block, this can be done based on either Account names or Account
SIDs. Based on this option the import process will automatically either resolve SIDs based on
configured account names or resolve account names based on configured SIDs. The default
setting is Account names. Unattended Building Block import will always use Account names.

Select the method for Get group membership using (for Microsoft Active Directory and
Windows Domain):

Domain controller - Select this method to have the Workspace Composer query the domain
controller to get group membership for the current user. With this method, in a user
session, changes in group membership are detected during a workspace refresh. To get the
group membership faster, choose the method Local tokens (faster).

Local tokens (faster) - Select this method to have the Workspace Composer resolve the
user's group membership from its logon token. This option is especially interesting for multidomain environments, in which resolving cross domain group membership does not work
properly or causes performance degradation. With this method, in a user session, a user
needs to log off and logon again to detect changes in group membership. To detect changes
during a workspace refresh, choose the method Domain controller.
This option should only be used in environments that have a Global Catalog server.

Local tokens, until administrative refresh - Select this method to combine the benefits of
both methods Local tokens (faster) and Domain controller to get group membership for the
current user. Local tokens are used until the first administrative refresh. From then on, until
the session is logged off, the domain controller is queried to get the group membership for
the current user. In multi-domain environments, all domains must be configured with this
method.
Administrative refreshes are initiated from outside the Workspace Composer, for instance,
through the Management Console, RES ONE Service Store Services, or RES ONE Automation.
It is advised to select the same method for all defined directory services in the RES ONE
Workspace Console.
74
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration

In some situations, the order in which Directory Services are processed may be important. When
a user starts a session, RES ONE Workspace starts at the top of the list of Directory Services
configured in the Console. The first configured Directory Service that matches the user's logon
domain becomes the primary directory service for the session.
The following order is usually advisable:

all Active Directory Services

all Microsoft Windows Domain Directory Services

the Local Computer Directory Service
In complex environments, you may need to experiment with this order.
Notes

In Active Directory, due to stricter security rules, it may occur that users are not allowed to read their group
membership. In this case, Domain Users must be added to the Pre-Windows 2000 Compatible Access group. The
Pre-Windows 2000 Compatible Access group grants all users read-only access to objects in the OU to which it
has been assigned.

When using Account SIDs to process Access Control, any changes in a user’s group membership are not reflected
until the next time the user logs on again.
Citrix XenApp Integration
If Citrix XenApp Integration is enabled in your RES ONE Workspace environment, ensure that the
Security Context fields of the Directory Service are filled out. Give the full path to the user name,
for example: admin1.administrators.newyork.d-energy
Novell Directory Services
The following instructions apply specifically to Novell Directory Services:
Order of Directory Services
When a user logs on to a computer using the Novell Client, the Novell Client silently also logs that
user on to a Microsoft Windows domain, or creates a new local user for this purpose. The way in
which this is set up in your environment influences the identification of the user for the purposes of
RES ONE Workspace:

If the Novell Client also logs the user on to a Windows domain, and you have also listed a RES
ONE Workspace Directory Service that includes that same domain, then you must place the
Novell Directory Service higher in the list than the domain Directory Service. (Otherwise RES
ONE Workspace will find the user in the other Directory Service and will not check the Novell
Directory Service anymore.)

If the Novell Client also logs the user on as a local user, and you have also listed a Local
Computer Directory Service in RES ONE Workspace that will apply to the computer on which the
user is logging on, then you must place the Novell Directory Service higher in the list than the
local computer Directory Service. (Otherwise RES ONE Workspace will find the user in the other
Directory Service and will not check the Novell Directory Service anymore.)
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
75
Chapter 4: Dynamic Configuration
Group Names
In Novell Directory Services, group names do not need to be unique. By default, RES ONE Workspace
Directory Services based on Novell will use the full paths of these groups to distinguish between
them. This can be disabled, so that RES ONE Workspace will treat all groups with the same name as
one.
For example, you have the Organizational Units "New York" and "Amsterdam", which both contain a
group "Helpdesk". Users from both those groups need access to the application "Knowledge Base".
The way in which Access Control is set for this application, depends on the option Use full group
names in the RES ONE Workspace Directory Service for this Novell environment:

If the option Use full group names is selected for the Directory Service for this Novell
environment, Access Control on the application "Knowledge Base" must be set on the group
Amsterdam/Helpdesk AND on the group New York/Helpdesk.

If the option Use full group names is not selected, Access Control on the Knowledge Base can
be set to the group "Helpdesk", and this will automatically include all groups with that name in
that Novell Directory Service.
Notes

Per RES ONE Workspace environment only one Novell Directory Service can be configured.

RES ONE Workspace support for Novell Directory Services requires Netware 4.x or higher. In combination with
Citrix, a higher version is required: Citrix 4.0 and 4.5 (x32 and x64) require Novell 6.5; and Citrix XenApp 5.0
supports Novell 6.5 too, but only on Windows 2003, not on Windows 2008.

If the Novell client has not been installed on the target computer, RES ONE Workspace will use standard Windows
NT user and group enumeration for any user who logs on.
Examples multiple Directory Services

configure a RES ONE Workspace Directory Service for tree A, and one for tree B, but not (yet)
for tree C.

configure a RES ONE Workspace Directory Service for a part of an Active Directory or Novell tree
(by setting a mount point).

use several Active Directory forests in one RES ONE Workspace environment.

combine different parts of several Active Directory forests, plus a number of Microsoft Windows
Domains.
76
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Connection States
Use the Connection States node of the User Context section to configure the connection state
settings of computers in your RES ONE Workspace environment. This allows you to specify which
applications and/or settings that are configured for off- and online use will be available to the user.
Where to find Connection States
What
Where
Connection States
User Context > Connection States
Methods
RES ONE Workspace knows two different methods of detection of the connection state:
Default detection of Connection State: if the connection state of the computer is required for a
setting or for accessibility to an application, the IP address of the local network connection will be
used for this task. If no IP address is available, an "offline" Connection State will be assumed.
Advanced detection of Connection State: in certain conditions, the default method to detect the
Connection State will fail. For example, if a fixed IP address is assigned to the local network
connection, the detected Connection State will always be "online". By using "Advanced detection",
this problem can be solved. Computers with access to any listed Zone will only have an "online"
Connection State if the specified IP address can be detected on the company network.
It is also possible to select additional detection based on host name, port and URL (http/https). By
specifying an IP address, an IP address and a port, or an URL (HTTP/HTTPS), you can verify whether
a specific IP address or URL is reachable to define an online or offline Connection State.
This may be useful, for instance if a specific URL is only available from within the company
network. Setting the advanced connection state to detect this URL allows you to use Advanced
detection of Connection state to determine whether a laptop is used inside or outside the company
network. This might especially be useful to, for example, prevent company-sensitive information to
be available outside the company.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
77
Chapter 4: Dynamic Configuration
Languages
Use the Languages node of the User Context section to extend multilingual support in your RES ONE
Workspace environment. Multilingual support in RES ONE Workspace is primarily based on
LanguagePacks. LanguagePacks provide different languages for all RES ONE Workspace components,
which end users can select in their "Workspace Preferences" tool.
By mapping languages to a LanguagePack, you can present the end user with a choice of additional
languages to those available in LanguagePacks. This allows you to configure environment variables
or registry settings that can be used to base applications on the language selection of the end user.
To map a language to a LanguagePack select Enable mapping of language to LanguagePack. This
will display a list of available languages. Select a LanguagePack in the Installed LanguagePacks area
and select the language(s) that you want to map to this LanguagePack.
Where to find languages
What
Where
Languages
User Context > Languages
Access principle
You can also use languages as access principle when configuring Access Control criteria for a certain
setting or application in RES ONE Workspace. For example, if the Management Console contains a
French version of Adobe Acrobat, you can use the language French as access principle in Access
Control, to ensure that only users that selected the language French in their "Workspace
Preferences" tool get access to this application.
Languages Example
If you highlight LanguagePack English and select the language Norwegian (Nynorsk), the variable
%LCID% will contain the Windows identifier of that language. You can then use this variable to make
changes in the registry on language level. For example, if you change the registry using this
variable, you can change the display language of Microsoft Office.
After you have mapped Norwegian (Nynorsk), the user can select Norwegian (Nynorsk) in his
"Workspace Preferences" tool. After refreshing the Workspace Composer, RES ONE Workspace will
display an English interface, whereas Microsoft Office will display the Norwegian (Nynorsk)
interface.
78
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
4.3
Access Control based on context
Access Control determines users' access to RES ONE Workspace settings and applications. Access
Control consists of:

Identity: which users get the setting or application. By default, all users are allowed access.

Locations and Devices: in which Zones or on which clients the setting or application is
available. By default, access is allowed from all zones and clients.

Date and Time: in which time span (start and end date) the application or object is or becomes
available. For applications, time restriction is possible for certain times and days of the week.
By default, access is allowed at all times and on all days.
If none of these areas is configured for an object, the object is available to all users throughout the
RES ONE Workspace environment.
If one or more of these areas is configured for an object, users get access if they meet the criteria
specified in each configured area.
Where to find Access Control
What
Where
Access Control on Managed
Applications
The application's Access Control section contains a tab for each
Access Control area.

Identity

Locations and Devices

Date and Time

Workspace Containers
Access Control is also available from the Quick Edit menu, which
enables you to set the items above for one or multiple applications at
the same time.
Access Control on settings
and on User Installed
Applications
Access Control tab:

Locations and Devices

Identity

Date and Time
Workspace Control tab:

Workspace Containers
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
79
Chapter 4: Dynamic Configuration
Identity
The following Identity options are available for Access Control:

All Users

User/Group

NOT User/Group

Organizational Unit

Organizational Unit including child OUs

Controlled by Application Manager(s)

Administrative Role

NOT in Administrative Role

Language (See Language Identity) ("Language Identity" on page 170)

RES ONE Service Store Service

Not RES ONE Service Store Service
Some of these options do not apply to all settings. For example, Access Control for User Settings
allows only Organizational Units, groups, users and Administrative roles; and Controlled by
Application Manager(s) is only available for applications.
Application Managers
In the configuration of Access Control on an application, the task of granting users access to the
application can be delegated to one or more designated users. This is achieved by setting the
Identity area of the application's Access Control to the option Controlled by application
manager(s).
Application Managers do not need access to the RES ONE Workspace Console. Instead, users who are
listed as Application Manager for a specific application automatically get the Access Wizard in their
Workspace (in the Settings section of the Start menu). The Access Wizard allows them to distribute
the application(s) for which they are responsible to other users. The Access Wizard can also be
opened directly from the Console by clicking the Access Wizard button.
When assigning Application Managers to an application, you can limit the range of users to whom
the Application Managers can give the application. The available range limits are:

all users.

only users in the same OU as the Application Manager.

only users in the same domain as the Application Manager.
On the Comments tab you can create a message that will be displayed in the Access Wizard when
an Application Manager grants or revokes application access.
80
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Locations and Devices: Zones
Access to a RES ONE Workspace object can depend on the location where and the device on which a
user session is started.
These locations are defined as Zones, based on various criteria such as IP-addresses, computer
names, hardware requirements, environment variable values, operating system versions, USB
storage device serial numbers, etc. Zones can also be configured for location based printing to allow
users to select a default printer per location based on Zones.
Zones are selected as Access Control criterion in the Locations and Devices area.
Where to find Zones
What
Where
Defining the Zones applicable in the
RES ONE Workspace site
User Context > Locations and Devices
Setting Zones as Access Control
criterion on a Managed Application
Composition > Applications > the Locations and Devices
tab in the application's Access Control section
Setting Zones as Access Control
criterion on User Installed Applications
Security > User Installed Applications > Access Control
Setting Zones as Access Control
criterion on a setting
on the Access Control tab of the setting
Zone rules

Rules based on Active Directory Site allow you to create zones based on the Active Directory
site from which users can start a RES ONE Workspace session. This can be useful for sites with
multiple Active Directory sites, divided by different domain controllers.

Rules based on Active Directory Group membership allow you to set access on items, based on
computer group membership.

Rules based on Active Directory OU membership allow you to set access on items, based on
computer OU membership.

Rules based on Active Directory Computer property allow you to set access on items, based on
computer property. For example, you can assign access to an application based on the
Computer's name as stored in Active Directory. For this Zone rule, wildcards can be used in the
Value field.

Rules based on Active Directory User property are useful to create Zones for applications
and/or settings that should only be available in sessions that match the value of the specified
user property. For example, when an application should only be available to users in a specific
company department, you can create a Zone rule based on the user property "department" and
a value that specifies this company department.

Rules based on Computer Hardware are useful for applications that need specific minimum
system requirements (for example, AutoCAD).


Rules based on Processor architecture (under Computer > Hardware) are useful for
applications that need specific processor type (x86/x64).
Rules based on IP address, IP address range or Computer Name (under Computer, Network
and Remote Desktop) are useful to link the Zone to a range of IP addresses or to a specific
server, for example when configuring a printer server. When adding a Rule based on the
Computer name for a Zone, the Computer (FQDN) can be used to apply the Rule to one or
several Zones.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
81
Chapter 4: Dynamic Configuration

On the Rules tab of a zone based on Computer name, you can manually add the relevant
computer names.
Specifically for this type of zone, computer names can also be added to an existing zone using
the command line. This can be used, for example, for scripting. The Administrator who runs this
command must have access to the Console and to Zones.

Syntax examples

To add MACHINE002 to the zone "France > Paris > Building A > Floor 1", use the following
command line:

pwrtech.exe /clientadd=MACHINE002 /zone={7B8BF240-3682-41C5-881EB14595593817}

If the command is run without a value for the parameter /clientadd, the current computer
on which the command is run will be added at the moment of execution:

pwrtech.exe /clientadd /zone={7B8BF240-3682-41C5-881E-B14595593817}

If the command is run with a question mark as the value for the parameter /zone, a
selection window opens to allow selection of the relevant Zone:

pwrtech.exe /clientadd /zone=?

To remove a Zone Rule for a particular client from a particular Zone:

pwrtech.exe /clientremove=MACHINE002 /zone={7B8BF240-3682-41C5-881EB14595593817}

If the command is run with an asterisk (*) for the parameter /zone, all existing Zones are
checked and any Rule where the (partial) computer name = MACHINE002 will be removed:

pwrtech.exe /clientremove=MACHINE002 /zone=*

Rules based on Operating system (Bit) version (under Computer and Configuration) are useful
for applications that need a specific (bit) version of a Microsoft Windows OS.

Rules based on Vendor ID, Product ID or Serial number of USB storage devices (under
Computer and Configuration > Hardware token) allow you to create advanced scenarios in
which, for example, an application is only available or a laptop can only be accessed if a
specific USB storage device is present. Click [here] for more information or see Zone examples Using a USB device for authentication purposes.
Common scenarios when using USB Storage Device Identification in Zones:
Removable Disks Security
By using Zones that contain USB Storage Device Identification rules, you can control which USB
devices are allowed to be used by specific users.
Application Control
By assigning Identity and Zones that contain USB Storage Device Identification rules to an
application, you enable multi-factored authentication for this application (based on user credentials
and USB Storage Device doubling as unique token).
Workspace Control
By assigning Identity and Zones that contain USB Storage Device Identification rules to a Workspace
Container, you enable multi-factored authentication for specific computers (only if these computers
are exclusively assigned to this Workspace Container).
82
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
RES ONE Workspace Workspace Extender
When a user starts a remote session using the RES ONE Workspace Workspace Extender, any Zone
that contains USB Storage Device Identification rules applies, as in a "normal" session.
This means that users can also use USB Storage Devices as an access token in remote sessions using
the RES ONE Workspace Workspace Extender. For example, when a user has started a remote
session and plugs in a USB device with a specific serial number on his local computer, this
information is passed on to the remote session. As a result, applications and settings whose
accessibility or applicability depends on the availability of this specific USB device serial number
become available in the remote session when this session is refreshed.
If you run the Management Console in a remote session using the RES ONE Workspace Workspace
Extender, and plug in a USB device on your local computer, this device is automatically recognized
by the Management Console. This allows you to create new Zones in the remote session using the
serial number of the local USB device.
Note
To make sure that Zones that contain rules based on USB Storage Device Serial Number are automatically enforced, select
Refresh Workspace on USB device change at Composition> Desktop > Lockdown and Behavior. This forces a refresh of the
Workspace of the user when a USB storage device is plugged into or unplugged from the user's computer. This is useful if
access or applicability of specific applications and settings in the user's Workspace depends on the availability of a specific
USB storage device (defined by its serial number, vendor ID or product ID).

Rules based on Environment variable (under Configuration) allow you to set access on items,
based on the value of a specific environment variable. This rule applies to existing environment
variables only; not to environment variables that are set by the Workspace Composer when the
user starts a session.

Rules based on File version (under Configuration > Files and folders) are useful if the version
of a specific file should be the reason why a setting or application should be available or
unavailable. For example, access to a database can be made to depend on the version of the
database client; or the availability of an application can be made to depend on the version of a
DLL file. In this way, you can hide an application from a user if the application cannot function
properly due to the absence of a required version of a specific file. This saves the user from
opening the application and then being confronted with error messages and other problems.

Rules based on File or folder exists (under Configuration > Files and folders) are useful if the
existence of a specific file, folder or drive at the start of a session should be the reason why an
action should be carried out or not. For example, you may want to perform a folder
synchronization action with a network drive. This action is only useful if this drive mapping
exists. The Zone rule File or folder exists can be used to check this.

Rules based on Federal Information Processing Standard (FIPS) compliancy (under
Configuration) allow you to set access to resources based on a FIPS-compliant Windows
Operating System. The rule evaluates whether the Windows GPO for FIPS has been set on the
Agent.

Rules based on Registry setting (under Configuration) offer a huge range of possibilities,
because much information is stored in the Registry. Each piece of information in the Registry
can serve to determine the user's workspace, from printers to environment variables to
applications to Data Sources. For example, the availability of Word 2013 can be made to depend
on a Zone that checks for the Registry key
HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Word; and the availability of Word
2010 can depend on the absence of this key. Similarly, different language versions of an
application can be made available to users depending on their Active Directory site, which is
stored in the Registry. Or access to the plotter printer can be granted only to users who use an
AutoCAD application, as information about this is also stored in the Registry.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
83
Chapter 4: Dynamic Configuration


With the option Registry redirection selected, a 64-bit Operating System will redirect
registry values specified for HKLM\Software to their corresponding locations under the
Wow6432Node. Please take the following into consideration when selecting this option:

In the RES ONE Workspace Console, when browsing the registry to configure a Zone rule,
the Wow6432Node will NOT be visible.

In a user session, applying a Zone will be based on the redirected location under the
Wow6432Node.
With the option Registry redirection not selected, no redirection will be done and the
following should be taken into consideration:

In the RES ONE Workspace Console, when browsing the registry to configure a Zone rule,
the Wow6432Node will be visible on 64-bit Operating Systems.
Please note that 32-bit and 64-bit applications store information in different locations in
the Registry. Therefore, separate rules may need to be configured for HKLM\Software
and HKLM\Software\Wow6432Node.

In a user session, applying a Zone will be based on the original location in the registry.
Zone rules containing registry values in the Wow6432Node will not be applied on 32-bit
Operating Systems that do not have a Wow6432Node.

Rules based on Remote host/URL (under Network) allow you to verify whether a specific IP
address or URL is reachable to define an Access Control mechanism. This may be useful, for
instance if a specific URL is only available from within the company network. Setting Access
Control on an application to a Zone based on Remote host/URL prevents the application to be
started from another location.

Rules based on Connected network (SSID), allow you to configure features (e.g. printers) that
are available if a session is running on a device connected to a specific wireless network.

Rules based on the Security option Must connect through a trusted access point apply if
the Agent's connection to a wireless network with the specified SSID uses a trusted access
point. This makes it possible to disregard connections to other wireless networks with the
same SSID, because they will not be accessible through your trusted access points.
Please note, an access point is trusted if an enabled Nearest access point (BSSID) zone rule
exists for it in your RES ONE Workspace Console. Please be sure to define a full set of
relevant access points.

Rules based on the Security option May connect through any access point apply if the
Agent is connected to any wireless network with the specified SSID. This may or may not be
your organization's wireless network, because wireless network SSIDs are not globally
unique.
This option may be sufficient if you have not defined a full set of trusted access points,
and/or if security is less important.

Rules based on Nearest access point (BSSID), allow you to configure features to be available if
a session detects that a specific access point is the nearest, based on it having the greatest
signal strength of all detected access points.
Please note that each access point for which a zone rule is specified will become a trusted
access point for the purpose of zone rules based on wireless networks.

Rules based on the Signal detection option Limit to trusted access points will only evaluate
trusted access points when determining which detected access point has the greatest signal
strength.
Please note, an access point is trusted if an enabled Nearest access point (BSSID) zone rule
exists for it in your RES ONE Workspace Console. Please be sure to define a full set of
relevant access points.

84
Rules based on the Signal detection option Do not limit to trusted access points will
evaluate all detected access points from networks with the specified SSID when determining
which detected access point is the nearest. Detected access points may include mobile
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
access points to other networks with the same SSID, because wireless network SSIDs are not
globally unique.
This option may be sufficient if you have not defined a full set of trusted access points,
and/or if security is less important.

Rules based on Client type (Citrix Receiver only) (under Remote Desktop) allow you to create
zones based on the client type detected through the Citrix Receiver on Citrix XenApp and Citrix
XenDesktop. This leverages the support that Citrix Receiver provides for different devices in
order to distinguish the various operating systems.

Rules based on Session type (under Remote Desktop) allow you, for instance to easily
distinguish various desktop types. By specifying a session type, protocol and/or platform, access
to a Zone may be set accordingly. A zone specifically for XenDesktop machines, for instance,
would comply to: Session type: Remote Desktop; Protocol: Citrix ICA; Platform: Desktop. Other
supported protocols are: Microsoft RDP, VMware PCoIP and VMware Blast.

Rules based on Terminal Server (TS) listener name (under Remote Desktop) allow you to
create Zones that can differentiate between network connections from inside and outside the
company network. This is useful for applications that should be highly secured, such as financial
applications.

Rules based on the presence (or absence) of a VDX/Workspace Extender (under Remote
Desktop) are useful to create Zones for applications that should only be available when there is
(or is no) active VDX or Workspace Extender Client. These rules also apply to the RES Subscriber
for VDX Agent and RES Subscriber for VDX Client.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
85
Chapter 4: Dynamic Configuration
Notes

It is also possible to add a rule based on a computer name to an existing Zone, using a command line. In the RES
ONE Workspace Console this would be done at User Context > Locations and Devices, New/Edit Zone and then
selecting the Rules tab and adding a Computer Name. This option is also available in combination with the
command line, which can be used, for example, for scripting. Some examples of the syntax that can be used:

to add MACHINE002 to the zone "France > Paris > Building A > Floor 1", the following command line can be
used:
pwrtech.exe /clientadd=MACHINE002 /zone={7B8BF240-3682-41C5-881EB14595593817}

if the command is run without a value for the parameter /clientadd, the current computer on which the
command is run will be added:
pwrtech.exe /clientadd /zone={7B8BF240-3682-41C5-881E-B14595593817}

if the command is run with a question mark as the value for the parameter /zone, a selection window is
opened allowing the administrator to select the Zone:
pwrtech.exe /clientadd /zone=?

to remove a Zone Rule for a particular client from a particular Zone:
pwrtech.exe /clientremove=MACHINE002 /zone={7B8BF240-3682-41C5-881EB14595593817}

if the command is run with an asterisk (*) for the parameter /zone, all existing Zones are checked and any
Rule where the (partial) computer name = MACHINE002 will be removed:
pwrtech.exe /clientremove /zone=*


Active Directory Group membership is supported for:

Active Directory groups

NT Domain groups
When adding rules based on the value of a specific Computer property in Active Directory, please note that the
following symbols will give unexpected results when they are used both in entries in Active Directory and as
wildcards in the Value field in RES ONE Workspace:

asterisk ("*")

square brackets ("[]")

semicolon (";")

If an access point is configured to hide its SSID, RES ONE Workspace will detect it as an empty SSID (i.e. empty
string). If there are multiple access points with a hidden SSID, RES ONE Workspace is not able to distinguish
between the networks they belong to. In this case, a rule for the nearest access point, specified for an access
point with a hidden SSID, will check the nearest access point of ALL access points that hide their SSID (even if
they belong to different networks).

The use of environment variables is not supported for SSID and BSSID names.

Due to privacy constraints, detected wireless networks and access points are not logged in the RES ONE
Workspace Console. However, during a user session they are shown to the end user on the Diagnostics tab of the
Workspace Preferences tool, so end users can provide their administrator with this information upon request.
86
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Multiple Rules for a Zone
By default, a Zone applies if a user logs on from a computer that matches one of the specified rules.
By grouping Zone rules using the ampersand button
, you can divide rules into groups. The
ampersand functions as a group separator, and the Zone applies when one of the groups of rules is
met.
Examples
Item
Explanation
Zone A
Accessible when Rule 1 OR Rule 2 applies (or both).
Rule 1
Rule 2
Zone B
Accessible when Rule 1 AND Rule 2 apply.
Rule 1
&
Rule 2
Zone C
Accessible when Rule 1 OR Rule 2 applies (or both),
AND Rule 3 applies.
Rule 1
Rule 2
&
Rule 3
Zone D
Accessible when Rule 1 OR Rule 2 applies (or both),
AND Rule 3 OR Rule 4 applies (or both).
Rule 1
Rule 2
&
Rule 3
Rule 4
When adding Zones in Access Control / Locations and devices, it is possible to require all Zones to
be valid by using the AND option. For example, if you have a Zone for a particular OS and another
Zone for a particular hardware requirement, you can combine these two by using AND in one Zone
Rule. This way you do not have to create a third Zone to combine the two Rules.
Zone Members: Nested Zones
A Zone can be a member of another Zone. This allows you to arrange Zones in a parent/child
hierarchy.
If a Zone contains no rules but only members, the Zone applies if the user logs on at a computer for
which at least one of the member Zones is accessible.
If a Zone contains rules as well as members, the Zone applies if the user logs on at a computer for
which all the Zone rules are met.
If a Zone contains rules and it also has a parent Zone, then the Zone applies if the Zone rules are
met.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
87
Chapter 4: Dynamic Configuration
Example

Zone A (no rules, only member Zone)

Zone B (no rules, only member Zones)

Zone C (contains rules)

Zone D (contains rules)
In this example:

Zone A can be accessed if Zone B can be accessed.

Zone C can only be accessed if the rules of Zone C are met.

Zone D can only be accessed if the rules of Zone D are met.
Pattern matching in Zones
Pattern matching allows you to use wild card characters, character lists and character ranges in any
combination to match a certain value (for example, client names or IP addresses). The specified
pattern is used to find the desired data. If necessary, you can test a certain pattern before you use
it in a field.
You can use the following pattern matching characters when configuring Zones:
Character
Explanation
?
Any single character
*
Zero or more characters
#
Any single digit (0-9)
[Charlist]
Any single character in charlist
[!Charlist]
Any single character not in charlist
Example: Using a USB device for authentication purposes
By restricting an application or setting to a Locations and Devices Zone based on the unique serial
number of a USB storage device, you can turn this specific USB storage device into a key to the
application or setting.
Procedure
1. At User Context > Locations and Devices, create a Zone based on the rule USB storage device
> Serial number.
2. At Composition > Desktop > Lockdown and Behavior, in the Workspace Composer section,
select Refresh Workspace on USB storage device change.
3. Set the Access Control of the application or setting to require the Zone.
With this setup, the user's session is refreshed when a USB storage device is plugged in. If the serial
number of the USB storage device matches the Zone rule, the application or setting becomes
available. When the USB storage device is unplugged, the session refreshes again and the
application or setting is no longer available.
This setup also works if the session is a Workspace Extension using the Workspace Extender.
88
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Date and Time
The following Date and Time options are available for Access Control:

Start and End Date and Time

Time Restrictions (only for applications)
Date and time configured on objects are evaluated and applied at the start and refresh of a RES
ONE Workspace session. Date and time evaluation is based on the local time of the RES ONE
Workspace Agent.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
89
Chapter 4: Dynamic Configuration
4.4
Applications
On the Application List tab, the RES ONE Workspace-managed applications that you can make
available to users in their Start Menu, Desktop and Quick Launch area are listed.
Where to find Applications
What
Where
Applications
Composition > Applications
Start Menu tab
The Start Menu tab shows the applications in the folder structure in which they will appear in the
Start Menu. Applications and Start Menu folders are added, edited, disabled and imported from this
tab, and existing Windows shortcuts imported. LNK and OSD files can be used to import
applications. The # applications at the bottom of the overview is dynamic.
The menu structure is created in the RES ONE Workspace Console at the Applications node. Here
you can also make applications available to end users.
There are four ways of creating a menu structure with applications:

Creating a menu structure by hand and adding applications manually. This can be done by
clicking the New menu button and selecting Application from the drop down menu. The Edit
application window will open allowing you to enter all application properties manually.

Adding applications using a Wizard. When clicking the New menu button, select Application
(using Wizard) from the drop down menu to add an application using the Wizard.

Importing applications with their menu structure to match. With the Import Wizard you can
import an existing menu and application structure. Of course it is possible to make alterations
to the menus to be imported. When importing applications, select Do not add root folder to
prevent the creation of the folder Start Menu. Select Do not add Programs folder to prevent
the creation of the folder Programs. The folders can be skipped to make the applications fit
better in an existing menu.

A combination of the above.
When you disable an application, you are prompted to provide a message for users who try to start
the disabled application. You can also provide such a message on the application's Notifications tab
(in the application's Properties section).
Application List tab
The Application List tab shows the same applications as listed on the Start Menu tab, but in a
sortable list with columns showing additional information.

Multiple applications can be deleted at once or moved at once to another menu on this tab by
selecting Delete or Move from the Menu at Action > Applications or from the context menu.

Use the Search field to search for the desired application(s).

The # applications at the bottom of the overview is dynamic.
You can sort columns by clicking on the column headers. Columns can be moved and resized by
dragging and dropping the column headers. In the Options menu, the option Reset all column
properties to defaults can be used to restore the columns to their original position and size.
90
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Settings tab
On the global Settings tab of Applications, you can configure:

whether managed applications should be fully implemented, partially implemented or disabled.

additional settings for the behavior of applications and the Start Menu.

the defaults that should be used for each new application.
RES ONE Workspace managed applications can be implemented fully, partially or not at all. In a new
environment, Applications is disabled: Windows Shell shortcut creation is set to Do not create
shortcuts, so that users get the same Start Menu, Desktop and Quick Launch area in their RES ONE
Workspace session as they had outside of the RES ONE Workspace session. With this setup, RES ONE
Workspace does not manage any of the user's applications. At this point, you can configure
applications in the Console, but these are not made available to any users.
When you are ready to start managing users' applications through RES ONE Workspace, you can
enable Applications partially or fully:

To give users RES ONE Workspace-managed applications in addition to their existing, non-RES
ONE Workspace-managed applications, choose Windows Shell shortcut creation: Merge with
unmanaged shortcuts.

To give users only RES ONE Workspace-managed applications, choose Windows Shell shortcut
creation: Replace all unmanaged shortcuts. This eliminates non-RES ONE Workspace managed
applications from the RES ONE Workspace session.

Replace all unmanaged tiles on the start screen is applicable to user sessions running on
Microsoft Windows 8.1 / 2012 R2 / 10.
Notes

If Windows Shell shortcut creation (see "Applications" on page 89) is set to Replace all unmanaged shortcuts,
this may lead to unpredictable results for global User Settings that preserve information in %desktop%,
%startmenu% or %appdata%\Microsoft\Internet Explorer\QuickLaunch. This does not
affect application-level User Settings for those folders.

For users with a new profile or logging on to a system in a VDI environment that uses a non-persistent/pooled
model), RES ONE Workspace automatically creates a tile layout on the user's Start screen that is similar to the
default Start screen created by Microsoft Windows 8.1 / 2012 R2 / 10. If you would like to place different default
tiles on the user's Start screen, you can create the file DefaultTilelayout.xml and add it as a Custom
Resource to RES ONE Workspace, in the root (at Administration > Custom Resources).
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
91
Chapter 4: Dynamic Configuration
The following settings determine the behavior of applications and the Start Menu:
Setting
With this setting, RES ONE Workspace will:
Autolaunch new
If access to applications is based on location, and a user starts a
applications on refresh if Terminal Server session at a certain location, he will have access to the
new application is
applications that have been configured for that particular location. If
configured to launch
the user disconnects from this session and reconnects from a different
automatically
location, RES ONE Workspace will refresh the Workspace, to update this
change. As a result, the user will then have access to the applications
that have been configured for the new location. If these applications
have been configured for AutoLaunch, selecting this option will
automatically launch these applications on a refresh of the Workspace.
Check actively for
Check for disabled applications each time the user opens the Start
disabled applications in
Menu. Disabled applications are marked with a red cross.
RES ONE Workspace shell
Disable Active Setup
ActiveSetup compares registry keys at
HKLM\Software\Microsoft\Active Setup\Installed
Components\%APPNAME% and HKCU\Software\Microsoft\Active
Setup\Installed Components\%APPNAME%. If the HKCU registry entries
don't exist, or the version number of HKCU is less than HKLM, then the
specified application is executed by ActiveSetup for the current user.
Enabling this option skips the "First Time Shell Init" that occurs, for
example, when using mandatory profiles.
Disable autolaunch for
managed applications
Select this option to cancel out the autolaunch of any managed
application. This overrides the Autolaunch at session start option on
Application level.
Disable process
interception for
unmanaged shortcuts
Select this option to disable Process Interception ("Process
interception for unmanaged shortcuts" on page 93) globally or for
exception tabs. This overrules the application-level setting If managed
shortcut was not used: Intercept new process and apply
configuration.
Do not show offline
applications when
computer is online
Hides applications if the configured connection state does not match
the computer's current connection state. If this option is not selected,
users who try to start an "offline" application will be confronted with a
message.
Do not show online
applications when
computer is offline
Hides applications if the configured connection state does not match
the computer's connection state. By default, "online" applications are
always shown in the user's Start Menu.
When a user launches an application, the connection state of the
computer is only checked against the required connection state of the
application. This allows the user to change the connection state of the
computer (by connecting to the corporate network), to gain access to
the application without having to refresh the Start Menu. If this option
is not selected, users who try to start an "online" application will be
confronted with a message.
Do not show Workspace
Extensions when VDX /
Workspace Extender not
detected
Hides applications configured to run as a Workspace Extension on
computers on which the Workspace Extender has not been installed.
Refresh start menu if
new software is installed
Enabling this option will refresh RES ONE Workspace sessions that use
the application shortcut mode Merge with unmanaged shortcuts
whenever the content of the common Start menu changes due to an
(un)install of a software package. As a result, the user's Start menu will
92
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Setting
With this setting, RES ONE Workspace will:
reflect this change. After a software package installation has finished, it
may take up to 5 seconds before the refresh is performed.
This option is not available when Windows Shell shortcut creation is
set to Do not create shortcuts or Replace all unmanaged shortcuts.
Remove all empty menus Enabling this option will automatically hide any empty menus (both
managed and unmanaged) from the user's Start Menu.
Remove empty managed
menus only
Enabling this option will automatically remove all managed empty
folders in the user's Start Menu. Managed folders are folders that were
created on the Start Menu tab at Composition > Applications.
When offline, start a
specific application ()
instead of RES ONE
Workspace taskbar
Start a specific application if the connection state of a computer is
"Offline", or if it is "Online".
and
When online, start a
specific application ()
instead of RES ONE
Workspace taskbar
These two settings allow you, for example, to configure a laptop to
connect to a published RES Workspace Composer when online and to a
local RES Workspace Composer when offline.
You can specify which application should start:

By clicking the browse button and selecting it or by entering its ID. (You can
find this ID on the application's General tab).

By specifying an environment variable, in which you have specified the
application ID as its value. The application ID or environment variable that
you specify will be shown between the brackets.
It is possible to configure an application timeout and configure the
session's behavior if the application is terminated before the set
timeout, or when the application exceeds the set timeout.
By checking Launch before other actions the application will be run
before other actions are performed, except for RES ONE Automation
Tasks and Execute Commands, if these have also been configured to 'run
before other actions'.
Note
In a user session, if a user starts an application using Run as different user / Run as administrator, only the settings that
are related to the start of the application (configured on the Properties > Settings tab of the application), are applied.
These settings are:

Parameters

Startup style of application

Process priority of application

Disable file system redirector on 64-bit systems
Actions configured for the application (on the Configuration > Actions tab of the application) will not be applied.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
93
Chapter 4: Dynamic Configuration
Process interception for unmanaged shortcuts
RES ONE Workspace can intercept processes that are started through unmanaged shortcuts, and
treat them as if they were a managed application. Process interception for unmanaged shortcuts
detects the start of a process, and checks whether a managed application is available to the user
that also uses the same process. If such a match is found, all the settings and configurations for the
managed application are applied before the process is allowed to continue.
For example, in a session where Microsoft Word is available as a managed application, a user finds
and double-clicks an unmanaged shortcut to Microsoft Word. This launches winword.exe, which RES
ONE Workspace intercepts. RES ONE Workspace first checks that Microsoft Word is allowed to start,
based on date and time restrictions, maximum number of instances, licensing etc. If so, RES ONE
Workspace applies the settings and actions configured for Microsoft Word, such as User Settings,
Drive and Port Mappings and Environment Variables. As a result, Microsoft Word starts up, and it has
all its familiar RES ONE Workspace configurations for the managed application Microsoft Word.
Configuration
On the Settings tab at Composition > Applications, the option Disable process interception for
unmanaged shortcuts determines whether RES ONE Workspace will intercept any processes at all.
This option can be set for the global Workspace Model and for Workspace exceptions.
To start using process interception, clear the global option Disable process interception for
unmanaged shortcuts, then configure individual managed applications to intercept their processes
if started unmanaged. This is determined by the option If managed shortcut was not used (on the
application's Properties > Shortcuts tab, under Automatic shortcuts):

Ignore: Take no additional action. The process will start without any configuration by RES ONE
Workspace.

Intercept new process and apply configuration: Intercept the process and apply the
configuration defined for the managed application.
If a process is intercepted that matches several available managed applications, RES ONE Workspace
applies the settings and configurations of the first managed application it finds. This may occur if
multiple configurations of the same managed application exist.
If a user starts several processes that are intercepted, they are processed one at a time.
A process started from an unmanaged shortcut will continue without any RES ONE Workspace
configurations in the following situations:

if there is no managed application available in the user session for the same process.

if the managed application is not configured to intercept.

if process interception for managed shortcuts is disabled.
94
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Process interception for Citrix published applications
To use Process interception for Citrix published applications, set the option Run RES Workspace
Composer to Automatic for servers running XenApp (at Administration > Agents). If an unmanaged
Citrix published application is started on these servers, it will always be launched by the RES
Workspace Composer. If there is a managed application that uses the same process and that is
configured with If managed shortcut was not used: Intercept new process and apply
configuration, it will be intercepted.
Notes

If the Managed Application Security setting Only RES ONE Workspace is allowed to launch this application is
selected (on the application's Authorized Files tab), users will only be able to start the process using managed
shortcuts. This will prevent process interception from taking effect.

Process interception for unmanaged shortcuts is not supported for virtualized applications such as Citrix XenApp
Streaming, Microsoft App-V 4.x, Microsoft TS RemoteApp, and VMware ThinApp.

When using process interception for unmanaged shortcuts, application environment variables cannot be used in
the Target field of the unmanaged shortcut to the application.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
95
Chapter 4: Dynamic Configuration
Known limitations RES ONE Workspace and Microsoft Windows 8.1, 2012 R2, and 10
Microsoft Windows apps with User Settings or Network Connections Security
Microsoft Windows apps* (such as Microsoft Edge) interact with the Operating System in a new way
and with changed timing. This particularly affects our User Settings and Network Connections
Security features, which may not behave exactly as expected for Microsoft Windows apps. For
example, Network Connections Security does not work correctly on Microsoft Explorer 11 running in
Enhanced Protected Mode. We are fully aware of this, and are working hard to address the issues
in order to provide full support as soon as possible.
* Windows apps are also referred to as Metro, Windows 8-style, Modern, Windows Store and Universal apps.
Enabled Microsoft Group Policy "Remove and prevent access to the Shut Down, Restart, Sleep,
and Hibernate commands" results in a black box in the Start Menu
If the Microsoft Group Policy "Remove and prevent access to the Shut Down, Restart, Sleep, and
Hibernate commands" is enabled, on Windows 10, a black box appears in the user's Start Menu
instead of the actual options. This Windows 10 behavior also occurs in RES ONE Workspace sessions
when using the following Lockdown and Behavior options that make use of the same policy:

Disable "Shutdown" for all users on all computers

Disable "Shutdown" for end users on workstations.
RES ONE Workspace and tile management (Microsoft Windows 8.1, 2012 R2, and 10)
Consider the following scenario:

At Composition > Applications, on the Settings tab, Windows Shell shortcut creation was set
to Merge with unmanaged shortcuts.

At Composition > Applications, an application, e.g. Microsoft Excel, was added.

In the user session, the user pins the managed Microsoft Excel to the Start screen.

In the Management Console, the administrator changes Access Control or removes the managed
application completely, so that the user no longer has access to the managed Microsoft Excel.
In this scenario, when the user next logs on, Microsoft Excel is still pinned to the Start screen, but
the managed application is not present. When the user clicks the tile, Microsoft Excel will start
unmanaged if it is present on the user's machine, or nothing will start.
RES ONE Workspace with Windows Shell shortcut creation set to Replace mode
Consider the following scenarios:

In an existing Microsoft Windows 10 environment users have pre-existing Start Screen lay-outs
including pinned tiles and RES ONE Workspace is installed with Windows Shell shortcut creation
set to Replace mode.


RES ONE Workspace is installed with Windows Shell shortcut creation set to Merge mode and in
the user session, users pinned tiles to their Start Screen.

96
When switching the Windows Shell shortcut creation mode to Merge or Do not create
shortcuts, or uninstalling RES ONE Workspace, unmanaged application tiles might not be
restored.
When switching Windows Shell shortcut creation to Replace mode, and then back to Merge
mode again, unmanaged application tiles might not be restored.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
RES ONE Workspace Folder Redirection not reflected in Microsoft Windows 10 explorer views
"Quick access" and "This PC"
At Composition > Actions By Type > Files and Folders > Folder Redirection, when redirections are
configured for one or more folders, the Microsoft Windows 10 explorer views "Quick access" and
"This PC" might not use the redirected locations for these folders.
RES VDX Integration
When the option Windows keys passthrough is enabled (at Setup > Integration > RES Software >
RES VDX, on the Settings tab) for user sessions running on Microsoft Windows 8/8.1, 2012/2012 R2,
and Windows 10, the ALT+Tab key combination to switch between application windows does not
work.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
97
Chapter 4: Dynamic Configuration
Recommendation when starting to use RES ONE Workspace Managed Applications for users with
pre-existing Microsoft Windows 10 profiles
If you have an existing Microsoft Windows 10 environment in which you are going to install RES ONE
Workspace with Windows Shell shortcut creation set to Merge mode, then the following
configuration will preserve the pre-existing Start Screen lay-outs for users with Windows 10 profiles
with pinned tiles:

At Composition > Applications, on the Settings tab, set Windows Shell shortcut creation to
Merge with unmanaged shortcuts.

Ensure that each managed application at Composition > Applications is configured as follows on
the Shortcuts tab of the application:

Turn off the options Replace existing unmanaged shortcuts and Create Start Menu
shortcut (checkboxes empty)

Set the option If managed shortcut was not used to Intercept new process and apply
configuration to manage all applications, also those that have a different name in the user
profile and the RES ONE Workspace Console
In the user’s first RES ONE Workspace session, no tiles will be added to the Start Screen for new
managed applications (those that are not yet existing in the user's Windows 10 profile). From the
user’s second logon, tile management as defined in the RES ONE Workspace Console will be applied
in all sessions.
In this scenario, if you do configure options in the Automatic shortcuts section differently than
recommended above, then users will experience changes to the lay-out of tiles pinned to their Start
Screen for unmanaged applications for which a managed equivalent also exists in the RES ONE
Workspace Console, but with a different name:

the tile sizes of these applications will all be set to medium.

the Start Screen groups to which these applications belonged will be lost. All tiles will be put in
a single, nameless, group.
98
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Defaults for new applications
New applications are created with certain default settings, for example for Access Control type,
maximum number of instances, etc. You can edit a number of these application defaults to reflect
the configuration that is most commonly used in your own RES ONE Workspace environment.

Click Set to configure the defaults for new applications.

Click Reset to revert to the RES ONE Workspace defaults for new applications. Resetting the
defaults for new applications does not affect existing applications. It does not affect the other
options on the Settings tab of the Applications node either.
Properties
The Properties section includes several tabs that together define the application and its behavior in
user sessions.
General
At the General tab of the Properties section you can review (and edit) the settings that have been
made for the application. If you add an application without the wizard, these settings must be
entered manually.
How to configure the general properties of an application

Open the application and click Properties > General.

Use the information in the ID and the GUID field e.g. when configuring published applications,
in which RES ONE Workspace takes care of the necessary registry settings, mappings,
substitutes, printer connections, etc. These fields cannot be changed and are first shown when
you edit an existing application.

Enter a title for the application in the Title field.

Enter a description for the application in the Description field. This will be shown when the
user moves his mouse pointer over the application in his Start Menu. The user can disable this
function in his "Personalize My Workspace" tool. You can use hyperlinks (e.g. mailto:, http://,
file://).

Click
in the Command line field to select the executable for the application.

You can use environment variables.

Right-click the Command line field and select Replace folder names with their associated
environment string to automatically replace the selected folder in the command line with
corresponding environment variables. This option is also available for the fields Working
directory and Parameters.

You can also use a wildcard (*). This means that instead of: %ProgramFiles%\Microsoft
Office\Office14\Winword.exe you could also use: C:\*\Winword.exe or
*\Winword.exe. The wildcard is resolved into a path when the application is started in a
user session. The more specific the path, the faster the application will be found.
When using a wildcard, keep the following in mind:

In the command line only one wildcard can be used. Only the use of "*" is allowed, not "?".

The wildcard cannot be used to replace (part of) an application name.

The application will only be searched in local drives.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
99
Chapter 4: Dynamic Configuration

You should only use a wildcard if no additional instances of the application are present (as
only the first instance will be found).

Examples of valid use:
*\notepad.exe
C:\*\notepad.exe
C:\progra*\notepad.exe
%ProgramFiles%\*\notepad.exe

Examples of invalid use:
*notepad.exe
C:\*\note*.exe
C:\note*.exe
notepad.*
*.exe
Notes

Depending on the number of files and folders on the local drives, searching for a matching file can take a
considerable amount of time. Once the file has been found, its location will be cached on the local machine.

When Disable file system redirector on 64-bit systems has been enabled at Composition > Applications on the
Properties > Settings tab, the file will be searched in both the actual and redirected folders if applicable.

If necessary, select the working directory of the application by clicking
in the Working
directory field. Although this field is populated automatically when you select the application's
executable in the Command line field, you can select a different folder.

You can use environment variables.

You can use wildcards (*).

If necessary, enter startup parameters for the application by clicking
in the Parameters
field. For example, use %password% ($password$ for applications configured to run as
Workspace Extensions) to pass the cached version of the user's password to the application. You
can use environment variables. If the application that you are configuring is a Microsoft App-V
application, the Parameters field specifies the location of the OSD file that is needed to start
the application.

To view a preview of the application's icon, double-click the application icon in the Icon field.
This will open the Icon Preview window, which shows a preview of the various sizes of the
application icon.
100
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration

To refresh the icon, click
in the Icon field. To select a different application icon, click
in
the Icon field. If you select a custom icon, it is always shown in the size in which it was
uploaded. If this size is not large enough for Microsoft Windows 7, Windows Server 2008 R2 or
Windows Vista, this icon will not look good if users opt to see larger icons. If this is undesirable,
you have two choices:

obtain a larger version of the custom icon, and set the application to use that version
instead. To do so, open the application at Applications and browse to the icon file at Icon.

disable the use of large icons in RES ONE Workspace sessions. To do so, go to Composition >
Desktop > Start Menu and Taskbar , and clear the option Use high quality icons (Windows
Vista and higher) under Microsoft Windows Shell only.
Notes

RES ONE Workspace considers an icon to be a high quality icon, if the file selected in the Icon field:

is an ICO file

contains more than one icon.

To make previously selected (before RES Workspace Manager 2014 SR2) high quality icons available in user
sessions, after an upgrade to RES Workspace Manager 2014 SR3 or higher, custom icons need to be reselected.

When selecting a different (custom) icon for an application, user sessions need to be logged off and on again to
reflect this change.

To run the application as a Workspace Extension, select Run as Workspace Extension. This is
useful if the application is located on a desktop and it should run as a Workspace Extension via a
Terminal Server session using the Workspace Extender.
For Microsoft App-V 5 packages, the option Package delivery mode is available. Choose to only
load the minimal parts of the Microsoft App-V 5 package that are needed to start the application
or choose to load the full Microsoft App-V 5 package in the background as well once the
application has started. Loading the full Microsoft App-V 5 package might be useful if the
application needs to be available when the user session is offline, for instance, on laptops.
Notes

By default, the Microsoft App-V client will fully download a Microsoft App-V application when a user starts that
application for the first time. When selecting Minimal (global) or Minimal (per user) for the Package delivery
mode, the registry value
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AppV\Client\Streaming\AutoLoad must be
set to 0.

After upgrading to RES Workspace Manager 2014 SR2, configuring the Package delivery mode for existing
Microsoft App-V 5 packages (packages that were configured in an earlier version than RES Workspace Manager
2014 SR2) will require you to (re)specify the central location of the Microsoft App-V 5 packages.

When configuring the RES ONE Workspace option Package delivery mode for Microsoft App-V 5 packages with
Minimal (per user) or Full (per user), the feature Folder Redirection for the Windows folder AppData, is not
supported.

In a user session, when starting a Microsoft App-V 5 application that has been configured to be deployed by RES
ONE Workspace and is not yet available from the Microsoft App-V cache on the system, a Splash screen in the
lower-right corner of the primary monitor will be displayed to the user. The Splash screen informs the user that
the Microsoft App-V application will be deployed. Once it has been deployed successfully, the application will
start automatically. Starting multiple Microsoft App-V applications (almost) simultaneously, a Splash screen per
application will be displayed (with a maximum of 7 Splash screens at once).
With the option Hide mini splash at application start enabled (at Composition > Desktop > Lockdown and
Behavior, in the Workspace Composer section), these Splash screens will be hidden in the user session.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
101
Chapter 4: Dynamic Configuration

Optionally enter an Administrative note. This can be any comment or remark useful for
administering the application.
Notes

The Citrix Integration Toolkit can be used to convert unmanaged Citrix published applications to managed
equivalents.

The option Allow users to restore their own settings at Composition > User Settings will only work if the
Workspace Preferences tool used by the end user fetches its data from the same homedrive as the application
itself.

To create the name of an application shortcut, the application's title and its Start Menu path are used. This name
may not exceed 255 characters. Microsoft Windows cannot handle application shortcut names that are >255
characters, which will result in an application shortcut that does not work properly.

Due to Microsoft Windows limitations, multiple explorer.exe shortcuts with different parameters that are
pinned to the taskbar, will not stack on the proper taskbar icon.
Shortcuts
Automatic shortcuts

Select Replace existing unmanaged shortcuts to ensure that the user's Workspace contains only
managed shortcuts, no unmanaged shortcuts to the same application. This setting is only
applicable if Windows Shell shortcut creation (see Applications (on page 89)) is set to Merge
with unmanaged application shortcuts.

Create Start Menu Shortcut is enabled by default. Disable this option to exclude the
application from the user's Start Menu, and to prevent the user from adding such a shortcut
using the Workspace Preferences tool.

To determine the behavior of the application If managed shortcut was not used (for example,
if an application was started by double-clicking the application's EXE), select Intercept new
process and apply configuration to treat the new process like a managed application applying:
102

User Settings

Actions

Drive and Port Mappings

Drive Substitutes

Folder Synchronization

User Home Directory

User Profile directory

Printers

User registry / policy

Execute Command

Automation Tasks

Environment Variables

E-mail Settings

Data Sources

Application Notification (only for enabled Applications)
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Setting the option to Ignore, the process will remain unmanaged. The following limitations
apply:

This option is not supported for virtualized applications such as Citrix XenApp Streaming,
Microsoft App-V and VMware ThinApp.

If multiple unmanaged applications are intercepted, they are processed sequentially, not yet
asynchronically.

If any of the following items are configured for the Managed Application, they are ignored
when starting unmanaged:



Application is disabled

Time restrictions

Seat Licensing

Concurrent Licensing

Memory Optimization limits

Maximum Instances

Required Connection States

Dynamic privileges
The RES Workspace Composer can also intercept unmanaged Citrix published applications
and apply configuration. At Administration > Agents, the option to Run RES Workspace
Composer can be set to Automatic for servers running XenApp. If an unmanaged Citrix
published application is started it will always be launched by the RES Workspace Composer.
However, if there is a managed application that uses the same process with Intercept new
process and apply configuration at If managed shortcut was not used, it will be
intercepted. If such a managed application is not present, the unmanaged Citrix published
application will be launched without further intervention.
In the Personalized Start Menu, Desktop and Quick Launch / Pin to taskbar fields, select the
automatic placement settings of shortcuts to the application for the user's Start Menu, desktop,
and Quick Launch bar/taskbar. For example, this allows you to create mandatory applications in
the user's Start Menu. Via the Workspace Preferences tool, users can pin and unpin their nonmandatory application shortcuts.

Take no action: No Start Menu, Desktop and/or Quick Launch/taskbar shortcuts will be
created automatically.

Set voluntary shortcut: This will automatically create the Start Menu, Desktop and/or Quick
Launch/taskbar shortcuts, but only once. The user can remove or add the shortcuts again.


If you change this setting to Take no action, and the user previously removed the
voluntary shortcut, the shortcut will not be placed back.

If you change this setting to Take no action, and the user kept the voluntary shortcut,
the shortcut will remain pinned to the Start Menu, desktop and/or Quick Launch
bar/taskbar.
Set mandatory shortcut: This will recreate the Start Menu, Desktop and/or Quick
Launch/taskbar shortcuts each time the user starts a new session.

If you change this setting to Take no action, the shortcut will be removed from the Start
Menu, desktop and/or Quick Launch bar/taskbar.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
103
Chapter 4: Dynamic Configuration

The option Pin to Start Menu, determines whether voluntary, mandatory or no application
shortcuts are pinned in the user's Start Menu. This option is only applicable to Microsoft
Windows 7, 2008 and 2008 R2.
On the Pin to Start Menu tab in the Workspace Preferences tool, users can pin and unpin their
non-mandatory application shortcuts.

Take no action: No application shortcut will be pinned to the user's Start Menu.

Set voluntary shortcut: This will automatically create the application shortcut in the user's
Start Menu, but only once. Users can remove or add the application shortcuts again.


If you change this setting to Take no action, and the user previously removed the
voluntary shortcut, the shortcut will not be placed back.

If you change this setting to Take no action, and the user kept the voluntary shortcut,
the shortcut will remain pinned to the Start Menu.
Set mandatory shortcut: This will recreate the application shortcut in the user's Start Menu
each time the user starts a new session.

If you change this setting to Take no action, the application shortcut will be removed
from the Start Menu.
Notes

The option Run (installation) using Dynamic Privileges can be combined with the intercept option for
unmanaged applications. This means that, once the process has been intercepted and is allowed to start, and the
application needs elevated privileges (for the user to install the software or for a command to be executed),
these will be applied on the started application.

If an intercepted application is not allowed to start, for example due to License or Opening hours restrictions, it
will be terminated.

When allowing the "Pinned sites" feature for browsers that have the ability to pin websites to the taskbar by
configuring specific settings in the Management Console (see the RES ONE Workspace Help for details), it is
advised to create a managed application for Microsoft Internet Explorer (at Composition > Applications). This is
because pinned websites will always be launched with Microsoft Internet Explorer (even if another web browser
is set as the default browser).

When enabling the option Pin to Start Menu for all applications, the User Settings template Start Menu (under
Windows > Vista or later > Control Panel) is not necessary. This template stores the same User Settings.

To create the name of an application shortcut, the application's title and its Start Menu path are used. This name
may not exceed 255 characters. Microsoft Windows cannot handle application shortcut names that are >255
characters, which will result in an application shortcut that does not work properly.

Due to Microsoft Windows limitations, multiple explorer.exe shortcuts with different parameters that are
pinned to the taskbar, will not stack on the proper taskbar icon.
104
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Tile
RES ONE Workspace can manage tiles in user sessions running on Microsoft Windows 8.1 / 2012 R2 /
10.

Pin to Start - select the automatic placement settings of tiles for the application on the user's
Start screen:

Take no action: No tile will be created automatically on the Start screen.

Set voluntary tile: This will automatically create the tile on the Start screen, but only once.
The user can remove or add the tile again. The tile will be displayed at the end of the Start
screen unless a Group name is specified.


If you change this setting to Take no action, and the user previously removed the
voluntary tile, the tile will not be placed back.

If you change this setting to Take no action, and the user kept the voluntary tile, the
tile will remain pinned to the Start screen.
Set mandatory tile: This will recreate the tile on the Start screen each time the user starts
a new session. The tile will be displayed at the end of the Start screen unless a Group name
is specified.


If you change this setting to Take no action, the tile will be removed from the Start
screen.
Tile size - select the size of the tile as it should be displayed on the Start screen:

Medium: the tile is displayed as a medium sized square on the Start screen.

Small: the tile is displayed as a small sized square on the Start screen.
If a user changes the size of a mandatory tile, but leaves it in its original group, then the
changed size will be maintained.

Group name - specify the group the tile should be added to on the Start screen. If the group
does not exist, it will be created.

If no group is specified, the tile will be added to the end of the Start screen.
Note
The tile properties are part of the Managed Applications Properties that are set when a session starts.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
105
Chapter 4: Dynamic Configuration
Settings
When you have set up the basic configuration of an application you can use the Settings tab to
configure some additional options.
Item
Function
Application is
enabled
Enables the application.
Disabling applications via the command line
To disable an application in RES ONE Workspace via the command line you need to use Building
Blocks.
This mechanism can be used if you want to update applications via a script and want to disable the
application before you start the update and enable the application after the update.
Steps to follow:

Export the RES ONE Workspace Application as single Building Block (e.g. Internet
Explorer.xml on C:\)

Rename the Building Block to Enable_Internet Explorer.xml

Make a copy of the Building Block (application) you need to update and rename this file to
disable_ Internet Explorer.xml

Edit the Building Block Disable_Internet Explorer.xml and change
<enabled>yes</enabled> to <enabled>no</enabled>

Before you start the update you execute C:\progra~1\respow~1\pwrtech.exe /add
C:\disable_ Internet Explorer.xml

Execute your update
After the update you execute C:\progra~1\respow~1\pwrtech.exe /add C:\Enable_ Internet
Explorer.xml
Note
Make sure that the cache update is set to "immediately": Administration> Agents > Update agent cache.
106
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Item
Function
Maximum instances
Allows RES ONE Workspace to preserve system capacity. E.g. if you specify
that the user is allowed to start the application only once and the user tries
to start a second instance, he will be prompted whether to return to the
open application or to close the open application and start the application in
a new window. The maximum # of instances that can be specified is 30, but
setting the maximum # of instances to 0 allows an unlimited # of instances.
Startup style of
application
Specifies the startup style of the application.
Process priority of
application
Specifies the process priority of the application in the field. A high priority
allows for a larger amount of processor capacity, but can result in system
freezes. A low priority decreases the chance on system hiccups and freezes,
but can make the application slow. When selecting this option, the option
Only RES ONE Workspace is allowed to launch this application on the tab
Security > Authorized files is selected automatically, to ensure that the
application cannot be started unmanaged with a different priority by using
e.g. a command prompt or Windows Explorer.
Required
connection state
Specifies the required connection state of the computer that grants access to
the application. This is useful if RES ONE Workspace is also used on laptops
and the application should only be accessible when the laptop is connected
to a network. By default the applications stay visible in the Start Menu.
Options
Item
Function
Do not list in
PowerHelp
Hides the application in PowerHelp. The user will not see the availability of
this application.
Do not notify about
running instances
Disables notifications about already running instances of the applications or
reaching the maximum number of allowed instances.
Do not show in "New Excludes the application from the "New Applications" notification that is
Applications"
shown if a user logs on after new applications have been installed.
Application
availability
Limits the availability of the application to the selected shell.
Do not show
application in
system tray
Specifies the system tray behavior of the application.
Autolaunch at
session start
Specifies the automatic launch of the application when the user logs on:

Take no action: The application will not start automatically. The user
can change this behavior on the Startup tab of the Workspace
Preferences tool.

Voluntary: Initially, this will start the application automatically, but the
user can change this behavior on the Startup tab of the Workspace
Preferences tool.

Mandatory: This will always start the application automatically. The user
cannot change this behavior.
The global setting Disable autolaunch for managed applications can
override this behavior.
Autolaunch by user
not allowed
Disallows the user to select the application to launch automatically.
This option is cleared and disabled when the Autolaunch at session start
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
107
Chapter 4: Dynamic Configuration
Item
Function
option is set to Voluntary or Mandatory.
Use extra password
verification
Uses password verification before the user is allowed to launch the
application. This is the standard Windows user password.
Exclude from CPU
Optimization
Excludes the application from CPU Optimization.
Exclude from
Memory
Optimization Limits
Excludes the application from Memory Optimization Limits. If the user
reaches the maximum number of applications allowed to run on his desktop,
Memory Optimization will allow the "excluded" application to be launched.
Exclude from
Memory
Optimization
Excludes the application from Memory Optimization. This will disable the
automatic release of reserved physical memory when the application is just
launched and no longer uses it. It will also disable the automatic release of
physical memory when the application has been inactive for a while.
Run in Separate
Memory (16 bit
apps)
Runs the application in a dedicated Virtual DOS Machine process. Use this
setting for 16-bit applications only. It does not affect 32-bit applications.
Hide application
Hides the application in the Start Menu and PowerHelp. The user will not be
able to select the application for desktop placement, AutoStart or Quick
Launch, but the application will still be able to run.
Hide application if
executable was not
found
Only shows the application in the Start Menu of the user if the application`s
command line is valid on the computer on which the user has logged on. The
application will be hidden in the Start Menu if the application`s command
line is not valid. This option also applies to Workspace Extensions.
Please note that if you want to make the application available through
Instant Passthrough, it is recommendable only to use the setting Do not
passthrough if application is available on local computer. The Instant
Passthrough settings can be edited at Composition > Applications. Edit the
application, go to the Publishing tab and then to the Citrix XenApp
Published Application, Settings tab. Click the Settings button and go to the
Behavior tab.
Use "generic
isolation"
integration
Allows you to integrate with application virtualization solutions other than
Microsoft App-V (e.g. Thinstall, Citrix).
Disable file system
redirector on 64-bit
systems
On a 64-bit system, starting an application is influenced by folder
redirection. Disable this folder redirection to ensure that the application is
started from its defined path.
108
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Licensing
Use the Licensing tab to configure application license metering. By managing the application
license usage of Managed Applications, you can enforce license compliance to e.g. Microsoft
licensing models.
It fully depends on the type of software license whether or not preventing access is enough for
license management. The method of preventing access must comply with the type of software
license. Here is an overview of the license types that RES ONE Workspace can enforce. This
enforcement is done on top off the access management of the application (i.e. a user may be
granted access based on a distribution group, but the license enforcement may prevent the
application from being used).
Concurrent user licensing
This type of licensing is uncommon for Microsoft applications. RES ONE Workspace keeps track of
the number of unique users that simultaneously use the same application. If the threshold is
reached then no additional users can launch the application. The maximum number of concurrent
users as well as the users that used the application can be tracked for later reporting.
Named user licensing
This type of licensing is uncommon for Microsoft applications. RES ONE Workspace keeps track of
the number of unique users that used the same application. If a new unique user tries to launch the
application while the threshold is reached then the application will not be accessible. A list of
unique users is maintained (including the denied users). Also the users that used the application can
be tracked for later reporting.
Seat licensing
This type of licensing is very common for Microsoft applications. RES ONE Workspace keeps track of
the number of unique computers that run the same application. There is an exception: if the
application is run on a remote desktop, then the client computer accessing the remote desktop is
being tracked instead. If the threshold of maximum allowed seats is reached then no additional new
(client) computers can launch the application. A list of unique seats is maintained (based on domain
and computer names) including the denied seats. Also the users and computers that used the
application can be tracked for later reporting.
How to configure application licensing

Open the application and click Properties > Licensing.

Select the application license type in the License type field and configure the selected
application license type:

Company wide license: unlimited access for all users.

Enter the license cost in the License cost field.

Enter the number of licenses in the # of licenses field. This will automatically calculate
the total cost of licenses in the Total cost field.

In the Max. # of users field, enter the maximum number of users that can be granted
access to the application. This field is only available if access to the application is
managed by application managers. See Configuring access to an application based on
identity.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
109
Chapter 4: Dynamic Configuration


Server license: access is based on server licenses. If all server licenses are in use, access
will be denied to additional users and a message will be shown instead.

Enter the license cost in the License cost field.

Enter the number of licenses in the # of licenses field. This will automatically calculate
the total cost of licenses in the Total cost field.

In the Max. # of users field, enter the maximum number of users that can be granted
access to the application. This field is only available if access to the application is
managed by application managers. See Configuring access to an application based on
identity.
Per seat license: access is based on seat licenses. By linking licenses to client names instead
of users, RES ONE Workspace can enforce seat licenses for desktops and laptops, but also for
Thin Clients. At #of licenses, click

In the field If database connection not available, specify the license metering behavior
if there is no connection to the Datastore and the actual number of licenses or seats
cannot be determined.

Always grant access (default): access to the application will always be granted and
the claimed license will be cached to be processed later. You can change the default
setting for new applications in the node Composition > Applications at the >
Properties tab.

Do not grant access: to force compliance with the configured licensing options,
access to the application will be denied if a Datastore connection is not available.

Enter the license cost in the License cost field.

Enter the number of licenses in the # of licenses field. This will automatically populate
the Total cost field with the total cost of licenses.


110
to set seat licenses per Zone.
Click
to configure the number of seat licenses per Zone. This will open the Seat
licenses per Zone window.

In the Max. # of users field, enter the maximum number of users that can be granted
access to the application. This field is only available if access to the application is
managed by application managers. See Configuring access to an application based on
identity.

Click Seats to view the number of seats currently in use and the users that have claimed
them. This button is only available if the application uses seat licenses.
Per named user license: access is based on specified users. If all licenses are in use, access
will be denied to additional users and a message will be shown instead. If access is managed
by an application manager, this message will be shown to him.

Enter the license cost in the License cost field.

Enter the number of licenses in the # of licenses field. This will automatically populate
the Total cost field with the total cost of licenses.

In the Max. # of users field, enter the maximum number of users that can be granted
access to the application. This field is only available if access to the application is
managed by application managers. See Configuring access to an application based on
identity.

Click Named users to view which users have access to the application. You can configure
access to the application on the Access Control tab. If you have delegated access to the
application to an Application Manager, the Information about users and applications
window will open, which shows information about the application and the users with
access to it.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration

Per concurrent user license: access is based on concurrent users. If you use this license
type, you cannot configure the Maximum instances of the application on the Settings tab.
Concurrent user licenses are supported for desktops and server-based computing
environments. If all licenses are in use, access will be denied to additional users. Instead, a
message will be shown, together with a list of current users. This avoids the purchase of
needless user licenses, because it allows users to arrange access to the application among
themselves. RES ONE Workspace will automatically retry to claim a concurrent license after
30 seconds. Users can use the Retry button to speed up this process.

In the field If database connection not available, specify the license metering behavior
if there is no connection to the Datastore and the actual number of licenses or seats
cannot be checked.

Always grant access (default): access to the application will always be granted and
the claimed license will be cached to be processed later. You can change the default
setting for new applications at Composition > Applications > Managed Applications
> Properties.

Do not grant access: to force compliance with the configured licensing options,
access to the application will be denied if a Datastore connection is not available.

In the field Idle timeout in minutes, specify how long the application can remain
inactive before it is forcibly closed by RES ONE Workspace. Because an inactive
application unnecessarily holds a lock on a concurrent user license, selecting this option
is useful if the number of available licenses is limited. If an application is forcibly
closed, this will be logged in the Event Log of the user.

By default, only the application's main process is closed when the timeout expires. To
also forcibly close child processes of the application when the idle timeout expires,
select Force close of child processes.

Enter the license cost in the License cost field.

Enter the number of licenses in the # of licenses field. This will automatically calculate
the total cost of licenses in the Total cost field.

In the Max. # of users field, enter the maximum number of users that can be granted
access to the application. This field is only available if access to the application is
managed by application managers. See Configuring access to an application based on
identity.

Click Concurrent usage to view which users are currently using the application.
Note
If you select Per seat license or Per concurrent license, the setting Only RES ONE Workspace is allowed to launch this
application on the Security tab will be selected automatically, to ensure that the user can only start the application via his
Start Menu or desktop. This allows RES ONE Workspace to check how many application licenses are in use.
Tip
If the application uses licenses per concurrent user, click Concurrent usage on the application's Licensing tab to see which
users are currently using the application.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
111
Chapter 4: Dynamic Configuration
Notifications
Use the Notifications tab in to configure user notifications for an application. These messages will
be shown to a user when he starts an application that has been enabled or disabled in Managed
Applications.
How to configure user notifications for an application

Open the application and click Properties > Notifications.

Click the upper Edit button to configure a notification message for disabled applications.

Select Show notification when user starts the enabled application and click the lower Edit
button to configure a notification message for enabled applications.

Select Show once to show the message only when the user launches the application for the
first time.

Select Clear history if you have changed the message. This will clear the history of the
message and show the new message once.
Notes

The notification messages support .rtf format and can contain hyperlinks (e.g. mailto:, http://,
file://).

The size of the Edit notification window determines the size of the notification window as it will be shown to
the user.
Configuration
The Configuration section determines the Actions that should be executed when the application is
started; the application's File Types, E-mail Settings and Data Sources.
Actions
Use the Actions tab to configure specific actions for an application. These actions are invoked when
a user launches the application. Application actions will be invoked whenever a started application
is managed by RES ONE Workspace. This is the case if the application is started from the Start Menu
or when the application is started by a configured File Type. Applications are not managed by RES
ONE Workspace if they are started from a command prompt, directly started from the Windows
Explorer or from the run command. This can be prevented by checking the option Only RES ONE
Workspace is allowed to launch this application from the Security > Authorized Files tab of the
application.
The user's Event Log will be appended with the results of the applied settings. You can view the
contents of this Event Log in the Workspace Analysis window of this user.
Actions can also be configured on a global level.
Actions for Applications are identical to global Actions ("Actions" on page 112), except:

Hide Drive behavior is not available in Drive and Port Mappings.

Set as default printer in Printers is mandatory, but will not reset the user’s preference. The
next time the user logs on, only the preferred default printer will be restored. The user will also
be notified of this event by the "Printing Preferences" tool.

Fast Connect is not available in Printers.
112
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
The order in which application Actions are executed
When a managed application starts, the application's Actions are executed by category, in the
following order:
1. Environment Variables
2. Drive and Port Mappings
3. Drive Substitutes
4. Printers
5. User Registry Settings
6. User Registry Policies
7. User Home Directory actions
8. User Profile Directory actions
9. Folder Synchronizations
10. Execute Commands
11. Automation tasks
12. Microsoft ConfigMgr distributions
13. LANDesk software distributions
14. Linked actions
If Microsoft Outlook is added as a new application in RES ONE Workspace, a registry key is
automatically added on the Configuration > Actions tab. This key disables the check whether
Microsoft Outlook is the default e-mail client. If Microsoft Outlook is started through a File Type a
notification that Microsoft Outlook is not the default e-mail client can appear, because the
associated application in the registry is pwrgate.exe [appid] instead of outlook.exe. If the user
then chooses to set Microsoft Outlook as the default mail client, the associated application in the
registry is changed from pwrgate.exe [appid] to outlook.exe, making the application
unmanaged.
The Registry key that is added is:
[HKEY_CURRENT_USER\Software\Microsoft\Office\<officeversion>\Outlook\Options\General]
Value name and data:
Check Default Client: 0
Notes
In a user session, if a user starts an application using Run as different user / Run as administrator, only the settings that
are related to the start of the application (configured on the Properties > Settings tab of the application), are applied.
These settings are:

Parameters

Startup style of application

Process priority of application

Disable file system redirector on 64-bit systems
Actions configured for the application (on the Configuration > Actions tab of the application) will not be applied.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
113
Chapter 4: Dynamic Configuration
File Types
Use the File Types tab to associate Windows file types and commands with an application.
Configuration

Open the application and click Properties > File Types.

To add a File Type to the application, click Add. This will open the Add/Change File Type
window.

To import all already known file types for the application from the system, click Import. If you
have edited or deleted file types, you can revert to the default file types of the application by
clicking the Import button again.

To change existing File Types, click Edit or Delete.

If multiple applications are associated with the same file types and commands, click the arrows
to assign a priority. For example, WordPad can open simple DOC files, but Microsoft Word also
supports this file type. If an application is at the top of the priority list for a certain file type
and command, it will be used to handle the File Type. If this application is not accessible to the
user, the second application will be used, etc. You can also edit this priority in the node
Composition > Applications > File Types.
The same file type and command may be entered for more than one application. For example,
WordPad can open simple DOC files, but Microsoft Word also supports this file type. To determine
what should happen if a user has access to both applications, assign an application priority to the
file type/command. You can do this in the Composition > File Types window, or on the File Types
node of Composition > Applications.
The application at the top of the priority list for a certain file type or command will handle the file
type association. If this application is not accessible to the user, the second application on the list
will be used, and so on. If the initial application that handles a certain file type and command is
temporarily not available (that is, disabled or limited by Time Restrictions), RES ONE Workspace will
look for an alternative application. This alternative must be configured for the same file
type/command and must also be available in the user's menu.
114
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
When you add or edit an association, you can configure the following options:

File type extension: the extension to be associated with an application. Select a known
association with the browse button or enter a new extension manually.

Enabled: whether the association is to be enabled.

Command: the command associated with the file type (for example "edit", "open", or "print").
Usually executed by Windows when a user double-clicks a file from the Explorer or when a file is
launched from another application. The command (or its description) will show in the context
menu when right-clicking a file in the Explorer. Select a known command with the browse
button or enter a new command manually.

Description: a short description of the command that will be shown in the context menu when
right-clicking a file in the Explorer.

Register as default command for this extension: the default command is the command that
will be executed by Windows when a user double-clicks a file.

Command line parameters: the command line parameters that should be used for the
application when the user selects the command. For example, use "/p %1" when configuring
the "print" command for WordPad, so that WordPad will print the selected file.

Also register this command as Workspace Extension: enables support for File Types for the
Workspace Extender / RES Subscriber for VDX (see Workspace Extensions (on page 118)).

Use DDE: you can enable this setting and automatically load the machine default DDE settings.
Using DDE (Dynamic Data Exchange) prevents RES ONE Workspace to open an additional instance
of an application when, for example, an associated file type is double-clicked from the Windows
Explorer and the application is already opened. It also enables e.g. printing of documents from
the context menu.

DDE Message: This field specifies the DDE command for this action.

Application: This field specifies the DDE application string that is used to start the DDE link
with the application.

Topic: This field specifies the DDE topic string to start a conversation with the application.
The default DDE topic string (used if this field is empty) is "System."

DDE message if application is not running: This optional field specifies the DDE command
to use if the application (specified in the Application field) is not already running. If this
field is left empty, Microsoft Windows sends the same command as specified in the DDE
Message field.
If you have configured a File Type for an application, you can use $PF_IFA$ in the application's
command line parameters to indicate where the filename should be inserted.
For example, if you have configured the command line for Microsoft PowerPoint as " /splash" to
suppress PowerPoint's splash screen, double-clicking a PPT file will result in an attempt to launch
PowerPoint with the command line "/splash H:\somefile.ppt". This will not work, because
PowerPoint requires the filename to be the first parameter. Instead, specify " $PF_IFA$ /splash" as
the application's command line. When the application is launched through a File Type Association,
the filename will no longer be appended to the application's command line, but instead will be
inserted in the position indicated with $PF_IFA$. When the application is launched directly from
the menu, the $PF_IFA$ text will be removed.
It is also possible to use $PF_IFA_REPLACE$ in the application's command line parameters to
indicate that the command line should not be used at all when the application is launched through a
File Type; but that only the filename should be passed to the application through the File Type.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
115
Chapter 4: Dynamic Configuration
E-mail Settings
With E-mail Settings, you can configure mail profiles and other mail-related settings, such as access
settings to mail servers and providers, personal address books and personal information stores. See
the manufacturer's documentation for more information about the configuration of these services.
RES ONE Workspace applies E-mail Settings before the application's Actions are processed. This
allows you to change E-mail Settings registry keys after the E-mail Settings have been configured.
Configuration

Click New or Edit in the node Composition > Applications > E-mail Settings. This will open the
New/Edit E-mail Settings window.

Click the Properties tab to configure the basic properties of the mail setup.
116

Enter a name for the mail settings in the E-mail Settings name field.

Optionally enter a note for the mail settings in the Administrative note field. This helps you
to differentiate your E-mail Settings.

Select one of the options and click Configure. This will open the configuration window of
the selected service. You can use environment variables such as %fullusername% and
functions such as $adinfo(title) and $adinfo(email). You can configure the following
services:

HP OpenMail

IMAP

Internet E-Mail
Supported for Microsoft Outlook XP and Microsoft Outlook 2000.

Lotus Notes Mail

Microsoft Exchange Online (Office 365)

Microsoft Exchange Server 5.5 or higher

Microsoft LDAP Directory

Microsoft Mail

Microsoft Outlook Express

Nortell CallPilot Desktop Messaging

Oracle Connector for Outlook

Outlook Address Book

Outlook Signature
When your Signature is voluntary, the signature is only created when the user starts
Microsoft Outlook for the first time. This allows the user to change his signature. You
can overwrite this custom signature with the default signature only once, by selecting
Clear history.
Signatures can only be edited in Rich Text Format, but when saving the signature, it will
also be stored as plain text and HTML.
You can use environment variables and user properties in the signature.
You can type user properties directly in the signature field or select them from a list by
clicking the User property button. When you click this button, you can review whether a
specific user property has been assigned a value before deciding to add it to the
signature.
When selecting Use external editors, you have to edit each format individually when
making changes to the signature. The signature will always be shown in Rich Text
Format, even when editing plain text or HTML.

Personal Address Book
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration

Personal Folders

Zarafa Groupware Server
Example: Configuring an Outlook Signature

Click the node Composition > Applications > E-mail Settings.

Click New. This will open the New E-mail Settings window.

Click the Properties tab.

Enter a name for the E-mail Settings in the E-mail Settings name field.

Optionally enter a note in the Administrative note field.

Select Outlook Signature and click Configure. This will open the Configure Feature - Outlook
Signature window, which allows you to configure a signature for all users of Microsoft Outlook
(Express). Outlook Signature is typically used to add corporate footers and disclaimers to e-mail
messages.

Enter a name for the signature.

Select if the signature should be used when replying to or forwarding e-mail messages.

Specify the behavior. If you select Signature is voluntary, the signature will only be created
when the user starts Microsoft Outlook for the first time. This allows the user change his
signature.

Select the appropriate version of Microsoft Outlook from the list.

Edit the signature on the New messages tab. Although you can only edit in Rich Text Format,
the signature will also be automatically translated to plain text and HTML. It is stored in these
three formats for later use. You can use variables and functions in the signature. With user
properties in Outlook Signatures, Outlook can get specific information about the user(s) to
which the mail setup applies from Active Directory. You can type user properties directly in the
signature field or select them from a list by clicking the User property button. When you click
the User property button, this will open the Select a user property window, which will show a
list of user properties and their values. This makes it possible to review whether a specific user
property has been assigned a value before deciding to add it to the signature.

Optionally, select Use external editors to use external editors. If you select this option, you
have to edit each format individually when making changes to the signature. The signature will
always be shown in Rich Text Format, even when editing plain text or HTML.

Select whether the signature should also be used for replies and forwards, and click OK to save
the configuration settings.

Click the Access Control tab and the Workspace Control tab to configure access control and
workspace control criteria for the signature.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
117
Chapter 4: Dynamic Configuration
Data Sources
With Data Sources, you can configure data connections (DSNs) to databases using open database
connectivity (ODBC). This allows you to associate DSNs with applications that need access to a
certain database.
For example, if a CRM application needs access to a CRM database located on an SQL database
server and you would configure this in Microsoft Windows, you would have to configure a DSN link to
the database server for each computer on which the CRM application has been installed. If you
create a Data Source in RES ONE Workspace, you only need to configure the DSN once to link the
CRM application to the CRM database. Each time the application will be used, the database
connection will be created automatically.
Configuration

When you have configured the Data Source, you need to associate the Data Source with an
application.

If you select Show associated applications and a scope applies to your administrative role, not
all applications may be shown or you may not be allowed to edit all applications.

Normally, a Data Source is created in a user session when the application to which it is linked is
started. This may cause a delay when starting the application. It can therefore be useful to
select Create Data Source during logon.
118
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Workspace Extensions
RES VDX enables the integration of locally installed applications into Centralized (Server Based)
Computing RES ONE Workspace environments. This makes it possible to manage and control the
access to local applications as well as Terminal Server applications from one central point: the RES
ONE Workspace Console.
Where to find Workspace Extensions
What
Where
Workspace Extensions
Composition > Applications, on the Properties > General tab of an
application
Configuring Workspace Extensions
Workspace Extensions are applications that are managed centrally with the RES ONE Workspace
Console. If you configure an application to run as a Workspace Extension, it will be displayed in the
RES ONE Workspace menu like any other application. The only difference is that you need to specify
the local path on the client for the application.
To run an executable on a local workstation as a Workspace Extension in a Centralized Computing
session (for example a CAD program), complete the following steps:

Install the RES VDX Client plugin on the client.

Create an application with the RES ONE Workspace Console. Select the option Run as
Workspace Extension.

Test the configuration by starting the Application.

Check Usage Tracking to see whether the application usage is logged.
You may also associate the application with a Zone:

Open the Application's properties in the RES ONE Workspace Console.

Add a Zone at the Access Control > Locations and Devices tab.

Select a previously created Zone or create one.
This restricts the Workspace Extension to a specific Zone. This can be useful, for example, if the
application is not locally installed on all workstations. As an alternative, assign the application to a
specific Workspace Container.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
119
Chapter 4: Dynamic Configuration
Integrating File Types with Workspace Extensions
File Types seamlessly integrate with Workspace Extensions.
If you configure a File Type and select Also register this command as Workspace Extension, the
File Type will also be registered on the client using the Workspace Extender (provided that your
environment uses the Workspace Extender).

If the user runs an application configured to run as Workspace Extension and accesses a file that
is associated with an application that is located on a Terminal Server, RES ONE Workspace will
automatically open this application. For example, if you have configured Microsoft Outlook to
run on a Terminal Server and associate it with the "mailto" special file type, RES ONE Workspace
will automatically open Microsoft Outlook in the Terminal Server session if the user opens a mail
link in Internet Explorer that runs locally.

If you have configured a File Type for a Workspace Extension and the user double-clicks this file
type in the Terminal Server session, RES ONE Workspace will automatically start the associated
Workspace Extension and open the selected file (or resource). For example, if you have
associated the file type "http" with the Workspace Extension Internet Explorer and the user
double-clicks an Internet URL from any application in the Terminal Server session, RES ONE
Workspace will start the Internet Explorer which was configured to run as Workspace Extension.
In both cases, the files (or resources) must be available on the Terminal Server AND the local client.
For example, if the user double-clicks a PDF file on a network share that has been mapped with
drive letter "T:" and you have associated this file type with an application configured to run as
Workspace Extension on the client, the same drive letter "T:" must be accessible on the client.
You can view the location of both file and application in the File Types node of the Workspace
Analysis window of a specific user, which can be accessed through the node Diagnostics >
Workspace Analysis. In this way, it is always clear how the redirection of File Types takes place
between RES VDX and RES ONE Workspace.
120
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
RES ONE Workspace Applications for end users
Access Wizard
It is possible to delegate the task of granting users access to an application to other users. Specific
people who are expert users or who are responsible for a certain application can be made
Application Managers. In most cases these people are non-IT personnel. Application Managers gain
access to the Access Wizard, an application with which they can distribute the application(s) he is
responsible for to other users.
Where to find the Access Wizard
What
Where
Setting Access Control to
Controlled by application
manager(s)
In the RES ONE Workspace Console: Composition > Applications, on
the Access Control > Identity tab of an application
Access Wizard
In the user's session: Start menu > RES ONE Workspace settings >
Access Wizard
Usage Tracking Viewer
Information gathered by Usage Tracking is presented in the Usage Tracking Viewer. The user can
view a list of detailed information, or a graphical representation of it. For reporting purposes, the
information can be copied to the clipboard and pasted into a spreadsheet or word processor file.
Notes

The Usage Tracking Viewer will not display any information about OUs if OU support has not been configured in
the RES ONE Workspace Console.

The Usage Tracking database only stores OU information on the lowest OU level. This means that if the OU
structure changes, the information displayed by Usage Tracking will change accordingly.

On the tabs Details, Sessions and Current Activity in the Usage Tracking Viewer, you can type a search string to
search for an object (e.g. user, application, computer or client). Previous search items are retained and using
wildcards (*) in your search is allowed.

Internet Explorer running as a Workspace Extension will not be tracked by Usage Tracking.

Computer names of extended applications are preceded with an asterisk ("*") in the Usage Tracking Overview.

It is also possible to retrieve and analyze Usage Tracking data by using Web services. See Web Service for
reporting.
Where to find Usage Tracking
What
Where
Usage Tracking
Go to Usage Tracking in the Setup menu
Usage Tracking Overview
Diagnostics > Usage Tracking Overview
The Usage Tracking Viewer
In the RES ONE Workspace Console: Diagnostics > Usage Tracking
Overview
In the user's session: Start menu > RES ONE Workspace settings >
Workspace Preferences > Other tab
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
121
Chapter 4: Dynamic Configuration
Printing Preferences
The Printing Preferences utility provides users with simple printer-related information and a Printer
Management console. Only user-related printers are shown.
Where to find Printing Preferences
What
Where
Printing Preferences
In the user's session: Start menu > RES ONE Workspace settings >
Printing Preferences
Creating a list from which users can choose a printer
It is possible to provide end users with an alternative user interface when connecting to a printer
from Printing Preferences. Usually, the Connect button will show a Microsoft Windows dialog in
which the user can browse the network for the desired printer. However, a geographically oriented
interface would be more intuitive for an average user. To enable this alternative interface complete
the following procedure:
Create a file with the name "printers.lst". This file consists of sections for each location that
contains lines for each printer on that location. For example:
[USA\Detroit\Building 1\Floor 2\Office
\\fileserver1\printer212|Friendly name
\\fileserver1\printer213|Friendly name
\\fileserver1\printer214|Friendly name
XYZ]
for printer 212
for printer 213
for printer 214
[USA\New York\Office ABC]
\\fileserver8\printer845|Friendly name for printer 845
\\fileserver7\printer713|Friendly name for printer 713
\\fileserver7\printer715|Friendly name for printer 715
The part between square brackets defines the folder structure, where every level is separated by a
slash ("\"). If you want to use a backslash ("\") in the name of a folder, use a double backslash ("\\").
The lines that follow the line with folder names each define a printer that is displayed in that
folder. This line must start with the printershare name ("\\server\share"), optionally followed by a
backpipe character ("|") and a friendly name for the printer.
The printers.lst file can be distributed through Home Directory Maintenance (in
<HomeDir>\Personal Settings) which allows distribution based on Zones or through Custom
Resources with the class "PowerLaunch \ Printers". The printers.lst file will then look for the
printers.lst file located in "%programFiles%\RES Software\Workspace
Manager\Data\DBCache\Resources\pl_prn".
122
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Workspace Preferences
Workspace Preferences is the users' desktop management system. It offers users several options,
such as configuring their desktop and their QuickLaunch icons, starting applications automatically,
and swapping mouse buttons.
In the RES ONE Workspace Console, you can determine which options should be available in the
users' Workspace Preferences. This allows you to make certain options available or unavailable
according, for example, to company policies. These user settings are stored in pwruser.ini,
located in \Personal Settings in the user's home folder.
Where to find Workspace Preferences
What
Where
Workspace Preferences
In the user's session: Start menu > RES ONE Workspace settings >
Workspace Preferences
Using User Home Directory Maintenance to change Pwruser.ini
Users can partly determine the behavior of their RES ONE Workspace session by changing settings in
their Workspace Preferences tool. These user settings are stored in pwruser.ini, located in
\Personal Settings in the user's home folder. The pwruser.ini can also be changed from the
RES ONE Workspace Console using Home Directory Maintenance.
Example:
(partial) contents of a pwruser.ini file
[Preferences]
Printer=\\srv-fs01\toshiba
PreviousPrinter=\\srv-fs01\prt-oce-groundfloor
DesktopColor=10841658
DesktopForeColor=16777215
SmallIcons=No
LeftRight=No
NoAppguard=Yes
...
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
123
Chapter 4: Dynamic Configuration
NoAppguard
Hide Application Security Management messages in user's session
Section
Preferences
Settings
NoAppguard
Data
Yes or No
Corresponding option in user's
Workspace Preferences
Do not display security notifications on the Options tab
NoVistaAppguard
Hide extra Vista/2008/w7/2008r2 Application Security Management messages in user's session
when executable is started from Explorer
Section
Preferences
Settings
NoVistaAppguard
Data
Yes or No
Corresponding option in user's
Workspace Preferences
Do not display security notifications on the Options tab
DesktopColor
Set a different background color for the user's session (other than the default set in the RES
ONE Workspace Console)
Section
Preferences
Settings
DesktopColor
Data
[the color code]
Corresponding option in user's
Workspace Preferences
Background color on the Background tab
DesktopForeColor
Set a different foreground (text) color for the user's session (other than the default set in the
RES ONE Workspace Console)
Section
Preferences
Settings
DesktopForeColor
Data
[the color code]
Corresponding option in user's
Workspace Preferences
Foreground color on the Background tab
124
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Desktop and DesktopSaveMandatory
Desktop lists the applications that the user has set as voluntary desktop shortcuts.
DesktopSaveMandatory lists the applications that are set as mandatory desktop shortcuts.
Section
MenuItems
Settings
Desktop
DesktopSaveMandatory
Data
List of application IDs, separated by vertical bars (|)
Corresponding option in user's
Workspace Preferences
Applications on desktop on the Desktop tab
Remarks
These settings are part of the RES ONE Workspace mechanism for
handling desktop shortcuts that change from optional to mandatory
and vice versa.
DesktopSaveMandatory lists applications that have the setting
Desktop: Set mandatory shortcut in the RES ONE Workspace
Console (on the application's General tab under Automatic
shortcuts). At the start of a user session, RES ONE Workspace
checks whether each application in this list still has that setting. If
not, the application is removed from the DesktopSaveMandatory
list and put in the Desktop list instead. The reverse also happens
with optional desktop shortcuts that have become mandatory.
There is not much point in changing these lists manually unless you
also change the setting in the Console.
Note
Users can also opt to automatically set desktop shortcuts for all their applications. This is set with the ini file setting
ShowAllOnDesktop.
ShowAllOndesktop
Create mandatory desktop shortcuts for all applications
Section
Preferences
Settings
ShowAllOnDesktop
Data
Yes or No
Default
No
Corresponding option in user's
Workspace Preferences
Show all available applications on desktop on Desktop tab
Note
This setting cancels out the settings Desktop (on page 124) and DesktopSaveMandatory (on page 124).
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
125
Chapter 4: Dynamic Configuration
QuickLaunch and QuickLaunchMandatory
QuickLaunch lists the applications that the user has set as voluntary Quick Launch shortcuts.
QuickLaunchMandatory lists the applications that are set as mandatory shortcuts.
Section
MenuItems
Settings
QuickLaunch
QuickLaunchMandatory
Data
List of application IDs, separated by vertical bars (|)
Corresponding option in user's
Workspace Preferences
QuickLaunch on taskbar on the QuickLaunch tab
Remarks
These settings are part of the RES ONE Workspace mechanism for
handling QuickLaunch shortcuts that change from optional to
mandatory and vice versa.
QuickLaunchSaveMandatory lists applications that have the setting
QuickLaunch: Set mandatory shortcut in the RES ONE Workspace
Console (on the application's General tab under Automatic
shortcuts). At the start of a user session, RES ONE Workspace
checks whether each application in this list still has that setting. If
not, the application is removed from the
QuickLaunchSaveMandatory list and put in the QuickLaunch list
instead. The reverse also happens with optional QuickLaunch
shortcuts that have become mandatory.
There is not much point in changing these lists manually unless you
also change the setting in the Console.
126
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Applications and ApplicationsSaveMandatory
Applications lists the applications that the user has set as voluntary shortcuts in the Start Menu.
ApplicationsSaveMandatory lists the applications that are set as mandatory shortcuts.
Section
MenuItems
Settings
Applications
ApplicationsSaveMandatory
Data
List of application IDs, separated by vertical bars (|)
Corresponding option in user's
Workspace Preferences
Applications in Start Menu on the Start Menu tab
Remarks
These settings are part of the RES ONE Workspace mechanism for
handling Start Menu shortcuts that change from optional to
mandatory and vice versa.
ApplicationsSaveMandatory lists applications that have the
setting Start Menu: Set mandatory shortcut in the RES ONE
Workspace Console (on the application's General tab under
Automatic shortcuts). At the start of a user session, RES ONE
Workspace checks whether each application in this list still has that
setting. If not, the application is removed from the
ApplicationsSaveMandatory list and put in the Applications list
instead. The reverse also happens with optional Start Menu
shortcuts that have become mandatory.
There is not much point in changing these lists manually unless you
also change the setting in the Console.
Note
Users can also opt to automatically set Start Menu shortcuts for all their applications. This is set with the INI file setting
ShowAllApplication.
ShowAllApplication
Create mandatory Start Menu shortcuts for all applications
Section
Preferences
Settings
ShowAllApplication
Data
Yes or No
Default
No
Corresponding option in user's
Workspace Preferences
Display all available applications in Start Menu on the Start Menu
tab
Note
This setting cancels out the settings Applications (on page 126) and ApplicationsSaveMandatory (on page
126).
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
127
Chapter 4: Dynamic Configuration
Startup
List the applications that users can set to be autolaunched
Section
MenuItems
Settings
Startup
Data
List of application IDs, separated by vertical bars (|)
Corresponding option in user's
Workspace Preferences
Start at startup of RES ONE Workspace on the Startup tab
DesktopBackGround
Set a specific BMP file as background picture
Section
Preferences
Settings
DesktopBackGround
Data
File name
Corresponding option in user's
Workspace Preferences
Picture on the Background tab
Remarks
The file needs to be placed in the Resources folder in the RES ONE
Workspace program directory. Files that are set as background from
the RES ONE Workspace Console are placed there automatically.
The most convenient way to place other files there is to add the file
as a Custom Resource in the RES ONE Workspace Console.
DesktopBackGroundPlacement
Location of the background picture (right corner, stretched)
Section
Preferences
Settings
DesktopBackGroundPlacement
Data
The number that corresponds with the desired location:
0 = top left
1 = top right
2 = bottom left
3 = bottom right
4 = center
5 = tile
6 = stretch
128
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
SmallIcons
Show small application icons in Start Menu
Section
Preferences
Settings
SmallIcons
Data
Yes or No
Default
Yes
Corresponding option in user's
Workspace Preferences
Use small icons and Use large icons on the Options tab
Remarks
Only available in the RES ONE Workspace Shell
SwapMouse
Swap the mouse button from right to left
Section
MenuItems
Settings
SwapMouse
Data
Yes or No
Default
No
Corresponding option in user's
Workspace Preferences
Users can swap the orientation of their mouse buttons on the
Options tab
Remarks
With this setting at No, the mouse button is on the right-hand side.
With this setting at Yes, the mouse button is on the left-hand side.
HideDescription
Hide balloon pop-up with application description when starting application
Section
Preferences
Settings
HideDescription
Data
Yes or No
Default
No
Corresponding option in user's
Workspace Preferences
Hide description window on the Options tab
Remarks
This option refers to the description balloon that pops up in the
bottom right-hand corner of the screen when the mouse pointer
hovers over an application in the Start Menu. Only available in the
RES ONE Workspace Shell.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
129
Chapter 4: Dynamic Configuration
MessageDefaultPrinter
Display message if default printer is missing
Section
Preferences
Settings
MessageDefaultPrinter
Data
Yes or No
Default
Yes
Corresponding option in user's
Workspace Preferences
Notify me if my default printer is missing or has changed on the
Options tab
LCID
Set the interface language for Microsoft applications and other Microsoft components (based on
installed MUI)
Section
Preferences
Settings
LCID
Data
[the LCID code]
Default
[default language in Management Console]
MLS
Set interface language of the RES ONE Workspace shell, Workspace Preferences and other RES
ONE Workspace components (based on installed RES ONE Workspace Language Pack)
Section
Preferences
Settings
MLS
Data
[MLS code]
Default
[default language in Management Console]
Corresponding option in user's
Workspace Preferences
Language on the Options tab
HideMyNameInScreensaver
Suppress user name in the RES ONE Workspace screensaver
Section
Preferences
Settings
HideMyNameInScreensaver
Data
Yes or No
Default
No
Corresponding option in user's
Workspace Preferences
Do not display my name in the screensaver on the Options tab
130
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
HotKeyModifier and HotKeyKey
Define the combination of keys to activate the Start Menu. HotKeyModifier is the first key,
HotKeyKey is the second key.
Section
Preferences
Settings
HotKeyModifier
HotKeyKey
Data
[key]
Default
Modifier: SHIFT
Key: ESC
Options
Modifier: SHIFT, ALT, CTRL or [empty]
Key: ESC, TAB, F1 up to and including F12 or [empty]
Corresponding option in user's
Workspace Preferences
Workspace hotkey on the Options tab
AutoHide
AutoHide the Taskbar in user session
Section
Preferences
Settings
AutoHide
Data
Yes or No
Default
No
Corresponding option in user's
Workspace Preferences
Auto hide taskbar on the Options tab
OnTop
Taskbar always OnTop in user session
Section
Preferences
Settings
OnTop
Data
Yes or No
Default
Yes
Corresponding option in user's
Workspace Preferences
Keep taskbar on top of other windows on the Options tab
TimeoutScrnSaver
Set the screensaver timeout (in minutes)
Section
Preferences
Settings
TimeoutScrnSaver
Data
[value between 1 and 120]
Corresponding option in user's
Workspace Preferences
Activate screensaver after on the Options tab
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
131
Chapter 4: Dynamic Configuration
DoNotShowAgain
Disable RES ONE Workspace messages based on the option "Do not show again"
Section
DoNotShowAgain
Settings
[Application Donotshow again value]
Data
Yes or No
Default
No
NoNetGuard
Hide Network Security messages in user's session
Section
Preferences
Settings
NoNetGuard
Data
Yes or No
Default
No
RunHistory
Saves up to 8 commands used in the Run option
Section
RunHistory
Settings
[Run1 up to and including Run8]
Data
command
Logging
Generate a Subscriber/Workspace Extender log
Section
SubCon
Settings
Logging
Data
Yes or No
Default
No
Remarks
The log file subcon.log is generated in \Personal Settings in the
user's Home folder
Printer
Save the user's default printer
Section
Preferences
Settings
Printer
Data
[printer share]
132
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
NotifyDefaultPrinterChange
To suppress the notification message when the default printer is changed.
Section
Preferences
Settings
NotifyDefaultPrinterChange
Data
No (Notification message will never be displayed when the default
printer changes)
or
OncePerLocation (Notification message is only displayed if the
new default printer differs from the default printer that has already
been set for this location)
PreviousPrinter
Previous default printer
Section
Preferences
Settings
PreviousPrinter
Data
[Printer share]
PowerPrintView
Force advanced view in Printing Preferences
Section
Preferences
Settings
PowerPrintView
Data
"Advanced" or empty
Default
[empty]
OutlookNoOpenDialog
Types of attachments that Microsoft Outlook should open without asking first
Section
Preferences
Settings
OutlookNoOpenDialog
Data
List of file types, separated by vertical bars (|)
Default
|
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
133
Chapter 4: Dynamic Configuration
AppguardDump
Generate an Application Security log
Section
Preferences
Settings
AppguardDump
Data
Yes or No
Default
No
Remarks
The log file appguardDump_%Servername%.txt is generated in
\Personal Settings
NetguardDump
Generate a Network Security log
Section
Preferences
Settings
NetguardDump
Data
Yes or No
Default
No
Remark
The log file netguardDump_%Servername%.txt is generated in
\Personal Settings
RefreshInterval
The interval at which information in the Usage Tracking viewer should be refreshed (in seconds)
Section
PwrTrace
Settings
RefreshInterval
Data
[0 to 30]
Default
30
Corresponding option in Usage Refresh interval for "Current activity" on Settings tab
Tracking viewer
NoRecordLimit
By default, the Usage Tracking viewer displays a maximum of 1000 records. Use the setting
NoRecordLimit to disable this maximum and store an unlimited number of records
Section
PwrTrace
Settings
NoRecordLimit
Data
Yes or No
Default
No
Corresponding option in Usage Do not limit output of "Details" and "Sessions" to 1000 records on
Tracking viewer
Settings tab
Remarks
134
With this setting at "No", a maximum of 1,000 records is stored.
With this setting at "Yes", an unlimited number of records is stored.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
NoScreensaver
Hide screensaver data in Usage Tracking results
Section
PwrTrace
Settings
NoScreensaver
Data
Yes or No
Default
No
Corresponding option in Usage Do not show any information about the screensaver on Settings
Tracking viewer
tab
ShowFullOUName
Show full OU names in the Usage Tracking viewer
Section
PwrTrace
Settings
ShowFullOUName
Data
Yes or No
Default
No
Corresponding option in Usage Show full names in reports and graphs on Settings tab
Tracking viewer
ShowOUinReports
Show OU names in Usage Tracking reports
Section
PwrTrace
Settings
ShowOUinReports
Data
Yes or No
Default
No
Corresponding option in Usage Show OUs in reports (Details, Sessions, Current Activity) on
Tracking viewer
Settings tab
ShowEmptyDates
Show empty dates in Usage Tracking viewer
Section
PwrTrace
Settings
ShowEmptyDates
Data
Yes or No
Default
Yes
Remarks
Set this setting at No to filter empty columns out of Usage Tracking
graphics
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
135
Chapter 4: Dynamic Configuration
PowerHelp
In most companies, information about available applications and support is not readily at hand for
users. In a RES ONE Workspace session, users can get such information from PowerHelp, which
provides users with information about application availability, application distribution, and
application responsibility.
On the Access information tab, users can see who the Application Manager of an application is, or
on what basis they can access an application. This can be useful if they have specific questions
about an application, or if they need access to it. The information on this tab is filled
automatically.
The Support information tab provides users with additional information about who to contact for
technical support. By default, this is a reference to the IT-department. For applications controlled
by application managers, the tab shows the names of the application managers and suggests the
user could contact one of these.
If Time Restrictions apply to the selected application, Personalize My Workspace includes the
Opening times tab where users can see the days and times when the application can be used.
Where to find PowerHelp
What
Where
PowerHelp
In the user's session: Start menu > PowerHelp
136
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Configuring Access Control for Workspace Preferences, PowerHelp, Printing
Preferences and Refresh Start menu
If you want to configure access control for the Personalize My Workspace, PowerHelp, Printing
Preferences and Refresh Start menu options, you need to disable them and offer them as separate
applications.
In the RES ONE Workspace Console at Composition > Desktop > Lockdown > Workspace Composer,
the options "Always hide PowerHelp", "Always hide Personalize My Workspace", "Always hide
Refresh in menu", and "Always hide RES ONE Workspace Settings submenu in menu" should be
enabled to disallow access to these applications.
Now create the following applications and configure Access Control as needed:
Personalize My Workspace
Program
%PROGRAMFILES%\RES Software\Workspace Manager\pfwsmgr.exe
PowerHelp
Program
%PROGRAMFILES%\RES Software\Workspace Manager\pwrhelp.exe
Printing Preferences
Program
%PROGRAMFILES%\RES Software\Workspace Manager\setprint.exe
Refresh
Program
%PROGRAMFILES%\RES Software\Workspace Manager\pwrgate.exe
parameters: -2
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
137
Chapter 4: Dynamic Configuration
Making Control Panel Applets (CPL files) available as applications
When the Windows control panel is disabled in RES ONE Workspace, it is impossible for users to
access any setting from the control panel. It is possible, however, to enable certain settings from
the control panel to users and make them available as application.
Creating a new application with rundll32.exe and the appropriate parameter
The following are valid control panel property page and wizard launch statements that will initiate
the various control panel applets, and may also include the ability to specify the active tab on
multiple-tabbed property pages. Some systems may not have all the control panel applets or related
applications installed; those systems executing the statement produce no result.
To make a Control Panel applet available create a new application in the RES ONE Workspace
Console with %systemroot%\windows\rundll32.exe and the appropriate parameter.
Examples:
Power Management Properties
Module
POWERCFG.CPL
Command:
%systemroot%\rundll32.exe
parameters: Start at startup of RES ONE Workspace on the Startup tab.
result:
Displays the Power Management properties, Power Schemes tab.
Control Panel
Module
CONTROL.EXE
Command:
rundll32.exe shell32.dll,Control_RunDLL
parameters: Start at startup of RES ONE Workspace on the Startup tab.
result:
Displays all the Control Panel icons in an Explorer view.
Accessibility Properties
Module
ACCESS.CPL
Command:
rundll32.exe shell32.dll,Control_RunDLL access.cpl,,5
result:
Displays the Accessibility General properties
Command:
rundll32.exe shell32.dll,Control_RunDLL access.cpl,,1
result:
Displays the Accessibility Keyboard properties
Command:
rundll32.exe shell32.dll,Control_RunDLL access.cpl,,2
result:
Displays the Accessibility Sound properties
Command:
rundll32.exe shell32.dll,Control_RunDLL access.cpl,,3
result:
Displays the Accessibility Display properties
Command:
rundll32.exe shell32.dll,Control_RunDLL access.cpl,,4
result:
Displays the Accessibility Mouse properties
138
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Add New Hardware Wizard
Module
SYSDM.CPL
Command:
rundll32.exe shell32.dll,Control_RunDLL sysdm.cpl @1
result:
Runs the Add New Hardware wizard
Safely Remove Hardware
Command
line:
%windir%/system32/rundll.exe
Working
Directory:
%windir%/system32
Parameters: shell32.dll,Control_RunDLL hotplug.dll
Add New Printer Wizard
Module
SHELL32.DLL
Command:
rundll32.exe shell32.dll,SHHelpShortcuts_RunDLL AddPrinter
result:
Runs the Add New Printer wizard
Note
With Windows NT, it is possible to bring up a predefined Windows Dialog box for connecting to a network printer - the
ConnectToPrinterDlg API. However, this dialog is not accessible by Visual Basic programs running under Windows 95.
Therefore, you must use a Command line equivalent statement to invoke the "Add Printer Wizard" under Windows 95 as
detailed above.
Add/Remove Programs Property Page
Module
APPWIZ.CPL
Command:
rundll32.exe shell32.dll,Control_RunDLL appwiz.cpl,,1
result:
Displays the Install/Uninstall tab selected
Command:
rundll32.exe shell32.dll,Control_RunDLL appwiz.cpl,,2
result:
Displays the Windows Setup tab selected
Command:
rundll32.exe shell32.dll,Control_RunDLL appwiz.cpl,,3
result:
Displays the Startup Disk tab selected
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
139
Chapter 4: Dynamic Configuration
Briefcase
Module
SYNCUI.DLL
Command:
rundll32.exe syncui.dll,Briefcase_Create
result:
Creates a new Briefcase on the desktop
Copy Disk Dialog
Module
DISKCOPY.DLL
Command:
rundll32.exe diskcopy.dll,DiskCopyRunDll
result:
Displays the Copy Disk dialog for removable media
Create New Shortcut
Module
APPWIZ.CPL
Command:
rundll32.exe apwiz.cpl,NewLinkHere %1
result:
Displays the Create New Shortcut dialog. Completing the filename in the dialog
creates a shortcut at the location specified by %1
Date & Time Properties
Module
TIMEDATE.CPL
Command:
rundll32.exe shell32.dll,Control_RunDLL timedate.cpl,,0
result:
Displays Set Date & Time properties tab
Command:
rundll32.exe shell32.dll,Control_RunDLL timedate.cpl,,1
result:
Displays the Time Zone properties tab
Dial Up Networking (DUN)
Module
RNAUI.DLL
Command:
rundll32.exe rnaui.dll,RnaDial {name of connection to establish}
result:
Displays the Connect To dialog for the passed connection. If connected, displays the
connection status dialog.
Command:
rundll32.exe rnaui.dll,RnaWizard
result:
Displays the Dial Up Networking Connection Wizard
140
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Display Options (Standard Windows Display Property Page)
Module
DESK.CPL
Command:
rundll32.exe shell32.dll,Control_RunDLL desk.cpl,,0
result:
Displays the Background tab selected
Command:
rundll32.exe shell32.dll,Control_RunDLL desk.cpl,,1
result:
Displays the Screen Saver tab selected
Command:
rundll32.exe shell32.dll,Control_RunDLL desk.cpl,,2
result:
Displays the Appearance tab selected
Command:
rundll32.exe shell32.dll,Control_RunDLL desk.cpl,,3
result:
Displays the Settings tab selected
Note
Display options
Your video adapter may install other property pages into DESK.CPL dynamically when selected with its own icon (i.e an ATI or
Matrox control panel icon). Additionally, it also may invoke its own control panel applet mimicking the Windows display
options.
FindFast
Module
FINDFAST.CPL
Command:
rundll32.exe shell32.dll,Control_RunDLL findfast.cpl
result:
Displays the Office FindFast control panel applet (if installed)
Fonts
Module
SHELL32.DLL
Command:
rundll32.exe shell32.dll,SHHelpShortcuts_RunDLL FontsFolder
result:
Displays the Fonts Folder in Explorer view
Command:
rundll32.exe shell32.dll,Control_RunDLL main.cpl @3
result:
Also displays the Fonts Folder in Explorer view
Format Drive Dialog (floppy disk only)
Module
SHELL32.DLL
Command:
rundll32.exe shell32.dll,SHFormatDrive
result:
Displays the floppy disk Format Drive dialog. Causes the Drive A to be accessed on
showing.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
141
Chapter 4: Dynamic Configuration
Game Controllers
Module
JOY.CPL
Command:
rundll32.exe shell32.dll,Control_RunDLL joy.cpl,,0
result:
Displays the Game Controllers General property page
Command:
rundll32.exe shell32.dll,Control_RunDLL joy.cpl,,1
result:
Displays the Game Controllers Advanced property page
HTML
Module
MSHTML.DLL
Command:
rundll32.exe mshtml.dll,PrintHTML (HTML doc to print)
result:
Sends the passed file to the printer
Internet Explorer 4 Control Panel
Module
INETCPL.CPL
Command:
rundll32.exe shell32.dll,Control_RunDLL inetcpl.cpl
result:
Displays Internet Properties, General Tab
Command:
rundll32.exe shell32.dll,Control_RunDLL inetcpl.cpl,,0
result:
Displays Internet Properties, General Tab (same as above)
Command:
rundll32.exe shell32.dll,Control_RunDLL inetcpl.cpl,,1
result:
Displays Internet Properties, Security Tab
Command:
rundll32.exe shell32.dll,Control_RunDLL inetcpl.cpl,,2
result:
Displays Internet Properties, Content Tab
Command:
rundll32.exe shell32.dll,Control_RunDLL inetcpl.cpl,,3
result:
Displays the Internet Control Panel, Connection Tab
Command:
rundll32.exe shell32.dll,Control_RunDLL inetcpl.cpl,,4
result:
Displays the Internet Control Panel, Programs Tab
Command:
rundll32.exe shell32.dll,Control_RunDLL inetcpl.cpl,,5
result:
Displays the Internet Control Panel, Advanced Tab
Joystick Properties (also see Games)
Module
JOY.CPL
Command:
rundll32.exe shell32.dll,Control_RunDLL joy.cpl
result:
Displays the Joystick property page
142
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Mail and Fax Options
Module
MLCFG32.CPL
Command:
rundll32.exe shell32.dll,Control_RunDLL mlcfg32.cpl
result:
Displays the Microsoft Exchange Profiles general property page
Mail Postoffice Options
Module
WGPOCPL.CPL
Command:
rundll32.exe shell32.dll,Control_RunDLL wgpocpl.cpl
result:
Displays the Microsoft Postoffice Workgroup Admin property page
Main Group Options/Properties
Module
MAIN.CPL
Command:
rundll32.exe shell32.dll,Control_RunDLL main.cpl @0
result:
Displays Mouse Properties
Command:
rundll32.exe shell32.dll,Control_RunDLL main.cpl @1
result:
Displays Keyboard Properties, Speed tab
Command:
rundll32.exe shell32.dll,Control_RunDLL main.cpl @1,,1
result:
Displays Keyboard Properties, Language tab
Command:
rundll32.exe shell32.dll,Control_RunDLL main.cpl @1,,2
result:
Displays Keyboard Properties, General tab
Command:
rundll32.exe shell32.dll,Control_RunDLL main.cpl @2
result:
Displays the Printers Folder (including Add Printer)
Command:
rundll32.exe shell32.dll,Control_RunDLL main.cpl @3
result:
Displays the Fonts Folder in Explorer view
Command:
rundll32.exe shell32.dll,Control_RunDLL main.cpl @4
result:
Displays Power Management Properties
Modem
Module
MODEM.CPL
Command:
rundll32.exe shell32.dll,Control_RunDLL modem.cpl,,add
result:
Runs the Add New Modem wizard
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
143
Chapter 4: Dynamic Configuration
Multimedia & Sound Properties
Module
MMSYS.CPL
Command:
rundll32.exe shell32.dll,Control_RunDLL mmsys.cpl,,0
result:
Displays the Multimedia/Audio property page
Command:
rundll32.exe shell32.dll,Control_RunDLL mmsys.cpl,,1
result:
Displays the Multimedia/Video property page
Command:
rundll32.exe shell32.dll,Control_RunDLL mmsys.cpl,,2
result:
Displays the Multimedia/MIDI property page
Command:
rundll32.exe shell32.dll,Control_RunDLL mmsys.cpl,,3
result:
Displays the Multimedia/CD Music property page
Command:
rundll32.exe shell32.dll,Control_RunDLL mmsys.cpl,,4
result:
Displays the Multimedia/Advanced property page
Command:
rundll32.exe shell32.dll,Control_RunDLL mmsys.cpl @1
result:
Displays the Sound Properties page
Network Properties
Module
NETCPL.CPL
Command:
rundll32.exe shell32.dll,Control_RunDLL netcpl.cpl
result:
Displays the Networks properties, Configuration tab
ODBC32 Data Source Administrator
Module
ODBCCP32.CPL
Command:
rundll32.exe shell32.dll,Control_RunDLL odbccp32.cpl
result:
Displays the ODBC32 Data Source Administrator properties dialog
Open With
Module
SHELL32.DLL
Command:
rundll32.exe shell32.dll,OpenAs_RunDLL {drive:\path\filename}
result:
Displays the application/file "Open With" dialog
result:
Passing the full file drive, path and name as a parameter will cause the dialog to
display the line "Click the program you want to use to open the file `{ filename}`".
144
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Passwords Properties
Module
PASSWORD.CPL
Command:
rundll32.exe shell32.dll,Control_RunDLL password.cpl
result:
Displays the Passwords properties, Change Passwords tab
Power Management Properties
Module
POWERCFG.CPL
Command:
rundll32.exe shell32.dll,Control_RunDLL powercfg.cpl
result:
Displays the Power Management properties, Power Schemes tab
Printer
Module
SHELL32.DLL
Command:
rundll32.exe shell32.dll,SHHelpShortcuts_RunDLL PrintersFolder
result:
Displays the Printers Folder (including Add Printer)
Command:
rundll32.exe shell32.dll,Control_RunDLL main.cpl @2
result:
Also displays the Printers Folder (including Add Printer)
Regional Settings
Module
INTL.CPL
Command:
rundll32.exe shell32.dll,Control_RunDLL intl.cpl,,0
result:
Displays the Regional Settings property page
Command:
rundll32.exe shell32.dll,Control_RunDLL intl.cpl,,1
result:
Displays the Numbers property page
Command:
rundll32.exe shell32.dll,Control_RunDLL intl.cpl,,2
result:
Displays the Currency property page
Command:
rundll32.exe shell32.dll,Control_RunDLL intl.cpl,,3
result:
Displays the Time property page
Command:
rundll32.exe shell32.dll,Control_RunDLL intl.cpl,,4
result:
Displays the Date property page
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
145
Chapter 4: Dynamic Configuration
Screensaver Installation
Module
APPWIZ.CPL
Command:
rundll32.exe desk.cpl,InstallScreenSaver C:\win\system\Flying
Windows.scr
result:
Installs the new screensaver and runs the display/screensaver preview property page
Note
Specify a valid path to the screen saver file to install. If you are installing a new screen saver, first copy the screen saver file
into the \windows\system folder, then execute the above command. This will install the specified saver as the current screen
saver. It will not copy the file into the windows\system folder. Replace the string above with the name of your actual .scr
file.
System Properties
Module
SYSDM.CPL
Command:
rundll32.exe shell32.dll,Control_RunDLL sysdm.cpl,,0
result:
Displays the General property page
Command:
rundll32.exe shell32.dll,Control_RunDLL sysdm.cpl,,1
result:
Displays the Device Manager property page
Command:
rundll32.exe shell32.dll,Control_RunDLL sysdm.cpl,,2
result:
Displays the Hardware Profiles property page
Command:
rundll32.exe shell32.dll,Control_RunDLL sysdm.cpl,,3
result:
Displays the Performance property page
Shutdown
Module
USER.EXE
Command:
rundll32.exe user.exe,restartwindows
result:
Forces Windows to perform a proper shutdown, and restart the computer
Command:
rundll32.exe user.exe,exitwindows
result:
Forces Windows to shutdown, and wait either to be turned off, or reset
Telephony Properties
Module
TELEPHON.CPL
Command:
rundll32.exe shell32.dll,Control_RunDLL telephon.cpl users
result:
Displays the Dialing Properties dialog.
146
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Themes
Module
THEMES.CPL
Command:
rundll32.exe shell32.dll,Control_RunDLL themes.cpl
result:
Displays the Themes control panel app (if installed)
Themes
Module
TweakUI
Command:
rundll32.exe shell32.dll,Control_RunDLL tweakui.cpl
result:
Displays the TweakUI control panel applet (if installed)
Note
Some dialogs may not work in the RES ONE Workspace shell because they need the presence of explorer.exe.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
147
Chapter 4: Dynamic Configuration
Disabling various tabs on Control Panel applets
It is possible to disable tabs on Control Panel applets to limit the view on these applets. An easy
way to do this is to add a Registry Key to the application.
Example:
If you want to make the desk.cpl applet available for your users, but only want the resolution
change screen to be available, create a new application in the RES ONE Workspace Console.
Display Options
Module
DESK.CPL
Command:
%systemroot%\windows\rundll32.exe shell32.dll,Control_RunDLL desk.cpl,,0
Parameter:
shell32.dll,Control_RunDLL desk.cpl
Now add the following Registry keys to this application by editing the (managed) application and
selecting Configuration > Actions > User Registry Setting:
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
@=""
"NoDispScrSavPage"=dword:00000001
"NoDispBackgroundPage"=dword:00000001
"NoVisualStyleChoice"=dword:00000001
"NoDispAppearancePage"=dword:00000001
"NoColorChoice"=dword:00000001
This will only make the resolution change screen of the DESK.CPL applet visible.
A list of policy settings which can be used to disable various components can be found at
http://www.microsoft.com/downloads.
148
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Directory Maintenance
The Directory Maintenance technology can be used for preparing and maintaining users' home and
profile directories.
Directory Maintenance is divided into a User Home Directory node and a User Profile Directory
node. Both nodes allow you to configure a model or template of the files and folders that should be
present on or copied to the user's home directory and/or the user's profile directory.
Where to find Directory Maintenance
What
Where
Global level
Composition > Actions By Type > Files and Folders > User Home /
Profile Directory
Application level
Open the application at Composition > Applications, go to
Configuration > Actions
Configuring Directory Maintenance
The User Home Directory and User Profile Directory nodes consist of two tabs:

The Files tabs: these tabs allow you to configure the model directories of RES ONE Workspace.
They provide an Explorer-like view of the model directories, files and subfolders. A model
directory contains all folders and resources that you can use when configuring the contents of
the user's home directory or profile directory.

The Actions tabs: these tabs allow you to configure the contents of the user's home directory
and profile directory, based on your selection of folders and resources from the model
directories.
Specify the user's home directory drive (User Home Directory > Actions)
Select the drive in the Default home drive field on the Settings tab:

When Resolve home drive from Active Directory is selected, RES ONE Workspace will first try
to retrieve the user's home drive letter from the Active Directory User Profile Properties.

When Use %reshomedrive% if available is selected, RES ONE Workspace will create exceptions
to the default Drive to home directory setting by using the %reshomedrive% environment
variable.
The Overview in the users Workspace Analysis Details also shows the Home Directory and Profile
Directory rules that apply to the user.
Configure Settings (Actions tabs)

When configuring the settings of a file or folder, you can replace its name with the username.
This is useful if you want to copy a file or folder with the same name as the user's logon name to
the user's home directory.

By specifying an alias for the object, the original object name will be overwritten when it is
copied to the home directory of a user. This is useful if the home directory of a user should
contain a specific object whose values depend on the group membership of the user.

Select which action should be taken in the Action field, depending on whether you selected a
folder or a file the Object field. When specifying an Action for a file, the option Set specific
values in INI-file allows you to configure INI file values. After configuring INI-file values, select
Run once if these values should be set only once.

Required connection state specifies the required connection state that allows the setting to be
applied. For example, this allows you to configure a setting that will only be applied if a
computer has an online connection state.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
149
Chapter 4: Dynamic Configuration
Configure Model Directories (Files tabs)

Click the Files tab of the User Home Directory or User Profile Directory node, depending on
the directory that you want to configure.

Select the folder to which you want to add a folder or User resource and click New. This will
open the Select File(s)/Folder(s) window, which allows you to select and add folders and
resources to the model directory.
Select or browse to the file or folder that you want to add and click OK. The selected file or folder
will be added to the Model directory folder of the Home Directory or Profile Directory node,
depending on your selection in step 1. You can only use these files and folders to configure the
user's Home Directory and Profile Directory.
Examples
Configuration of Actions

When configuring the settings of a resource, the option Replace with %username% allows you
to replace the name of the resource with the username. This is useful if you want to copy a file
or folder with the same name as the user's logon name to the user's home directory.
For example, if you want to copy a log file to the home directory of users Jackson, Greene and
Smith, make sure that the model directory contains the files jackson.log, greene.log, and
smith.log. When these users then log on, the correct files with their login name will be copied
to their home directory. This means that you do not need to create an entry for each individual
user (jackson.log, greene.log, smith.log), but can create one entry with %username%.log
instead.

By specifying an alias for the resource, the original resource name will be overwritten when it is
copied to the home directory of a user. This is useful if the home directory of a user should
contain a specific resource whose values depend on the group membership of the user.
The administrator of D-Energy has added two .ini files to the model directory of Home
Directory Maintenance, app_group1.ini and app_group2.ini.

app_group1.ini has value "green".

app_group2.ini has value "blue".

If user petersent logs on, who belongs to group 1, app_group1.ini should be copied to his
home directory and renamed to app.ini

If user williamsj logs on, who belongs to group 2, app_group2.ini should be copied to his
home directory and renamed to app.ini
You can configure this by specifying the alias "app.ini" for both files. This ensures that the
home directory of user petersent will contain an app.ini file with value "green" and the
home directory of user williamsj will contain an app.ini file with value "blue".
150
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
4.5
Actions
Use Actions to configure global actions, or specific actions for an application. Global actions are
executed at the start of the user session, when the user session is refreshed or reconnected and
when network connectivity changes. Application actions are executed when a user launches an
application. Application actions will be invoked whenever a started application is managed by RES
ONE Workspace. This is the case if the application is started from the Start Menu or when the
application is started by a configured File Type. Applications are not managed by RES ONE
Workspace if they are started from a command prompt, directly started from the Windows Explorer
or from the run command. This can be prevented by selecting Only RES ONE Workspace is allowed
to launch this application at the Security > Authorized Files tab of the application.
The user's Event Log will be appended with the results of the applied settings. You can view the
contents of this Event Log in the Workspace Analysis window of this user.
Actions can also be configured on a global level.

The behavior of Actions for Applications is identical to the before mentioned options, except:

Hide Drive behavior is not available in Drive Mappings.

The option Set as default printer for Network Printers is mandatory, but this will not reset
the user's preference. The next time the user logs on, the preferred default printer will be
restored. The user will also be notified of this event by his Printing Preferences tool.

The Fast Connect option is not available for Network Printers.
It is possible to Move and Duplicate settings related to Actions. This makes it possible to:

duplicate application settings and move them from one application to another

duplicate application settings and move them to a global level

duplicate global settings and move them to an application
Please note that executing an action on session reconnect requires a RES ONE Workspace refresh.
Therefore, when configuring actions to be executed at session reconnect, make sure the option Do
not refresh Workspace when reconnecting to a session is not enabled (at Composition >
Lockdown and Behavior, in the Workspace Composer section).
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
151
Chapter 4: Dynamic Configuration
Drive and Port Mappings
It is possible to create drive and port mappings based on all previously mentioned types of access
control.
There may be hundreds of network locations and ports (lpt/com) available: rather than browse a list
every time you need a specific one, you can "map" it. This sets your machine to connect to it when
you log in and treat it like one of its own disk drives or ports.
Where to find Drive and Port Mappings
What
Where
Global level
Composition > Actions By Type > Files and Folders > Drive and Port
Mappings
Composition > Actions By Event > At Logon, select New > Drive and
Port Mapping
Application level
Open the application at Composition > Applications, go to
Configuration > Actions
Configuring Drive and Port Mappings
Global settings

Disconnect all network drives before logging on/off cleans the user's profile from userconnected and disabled drives.

Skip unmanaged drives can only be selected when the option Disconnect all network drives
before logging on/off is enabled. Only network drives that are managed by RES ONE Workspace
will be disconnected, all other drives will not be touched. With an unmanaged drive, a drive is
meant that has no managed equivalent in RES ONE Workspace. If both a managed and an
unmanaged version of a drive exist, the unmanaged version will be replaced by a managed
version after logging off/on.

Refresh Drive and Port Mappings when network connectivity changes allows you to refresh
Drive Mappings automatically when the network connectivity of a session changes. This ensures
that connection state-dependent Drive Mappings become available or disappear correctly.
Drive and port mappings will not be refreshed if the Lockdown and Behavior option Do not
refresh Workspace when network connectivity changes is selected (at Composition > Desktop
> Lockdown and Behavior).

Also connect all network drives using VDX plugin. Drive mappings that are configured for the
remote desktop can be set as local drive mappings too. This setting enables the user to access
the same drives from local desktop and from virtual desktop using the VDX plugin.

You can override the global settings of this feature for specific Workspace Containers.
152
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Mapping settings

Optionally enter a note in the Administrative note field. This is useful to differentiate the
mappings that you configured.

Action:



Map drive: Default; perform drive mapping

Disconnect drive mapping: Disconnect an existing (non-RES ONE Workspace) mapping.

Do not perform mapping operation: Do not perform the actual mapping, but do set other
options, such as setting a friendly name. This setting is also useful when configuring hide
drive behavior for existing local drives.

Set RES HyperDrive: perform drive mapping to an existing RES HyperDrive as specified in
RES HyperDrive Fileserver name. This setting is only available if RES HyperDrive
integration is enabled (at Setup > Integration > RES Software > RES HyperDrive). When
selecting this setting, unavailable settings for this mapping are greyed out.
The Device field specifies which drive letter should be used for the mapping.

If you select Do not use a drive letter, RES ONE Workspace will not expose the drive letter
when a mapped network resource should be available for the user.

If you select Find first free drive letter, RES ONE Workspace will find the first available
drive letter when mapping a network drive, starting down from "Z:".
The Hide drive field specifies the hide drives behavior of the mapping. Hidden drives are not
available to end users and are also blocked in Windows Explorer-type dialogs.

If you select Default, the default hide drives behavior for Drive and Port Mappings will be
applied.

If you select Always hide, but allow access, the drive will be hidden without blocking it.
This can be useful for removable media that cause a delay in application startup or File
Open/Save dialogs.

Fast connect allows users to start their sessions faster. Do not select this option if the drive
contains applications: until the user accesses the drive, the drive will not be available, which
means that any applications on the drive will not be available either.

When selecting the option Fast connect, the option Wait for task to finish before continuing
becomes unavailable, because the actual mapping will first be performed when the user
connects to the drive.

When clearing the option Wait for task to finish before continuing the option Fast connect
becomes unavailable, because the task will be performed asynchronously.

The Required connection state field specifies the required connection state that allows the
setting to be applied. For example, this allows you to configure a setting that will only be
applied if a computer has an online connection state.

Click the Access Control tab to configure the Access Control criteria of the mapping.

Click the Workspace Control tab to configure to which Workspace Container(s) the mapping
applies.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
153
Chapter 4: Dynamic Configuration
Notes

You can use environment variables (for example, %username%).

For additional security, Drive and Port mappings can also direct the drive mapping to a resource, without the
user knowing the username or password.

On Microsoft Windows Vista or later, Drive and Port Mappings also allow mappings to WebDAV web folders, which
start with "http://" or "https://" instead of "\\server\share".

WebDAV mappings to RES HyperDrives connect to the Fileserver without the use of the RES HyperDrive
Client. As a result, files and folders are not cached locally.

Use the Workspace Analysis window to display an overview of all mappings and their hide drive settings for a
specific user.

When different friendly names are configured for drive letters that are mapped to the same share, the last
configured friendly name will be used for all these drive mappings.
Default Hide drives behavior
Hidden drives are also blocked in Windows Explorer-type dialogs.

Disabled: No default hide drives behavior is configured.

Never hide any drives: Overrides any hide drive settings in Drive and Port Mappings.

Do not hide any drives (unless otherwise specified): Default behavior is to show all drives.
This setting is overruled by any hidden drives configured with Drive and Port Mappings.

Hide all drives (unless otherwise specified): Default behavior is to hide all drives. This setting
is overruled by any drives configured to be shown with Drive and Port Mappings.

Never Hide Home Drive is selected by default. If selected, the user's home folder will never be
hidden, regardless of the Hide Drives setting of individual mappings.
154
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Create a drive mapping using information from Active Directory
Active Directory stores information about users as user properties, and Active Directory user
properties can be looked up using the $adinfo function. This makes it possible, for example, to
base a drive mapping on a user's home directory as stored in Active Directory.
To set this up, configure an environment variable that uses the function $adinfo(homedirectory)
to set its value based on the user's home directory information in Active Directory; and then map
the directory on the basis of this environment variable.
For example:


At Composition > Actions By Type > Environment Variables, create an environment variable.

Give it a name (for example, HomeDrive)

In the Value field, enter: $adinfo(HOMEDIRECTORY)
At Composition > Actions By Type > Files and Folders > Drive and Port Mappings, create a
drive mapping

In the Share name field, enter: %HomeDrive%
Result: when a user starts a session, the path stored in that user's Active Directory property Home
folder is set as the value for the environment variable %HomeDrive%; and then the directory is
mapped on the basis of this path as taken from the Active Directory.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
155
Chapter 4: Dynamic Configuration
Drive Substitutes
For some (legacy) applications it may still be necessary to use a fixed drive letter. You can
substitute drives to create the drive needed. You can do this by using the Drive Substitutes option.
You can set the drive substitute to be dependent on connection state. For example, when working
with a laptop, the mapping should only be set if the user is connected to the network. This means
the required state must be on-line connection. If the mapping is not set to be connection statedependent, it will be set permanently.
Where to find Drive Substitutes
What
Where
Global level
Composition > Actions By Type > Files and Folders > Drive
Substitutes
Composition > Actions By Event > At Logon, select New > Drive and
Port Mapping
Application level
Open the application at Composition > Applications, go to
Configuration > Actions
Configuring Drive Substitutes

At Composition > Actions By Type > Files and Folders > Drive Substitutes, the option Refresh
Drive Substitutes when network connectivity changes allows you to refresh Drive Substitutes
automatically when the network connectivity of a session changes. This ensures that connection
state-dependent Drive Substitutes become available or disappear correctly.

You can override the global settings of this feature for specific Workspace Containers.

When configuring a drive substitute, you can optionally enter a note in the Administrative note
field. This is useful to differentiate the substitutes that you configured.

When specifying the hide drives behavior for a drive substitute, the option Always hide, but
allow access will hide drives, but they are still available to users that need access to them. This
is useful, for example, for local floppy disks. If a local floppy disk is not hidden, this can
seriously slow down the initial appearance of Windows Explorer or file dialog windows. You can
change the default behavior for all drive substitutes if necessary.

The field Physical drive and path specifies the physical drive and path to the drive that will be
substituted for the virtual drive that you selected in the field Virtual drive.

The Required connection state field specifies the required connection state that allows the
setting to be applied. For example, this allows you to configure a setting that will only be
applied if a computer has an online connection state.

When a session starts, the applicable drive substitutes are set in the order in which they appear
in this list. If necessary, change the order to ensure the correct processing.

Click the Access Control tab to configure the Access Control criteria of the drive substitute.

Click the Workspace Control tab to configure to which Workspace Container(s) the drive
substitute applies.
156
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Folder Redirection
At Composition > Actions By Type > Files and Folders > Folder Redirection, you can configure the
redirection of Microsoft Windows User Shell Folders. Folder redirection enables the administrator to
redirect the location of certain folders of the user profile to a different path, such as a shared
network location. For example, the local folder C:\Users\<username>\My Documents can be
redirected to a different Target folder location (e.g. <networkshare>\Users\<username>\My
Documents). Up till now, folder redirection could only be done by creating a User Registry Setting or
by defining a GPO. If the folder does not exist in the target location of the user session, it will be
created automatically, if possible in the user context.
Some of the advantages of folder redirection are:

user documents are available from any computer

helps to reduce logon and logoff times (data is stored outside the user profile)

reduces the risk of profile corruption

increased security and availability of user data (safe storage and recovery on network location)
The following folders can be redirected:
Folder on
Microsoft
Windows Vista
and higher
Folder on
Microsoft
Windows XP
Description
Appdata
Application Data Default location for user application data and binaries (hidden
folder)
Contacts
Not applicable*
Default location for users' Contacts
Desktop
Desktop
Desktop items, including files and shortcuts
Documents
My Documents
Default location for all user created documents
Downloads
Not applicable*
Default location to save all downloaded content
Favorites
Favorites
Internet Explorer Favorites
Links
Not applicable*
Contains Windows Explorer Favorite Links
Music
My Music
Default location for user’s music files
Pictures
My Pictures
Default location for user’s picture files
Saved Games
Not applicable*
Used for Saved Games
Searches
Not applicable*
Default location for saved searches
Start Menu
Start Menu
Default location for Start Menu
Videos
My Videos
Default location for user’s video files
* Microsoft Windows XP and before will not recognize these folder redirections.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
157
Chapter 4: Dynamic Configuration
Configuration of Redirections

The Redirections tab shows the redirected folders, for example, Favorites may be redirected
to <networkshare>\Users\<username>\Favorites. If several Folder Redirections have been
configured, you can change the order in which the redirections will be carried out by clicking
Change order of execution and using the arrow up and down icons.

Select the Windows folder which must be redirected in the user session. See the table above
for possible folders for redirection and the OS version to which they apply.

Specify for Target folder location, the required type of folder redirection and applicable Root
path. When specifying the Root path, keep in mind that this applies to the user session
environment. For example, a network location that is accessible to an administrator, is not
necessarily also accessible to the user.

Redirect to the following location

Specify a full network path for Root path. Example:
\\server\Redirection\%username%\<foldername>.

Create a folder for each user under the Root path


Specify a network path without %username%\<foldername> for Root path.
Example: for a redirection of the Documents folder, specifying \\server\Redirection
for Root path, for user John, this folder will be redirected to
\\server\Redirection\John\Documents.
Redirect to the local user profile location

%USERPROFILE%\ is automatically specified for Root path. This value cannot be changed.

Move the contents to the new location - Select this option to perform a one-time move of the
contents of the specified Windows folder to the Root path (target folder location). When
changing the Root path, the content of the current root path will be moved to the new root
path. This is also a one-time move.
Please note that if this option is selected for an existing folder redirection in a RES ONE
Workspace environment without changing the Root path, the one-time move will not be
executed for users that logged on, at least once, to a RES ONE Workspace user session. The
original content in the Windows folder will remain there. When changing the Root path at a
later stage will cause the contents of the redirected folder in the initial root path to be moved
to the new root path.

Make the contents available offline - Select this option if the contents of the redirected
Windows folder should be made available offline (using the Microsoft Windows technology
"Offline files and folders"). At session logon, redirected Windows folders are synchronized for
offline use to the Offline Files cache. When this option is not selected, RES ONE Workspace will
clean up the Offline Files cache for the configured redirected Windows folder.
For this option to work correctly, Microsoft Windows must be configured for Offline Files and
disk space for the Offline Files cache must be sufficient.

The Required connection state field specifies the required connection state that allows folder
redirection. For example, this allows you to configure folder redirection that will only take
place if a computer is online. See Connection State Settings.

Click the Access Control tab to configure the Access Control criteria of the Folder Redirection.

Click the Workspace Control tab to configure to which Workspace Container(s) the Folder
Redirection applies.
158
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Configuration of Settings

Shows whether Folder redirection has been enabled or disabled.

With the option Use localized names for redirected Windows folders selected, when an
Operating System is set to any other language than English, the redirected folder is displayed in
the local language of the system the user session is running on.

You can override the global settings of this feature for specific Workspace Containers.
Notes

With Folder Redirection, a backup is made of pre-existing folder redirections for that user and this backup is
restored at the end of the user session. This is done because otherwise when, for example, a user is placed in a
different Workspace Container, he/she could get invalid folder reference(s) due to Folder Redirection.

When there are User Registry actions that are already configured, enabling Folder redirection will prompt a
message that these actions may override Folder Redirections and need to be checked. For example, you may
have a registry setting for the Folder Redirection for Citrix Servers, which applies to the Workspace Container
Citrix Servers, which may conflict with other Folder Redirections. In this case, you have to be careful configuring
a redirection for Citrix Servers in Composition > Actions By Type > Files and Folders > Folder Redirection as it
will be overridden by the User Registry action.

When using Folder Redirection, User Profile Directory Maintenance can no longer be used to manage the
contents of these redirected folders, because they are no longer part of the user profile. When a folder is
redirected to the user's home drive, you can use User Home Directory Maintenance to manage the contents of
the folder.

Start Menu will be redirected along with AppData, unless:

Start Menu itself has been configured for Folder Redirection

Start Menu has already been redirected by means of a GPO to a different path from AppData (also, for
Microsoft Windows Vista and later, child shell folders of AppData will also be redirected)

Not all contents of the original Start Menu folder will be copied to the redirected location. Shortcuts from the
section All Users of the local PC Profile will be copied to the redirected Start Menu. The personal part of the
profile will, however, not be copied. If you want to keep this, you will have to copy it manually.

When configuring the RES ONE Workspace option Package delivery mode for Microsoft App-V 5 packages with
Minimal (per user) or Full (per user), the feature Folder Redirection for the Windows folder AppData, is not
supported.
Examples
Folder Redirection versus User Profile Directory
These can be confusing as both can be used to manage user-dependent files. In most cases, a
combination of Folder Redirection and User Profile Directory maintenance will be necessary. For
example, an application or application plug-in may need some configuration settings from the local
User Profile, but you want to store the user settings on a network drive at logoff for security
reasons. Define the file containing the user settings as an object at Composition > Actions By Type
> Files and Folders > User Profile Directory. Redirect the AppData folder to a network drive via
Composition > Actions By Type > Files and Folders > Folder redirection. This way, the application
can start up and the user settings are stored safely.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
159
Chapter 4: Dynamic Configuration
Folder Synchronization
Users often work from a variety of locations, and in each location they access, create, change and
delete files and folders. This may lead to problems if users are unable to find the correct documents
because they have different sets of documents, or different document versions, in different
workspaces.
Use Folder Synchronization to solve this by synchronizing the files in two designated folders, in
order to ensure that the correct set of files and folders is available in the user's workspace.

Configure global Folder Synchronization actions to synchronize the contents of folders that
should be up to date when a RES ONE Workspace session starts, ends, refreshes or reconnects or
at specific intervals.

Home folders are an example of folders that should be synchronized with a global Folder
Synchronization action.

Configure application Folder Synchronization actions to synchronize the contents of folders that
should be up to date when a specific application starts or ends.
Folder Synchronization: global or application-based

Configure global Folder Synchronization actions to synchronize the contents of folders that
should be up to date when a RES ONE Workspace session starts, ends, refreshes, reconnects or
at specific intervals. Home folders are an example of folders that should be synchronized with a
global Folder Synchronization action.

Configure application Folder Synchronization actions to synchronize the contents of folders that
should be up to date when a specific application starts or ends.
Where to find Folder Synchronization
What
Where
Global level
Composition > Actions By Type > Files and Folders > Folder
Synchronization
Composition > Actions By Event > At Logon, select New > Folder
Synchronization
Composition > Actions By Event > At Session Refresh, select New >
Folder Synchronization
Composition > Actions By Event > At Session Reconnect, select New
> Folder Synchronization
Composition > Actions By Event > At Logoff, select New > Folder
Synchronization
Application level
Open the application at Composition > Applications, go to
Configuration > Actions
Prerequisites
Microsoft .NET Framework 4.0 and Microsoft Sync Framework 2.1 must be installed on all Agents
running user sessions in which folders are to be synchronized. Microsoft .NET Framework 4.0 must
be installed separately; Microsoft Sync Framework 2.1 is automatically installed during installation
of RES ONE Workspace. Both folders must be accessible in the user's workspace. For one-way
synchronization, the user must have write permissions on the local folder. For two-way
synchronization, the user must have write permissions on both folders.
160
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Configuring folder synchronization

On the Properties tab, you can choose to include or exclude read-only files, hidden files and
system files. With two-way synchronization (Direction: Both), files deleted in one folder are
also deleted in the other location. With single-direction synchronization Direction: Upload, files
deleted locally will also be deleted from the remote location and with Direction: Download,
files deleted from the remote location will also be deleted locally after synchronization.

Optionally, on the Filters tab, you can filter a Folder Synchronization action to include only
specific files (for example, D-Energy.ppt) or file types (for example *.ppt), and/or to exclude
specific files, file types and folders.

You can use the wildcard characters * and ? in the fields Files to include and Files to exclude.

Separate multiple entries in the fields Files to include and Files to exclude with a semi-colon
(;).

You can specify folders that should be excluded by entering the location in the Folder field and
clicking Add.

To exclude a folder that is located in another folder, enter the full path. For example, if you
only specify "temp", the folder "temp" in the root of the sync folder will be excluded; "temp"
folders in other folders will not be excluded.

The Required connection state field specifies the required connection state that allows
synchronization. For example, this allows you to configure synchronization that will only take
place if a computer is on-line.

By default, files that are overwritten or deleted during the synchronization process are moved
to the user's Recycle Bin, so that they remain available for recovery. This safety measure can be
turned off if it is not necessary.

Click the Access Control tab to configure the Access Control criteria of the Folder
Synchronization.

Click the Workspace Control tab to configure to which Workspace Container(s) the Folder
Synchronization applies.
Examples
Use Folder Synchronization to:

synchronize local and network folders. Folder Synchronization will ensure that both folders have
the same contents by adding new files and folders, removing deleted files and folders, and
overwriting old file versions. This is particularly useful in cases where a user has a home
directory on a share as well as a local home directory, for example on a laptop. This is achieved
with the Direction: Both.

download files and folders from the network to local computers. Folder Synchronization will add
new files and folders from the network location to the local computer, and will overwrite old
file versions. This can be useful for a network folder that users also need to access when they
are working locally, for example a folder containing standard forms or presentations. This is
achieved with the Direction: Download.

upload local files and folders to the network. Folder Synchronization will add new files and
folders from the local computer to the network location, and will overwrite old file versions.
This can be useful if a user creates files locally that need to be made available on the network,
for example as output of an authoring application that publishes to a local folder. This is
achieved with the Direction: Upload.
For example, the technical writers at D-Energy use an authoring tool to create, maintain and
publish product documentation. The tool publishes documents to a local folder, and the writers
must remember to manually copy the updated output to a central network folder where other
people and processes can always access the latest version. This process can be automated using an
application-level Folder Synchronization action that uploads the contents of the local folder to the
network folder whenever the writer closes the authoring tool.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
161
Chapter 4: Dynamic Configuration
Printers
Depending on the physical location of the desktop or laptop, different printers should be available
to the user. You can use Composition > Actions By Type > Printers to achieve this.
You can set a printer as the default printer for the selected type of access control. It is also
possible to define a backup printer for process-critical printing situations. To do this, enable the
Failover option.
The RES ONE Workspace Workspace Composer shows a simple list of available printers, and so helps
the user to select a default printer or open a Print Status window. The user can even set a default
printer based on his work location. You can also allow the user to connect to additional printers.
Where to find Printers
What
Where
Global level
Composition > Actions By Type > Printers
Application level
Open the application at Composition > Applications, go to
Configuration > Actions
Configuring printers

If you select Force mandatory default printer (reset default printer during each logon), the
advanced options in the user's "Printing Preferences" will be disabled. Although the end user will
be able to set a different printer as default within a session, the centrally configured default
printer will be reset at the start of each new session.

Allow users to choose default printer per location, based on:

162

IP network address for all Agents - When a default printer is set in a user session, it is
stored by RES ONE Workspace based on IP network address.

IP network address for laptop Agents, ClientName for all other Agents - When a default
printer is set in a user session, for laptops, it is stored by RES ONE Workspace based on IP
network address, and for workstations based on Client name.

Locations and Devices (use Zones for location based printing) - When a Zone that has been
configured for location based printing applies to a RES ONE Workspace session, the user will
be allowed to select a default printer for that specific location. For every following RES ONE
Workspace session to which this same Zone applies, the previously selected printer is set as
default. Enabling this option allows the configuration of location based printing both for
managed and unmanaged printers.
Please note, that at least one Zone for location based printing must apply to a user session
to enable the user to select a default printer for that location. Zones can be configured for
location based printing by enabling the new option Use this Zone for location based
printing on the Properties tab of the Zone (at User Context > Locations and Devices). It is
recommended that Zones for location based printing are configured in a way, that a user
only belongs to one such Zone at a time. If a user belongs to multiple Zones for location
based printing at the same time, this may lead to unexpected behavior. Per session only one
Zone for location based printing will be taken into account, but the Zone may differ for a
next session.
At Diagnostics > Event Log, location based printing entries will be logged (i.e. Zone used
for location based printing, Other Zone(s) configured for location based printing, No Zone
configured for location based printing).
Also connect default / all printer(s) using VDX plugin also connects printers from the remote
session in your local desktop. This allows, for instance to use a printer from your virtual desktop
on your local desktop or in an application that is configured as a workspace extension (i.e. that
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
runs from your local desktop). If Connect default printer using VDX plugin is enabled, the
default printer of your virtual desktop will be used as default printer in your workspace
extensions. If this option is not selected, the default printer of your local desktop will be used.
Disconnect network printers:

Before logging off, RES ONE Workspace will clean the user profile from user-connected and
disabled printers. If you clear the check box Disconnect network printers before logging
off, these settings will be preserved in the user's profile.

Before logging on or on reconnect, RES ONE Workspace will clean the user profile from
user-connected and disabled printers. If you clear the check box Disconnect network
printers before logging on or on reconnect, these settings will be preserved in the user's
profile.

Skip unmanaged printers: Within RES ONE Workspace, an unmanaged printers is a printer
that does not have a managed equivalent in a RES ONE Workspace session. If both a
managed and an unmanaged version of a printer exist, the unmanaged version will be
replaced by a managed version after logging on. When this option is enabled, only network
printers that are managed by RES ONE Workspace will be disconnected before logon/logoff,
all other printers will not be touched. The advantage of keeping unmanaged printers is, for
instance, when you have defined an unmanaged printer you only use at home, you do not
have to reconnect this printer each time you need it.
Refresh printers:

On reconnect causes RES ONE Workspace to reprocess all Network Printers, to determine
which printers should be connected when a previously disconnected terminal session is
reconnected.

On session refresh causes RES ONE Workspace to reprocess all Network Printers, to
determine which printers should be connected when a user session refreshes.

When network connectivity changes helps workstations and laptops to automatically
reconnect printers when switching from offline network connection to online. To work
properly, the checkbox Do not refresh Workspace when network connectivity changes at
Composition > Desktop > Lockdown and Behavior must be unchecked.

When configuring a network printer, optionally enter a note in the Administrative note field.
This is useful to differentiate the Printers that you configured.

Fast connect allows users to start their sessions faster. The Fast Connect option is not
available for Printers that are configured for an application.

When selecting the option Fast connect, the option Wait for task to finish before continuing
becomes unavailable, because driver checks and permission checks will first be performed when
the user actually connects to the printer.

When clearing the option Wait for task to finish before continuing the option Fast connect
becomes unavailable, because the task will be performed asynchronously.

When specifying whether printing preferences should be preserved, if you select Default, the
default settings as configured in the node Composition > User Settings will be applied. If you
select Never save or Always save, this will overrule the default settings as configured in the
User Settings node. The option Set as default printer for Printers is mandatory when
configuring a printer for an application, but this will not reset the user's preference. The next
time the user logs on, the preferred default printer will be restored. The user will also be
notified of this event by the "Printing preferences" tool.

The option Failover allows you to configure a backup printer that the user can connect to if it is
not possible to connect to the primary printer, for example because the specified printer driver
is unknown or if the print server is unavailable.

The Required connection state field specifies the required connection state that allows the
setting to be applied. For example, this allows you to configure a setting that will only be
applied if a computer has an on-line connection state.

Click the Access Control tab to configure the Access Control criteria of the Printer.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
163
Chapter 4: Dynamic Configuration

Click the Workspace Control tab to configure to which Workspace Container(s) the Printer
applies.

When a session starts, the applicable printers are set in the order in which they appear in this
list. If necessary, change the order to ensure the correct processing.
Tip
Sometimes the message "Composing default printer" appears in the Startup screen, although a default printer was defined.
This is caused by the fact that the workstation cannot access the printer due to missing user credentials. In RES ONE
Workspace user credentials cannot be defined for printers. A possible workaround is to define a drive mapping to the same
network location (or subdirectory) with the proper user credentials. Any driveletter can be assigned. This will speed up the
connection to the printer considerably.
164
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Using Locations and Devices for Printers
Because printers are usually used per location, you can use Zones / Workspace Containers to set
up printers. By creating Zones / Workspace Containers you can set up printers per location. It has
the advantage that for instance mobile users will automatically connect to the right printer when
using a mobile computer at different locations.
Configure Zones for different IP ranges if your users use roaming workplaces or when multiple
branches of your company share the same print server.
Location based printing - example
Configuration
Configure Zones for location based printing, based on, for example, IP address range


At User Context > Locations and Devices, create a Zone "ABC" with the following settings:

On the Properties tab, enable Use this Zone for location based printing.

On the Rules tab, add a Rule based on Computer IP address range (Computer > IP address >
IP address range) between 10.0.0.51 - 10.0.0.60.
At User Context > Locations and Devices, create a Zone "XYZ", with the following settings:

On the Properties tab, enable Use this Zone for location based printing.

On the Rules tab, add a Rule based on Computer IP address range (Computer > IP address >
IP address range) between 10.0.0.61 - 10.0.0.70.
Allow users to choose a default printer per location based on Zones

At Composition > Actions By Type > Printers, on the Settings tab, select Allow users to
choose default printer per location, based on.

Select Location and Devices (use Zones for location based printing).
Available printers

In a RES ONE Workspace session, multiple printers are available.
Result
When a user logs on to a RES ONE Workspace session from a computer with IP address 10.0.0.59, the
user can choose a default printer for this location from the list of available printers. This printer
will then be the user's default printer for every session where his computer has an IP address in the
range of Zone "ABC" (10.0.0.51 - 10.0.0.60).
When the user logs on to a RES ONE Workspace session from a computer with IP address 10.0.0.62,
he can choose a (different) default printer for that location from the list of available printers. This
printer will then be the user's default printer for every session where his computer has an IP address
in the range of Zone "XYZ" (10.0.0.61 - 10.0.0.70).
When the user logs on to a RES ONE Workspace session from a computer with IP address 10.0.0.95,
he is not able to choose a default printer specifically for that location, but he may choose a default
printer for all other locations. This printer will then be the user's default printer for every session
where his computer has an IP address not in the range of Zones "ABC" or "XYZ". The user may also
choose not to register a default printer.
Tip
In a user session, a default printer can be configured at Start > RES ONE Workspace Settings > Printing Preferences, by
clicking the Advanced button in the Printing Preferences window.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
165
Chapter 4: Dynamic Configuration
User Registry
With the User Registry technology it is possible is to set up registry keys and policies for (groups of)
users, based on their specific situations and needs. For example, it is possible to set registry
settings based on the selection of the user's RES ONE Workspace language.
Registry keys (HKCU) can be imported and exported, which facilitates entering or changing registry
keys. If you select the Run once option when implementing a registry setting, it will only be applied
the first time a user logs on.
Documentation on registry keys can be found at various locations. Registry keys changing Windows
settings can be found in the Windows Resource Kit. Documentation on application registry settings
may be harder to find, since not all applications provide documentation regarding registry settings.
Contact the application vendor for more information.
Policies
User Registry also supports Windows policy files (.adm) in the registry section. When adding a new
policy template, first select a policy file to base the template on.
Where to find User Registry
What
Where
Global level
Composition > Actions By Type > User Registry
Composition > Actions By Event > At Logon, select New > User
Registry Setting or User Registry Policy
Application level
Open the application at Composition > Applications, go to
Configuration > Actions
Configuring Registry Settings
Configuration

Click New Registry, this will open the New registry settings window.

Click the Properties tab.
166

Enter the name of the registry setting in the Name field.

Optionally enter a note in the Administrative note field. This is useful to differentiate the
registry settings that you configured.

To enable the registry setting, select Enabled.

Select Run once to limit implementation of the registry setting to a user's first startup.

Select Ignore registry redirection (on 64-bit operating systems) to map the registry value
(new or modified) to the path specified by the user. If this option is not selected, the
registry value may be mapped to a location under Wow6432Node on a 64-bit operating
system.

In the Required connection state field, select the required connection state that allows the
setting to be applied. For example, this allows you to configure a setting that will only be
applied if a computer has an online connection state. See Connection State Settings.

Right-click HKEY_CURRENT_USER and select an action from the Registry section. The first
five actions are explained based on an example where HKEY_CURRENT_USER is the
subtree, SOFTWARE is the key and RES is the subkey
(HKEY_CURRENT_USER\SOFTWARE\RES).
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
How to add a registry subkey

Right-click HKEY_CURRENT_USER.

Click Open HKEY_CURRENT_USER. This will open the Pick keys/values from registry window.

Expand HKEY_CURRENT_USER and SOFTWARE.

Select RES and click New.

Click Close to close the Pick keys/values from registry window.
How to add a new subkey to an existing subkey

In the New registry setting window, expand HKEY_CURRENT_USER and SOFTWARE.

Right-click the RES subkey.

Point to New and click Key.

Enter TestSubkey in the folder that is added and press ENTER.
How to add or change a registry subkey value
How to add a new string value

In the New registry setting window, expand HKEY_CURRENT_USER, SOFTWARE and RES.

Right-click the TestSubkey subkey.

Point to New and click String Value.

Enter TestString and press ENTER.
How to edit the value of a subkey

Right-click the value that you just added.

Click Modify. This opens the Edit String window.

Enter 1 in the Value data field.

Enter "This is a test value" in the Administrative Note field. This field can be used to describe
the function of the registry value. If you create an Instant Report of the registry setting, any
annotations will be included.

Click OK.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
167
Chapter 4: Dynamic Configuration
You can add the following registry subkey values:
Value
Function
String Value
Adds a string value. Most information about hardware components is
stored as binary data and shown in hexadecimal format.
Expandable String Value
Adds a variable-length string value. This data type includes
variables that will be resolved when an application or service uses
the data.
Multiple String Value
Adds a multiple string value. In general, this type is used for values
that contain lists or multiple values in a form. Separate multiple
values with spaces, commas or other marks.
Binary Value
Adds a binary value. This data type is generated by hardware device
drivers and the physical devices it controls. It is shown in
hexadecimal format as a binary value.
DWORD Value
Adds a DWORD value. This data type is a number of 4 bytes long
(32-bit integer). Many parameters for device drivers and services
are this type and are shown in binary, hexadecimal or decimal
format.
QWORD Value
Adds a QWORD value. This data type is a number that is a 64-bit
integer. It is shown as a binary value.
NONE Value
Adds a value without any particular type. It is written to the
registry by the system or applications and is displayed in
hexadecimal format as a binary value.
How to rename a registry subkey or value

Expand HKEY_CURRENT_USER, SOFTWARE and RES.

Right-click the TestSubkey key.

Click Rename.

Enter RESTest and press ENTER.
How to convert a registry value to a registry value of a different type

In the New registry setting window, right-click the TestSubkey subkey.

Point to Convert to and click Expandable String Value. This will convert the TestSubkey from a
string value to an expandable string value. You can only convert string values, expandable string
values and multiple string values to values of these types.
How to remove a registry subkey or value
How to remove the value from a subkey in the registry

Expand HKEY_CURRENT_USER, SOFTWARE and RES.

Select the RESTest subkey.

Right-click the TestString value and click Toggle "remove this value". This will remove the
value from the registry subkey in the registry.
How to remove a subkey from the registry

Expand HKEY_CURRENT_USER, SOFTWARE and RES.

Right-click the RESTest subkey and click Toggle "remove this value". This will remove the
registry subkey and its underlying values from the registry.
168
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
How to delete a subkey

Expand HKEY_CURRENT_USER, SOFTWARE and RES.

Select the RESTest subkey.

Right-click the TestString value and click Delete.

Click Yes to confirm that you want to delete the value.
Registry Tracing
When you make changes to the preferences of an application, these are usually stored as a registry
setting in HKEY_CURRENT_USER. If you want to add these registry settings to Composition > Actions
By Type > User Registry manually, you need to know the exact location of these settings in the
registry. With the functionality Trace registry changes (available from the Action menu when adding
a new User Registry setting), this is not necessary. When tracing the registry changes that are made
by an application's process, you can choose the relevant registry setting(s) from a list of logged
registry changes and convert them to a User Registry setting. This makes it easier to add registry
settings.
You can use registry tracing to configure global User Registry settings, as well as User Registry
settings that are set when a user starts an application.
To use Trace registry changes:

Add or edit a User Registry item (in an application's Configuration section on the Action tab, or
at Composition > Actions By type > User Registry).

Go to Action > Registry > Trace registry changes.

In the Trace registry changes window, the Process field shows the application's command line.
You can change this if necessary, either by typing a process yourself, or by selecting a process
that is currently running.

For processes traced from an application's Configuration section on the Action tab, the button
Run now opens the application with the full RES ONE Workspace configuration, including
settings, etc. For example, if a command is configured as a setting for the application, then this
command will also be executed if you start the application with the Run now button in the
Trace registry changes window.

For processes traced from Composition > Actions By Type > User Registry, the Run now button
starts the selected process as if from the command prompt.

After clicking Start trace, you can go to the application and make the changes to the
preferences you wish to store. The Trace registry changes window will reflect all the registry
changes made by the application.

Click Stop trace when you have changed all the settings you needed to change. Select the check
boxes of the changes that you want to set as a User Registry and click Add.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
169
Chapter 4: Dynamic Configuration
How to import and export registry keys
How to import registry files

Select the folder in which you want to import or export registry files and click Registry in the
menu bar.

Click Import registry file. This will open the Import Registry File window.

Select the registry file and click Open. This will open the Import registry file window.

Select one of the merge options:
Item
Function
Replace existing data
Replaces the existing registry file with the imported
registry file.
Perform incremental merge with existing
data
Adds the data in the imported registry file to those in
the existing registry file.
Perform differential merge with existing
data
Replaces only those data in the existing registry file
that differs from the imported registry file.
How to export registry files

Select the registry file that you want to export and click Registry in the menu bar.

Click Export registry file. This will open the Export Registry File window.

Select the location, enter a name for the file and click Save.
Toggle Remove
In RES ONE Workspace it is also possible to remove specific registry keys and/or values from a user
profile, each time User Registry is executed. To achieve this, create a User Registry object that
contains the keys and values that should be deleted from the user profile:

Select the registry key or value you want to delete.

Right-click the specific key or value.

Select Toggle - remove this key and subkeys or select Toggle - remove this value.
Language Identity
It is also possible to link a registry key setting to a language setting, allowing an application to start
in the user's preferred language (which can be selected on the Options tab of the "Workspace
Preferences" tool). This functionality is beneficial for multilingual businesses. However, the
application must be able to change a language setting using a registry setting.
Configuring registry policies
When you select a policy file, its contents will be displayed and you can set new policies. If a policy
requires additional data, a detailed policy window is displayed in which you can type data. When
typing textual data in this window, it is possible to use variables such as "%username%" or
"%homedrive%".
You can specify the order in which registry files and policies should be processed with the Change
order of execution option.
When policies have been set (switched on or off), the menu item View resulting registry in the
Policy window enables you to view the registry keys and values that result from the policies. It is
also possible to export these keys and values to a registry file for later use.
170
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
The policy template will be copied to the Datastore, which allows it to be used at all times and on
all servers.

Click New Policy, this will open the Select ADM file window.

Select the policy file on which the template will be based. You can select ADM files and ADMX
files, which are XML-based.

Alternatively, click Add or Remove to add or remove ADM(X) files.

Click OK. This will open the New registry setting (based on <ADM file>) window.

Click the Properties tab.


Enter the name of the registry setting in the Name field.

Optionally enter a note in the Administrative note field.

To enable the registry setting, select Enabled.

Select Run once to limit implementation of the registry setting to a user's first startup.

Expand the contents of the ADM file.

Double-click a setting to view its details or right-click the setting and click Explanation to
view an explanation of the setting.
Click the Access Control tab to configure the Access Control criteria of the registry setting.
Click the Workspace Control tab to configure to which Workspace Container(s) the registry setting
applies.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
171
Chapter 4: Dynamic Configuration
Execute Command
At the Execute Command section you can start external non-RES ONE Workspace tasks or
applications when a user logs on or off.
This can be anything from an enterprise-wide questionnaire application to a simple cleanup task.
Where to find Execute Command
What
Where
Global level
Composition > Actions By Type > Execute Command
Composition > Actions By Event > At Logon, select New > Execute
Command
Composition > Actions By Event > At Session Refresh, select New >
Execute Command
Composition > Actions By Event > At Session Reconnect, select New
> Execute Command
Composition > Actions By Event > At Logoff, select New > Execute
Command
Application level
Open the application at Composition > Applications, go to
Configuration > Actions
Configuring commands

When configuring a command, the option Run Hidden runs the command hidden from the user.

RES ONE Workspace can detect whether the command has run before for that user, on that
computer, or for the combination of that user on that computer. In the Run once field, you can
configure whether the command should be executed or skipped depending on this information:

Select Run once to execute the command only if it has not yet been executed for the user
starting the session.

Clear Run once to execute the command regardless of whether it has been executed before.

If you need to repeat an existing command that has been configured to Run once, select Clear
history. If you select Clear history, the history of the command will be cleared and the
command will be repeated once.

If a command has been configured to run at logoff, the option Wait for task to finish before
continuing will always be selected. Specify a timeout in seconds to ensure RES ONE Workspace
does not wait if the task is unable to finish.

Required connection state specifies the required connection state that allows the command to
be executed. For example, this allows you to configure a command that only synchronizes user
files between a laptop and the network if the laptop has an online connection state. See
Connection State Settings ("Connection States" on page 76).

For App-V applications, the option Run outside App-V virtual environment is available. This
allows the command that was configured for the application to run outside the App-V bubble of
that application.

On the Script tab you can directly enter script contents. Enter (only) %script% in the command
line on the Properties tab, to refer to the script tab content. Note that the correct file
extension of the script is entered on the Script tab.
172
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration

It is not possible to execute a Visual Basic- or PowerShell-script in combination with only the
%script% variable in the command line. In that case, use the following in the command
line:

To execute Visual Basic-scripts use cscript.exe %script%.

To execute PowerShell-scripts use PowerShell.exe %script%.

Click the Access Control tab to configure the Access Control criteria of the command.

Click the Workspace Control tab to configure to which Workspace Container(s) the command
applies.
Notes

The option Execute Command can be Run using Dynamic Privileges. This means that the task will run
"elevated", using Administrative Privileges, while maintaining default privileges for the user. The option Run
using Dynamic Privileges is part of the functionality of the Adaptive Security module and therefore is only
available if this module is included in your license. For full details, please refer to the RES ONE Workspace
Module Comparison Chart available on the RES Software website.

When configuring a Command as a script, the value entered as Administrative note (on the Properties tab of the
Command) will be displayed in the User Event Log (at Diagnostics > User Sessions or at Diagnostics >
Workspace Analysis) and in trace files. If no value was entered, %script% will be displayed.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
173
Chapter 4: Dynamic Configuration
Microsoft System Center Configuration Manager Software Distributions
At Composition > Actions By Type > Microsoft ConfigMgr, you can view and configure Microsoft
System Center Configuration Manager software distributions. This allows you to deploy software
distributions of Applications and Packages in the user workspace.
You can only configure Microsoft Configuration Manager software distributions if you have enabled
Microsoft System Center in the Setup menu and are connected to a Microsoft System Center
Configuration Management Server.
Software distribution Configuration
To add a software distribution that should run when a session starts, go to Composition > Actions
By Type > Microsoft ConfigMgr. See RES ONE Workspace Help for configuration settings.

You can override the global settings of this feature for specific Workspace Containers.
Configuring software distributions for Applications
To add a software distribution that should run when an application starts, open the application at
Composition > Applications and go to Configuration > Actions. Configuring these software
distributions is the same as on global level.

If the Wait for action to finish before continuing has been enabled for a software distribution
on an application, a notification is displayed in the user session if a user starts the application
and the deployment starts. This notification window presents the user the option to select
Dismiss and notify me when done, which allows him to continue working with already available
applications while the Software Distribution is deployed.
Note
You can easily move Actions from one application to another; from an application to global; and from global to a specific
application. To do so, right-click one or more selected Actions and choose Move.
174
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
LANDesk
At Composition > Actions By Type > LANDesk, you can view and configure LANDesk software
distributions. This allows you to deploy software in the user workspace.
You can only configure LANDesk software distributions if you have enabled LANDesk in the Setup
menu and are connected to a MBSDK Web Service.
Software distribution Configuration
To add a software distribution that should run when a session starts, go to Composition > Actions
By Type > LANDesk. See RES ONE Workspace Help for configuration settings.

You can override the global settings of this feature for specific Workspace Containers.
Configuring software distributions for Applications
To add a software distribution that should run when an application starts, open the application at
Composition > Applications and go to Configuration > Actions. Configuring these software
distributions is the same as on global level.

If the Wait for action to finish before continuing has been enabled for a software distribution
on an application, a notification is displayed in the user session if a user starts the application
and the Package is deployed. This notification window allows the user to select Dismiss and
notify me when done which allows the user to continue working with already available
applications while the Package is deployed.
Note
You can easily move Actions from one application to another; from an application to global; and from global to a specific
application. To do so, right-click one or more selected Actions and choose Move.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
175
Chapter 4: Dynamic Configuration
Automation Tasks
Automation Tasks allow you to run specific RES ONE Automation Tasks in the user workspace, such
as the installation of software or the creation of user profiles. RES ONE Workspace will run these
Tasks during the logon process of a user.
You can only configure RES ONE Automation Tasks if you have enabled RES ONE Automation
Integration at Setup > Integration > RES Software > RES ONE Automation and are connected to a
RES ONE Automation Datastore.
Where to find Automation Tasks
What
Where
Global level
Composition > Actions By Type > Automation Tasks
Composition > Actions By Event > At Logon, select New >
Automation Task
Application level
Open the application at Composition > Applications, go to
Configuration > Actions
Configuring Automation Tasks

To configure an Automation Task that should run when a session starts, go to Composition >
Actions By Type > Automation Tasks.

To configure an Automation Task that should run when an application starts, open the
application at Composition > Applications and go to Configuration > Actions.

You can override the global settings of this feature for specific Workspace Containers.

When configuring an Automation Task, optionally enter a note in the Administrative note field.
This is useful to differentiate the Automation Tasks that you configured.

Click
in the Task field to load the available RES ONE Automation Projects and Modules from
the RES ONE Automation environment that you specified at Setup > Integration > RES Software
> RES ONE Automation. This allows you to select the RES ONE Automation Projects or Modules
that should be part of the RES ONE Automation Task.

Skip if application executable was found (only available on application level) when selected, a
check will be done whether the application executable is present on the client computer before
the task is executed. When the option is not selected, the task is executed as configured when
the application is started.

RES ONE Workspace can detect whether the Automation Task has run before for that user, on
that computer, or for the combination of that user on that computer. In the Run once field, you
can configure whether the Task should be executed or skipped when a user starts the
application:
176

No: the Automation Task will be executed, irrespective of whether it has been executed
before.

Per user: the Automation Task will be executed once for each user who logs on to the RES
ONE Workspace environment.

Per computer: the Automation Task will be executed once for each computer in to the RES
ONE Workspace environment.

Per user per computer: the Automation Task will be executed once for each user who logs
on to the RES ONE Workspace environment on a specific computer.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration

If you need to repeat an existing Automation Task that has been configured to Run once, select
Clear history. This resets the count, so that the existing Automation Task is executed again
throughout the environment, according to the rules selected for Run once.

When you configure a custom message, you can communicate additional information about the
Automation Task to the user.

Wait for task to finish before continuing forces RES ONE Workspace to finish the task before
continuing with the next Task. Clear this check box to force RES ONE Workspace to continue
with the next Task if the Task does not complete. It can be useful to select this option when you
have configured a custom message: this allows the user some additional time to read this
message. However, if the Automation Task has not started before the specified timeout expires,
the Task will be canceled.

Run before other actions makes it possible to specify that the Automation Task should be
executed before other configuration Actions (except Environment Variable Actions). At
application level, an Automation Task that is configured to Run before other actions will
appear on top of the list of Actions on the Actions tab; The option Run before other actions
will automatically be selected or cleared again when moving an Automation Task in the list by
using the arrows.

Required connection state specifies the required connection state that allows the Task to be
executed. For example, this allows you to configure a Task that only runs if the laptop has an
online connection state.

Click the Parameters tab to view which parameters will be used in the Automation Task. This
tab is only available if the selected RES ONE Automation Project or Module contains parameters.

Click the Access Control tab to configure the Access Control criteria of the Automation Task.

Click the Workspace Control tab to configure to which Workspace Container(s) the Automation
Task applies.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
177
Chapter 4: Dynamic Configuration
Environment Variables
Environment Variables are variables set in the memory of the user's workstation or session.
These variables are often used by applications, for example to determine who a user is and what his
default path structures are; or what the system date and time is. The option Environment Variables
enables you to set or modify environment variables based on various types of access control.
Windows provides several useful variables, such as user name and computer name. You can use
these variables in your values by using the percentage character (for example %username% and
%computername%).
You can modify the order of execution by setting an order number in the order column. You can
change the order by selecting the option Change order of execution.
Where to find Environment Variables
What
Where
Global level
Composition > Actions By Type > Environment Variables
Composition > Actions By Event > At Logon, select New >
Environment Variable
Application level
Open the application at Composition > Applications, go to
Configuration > Actions
Configuring Environment Variables

To configure an Environment Variable that should be set when a session starts, go to
Composition > Actions By Type > Environment Variables.

To configure an Environment Variable that should be set when an application starts, open the
application at Applications and go to Configuration > Actions.

At Composition > Actions By Type > Environment Variables, the option Reset Environment
Variables on refresh of workspace allows you to reset Environment Variables on a refresh of
the user workspace. This ensures that connection state-dependent Environment Variables are
resolved correctly.

You can override the global settings of this feature for specific Workspace Containers.

When configuring an Environment Variable, optionally enter a note in the Administrative note
field. This is useful to differentiate the variables that you configured.

In the Value field, you can use Microsoft Windows environment variables and the functions
$adinfo(<property>), $usershellfolder(<folder>), $substring, $endstring,
$lowercase, $uppercase and $autocount.

When a session starts, the applicable Environment Variables are set in the order in which they
appear in this list. If necessary, change the order to ensure the correct processing.

The Required connection state field specifies the required connection state that allows the
setting to be applied. For example, this allows you to configure a setting that will only be
applied if a computer has an online connection state.

Click the Access Control tab to configure the Access Control criteria of the environment
variable.

Click the Workspace Control tab to configure to which Workspace Container(s) the environment
variable applies.
178
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Example
You can use the %deskpic% variable to display a custom desktop picture for a specific (group of)
user(s). The variable contains the file name of the picture to be displayed on the desktop, which
must exist as desktop image resources. When RES ONE Workspace is started, this variable applies to
each user that is member of the Non-management group, and places the Non_mgmnt_back.bmp
picture on his desktop.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
179
Chapter 4: Dynamic Configuration
Linked Actions
When configuring Actions for applications it is possible to add Linked Actions. When adding a linked
action the only configuration to be made is selecting the source application, containing the actions
to be used.
This allows, for example, creating an application with a default set of Actions and linking various
other applications to that source application, thereby making it unnecessary to create multiple
applications and creating the same set of Actions for each application.
Where to find Linked Actions
What
Where
Application level
Open the application at Composition > Applications, go to
Configuration > Actions
Configuring linked actions
Linked Actions - It is possible to implement the Actions configured for another application. When
adding a linked action the only configuration to be made is selecting the source application,
containing the actions to be used.
Linked Actions Restrictions

Execution of "Linked Actions" is restricted based on:

The Access Control set on the Actions configured for the source Managed Application

The Workspace Control set on the Actions configured for the source Managed Application.

Access Control configured for the source Managed Application is ignored.

Workspace Control configured for the source Managed Application is ignored.

Actions with the setting "Run Once" should only run once for each user, even if several
applications reference the same Action.
Linked Actions Relationships

Managed applications are allowed to link to multiple managed source applications.

Multiple managed Applications (targets) are allowed to link to a single managed source
application.

Linked Actions are not allowed to link to any managed application which itself has "Linked
Actions" Actions to another managed application.

Managed Applications are not allowed to link to the same managed source application more
than once.
180
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
4.6
Desktop
You can configure settings options concerning the appearance and the lockdown of the end user's
workspace in the RES ONE Workspace Console at Composition > Desktop.
These settings include:

Shell

Background

Lockdown and behavior

Screensaver
Where to find Desktop
What
Where
Desktop
Composition > Desktop
Shell
At the Shell node you can define which shell should be used: the RES ONE Workspace shell or the
(RES ONE Workspace-managed) Microsoft Windows shell. A few of the properties of the RES ONE
Workspace shell are:

Users do not have to attend a course every time Microsoft releases a new version of Windows.

One company look and feel, regardless of the Windows version used.

It provides additional menu- and application-related information for the users.

Upgrading to a new Windows version poses no stress for users and administrators.

It does not make use of explorer.exe which might be needed by some applications, but is less
uniform (e.g. it allows the usage of themes).
In the Microsoft Windows Shell, dragging and dropping items on the desktop or in the QuickLaunch
area will be detected by the Workspace Preferences tool. This enables coexistence of both RES
ONE Workspace shortcuts and document shortcuts. Users can customize their shortcuts in the
Taskbar Settings window or with the Workspace Preferences tool.
When a user switches from the RES ONE Workspace Shell to the Microsoft Windows Shell, all
configured settings will be remembered by both shells. When the RES ONE Workspace session ends
and the Microsoft Windows Shell was used, all original settings will be restored in the profile of the
user.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
181
Chapter 4: Dynamic Configuration
Background
In the Desktop background picture section you can:

Select a picture (for example, your company logo) as well as the placement of that picture. The
Microsoft Windows Microsoft Shell supports BMP and JPG formats for the desktop. The RES ONE
Workspace Shell supports BMP, GIF, ICO, JPG formats. Make sure all bitmaps are available as
desktop picture resources. If you do not select a picture, the standard RES ONE Workspace logo
will be used.

In a session running on an operating system that does not support the configured Picture
placement, the system reverts to an alternative picture placement. On Windows 8 and
later, the alternative is Center; on Windows Vista and earlier it is Stretched.

With the option Use %deskpic% environment variable to determine picture file name, you
can configure different desktop pictures in different contexts. See Environment Variables
(on page 177) for more information. See the RES ONE Workspace Help for configuration
details.

The picture that is used with the variable is stored in the resources and is therefore
always available.
In the Default desktop colors section you can select a default background and text color for your
environment. To force the desktop colors in user sessions, the Lockdown and Behavior option Hide
"Change Desktop Colors" in Workspace Preferences (forces default colors) must be selected. By
not selecting this option, the desktop colors that the user selects in his "Workspace Preferences"
tool take precedence over the default colors configured at Composition > Desktop > Background.
Note
If the Microsoft Windows Shell is used in combination with a changed Text color at Composition > Desktop > Background,
this will not work with Microsoft Windows Vista and higher.
Lockdown and Behavior
Once the appearance of the Desktop has been set, you can hide/disable/remove specific settings in
order to secure it fully.
Lockdown options can be set related to:

Windows Explorer: hide/disable/remove specific options from the Windows Explorer
application.

Start Menu and Taskbar: hide/disable/remove specific Start Menu and Taskbar options from
either the Windows shell, the RES ONE Workspace shell or both shells.

Workspace Composer: hide/disable/remove options related to the Workspace Composer
(irrespective of the shell used).
Optionally you can enter (part of) a keyword in the Instant Search field to find the setting you
need.
Certain options in Lockdown and Behavior are always evaluated by RES ONE Workspace, even if
Lockdown and Behavior is Disabled.

Options marked with

Options marked with
are only evaluated if Lockdown and Behavior is enabled. If Lockdown
and Behavior is disabled, these options are grayed out.
182
are always evaluated and, if selected, applied.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
The following options are available:
Workspace Composer
Item
Function
Always hide "Log Off" in
context menu
Hides the context menu options “Sign Out” (on Microsoft Windows 8
and up) and “Log Off” (on prior Windows versions).
Always hide "Refresh
Workspace"
Hides this item in the Start Menu and context menus.
Ignore "Autolaunch at
session start" when
starting a published
application session
Prevents applications that are configured to "Autolaunch at session
start" from starting up when starting a published application session.
Do not reload user
information when
refreshing Workspace
Skips reloading user information when a Workspace is refreshed. In
situations where it takes a long time to retrieve a user's group
membership after a refresh, this option may significantly speed up the
refresh of the Workspace.
Do not reload Computer
OU membership
information when
refreshing Workspace

If the option is selected, the option
(Reload user information)
will be added to the Diagnostics tab of the user's Workspace
Preferences tool. This enables the user to reload this information
manually.

If you force a refresh of a User Workspace (at Diagnostics > User
Sessions), the Workspace Composer will always reload the user
information, even if the option Do not reload user information
when refreshing Workspace is selected.
Skips reloading computer OU membership information when a
Workspace is refreshed. In situations where it takes a long time to
retrieve a computer's OU membership after a refresh, this option may
significantly speed up the refresh of the Workspace.

If you force a refresh of a User Workspace (at Diagnostics > User
Sessions), the Workspace Composer will always reload the
computer OU membership information, even if the option Do not
reload Computer OU membership information when refreshing
Workspace is selected.

It is recommended to enable this option when there are Zones
based on computer OU membership used in your RES ONE
Workspace environment.
Do not refresh Workspace
after resuming from stand
by or hibernate
Specifies that the workspace should not be refreshed if resuming from
stand by or hibernate.
Do not refresh Workspace
when display properties
change
Specifies that the workspace should not be refreshed if, for example,
an application changes the display properties when starting up.
Normally, a refresh is necessary to reflect these changes.
Do not refresh Workspace
when network
connectivity changes
Specifies that the workspace should not be refreshed if the user
disconnects from the network without using the hibernate or stand by
options.
The availability of applications and settings may depend on the
session's network connectivity, for example if an application requires a
specific connection state. By default, RES ONE Workspace refreshes
the user's Workspace if the network connectivity changes, to reevaluate the connection state and reflect any resulting changes.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
183
Chapter 4: Dynamic Configuration
Item
Function
Do not refresh Workspace
when reconnecting to a
session
Specifies that the workspace should not be refreshed if the user
reconnects to an existing session on a Terminal Server.
The availability of applications and settings may differ at the new
session location, for example as a result of Zones. The default printer
may also be different. A refresh is necessary to re-evaluate the
location and reflect any resulting changes.
Hide main splash screen at Hides the main RES ONE Workspace splash screen, which is normally
session start, end and
shown when a user starts a session, refreshes it, logs off or
refresh
disconnects. This option is not available when configuring exceptions
to the global settings for Workspace Containers; when users start a
session, the main splash screen is shown before RES ONE Workspace
determines which Workspace Containers apply.
Hide mini splash at
application start
Hides the small splash screen, which is normally shown near the
Windows notification area, when a user starts a managed application.
Mark window captions red
if user has local
administrator privileges
Marks title bars if a user is a local administrator.
Maximum number of
automatically started
applications
Limits the number of applications the user can select in the
Workspace Preferences tool to start automatically at the start of a
session.
Notify user about new
applications
Shows a message to the user when new applications have been
installed.
Notify user about not
responding applications
Shows a message to the user when applications do not respond.
Notify user about missing
default printer
Shows a message to the user when the default printer cannot be
found.
Refresh Workspace on USB Forces a refresh of the workspace of the user when he plugs a
storage device change
different USB storage device into his computer. This option only
functions if a rule for a Zone has been configured based on a USB
storage device serial number. It is useful if access or applicability of
specific applications and/or settings depends on the availability of
such a USB storage device serial number. See Adding and editing rules
to a Zone
Start Menu and Taskbar
Item
Function
Always hide "Log Off" in
Start Menu
Hides or grays out the Start Menu options “Sign Out” (on Microsoft
Windows 8 and up) and “Log Off” (on prior Windows versions).
Always hide "PowerHelp"
in menu
Hides this item in the Start Menu. This option is enabled by default for
new Datastore installations of RES ONE Workspace.
Always hide "RES ONE
Hides this item in the Start Menu.
Workspace Access Wizard"
in menu
Always hide "RES ONE
Workspace Console" in
menu for other
Administrative Roles
184
Hides this item in the Start Menu for Administrative Roles other than
technical manager.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Item
Function
Always hide "RES ONE
Workspace Console" in
menu for technical
managers
Hides this item in the Start Menu for technical managers.
Always hide "RES ONE
Workspace Settings"
submenu in menu
Hides this item in the Start Menu.
Always hide "Run..." in
menu
Hides this item from the Start Menu. The Run command is a quick way
to open programs, files, folders, and—when you're connected to the
Internet—websites. This option is only available for technical
managers.
Always hide "Workspace
Preferences" in menu
Hides this item in the Start Menu.
Disable "Shutdown" for all
users on all computers
Disables this item from the Start Menu for all users.
Disable "Shutdown" for
end users on workstations
Disables this item from the Start Menu for specific users. If Disable
"Shutdown" for all users on all computers has been selected, this
option will also be selected and it will not be possible to clear it.
Disable Recent Documents Disables this option from the Start Menu. Recent Documents shows a
History
list of your recently used files on the right side of the Start menu.
Hide "Clock" on taskbar
and in screensaver
Hides this item from the taskbar and the screensaver.
Hide "Disconnect" for end
users on terminal servers

If selected, this option will be hidden on Terminal Server sessions
and on workstations running Microsoft Windows Vista and later.

If not selected, the option will be shown on Terminal Server
sessions and on workstations running Microsoft Windows Vista and
later.

The option is never hidden for Technical Managers.
Hide "Exit" in menu and
protect "Log off" with
password
Hides Exit in the Start Menu and prompts the user for a password when
selecting Log Off.
Hide "Lock desktop" icon
in system tray
Hides the icon that is visible by default in the user's system tray. With
this button the user can lock his desktop with one click.
Hide "Show tasklist" icon
in system tray
Hides the icon that is visible by default in the user's system tray. With
this button the user can see his active applications and switch
between them with one click.
Hide Administrative Tools
Menu
Hides this item in Windows Explorer. Administrative Tools is a folder in
Control Panel that contains tools for system administrators and
advanced users. The tools in the folder might vary depending on which
version of Windows you are using.
Hide computername in
taskbar popup text
Hides the computer name from the tooltip that is displayed when
hovering over the Tasklist icon in the system tray .
Place mouse pointer over
Start button after logon
Places the mouse pointer on the Start button on the task bar when the
user logs on. This option is disabled by default.
NOTE: If you select this option, please ensure that the option Disable
Taskbar Context Menus is cleared (at Desktop Management >
Lockdown > Start Menu and Taskbar under Windows Shell only). If
both these options are selected, users will not be able to log off.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
185
Chapter 4: Dynamic Configuration
Personalization by end user
Item
Function
Hide "Connect/Disconnect
printer" in Printing
Preferences
Hides this item in the Printing Preferences tool.
Enable "Find printers" in
Printing Preferences
When selected, in a user session, when clicking Connect in the
Printing Preferences window, RES ONE Workspace will open the
Microsoft Windows Find Printer window to search for and select a
network printer from Active Directory.
Hide "Change Desktop
Colors" in Workspace
Preferences (forces
default colors)
Hides this item in the Workspace Preferences tool and forces the
default desktop colors of RES ONE Workspace in the user's session. If
you clear this option, the desktop colors that the user selects in his
"Workspace Preferences" tool take precedence over the default colors
of RES ONE Workspace. This means that if you change the default
desktop colors of RES ONE Workspace in the node Desktop >
Background, this will not affect the desktop colors of the user's
session.
Hide "Change Desktop
Hides this item in the Workspace Preferences tool. If not selected,
Background" in Workspace users can select a background picture for their desktop using their
Preferences (forces
Workspace Preferences tool.
default picture)
Limit "Change Desktop
Background" to preconfigured pictures
With this option you can upload pictures and limit the Change
Background function in the user's Workspace Preferences tool to this
list of pictures.
Hide "Change Password" in Hides this item in the Workspace Preferences tool.
Workspace Preferences
Hide "Do not display my
name in the screensaver"
in Workspace Preferences
Hides this item in the Workspace Preferences tool.
Hide "QuickLaunch" in
Workspace Preferences
Hides this item in the Workspace Preferences tool.
Hide "Select applications
If Hide "Select applications to display in Start Menu" in Workspace
to display in Start Menu" in Preferences is selected, users cannot determine the contents of their
Workspace Preferences
Start Menu. Each user's Start Menu simply shows all the available
applications, and the Workspace Preferences tool does not include
the Start Menu tab.
Hide "Pin to Start Menu" in Hides this item in the Workspace Preferences tool.
Workspace Preferences
Hide "Startup" in
Workspace Preferences
Hides this item in the Workspace Preferences tool.
Hide "Swap left and right
mouse button" in
Workspace Preferences
Hides this item in the Workspace Preferences tool.
Hide advanced options in
Printing Preferences
Hides this item for all users in the Printing Preferences tool.
Limit Workspace
Preferences to "Change
Password" and "Change
Desktop Colors"
Removes all other options from the Workspace Preferences tool.
186
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Item
Function
Never hide client printers
in Printing Preferences
When selected, locally configured client printers are displayed in the
Printing Preferences tool in the user's session.
Windows Explorer
Item
Function
Disable Add/Remove
Programs
Disables this item in Windows Explorer.
Disable Control Panel
Disables this item in Windows Explorer. You can use Control Panel to
change settings for Windows. These settings control nearly everything
about how Windows looks and works.
Disable Context Menu on
Desktop and in Windows
Explorer
Disables all menus that are displayed when right-clicking an item.
Hide Computer
Management Option
Hides this item in Windows Explorer. Using Computer Management,
you can perform many tasks, such as monitoring system events,
configuring hard disks, and managing system performance.
Hide Control panel,
Printer and Network
Settings
Hides these items in Windows Explorer.
Hide Internet Explorer
Icon
Hides this icon in Windows Explorer.
Hide My Computer Icon
Hides this icon in Windows Explorer.
Hide My Documents Icon
Hides this icon in Windows Explorer.
Hide My Network Places
Icon
Hides this icon in Windows Explorer. My Network Places is the
network browser feature in Windows Explorer from Windows XP,
Windows Server 2003 Windows 2000 and Windows Me onwards. It
superseded Network Neighborhood in Windows 95, Windows NT 4.0
and Windows 98.
Hide Recycle Bin Icon
Hides this icon in Windows Explorer. Even when the Recycle Bin is
hidden, deleted files are still stored there temporarily until you
choose to permanently delete them or recover them.
Remove "Open With..."
context menu in Windows
Explorer
Removes the option Open With if the user right-clicks a file in
Windows Explorer. If you double-click a file in Windows and it opens in
the wrong software program, you can choose the program you would
prefer to use by selecting the Open with option.
Remove Map and
Disconnect Network Drive
Options
Removes this option in Windows Explorer. A network drive is a file
folder located on a remote computer that has been configured for
sharing over a LAN.
Remove Properties from
My computer
Removes this option in Windows Explorer. You can view a summary of
important information about your computer by opening System in
Control Panel. You can see basic hardware information, such as your
computer's name, and you can change important system settings by
clicking the links in the left pane of System
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
187
Chapter 4: Dynamic Configuration
Microsoft Windows Shell
Item
Function
Automatically Place
Applications in Programs
Menu
Automatically places all application icons in the Programs menu
instead of in submenus.
Disable Drag-and-Drop on
the Start Menu
Disables the dragging-and-dropping of Start Menu items.
Disable Search programs
and Control Panel
(Windows Vista or later)
Disables this option in the Start Menu. Prevents search from listing
programs and Control Panel items. (i.e. limits the results to files and
folders)
Disable Taskbar Context
Menus
Disables the context menu of the Taskbar.
NOTE: If you select this option, please ensure that the option Hide
"Exit" in menu and protect "Log off" with password is cleared. If both
these options are selected, users will not be able to log off.
Enable Windows 8.1 Start In Microsoft Windows 8.1 / 2012 R2, the Classic view of the Start Menu
Menu (Windows 8.1 / 2012 will be used.
R2)
Allow user to toggle
When enabled, the option Show Windows 8.1 Start Menu will become
Windows 8.1 Start Menu in available in the users' Workspace Preferences, on the Options tab,
Workspace Preferences
allowing users to enable or disable the Start Menu.
(Windows 8.1 / 2012 R2)
Go to the desktop instead
of Windows 8 Start screen
after logon (Windows 8.1 /
2012 R2 and up)
In Windows 8, when logging on, users get the Windows 8 Start screen
instead of the more familiar desktop. With this option, you can select
that users by default go to the desktop instead of the Windows 8 Start
screen when logging on.
Allow user to choose
between desktop or
Windows 8 Start screen in
Workspace Preferences
(Windows 8.1 / 2012 R2
and up)
When enabled, the option Go to the desktop instead of Start screen
after logon (Windows 8.1 / 2012 R2 and up) will become available in
the Workspace Preferences tool, on the Options tab, allowing users
to enable or disable going to the desktop when logging on.
Force "Classic Start Menu" Disables the Microsoft Windows XP- or Vista-look Start Menu and forces
(Windows XP or Vista only) the Classic look.
Hide Action center from
Hides the Action Center from the Taskbar. Action Center lists
the Taskbar (Windows 7 or important messages about security and maintenance settings that
later)
need your attention.
Hide desktop icons during
session start and session
refresh
Shows an empty desktop until all icons are in their correct locations.
This eliminates the effect of shifting desktop icons, but it also means
that end users cannot start any applications from their desktop until
the process has finished.
Hide Taskbar Settings on
the Start Menu
Hides these settings on the Start Menu.
Remove Active Desktop
Options from the Settings
Menu
Removes these options from the Start Menu. Active Desktop allows the
user to add HTML content to the desktop. (Internet Explorer 4.0 to
6.x)
Remove Downloads from
Removes this option from the Start Menu. The Downloads folder is the
the Start Menu (Windows 7 default folder in which downloaded files are stored.
only)
188
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Item
Function
Remove Games from the
Start Menu (Windows 7
only)
Removes this option from the Start Menu. The Games folder is the
central repository for games which also offers updates, statistics and
news feeds for games.
Remove Help Option from
the Start Menu
Removes this option from the Start Menu. Windows Help is the built-in
help system for Microsoft Windows.
Remove HomeGroup from Removes this option from the Start Menu. HomeGroup makes it easy to
the Start Menu (Windows 7 share libraries and printers on a home network.
only)
Remove My Documents
from the Start Menu
Removes this option from the Start Menu. My Documents is the central
repository for the user's documents.
Remove My Favorites from Removes this option from the Start Menu. Favorites are links to
the Start Menu
websites that are frequently visited
Remove My Music from the Removes this option from the Start Menu. My Music is the central
Start Menu
repository for the user's music.
Remove My Network
Places from the Start
Menu (Windows XP)
Removes this option from the Start Menu. My Network Places displays
shortcuts to shared computers, printers, and other resources on the
network.
Remove My Pictures from
the Start Menu
Removes this option from the Start Menu. My Pictures is the central
repository for the user's pictures.
Remove Network
Connections from the
Start Menu
Removes this option from the Start Menu. Network Connections
provides connectivity between your computer and the Internet, a
network, or another computer. Connections are created, configured,
stored, and monitored from within the Network Connections folder.
Remove Personal Folder
from the Start Menu
(Windows 7 only)
Removes this option from the Start Menu. The Personal folder contains
all the user personal folders and libraries.
Remove Recent
Documents from the Start
Menu
Removes this option from the Start Menu. Recent documents is a list of
recently used files on the right side of the Start Menu
Remove Recorded TV from Removes this option from the Start Menu. Recorded TV is the default
the Start Menu (Windows 7 public library where tv recordings are stored.
only)
Remove Search link from
the Start Menu
Removes this option from the Start Menu. Search allows you to search
for files and folders, printers, people, and other computers on your
network.
Remove Set Program
Access and Defaults from
the Start Menu
Removes this option from the Start Menu. This option specifies default
programs for certain activities, such as Web browsing or sending email, and which programs are accessible from the Start menu, Desktop
and other locations.
Remove Start Banner on
the Taskbar
Removes the Click here to begin banner from the Taskbar.
Remove Videos from the
Start menu (Windows 7
only)
Removes this Library from the Start Menu. The Videos library is used to
organize and arrange videos.
Remove Windows Security
on Start Menu (Terminal
Server)
Removes this option from the Start Menu. This option allows access to
the Windows NT Security menu.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
189
Chapter 4: Dynamic Configuration
Item
Function
Restrict Changes to Active
Desktop Settings
Prevents changes from being made to the Active Desktop settings.
Active Desktop allows the user to add HTML content to the desktop.
(Internet Explorer 4.0 to 6.x)
Use high quality default
icons instead of custom
icons (Windows Vista or
later)
In Microsoft Windows Vista and higher RES ONE Workspace
automatically uses the high quality icons contained in the application
executables whenever an application is configured to use the default
icon. Check this option to do this for custom icons as well. Note that
after an upgrade from a version prior to RES PowerFuse 2010, all icons
(including the original default icons) will be treated as custom icons.
Use Personalized Menus
Allows the use of personalized menus. In a personalized menu, menu
items that you have used infrequently are hidden. With an arrow at
the bottom a cascade menu is opened that shows you these items.
RES ONE Workspace Shell
Item
Function
Display "Menu" instead of
"Start" on RES ONE
Workspace Shell taskbar
Renames the Start button to Menu.
Display AM/PM in clock on
RES ONE Workspace Shell
taskbar
Changes the time format from 24-hour clock to 12-hour clock.
Disable single-click on RES Disables the possibility to open items on the desktop using a single
ONE Workspace Shell
click.
desktop
Do not show blinking time
in RES ONE Workspace
Shell
Disables the blinking colon in the time display.
Do not show welcome
message after log on
Disables the welcome message that is normally shown when users start
a session. This option is enabled by default for new Datastore
installations of RES ONE Workspace.
Force Microsoft Office
Excel to show open
workbooks on RES ONE
Workspace Shell taskbar
Forces Microsoft Office Excel to show all open workbooks in the
taskbar in separate buttons instead of grouping them.
Force Taskbar on top of
full-screen applications
Forces the Taskbar on top of a full-screen application in sessions that
use the RES ONE Workspace shell.
Hide "Start" button on RES Hides the Start button. This is useful if RES ONE Workspace runs in a
ONE Workspace Shell
kiosk or as a Web Portal.
taskbar
Protect "Emergency Exit"
with password
Protects the emergency exit with a password. The user can access the
emergency exit by double-clicking the upper-right corner of his
desktop. This allows the user to leave a session immediately.
Use the Security window to
protect the emergency exit
of the user session with a
password. When a user uses
the emergency exit, RES
Shows the battery state on the taskbar. The remaining time of the
battery will be shown in a tooltip text (if the laptop works on its
battery). The battery state will only be shown if a battery is detected
by RES ONE Workspace. This option is disabled by default.
190
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Item
Function
ONE Workspace will end the
user session immediately,
without saving application
usage data for the session is
lost. By protecting the
emergency exit with a
password, you can prevent
this situation from
happening.
Show battery state on RES
ONE Workspace Shell
taskbar
Show "Hibernate" in "Exit"
dialog on workstations
Adds this option to the Exit dialog on workstations. It saves an image
of the user's desktop with all open files and documents, before
shutting down the computer. When the user starts the computer
again, his files and documents will be on his desktop exactly as when
he left them. This option does not apply to Terminal Servers.
Show "Restart" in "Exit"
dialog on workstations
Adds this option to the Exit dialog on workstations. It allows the user
to end his session, shut down his computer and then restart it again.
This option does not apply to Terminal Servers.
Show "Stand by" in "Exit"
dialog on workstations
Adds this option to the Exit dialog on workstations. It reduces the
power consumption of a computer by cutting power to hardware
components that are not in use. This allows the user to maintain his
session, while keeping his computer running on low power with data
still in memory. This option does not apply to Terminal Servers.
Use Unicode Font to
display window captions
on RES ONE Workspace
Shell taskbar
Uses Unicode Font instead of non-ANSI characters (e.g. Japanese) in
windows captions. This option is useful if window captions of
application are not shown correctly in the RES ONE Workspace taskbar,
but requires the availability of the Unicode font on the target
computer.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
191
Chapter 4: Dynamic Configuration
Screensaver
At the Screensaver section, you can take control of the screensaver in user sessions. A user then
cannot change its configuration. Next to that, you can set:

A screensaver background image. The Microsoft Shell only supports BMP images for the
screensaver. The RES ONE Workspace Shell supports BMP and other formats. Make sure all
bitmaps are available as screensaver image resources. By clicking the Image button you can add
a picture to the screensaver image resources.

A variable screensaver picture. Select the option Use %saverpic% variable... to define via the
RES ONE Workspace environmental variable %saverpic% what pictures need to be used for what
groups (OUs, Zones, Workspace Containers, etc.).
When a mandatory timeout for the screensaver is set, the user can no longer set this time in his
"Workspace Preferences" tool.
Note
When a RES VDX session is started from a RES ONE Workspace session, the screensaver of the client will be used by default. It
is possible to force the use of the RES ONE Workspace session screensaver by setting the registry value
NoAgentScreenSaver.
192
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
4.7
User Settings
RES ONE Workspace has a method of preserving and applying user settings independent from the
Windows profile called Zero Profile Technology. Zero Profile Technology automatically detects user
settings that are being changed by the user. These settings are preserved immediately outside the
profile. When these settings are required by the Windows desktop or application, they are applied
just in time.
The following assigned profile types are supported:

Local profiles (version 1, 2)

Roaming profiles (version 1, 2)

Mandatory profiles (version 1, 2)
The profiles version 2 are used by Microsoft Windows Vista, Microsoft Windows Server 2008 and
higher.
For more information about User Profiles, please see Microsoft references:

Microsoft Technet | User Profiles (http://technet.microsoft.com/enus/library/cc737881(WS.10).aspx)

Managing User Profiles (http://technet.microsoft.com/en-us/library/bb726990.aspx)

How to create and Assign User Profiles for Users in a Domain
(http://support.microsoft.com/kb/128624)

Managing Roaming User Data Deployment Guide, scenario 3
(http://download.microsoft.com/download/3/b/a/3ba6d659-6e39-4cd7-b3a29c96482f5353/managing%20roaming%20user%20data%20deployment%20guide.doc)
Users can change certain settings in a session, such as their default printer, their mouse orientation,
and the view in which an application should open. Applications and processes store such user
settings in keys and values in the user-specific part of the registry (HKEY_CURRENT_USER), and in
configuration files in the user's profile directory.
However, user profile directories and HKEY_CURRENT_USER are not always preserved when the user
logs off. This is particularly the case if you use mandatory profiles, or if you use roaming profiles in
combination with passthrough applications (see "Setting up Instant Passthrough for Citrix XenApp
published applications" on page 222) in a Citrix XenApp environment.
With RES ONE Workspace Zero Profile Technology, you can preserve changes that users make to
certain settings, files and folders during a session. These User Settings are preserved in a network
location or at a local cache location outside the user profile and are restored automatically when
the user logs on again. This is achieved independent of the user's profile.
Please note that for a better user experience, it is recommended to create user settings for an
application instead of globally. This can be done by editing the application at Composition >
Applications. Global user settings are processed at log on.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
193
Chapter 4: Dynamic Configuration
Where to find User Settings in the RES ONE Workspace Console
What
Where
Global User Settings
Composition > User Settings
User Settings for an
application
Open the application at Composition > Applications, go to User
Settings
Storage location of User
Setting data
Composition > User Settings > Central storage location
Zero Profile Modes

Capture targeted items on application/session end - Preserves specified parts of
HKEY_CURRENT_USER and of the user profile directory when the session ends or when the user
closes an application.

Track any changed setting within scope immediately (global) - Automatically tracks specific
trees in HKEY_CURRENT_USER and/or the user profile directory tree and immediately preserves
any changes that occur there.

Track any setting changed by application immediately (application) - Automatically tracks
and immediately preserves all changes made by a specific application. This mode preserves all
changes that the application's process makes in the registry at HKEY_CURRENT_USER and to files
and folders in the user's %appdata% folder. This option is not available for Citrix Streamed
Applications.

Capture targeted items once, then track further changes - If this mode is selected User
Settings will run once with the Zero Profile mode set to Capture targeted items on
application/session start/end. The second time the Managed Application is run or the second
time a session is started User Settings will run in the Zero Profile mode Track any setting
changed within scope/by application immediately. By using this option it becomes very easy to
use User Settings to migrate personal settings from one machine to another: With the Capture
targeted items once, then track further changes mode it is easy to transfer all stored changes
that were made on system A and track all new changes on system B with Track any setting
changed within scope/by application immediately. Note that you need to specify Targeted
items and possibly Excluded items.
194
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Capture targeted items on application/session end
Use the Zero Profile modes Capture targeted items on application/session end (application) and
Capture targeted items on session end (global) to preserve a list of specific items, as configured
on the Capturing tab. Predefined Templates are available for a select number of applications and
Control Panel options. You can use User Settings templates for the following applications:
User Settings templates
Windows

Control Panel
General

Accessibility Options, Desktop Content,
Desktop Icons, Keyboard Settings, Mouse
Settings, Regional and Language Options, All
Control Panel Settings
Vista / 7 / 2008 (R2), 8 / 2012 (R2), and 10 only

Screen Saver, Sounds, Taskbar, Toolbars,
Visual Settings
Windows 7, 8 / 2012 (R2), and 10 only

Themes
Vista / 7 / 2008 (R2) only

Desktop Gadgets, Start Menu
XP and 2003 only

Internet Options
XP only


Windows Explorer
Display
General

Folder General, Folder View
Vista / 7 / 2008 (R2), 8 / 2012 (R2), and 10 only

Folder Search
XP and 2003 only


Instant
Messaging
User Certificates
Windows Messaging
Subsystem

Folder Offline Files

XP/2003

Vista / 7 / 2008 or later

8 / 2012 (R2)

10

XP/2003

Vista / 7 / 2008 or later

8 / 2012 (R2)

10

AOL Instant
Messenger

Microsoft Lync

2010, 2013

MSN Messenger

7.0, 7.5

Skype
Up to and including version 6

Windows Live
Messenger

2011
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
195
Chapter 4: Dynamic Configuration
Internet
Browsers
Microsoft
Office
Other
Applications

Yahoo! Messenger
Up to and including version 11

Google Chrome
Up to and including version 30

Internet Explorer


Mozilla Firefox
Up to and including version 25

Opera

Opera 12 or lower

Opera 15 or later
6, 7, 8, 9, 10, 11

Microsoft Access,
Excel, Outlook,
PowerPoint,
Project, Publisher,
Visio, Word

2003, 2007, 2010, 2013

Microsoft
FrontPage

2003

Microsoft Groove

2007

Microsoft InfoPath

2003, 2007, Designer 2010, Designer 2013,
Filler 2010, Filler 2013

Microsoft OneNote

2007, 2010, 2013

Microsoft
SharePoint

Designer 2007, Designer 2010, Designer 2013,
Workspace 2010

Office
Communicator

2007

Microsoft Office
Common

2003, 2007, 2010, 2013

Microsoft Office
Tools

2003, 2007, 2010, 2013

Adobe Acrobat
Professional,
Adobe Reader

6, 7, 8, 9, X, XI, DC

Adobe
Dreamweaver,
Illustrator,
Photoshop

CS5, CS6, CC (Compatible with CC, CC 2014,
CC 2014.01)

FileZilla
Up to and including version 3

Foxit Reader


iTunes
Up to and including version 11

Outlook Express

Quicktime Player
5, 6, 7

XP/2003

Vista and Higher

WinRAR
Up to and including version 5

WinZip
Up to and including version 17
Note
The Start Menu template (under Windows > Vista or later > Control Panel) is only necessary if the option Pin to Start Menu
(at Composition > Applications, on the Properties > General tab of an application), is not selected for applications. This
template stores the same User Settings.
196
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Configuration
The User Settings templates for applications contain predefined Targeted Items for a specific
application or Microsoft Windows setting and can assist with configuring User Settings.
Notes

There are some known limitations when using Application Templates:

Windows Themes templates are supported on Microsoft Windows Vista and Microsoft Windows 7.

Pictures that are saved on a local machine will not be roamed.

Custom installed mousepointers will not be roamed, unless they are saved in the folder
%LocalAppData%\Microsoft\Windows\Themes\YOURTHEME\cursors and the .theme
adjusted to take the cursor from that folder.

file is
Aero-specific settings will not be applied to non aero-capable sessions (aero-specific settings will be saved).

Device/Hardware related settings are not supported.

Settings that require administrative privileges are not supported.

The input language template is not supported on Microsoft Windows 7.

It is recommended to use the Microsoft Office Common templates on global level.

Composition > Applications > Settings > Disable Active Setup (skips first-time shell init) should be unchecked
for Microsoft Windows settings to function properly.

When at Composition > Applications > Settings, Disable Active Setup (skips first-time shell init) is selected the
following command must be added at Composition > Actions by Type > Execute Command:
%SystemRoot%\system32\regsvr32.exe /s /n /i:/UserInstall
%SystemRoot%\system32\themeui.dll.

Windows Themes settings will be captured in RES ONE Workspace sessions on Terminal Servers, but due to
technical restrictions on a multi-user platform the Desktop Window Manager will not be notified of these
settings.
When adding a User Setting, use one of the following methods:

Click New > Templates to use a predefined template.

Click New > Discover User Settings... to start the User Settings Capture Wizard that discovers
which files and registry settings need to be captured as User Settings for applications or
processes.
Please note that a full installation of RES ONE Workspace is necessary to run the User Settings
Capture Wizard as the wizard makes use of the RES ONE Workspace drivers. Also, to avoid
conflicting results, no RES ONE Workspace session may be running on the system on which the
User Settings Capture Wizard runs.

Click New > Custom to create your own User Setting.
The following options are available when adding the User Setting (either Custom or by using a
Template, or after the User Settings Capture Wizard has finished):

On the Capturing tab, create a list of all the settings to be preserved. If you use a template or
the User Settings Capture Wizard, this list is already pre-populated.

When adding or editing Captured items:

At Limit # of files to, enter the number of User Setting files that must be preserved for the
managed application. This setting only applies to: Folder/Folder tree.

Select Empty target when applying user setting to delete the corresponding User Setting
before applying the setting. This setting only applies to: Registry key/Registry
tree/Folder/Folder tree. Normally, targeted items are merged into the existing contents of
the registry or folder structure of the user's session. This leaves intact any existing settings
that are not overwritten by a User Setting. Sometime this is not the desired behaviour, for
example if an application leaves settings behind that it should have cleaned up. In such
situations, enable this option.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
197
Chapter 4: Dynamic Configuration



Optionally, select Show exclusions to add exclusions to the configured settings, so that
parts of the settings are not preserved.

Select Any file larger than to determine the maximum size of the User Settings files and
folders to be excluded and enter a number in KB, MB, GB. This setting only applies to:
Files/Folders/Folder tree.

Select Any file unchanged for to determine the maximum age of the User Settings files
and folders to be excluded and enter a number in days or months. This setting only
applies to: Files/Folders/Folder tree.
Click Add > Import > Flex Profile Kit to import existing Flex Profile INI files directly into the
User Setting.
When specifying paths and names anywhere in User Settings, you can use:

wildcards *, ?, [charlist] and [!charlist].

special folders to specify files, folders or folder trees in the user profile directory, as well as
the default Microsoft Windows known folders (also called special folders in Microsoft
Windows XP and earlier versions of Microsoft Windows) and any other special folder that
may exist on the computers in your environment.
Note
If Windows Shell shortcut creation is set to Replace all unmanaged shortcuts, this may lead to unpredictable results for
global User Settings that preserve information in %desktop%, %startmenu% or
%appdata%\Microsoft\Internet Explorer\QuickLaunch. This does not affect application-level User Settings
for those folders.
Only applicable to global-level User Settings:

For Global User Settings it is possible to capture items exclusively by enabling the option
Automatically exclude these targeted items from all other User Settings that is available on
the Capturing tab. In a session where such an "exclusive" User Setting applies, all other User
Settings automatically handle the captured items as (hidden) exclusions for the duration of the
user session.

After a certain time, things like registry settings tend to grow large. To save disk space and to
improve performance drastically, the User Settings will be compressed. In a new Datastore the
setting is enabled by default. There is however a contingency: all Agents must be running on
RES ONE Workspace 9.5.2.0 or higher.
Warnings

If any of your Agents runs on a version prior to RES Workspace Manager 9.5.2.0, a message appears stating this.
You need to update the Agents concerned for the setting to take effect. If an Agent running an older version of
the software is added to an existing environment, a more urgent message appears. Such an Agent must be
updated immediately, because it cannot load compressed user settings.

In case of downgrading an Agent, the captured User Settings will not be restored to their previous uncompressed
state.
Note
The compression of User Settings only works when Zero Profile mode is set to Capture targeted items on session end at
global or application level.
198
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Only applicable to application-level User Settings:

On the Properties tab, with the option Restore application to default configuration, the end
user or Management Console user can revert an application to its original configuration (only
available if the Zero Profile mode for the application is set to Capture targeted items on
application/session end (on the Capturing tab)).

Applying this option will clear or delete all registry values, files and folders configured in the
User Settings for the application from the user profile.

It is recommended to select the option Empty target when applying user setting for the
captured settings (only applicable to Registry key/Registry tree/Folder/Folder tree). This
will delete any existing settings that are not overwritten by the User Setting, which can be
useful in case the application leaves settings behind that it should have cleaned up.

Before enabling the option Restore application to default configuration for an application,
it is advised to first test if the application will launch correctly with its default
configuration. If this causes problems with the application, you might want to consider only
enabling the option Restore settings from previous session(s).

When enabling this option for end users, in the user session in the user's Workspace
Preferences tool, on the Other tab, the extra option Default configuration will become
available in the list of dates for which User Settings can be restored.

This option is not available for Microsoft App-V 4.x, ThinApp and Citrix Streaming
applications.

By default, the settings specified in the application's User Settings are preserved at application
end: Capture: After application has ended. Optionally, you can set Capture: After session has
ended instead, to preserve the settings later. To change the default configuration, you need to
switch to the Advanced User Settings view (Capturing tab).

The Sampling tab is only available in Advanced User Settings view.

If an application in this Zero Profile mode runs in sampling mode, its Sampling tab shows the
settings that users did change during the sampled sessions, but that they subsequently lost
because those changes did not fall within the scope of the application's Targeted Items.

The Sampling ratio controls the number of sessions from which information is logged. A
higher ratio results in information from more sessions, and a lower ratio results in
information from fewer sessions. With the ratio of 1:1, information is shown from all
sessions.

On the Sampling tab:


settings that are part of a User Setting exclusion are not shown.

you can right-click a sampled setting and convert it into a User Setting targeted item or
into a User Registry Setting ("User Registry" on page 166).

use CTRL+F to search for a specific sampling entry.

you can group the information by dragging column headers to the grouping area. To
restore the original view, drag the column headers back to the column bar.
The value set for the option Start sampling determines when RES ONE Workspace should
start sampling data.

The default Start sampling: After application has started and is ready to be used is
useful if the application loads and processes user-related settings after it has started up.
Postponing the sampling until the application is ready for use filters out irrelevant
changes from the Sampled data tab. With this option, changes are only sampled if they
are made by this specific managed application.

Set Start sampling: Immediately when application starts if you want to see sampled
data about changes made during the application's startup process. With this option,
sampling is active as soon as the session has started. Any changes made by an
unmanaged version of this application will also be included in the sampling.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
199
Chapter 4: Dynamic Configuration

Select Use the User Settings from the following application to link an application to the User
Settings of another application, rather than giving the application its own User Settings. Please
note that linked User Settings are not supported for Citrix Streamed Applications.
Note
When creating a Managed Application for a Citrix Streamed Application, User Settings are automatically enabled for that
application in the Zero Profile Mode Track specified settings on application start/end. By default, two User Setting
Targeted Items are also created for that application, targeting the applicable (streaming application GUID-based) Folder tree
and Registry tree for that application. This covers the most commonly used locations where Citrix Streamed Applications
store their settings. You may need to add additional Targeted Items and/or exceptions.
Track any changed setting within scope immediately (global)
Use the Zero Profile mode Track any changed setting within scope immediately to preserve all
changes made in a tracked registry tree in HKEY_CURRENT_USER, and/or in a tracked folder tree in
the user profile directory. This mode is available for global User Settings.
Configuration

The Sampling and Tracking tabs are only available in Advanced User Setting view.

The Sampling ratio controls the number of sessions from which information is logged. A
higher ratio results in information from more sessions, and a lower ratio results in
information from fewer sessions. With the ratio of 1:1, information is shown from all
sessions.

In one or both of the fields Registry to track and Folders to track, restrict the User Setting
to a single registry tree in HKEY_CURRENT_USER and/or to a single folder tree in the user
profile directory.

Optionally, use the field Process(es) to track to restrict the User Setting so that it only
tracks changes made by one or more specific processes.

200

You can enter just a process name (such as regedit.exe), or you can specify an exact
path (such as C:\windows\system32\regedit.exe).

Separate multiple entries with a semi-colon (;).

If you restrict the User Setting to a process that also uses subprocesses for certain
changes, include these subprocesses in the Process(es) to track field.
On the Excluded Items tab, create a list of all the settings that should not be preserved.

When specifying paths and names anywhere in User Settings, you can use:

wildcards *, ?, [charlist] and [!charlist].

special folders (see Variables and special folders (on page 213)) to specify files, folders
or folder trees in the user profile directory, as well as the default Microsoft Windows
known folders (also called special folders in Microsoft Windows XP and earlier versions of
Microsoft Windows) and any other special folder that may exist on the computers in your
environment.

Select Any file larger than to determine the maximum size of the User Settings files and
folders to be excluded and enter a number in KB, MB, GB.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Sampling

If the Sampling Mode is enabled (only available in Advanced User Settings view), the Sampling
tab shows the settings that were preserved and/or applied during the sampled sessions.

On the Sampling tab:

settings that are part of an Excluded Item are not shown.

right-click a sampled settings and convert it into an Excluded Item or into a User Registry
Setting.

use Ctrl+F to search for a specific sampling entry.

You can group the information by dragging column headers to the grouping area. To restore
the original view, drag the column headers back to the column bar.
Note

If Windows Shell shortcut creation is set to Replace all unmanaged shortcuts, this may lead to unpredictable
results for global User Settings that preserve information in %desktop%, %startmenu% or
%appdata%\Microsoft\Internet Explorer\QuickLaunch. This does not affect application-level
User Settings for those folders.

If changes handled by a subprocess should be included in the tracking and sampling of a global User Setting in the
Zero Profile mode Track any changed setting within scope immediately, the subprocess must be authorized at
Security > Global Authorized Files.

When testing User Settings, please note that manually renaming registry keys may lead to unexpected results. To
test User Settings, always use the proper application or Microsoft Windows feature to implement changes.
Track any setting changed by application immediately (application)
Use the Zero Profile mode Track any setting changed by application immediately to preserve all
changes that the application's process makes in the registry at HKEY_CURRENT_USER and to files
and folders in the user's %appdata% folder.
Configuration Advanced User Settings

The Tracking and Sampling tabs are only available in Advanced User Settings view.

If an application in this Zero Profile mode runs in sampling mode, its Sampled Data tab
shows the settings that were preserved and/or applied during the sampled sessions.

The Sampling ratio controls the number of sessions from which information is logged. A
higher ratio results in information from more sessions, and a lower ratio results in
information from fewer sessions. With the ratio of 1:1, information is shown from all
sessions.

The value set for the option Start tracking changes determines when RES ONE Workspace
should start tracking the changes to be processed.

The default Start tracking: After application has started and is ready to be used is
useful if the application loads and processes user-related settings after it has started up.
Postponing the tracking until the application is ready for use filters out irrelevant
changes from the Sampled Data tab. With this option, changes are only tracked if they
are made by this specific managed application.

Set Start tracking to immediately when application starts if relevant changes are made
during the application's startup process. With this option, tracking is active as soon as
the session has started. Any changes made by an unmanaged version of this application
will also be tracked.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
201
Chapter 4: Dynamic Configuration


On the Tracking tab:

Create a list of all the settings that should not be preserved.

When specifying paths and names anywhere in User Settings, you can use:

wildcards *, ?, [charlist] and [!charlist].

special folders (see Variables and special folders (on page 213)) to specify files,
folders or folder trees in the user profile directory, as well as the default Microsoft
Windows known folders (also called special folders in Microsoft Windows XP and
earlier versions of Microsoft Windows) and any other special folder that may exist on
the computers in your environment.

You can specify any Extra process(es) to track. This can be useful in case applications
use subprocesses.

Select Any file larger than to determine the maximum size of the User Settings files and
folders to be excluded and enter a number in KB, MB, GB.
On the Sampling tab:

settings that are part of an Excluded Item are not shown.

right-click a sampled settings and convert it into an Excluded Item or into a User Registry
Setting.

use CTRL+F to search for a specific sampling entry.

You can group the information by dragging column headers to the grouping area. To
restore the original view, drag the column headers back to the column bar.
Notes

A User Setting for a specific application is never available to users who do not get the application itself. If Access
Control and Workspace Control are set on an application-based User Setting, users only get the User Setting if
they meet both the criteria for the application and the criteria for the User Setting.

If the subprocess is listed on the Authorized Files tab of the application's Security section, the subprocess will
be processed and, if relevant, sampled as part of the application-level User Setting.

If the subprocess is listed at Security > Global Authorized Files, changes made through this subprocess will be
processed as part of the application-level User Setting, but will not be included in the application's User Setting
sampling.

Application-level Authorized Files are not included in User Setting linking. If an application links to the User
Settings of another application, the Authorized Files of the master application must be added to the linked
application manually.

When testing User Settings, please note that manually renaming registry keys may lead to unexpected results. To
test User Settings, always use the proper application or Microsoft Windows feature to implement changes.

With User Settings tracking for applications, in a mixed environment of RES Workspace Manager Console 2012 SR2
or higher and RES Workspace Composer 2012 SR1 or earlier, subfolders of %LOCALAPPADATA%, e.g.
%LOCALAPPDATA%\Microsoft, will not be tracked.
202
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Migration settings when switching to another Zero Profile mode
User Settings data is stored in different formats for different Zero Profile modes. When switching an
existing global User Setting or application to another Zero Profile mode, use its Migration settings
to determine what should happen to data stored in the previous format.
Migration Settting "Ignore"
Effect:
The old data continues to exist, but it is not used or updated.
When users start using the switched User Setting, they will initially get
the default settings and they will gradually build up a new set of data
according to the new Zero Profile Mode.
Eventually, two sets of data will exist for each user for both Zero Profile
Modes. In that situation, switching the Zero Profile mode results in a
switch to the stored settings appropriate to the current mode.
Other consequences:
Additional data remains in the system and, when not using User Settings
caching, will be transferred at various moments (session logon, logoff
and, refresh; and application start and end). This could potentially
impact performance.
Migration Settting "Remove"
Effect:
All the old information is permanently deleted.
At their next logon, users get the default settings and will have to re-do
any changes they want in their profile. These changes will then be
stored according to the new Zero Profile Mode.
Other consequences:
Migration Setting "Apply/Convert and remove"
Effect:
The existing data is converted into the new format. The data is no
longer available in the previous format.
When users next log on, they will have the customized settings that
they already had.
Other consequences:
The new User Setting may store more information than would strictly be
necessary. This additional data will be transferred at various moments
(session logon, logoff and, refresh; and application start and end).
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
203
Chapter 4: Dynamic Configuration
Flex Profile Kit INI files
In Citrix and Terminal Server environments, the freeware Flex Profile Kit is sometimes used to store
user settings in combination with mandatory profiles. There are, however, several advantages to
managing such settings as User Settings in RES ONE Workspace, where they can be managed
centrally in a fully supported and enterprise-ready system.
Flex Profile Kit stores information in INI files. The information from such INI files can be imported
directly into RES ONE Workspace User Settings.
Importing Flex Profile Kit settings into User Settings

Have the relevant INI file(s) available in an accessible location.

Create a new User Setting, either at Composition > User Settings or on the User Settings tab of
an application at Applications.

Click Add > Import > Flex Profile Kit and select the relevant INI file. The settings stored in that
INI file appear in the User Setting immediately.

Close the User Setting. The list of User Settings now includes the settings that were previously
handled through the Flex Profile Kit.
What is saved as part of a Targeted Item
A Targeted Item for a:
saves:
Registry tree
all the keys and subkeys in the
specified tree, and the values in
those keys
but does NOT save:
Registry key
the specified key and all the
values in it
subkeys and their values
Registry value
the specified value

other values in the same key

subkeys and their values.
Folder tree
all the files and folders in that
tree, including subfolders and
their files
Folder
the specified folder and its file
subfolders and their files
File
the specified file

other files in the same folder

subfolders and the files in
them
Notes

In all cases, parent keys or parent folders will be empty, except for the keys or folders in the path to the User
Setting to be stored.

If you set a registry key as exception to a User Setting, the values in that key will NOT be stored, but any subkeys
and their values will.

If you set a folder as exception to a User Setting, the files in that folder will NOT be stored, but any subfolders
and their contents will.
204
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Storage of users' User Setting data
Storage method
Each User Settings is stored as a separate (compressed) file with a GUID as its file name, and with a
file extension that indicates its content type.
If the option Allow users to restore their own settings is enabled, additional files may be created
with sequence numbers related to the value set for Number of sessions to keep.
Application-level User Settings with "Track specified settings on application start/end"
GUID:
GUID of the individual Targeted Item
File name:

[GUID].UPR for registry information

[GUID].UPF for file and folder information
Data for rollback:
Contained in additional files with a sequence number per session:

[GUID].UPR_h[n]

[GUID].UPF_h[n]
(where [n] is the session number)
Application-level User Settings with "Track any setting changed by application immediately"
GUID:
GUID of the application
File name:

[GUID].UPR2 for registry information

[GUID].UPF2 for folder tree information
Data for rollback:
All data, including rollback data, is contained in a single file.
Global User Settings with "Track specified settings on session start/end"
GUID:
GUID of the individual Targeted Item
File name:

[GUID].UPR for registry information

[GUID].UPF for file and folder information
Data for rollback:
Contained in additional files with a sequence number per session:

[GUID].UPR_h[n]

[GUID].UPF_h[n]
(where [n] is the session number)
Global User Settings with "Track any changed setting within scope immediately"
GUID:
GUID of the User Setting
File name:

[GUID].UPR2 for registry information

[GUID].UPF2 for folder tree information
Data for rollback:
All data, including rollback data, is contained in a single file.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
205
Chapter 4: Dynamic Configuration
Central storage location of User Settings and other user-specific information
In a user's session, the central storage location stores the file PWRUSER.ini and other user-specific
information. User Settings files are stored in a subfolder (\UserPref ) of the central storage
location.
The central storage location is defined on the Settings tab at Composition > User Settings, at
Central storage location.
The default central storage location is the hidden folder \Personal Settings on the user's
homedrive. Its location can be customized to:

A mapped network drive letter and folder name.

Any path in UNC format.
Environment variables from both Microsoft Windows and RES ONE Workspace can be used. Always
ensure that this path is unique per user, for example by including %username%. (Otherwise, files
from multiple users could get mixed together in a single location.)
You can define different locations for different Workspace Models.
Locally cached User Settings ("User Settings Caching" on page 207) files are synchronized to the
central storage location automatically at the end of each session.
Note
Support for a UNC path as central storage location was introduced in RES Workspace Manager 2012 SR1 and is not backwards
compatible. Should you need to downgrade to a version prior to that, please first ensure that the central storage location
refers to a folder on <homedrive> or on a mapped network drive letter.
206
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Migration
When you change the location for Storage of user settings, the value set for Migration Settings
(also at Composition > User Settings) determines what will happen to RES ONE Workspace data
currently stored in the original location.
Option
Effect
Ignore
The stored user settings data remains in the old location, but it is not used or
updated.
At their next logon, users will initially get the default settings. They will gradually
build up a new set of data in the new location.
Eventually, two sets of data will exist for each user, in both locations. In that
situation, switching the storage location back to previous value results in a switch
to the settings that are stored there.
Copy
The stored user settings data is copied to the new location and is used and updated
from there.
At their next logon, users get their customized settings as usual.
The data also remains in the old location, but it is not used or updated there.
Move
The stored user settings data is moved to the new location and is used and updated
from there.
At their next logon, users get their customized settings as usual.
For the options Copy and Move to work as expected, please make sure that:

Previous storage location is filled in correctly.

The previous storage location is accessible to users at their next logon, until all stored user
settings have been migrated.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
207
Chapter 4: Dynamic Configuration
User Settings Caching
User Settings are always stored centrally, in the central storage location ("Central storage location
of User Settings and other user-specific information" on page 206). Optionally, User Settings can
also be cached locally.
Locally cached User Settings are available even if the central location is not available, for example
on a laptop that is not logged on to a network. Local caching can also improve performance on
persistent desktops, as there is no need to copy a User Setting from the central location to the
Agent (unless it has changed since the user's last session). However, cached tracked User Settings
are not immediately available across multiple simultaneous sessions. Depending on the
configuration of the caching feature, cached files are synchronized at the end of the session.
Caching policy
The User Settings caching policy is determined (per Workspace Model) at Composition > User
Settings > User Settings caching:

Cache locally at logon and logoff, unless otherwise specified.

Cache locally at logon, during the session, and at logoff, unless otherwise specified.

Do not cache locally, unless otherwise specified.
On a managed application or on a global User Settings container, use the Advanced User Setting
option Override local caching and choose Always cache or Never cache to overrule the User
Settings caching policy.
Terminal Servers are automatically excluded from all User Settings caching. All sessions on Terminal
Servers use User Setting files from the central storage location.
User Settings caching requires at least Microsoft .NET Framework 4.0 Client Profile or higher to be
installed on the Agent.
Synchronization between central storage location and cache location
The in-built User Settings synchronization process uses a customized synchronization method that is
more efficient than other file synchronization methods, as it is optimized for the User Setting
mechanism and file structures.
Synchronization between the central drive and the local cache only takes place if the central
storage location is available. Without synchronization, User Settings are not uniformly available
across sessions on different devices.
The timing of caching is as follows:

Global User Setting files are synchronized at session start, session end and optionally during the
session at defined cache intervals (ranging from 1 minute to 8 hours).

Application-level User Setting that are preloaded are synchronized in the background at session
start, and when the User Settings are stored. Depending on configuration, this can be at
application or session end, or during the session at a predefined cache interval.

Application-level User Setting that are not preloaded are pre-cached in the background at
session start and are synchronized when the application starts and when the User Settings are
stored. Depending on configuration, this can be at application or session end, or during the
session at a predefined cache interval.
208
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Cache location
The cache location is determined at Composition > User Settings > Cache location. The default
cache location for User Settings is %localappdata%\RES\WM\UserPref. This location is inside the
user profile, and is therefore not suitable for environments with mandatory user profiles, or when a
fresh user profile is created. In such cases, specify a different path. Always ensure that this path is
unique per user, for example by including %username%. (Otherwise, files from multiple users could
get mixed together in a single location.)
A cache location must be a folder on the local hard drive of the Agent running the session. If the
folder does not exist, RES ONE Workspace will try to create it. If it fails to create the folder, or if
the specified cache location is invalid, User Settings caching is not possible. If available, the User
Settings will then be retrieved from the central storage location instead.
Additional User Setting options
Sampling
Sampling is an advanced User Setting and only available in the Advanced User Settings view.
Run a User Setting in sampling mode to obtain information about which settings are changed by
users and/or preserved as a User Setting. Sampled information can help you determine:

which settings users change, but which are lost. You could consider creating User Settings for
these settings.

which changed settings are preserved for users, while they should instead be kept at their
default value. You could consider creating User Setting exceptions for these settings, so that
users' changes to these settings are not preserved.

which settings users always set to specific values. You could consider creating registry setting
Actions for these settings to ensure that the desired value is already available for users,
depending on their context.
Application-level User Settings
Zero Profile mode
Sampled Data
Track any setting changed by
application immediately
shows all the registry, file and folder changes that are
preserved. Settings that are excluded are not shown.

Track specified settings on
application start/end
Right-click an entry and choose Convert selected
entry to User Setting exclusion if the setting should
not be preserved in future.
shows all the the changes that are made in user sessions but
that are not preserved.

Right-click an entry and choose Convert selected
entry to User Setting if the setting should be
preserved in future.

Right-click an entry and choose Convert selected
entry to PowerLaunch setting if the setting should
be set as part of PowerLaunch in future.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
209
Chapter 4: Dynamic Configuration
Global User Settings
Zero Profile mode
Sampled Data
Track any changed setting within
scope immediately
shows all the registry changes that are preserved. Settings
that are excluded are not shown.

Right-click an entry and choose Convert selected
entry to User Setting exclusion if the setting should
not be preserved in future.
Track specified settings on session is not available.
start/end
Sampling ratio
The Sampling ratio controls the number of sessions from which information is logged, and therefore
it controls the amount of data shown on the Sampled Data tab. Optionally, set a higher ratio to
view information from more sessions, or set a lower ratio to see information from fewer sessions.
With the ratio of 1 out of 1, information is shown from all sessions.
The Event Log in a user's Workspace Analysis shows whether sampling was active during a specific
session.
Notes


210
To include an application subprocess in an application-level User Setting in the Zero Profile mode Track any
setting changed by application immediately, the subprocess must be listed as an Authorized File:

If the subprocess is authorized on the Authorized Files tab of the application's Security section, the
subprocess is included in the application's Sampled Data.

If the subprocess is listed at Security > Global Authorized Files, changes made by this subprocess are
preserved as part of the application-level User Setting, but are not shown in the application's Sampled Data.
If files, folders or folder trees containing User Settings are excluded based on size and/or date at Composition >
Applications on the User Settings > Tracking tab, these will be added when the application is in sampling mode,
but with the note that they will be excluded due to size and/or date.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Linking
If several applications need the same set of User Settings, you do not need to configure this set for
each application. Instead, an application can use the User Settings of another application. When the
set of User Settings changes, all the applications that use these User Settings will automatically
reflect these changes too. This saves configuration and maintenance time, and ensures that
multiple applications have identical User Settings.
This is useful, for example, if you need a duplicate of an existing application in order to test out a
new version of the application. Another example could be two applications that use the same SQL
database.

The application with the original set of User Settings cannot itself use the User Settings of
another application.

When you edit linked User Settings, RES ONE Workspace will open the application from which
the User Settings originate.

The application with the original set of User Settings cannot be deleted while other applications
still use its User Settings. When you unlink an application, you can choose whether to create a
copy of these User Settings for the application.

When you create a Building Block containing an application that is linked to the User Settings of
another application, the Building Block will recreate this link when importing the Building Block
again. If necessary, it will also recreate the application from which the User Settings originate.

If the source application uses Zero Profile mode Track any setting changed by application
immediately with Authorized Files to track changes made by application subprocesses, these
Authorized Files must be added to the linked application manually.

Linked User Settings are not supported for Citrix Streamed Applications.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
211
Chapter 4: Dynamic Configuration
Allow users to restore their own settings
An application-level or global User Setting becomes available for rollback in the Restore User
Settings wizard if the option Allow end users to: Restore settings from previous session(s) is
selected for that User Setting AND if the user has actual stored settings for that User Setting.
For applications, if the option Restore application to default configuration is selected, the user
can revert the application to its original configuration.
The Restore User Settings wizard is available on the Other tab of the user's "Workspace
Preferences" tool.
The Restore User Settings wizard can also be made available as a separate application in the user's
workspace. To do so, create a Managed Application that refers to pwrgate.exe in its command line
with the command line parameter -15.
It is also possible to restore a user's User Setting to a previous value from the RES ONE Workspace
Console. This allows the administrator to remotely revert a User Setting for a specific user to a
previous state, without the user having to use the Workspace Preferences tool. For applications, the
administrator can also revert to an application's default configuration for a specific user from the
Console.
The wizard can be found at:

Diagnostics > User Sessions > Context menu

Diagnostics > Workspace Analysis > Workspace Analysis Details > Composition > User Settings
> Context Menu

Diagnostics > Workspace Analysis > Workspace Analysis Details > Composition > User Settings
> View User Setting
Notes


The option Restore application to default configuration is only available if the Zero Profile mode for the
application is set to Capture targeted items on application/session end.

When reverting to an application's default configuration, all registry values, files and folders configured in
the User Settings for the application will be cleared or deleted from the user profile.

When using the option Restore application to default configuration, it is recommended to select the option
Empty target when applying user setting for the captured settings (only applicable to Registry key/Registry
tree/Folder/Folder tree). This will delete any existing settings that are not overwritten by the User Setting,
which can be useful in case the application leaves settings behind that it should have cleaned up.
Before enabling Restore application to default configuration for an application, it is advised to first test if the
application will launch correctly with its default configuration. If this causes problems with the application, you
might want to consider only enabling the option Restore settings from previous session(s).
Save printing preference
If printers are made available through user workspace management, you can set RES ONE Workspace
to preserve users' changes to their default printer settings. To do so, enable this option at
Composition > User Settings > Save printing preference.
RES ONE Workspace will handle the technical rules to preserve the correct printer settings for each
user.
212
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Applications User Settings
It is possible to change the behavior of the timing of loading User Settings for applications. At
Composition > User Settings two options are available for prefetching User Settings:

Prefetch in background, check on application start: this is the default behavior. The User
Settings for applications are loaded in the background during session startup.

Apply on application start (requires managed shortcut): the User Settings are not loaded
during session startup, only the first time an application starts its User Settings will be loaded.

On the User Settings tab of a Managed Application, you can choose either setting as the default
for that application (i.e. make an exception to the set default) or choose the setting that has
the (default) prefix.

The setting will then be equal to the one set at Composition > User Settings (and will be
changed accordingly if the default is modified).
Override local caching
It is possible to change the location where User Settings for applications are stored. The Advanced
User Setting Override local caching, allows you to set exceptions for specific applications:

Always cache locally - can be used if local caching is disabled on a Global level, but you want
to cache User Settings for this application locally.

Never cache locally - can be used if local caching is enabled on a Global level, but you do NOT
want to cache User Settings for this application locally.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
213
Chapter 4: Dynamic Configuration
Variables and special folders
When specifying paths and names anywhere in User Settings, you can use:

the wildcards *, ?, [charlist] and [!charlist].

the default Microsoft Windows known folders (also called special folders in Microsoft Windows
XP and earlier versions of Microsoft Windows) and any other special folder that may exist on the
computers in your environment.

the following special folders to specify files, folders or folder trees in the user profile directory:
Item
File System Directory
%appdata%
Contains application data for all users. This folder is used for application
data that is not user specific.
%cache%
Common repository for temporary Internet files.
%cookies%
Common repository for Internet cookies.
%desktop%
Stores file objects on the desktop.
%favorites%
Common repository for the user's favorite items.
%history%
Common repository for Internet history items.
%localappdata%
Data repository for local (non roaming) applications.
%mymusic%
Common repository for music files.
%mypictures%
Common repository for image files.
%myvideo%
Common repository for video files.
%nethood%
Contains the link objects that may exist in the My Network Places folder.
%personal%
Stores a user's common repository of documents.
%printhood%
Contains the link objects that can exist in the Printers folder.
%programsmenu%
Contains the user's program groups (which are themselves file system
directories).
%recentfiles%
Contains shortcuts to the user's most recently used documents.
%sendto%
Contains Send To menu items.
%startmenu%
Contains Start menu items.
%startupmenu%
Corresponds to the user's Startup program group.
%templates%
Common repository for document templates.
%userprofile%
Contains the user profile.
214
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Microsoft App-V applications
Version 4.x
When you create a managed Microsoft App-V 4.x application in RES ONE Workspace on the basis of
an OSD file, User Settings are automatically enabled for the application. It will run in the Zero
Profile mode Track specified settings on application start/end and it will have a hidden Targeted
Item for the folder %APPDATA%\SoftGrid Client\<SGAPPGUID>. This is where the application will
store all its user-specific changes, in a PKG file containing deltas as compared to the original App-V
package.
If you use an App-V package that contains a set of applications, then all the user-specific data for
these applications is stored in the same PKG file. In the default setup, this results in a duplication of
stored user settings data, because the same file is stored for each application that uses it. To
prevent this, disable User Settings for all the applications in the set. Instead, create a single global
User Setting to cover the set of applications.
There is a method to achieve this:

create a global User Setting in Zero Profile mode Track specified settings on session start/end
with a Targeted Item for the specific subfolder of %appdata%\SoftGrid Client where the PKG
file of the relevant App-V package is stored; or, if your RES ONE Workspace site includes several
App-V packages containing sets of applications, using this option requires a global User Setting
for each package.
Ensure that User Settings are disabled for the applications that are covered by the global User
Setting.
Version 5.x
The configuration of User Settings for Microsoft App-V 5.x applications is similar to installed
applications. All Zero Profile modes and User Settings options are supported.
For Microsoft App-V 5.x applications, when selecting Track any setting changed by application
immediately for Zero Profile mode, the Registry to track (on the User Settings > Tracking tab of
the application) must be HKEY_CURRENT_USER. If this registry is changed, no User Settings can be
tracked for this Microsoft App-V 5 application.
Please refer to User Settings (on page 192) for more information on how to configure User Settings.
Notes

The Zero Profile mode and the Targeted Items can be edited for Microsoft App-V 4.x applications. To view the
hidden Targeted Item and its contents, select Show all User Settings and Show Details at Composition > User
Settings.

When creating Microsoft App-V managed applications, the folder to be captured for Microsoft App-V packages,
%appdata%\SoftGrid Client\<SGAPPGUID> (specified in the Data column on the Capturing tab after
selecting Show details), is predefined and cannot be changed.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
215
Chapter 4: Dynamic Configuration
Citrix streamed applications
When creating a Managed Application for a Citrix Streamed Application, User Settings are
automatically enabled for that application in the Zero Profile mode Track specified settings on
application start/end. By default, two Targeted Items are also created: one targeting the
applicable (streaming application GUID-based) Folder tree, and another targeting the relevant
Registry tree for that application. This covers the most commonly used locations where Citrix
Streamed Applications store their settings. You may need to add additional Targeted Items and/or
exceptions.
Note
Linked User Settings are not supported for Citrix Streamed Applications.
216
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
4.8
Integration
Application Virtualization
Citrix XenApp Publishing
With Citrix XenApp Publishing integration, you can integrate Citrix XenApp published applications
and published content into the user workspace, and manage it from the Management Console. A
Citrix XenApp published application is an application that runs on a Citrix XenApp server, but which
behaves as if it were running on the user's local computer. Citrix XenApp published content allows
you to publish files (document files, media files, Web URLs, etc.) from any network location in your
environment.
Notes

RES ONE Workspace (full installation) must be installed on at least one of the Citrix servers in the farm to be
integrated with RES ONE Workspace. Citrix Studio must also be configured on this Citrix server. It is advised to
install RES ONE Workspace on more machines for redundancy purposes.

This is necessary to be able to handle publishing activities and to retrieve updates concerning delivery
groups.

Follow the instructions described in the article "How to Configure Citrix Receiver Pass-Through Authentication for
StoreFront or Web Interface" (available at http://support.citrix.com/article/CTX200157) to configure your Citrix
Receiver to work in combination with RES ONE Workspace.

The RES ONE Workspace Agent must be installed on each Citrix Virtual Desktop Agent that needs to be managed
by RES ONE Workspace.
Tips

When integrating Citrix XenApp 7.x with RES ONE Workspace, it is recommended to use Citrix StoreFront 2.x and
Citrix Receiver 4.x.

In case Citrix Receiver 4.x is used together with Citrix StoreFront, it is highly recommended to enable SSON to
prevent authentication requests within the user session. See for more information the following Citrix article:
"How to Configure Citrix Receiver Pass-Through Authentication for StoreFront or Web Interface" (available at
http://support.citrix.com/article/CTX200157).

When using Citrix Receiver 3.x without PNAgent, only Citrix XenDesktop/XenApp 7.x published applications are
supported. Applications published with Citrix XenApp 6.x or earlier are not supported.

Using Citrix Legacy Receiver / Enterprise Receiver 3.x (including PNAgent) and Citrix WebInterface or Citrix
StoreFront with legacy support, will support both Citrix XenApp 6.x and Citrix XenDesktop/XenApp 7.x
published applications.
Where to find Citrix XenApp Publishing
What
Where
Setting up integration with
Citrix XenApp publishing
In the Setup menu, go to Application Virtualization > Citrix XenApp
Publishing
Setting up Citrix XenApp
published applications
Open or create a managed application at Composition >
Applications, and go to the Publishing tab in its Properties section.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
217
Chapter 4: Dynamic Configuration
Integrating Citrix XenApp Publishing
When setting up integration with Citrix XenApp Publishing, you first need to set the correct settings
and defaults before you can publish applications.
Requirements

Citrix XenApp integration is supported for Citrix MetaFrame XP or higher.

RES ONE Workspace must be installed on at least one of the Citrix servers in the farm to be
integrated with RES ONE Workspace. Please note that if the RES ONE Workspace Agent on a
Citrix server connects to a Relay Server, the Agent version and Relay Server version need to be
identical.
RES ONE Workspace has two different mechanisms for Citrix XenApp publishing:

The local publishing mechanism is used when the RES ONE Workspace Console is running on a
Citrix XenApp server and you publish to the farm to which this Citrix XenApp server also
belongs.
Local publishing is executed by the RES ONE Workspace Console.

The remote publishing mechanism is used when the RES ONE Workspace Console is not running
on a Citrix XenApp server, or when the RES ONE Workspace Console is running on a Citrix
XenApp server in a different farm than the target farm.
Remote publishing is executed by the RES Agent Service running on the target Citrix XenApp
server.
Publishing a single application or content to multiple farms may trigger both mechanisms.
On each Citrix XenApp server to which RES ONE Workspace will publish, the account running the RES
Agent Service must be either local system or a domain account with Full Administration Privileges in
the Citrix farm.
For local publishing, the account running the RES ONE Workspace Console must be a user account
with Full Administration Privileges in the Citrix farm. For remote publishing, the account running
the RES ONE Workspace Console is irrelevant.
If you have Citrix XenApp 6.5 Session Host Only servers (Worker) configured in your environment,
consider the following requirements:


218
RES ONE Workspace must be installed on one or more Citrix XenApp Controllers (Zone Data
Controllers). For redundancy purposes it is preferred to have RES ONE Workspace installed on
two or more Citrix XenApp Controllers.
This is required for the following:

To retrieve available Citrix XenApp Worker Groups and make them available in the RES ONE
Workspace environment.

Execute Citrix application publishing in case applications are published from a RES ONE
Workspace Console that is running on a Citrix XenApp Session Host Only server.
For Agents running on a Citrix XenApp Controller, the option Poll for changes must be set to
Every 5 seconds (at Administration > Agents, on the Settings tab).
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Notes

RES ONE Workspace Console users can only change the Citrix folder to which a specific application is to be
published if they are running the Console on a Citrix server AND the account running the RES Agent Service has
Full Administration Privileges in the Citrix farm.

To successfully publish applications from a machine on which the Microsoft Windows option User Account
Control (UAC) is enabled, the Management Console needs to be started as Run as Administrator on that
machine.

A standard 30-second timeout applies to remote publishing tasks. For Citrix XenApp servers to which managed
applications will be published remotely, the Agent setting Poll for changes should therefore be set at 5 seconds
(at Administration > Agents). A longer interval may cause publishing to fail. The Agent setting Update agent
cache on change does not affect Citrix XenApp publishing.

Lingering Citrix XenApp applications started by RES ONE Workspace will not show the status 'lingering' on the
Citrix server. This is caused by the way RES ONE Workspace starts Citrix published applications.

To enable Session Lingering for Citrix XenApp 7.5 and 7.6, the following registry values can be set:

LingerDisconnectTimerInterval (on page 350) (see the RES ONE Workspace Administration Guide
for more information)

LingerTerminateTimerInterval (on page 351) (see the RES ONE Workspace Administration Guide
for more information)

For Citrix Session Prelaunch to work, the following prerequisites need to be met:

the Citrix server needs to be configured to launch the Workspace Composer automatically (Administration >
Agents, on the Agents tab, select Automatic for Run Workspace Composer)

a Citrix Receiver needs to be started on the client.
Configuration
On the Settings tab, configure general settings for the Citrix XenApp integration in your RES ONE
Workspace site:

Clicking the Test Publishing Ability button will, for the machine it is used on, test to which
available Citrix XenApp 7.x sites within the RES ONE Workspace environment it can publish. The
machine must be a delivery controller or Citrix Studio must be installed on it.

For previous editions of Citrix XenApp, the Test Publishing Ability button can only be used
on a Citrix XenApp server, and the publishing ability of only the farm that the server belongs
to, is looked at.
Note
To successfully use the Test Publishing Ability button on a machine on which the Microsoft Windows option User Account
Control (UAC) is enabled, the Management Console needs to be started as Run as Administrator on that machine. Starting
the Management Console normally, would cause a message to be displayed about the user not having sufficient access rights
(even if this is not the case).

The field ID used by RES ONE Workspace contains the name of the CMC folder used by RES ONE
Workspace when creating Published Applications. You can change this ID if you use two or more
RES ONE Workspace Datastores in one Citrix farm. The different IDs for each RES ONE Workspace
Datastore will then keep the Published Applications unique in the farm.

It is possible to assign an application to one or more Organizational Units. When publishing this
application in a Citrix environment, all users in the selected Organizational Units are listed and
added to the list of users for the published application. However, the users present in the
selected Organizational Units may change over time, and these changes need to be reflected in
the list of users for the Published Application. RES ONE Workspace will do this automatically at
the time specified in the field Rebuild userlist for OU based Published Applications every day
at: At the time specified, one of the Citrix servers using this Datastore will go through the list of
applications which are configured to use OU-based access control and which are published in
Citrix. For these applications, the selected OUs are read and the resulting list of users is
matched to the application's current list of configured users and changed accordingly.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
219
Chapter 4: Dynamic Configuration

If an ICA Seamless Host Agent message should be shown when a user logs on, select Do not
suppress message from ICA Seamless Host Agent during logon. This message is shown if the
user connects seamless to a published XenApp desktop via the ICA client and the Terminal
Session uses the Microsoft Windows shell. The message is suppressed if the RES ONE Workspace
shell is used.

Select Use RESPFDIR environment variable in command line of published application to use
the system environment variable RESPFDIR in the command line of a published XenApp
application when that command line refers to the RES ONE Workspace installation folder. (This
system environment variable is created by the RES ONE Workspace Agent Service.) Use of this
environment variable makes it possible to publish an application across multiple computers with
different RES ONE Workspace installation locations. This option should only be used when the
system environment variable RESPFDIR is available on all computers that the application is
published to. To ensure this, either make sure RES PowerFuse 2008 or higher is installed on all
computers, or manually create the system environment variable on all computers running a
version of RES ONE Workspace older than RES PowerFuse 2008.

To make RES ONE Workspace components available as published applications, select the
relevant check boxes at Publish the following RES ONE Workspace components for authorized
users. The access control settings of these published applications will match those of a RES ONE
Workspace desktop session (e.g. only application managers will be added to the user list for the
Access Wizard, etc).

To create a published server desktop, use the Citrix XenApp Console and a GPO to launch the
RES ONE Workspace desktop. See Configuring the RES Workspace Composer as a Citrix XenApp
Published Application (on page 221).

The button Add or remove Citrix XenApp servers to or from existing applications opens a
wizard that will guide you through the process of adding or removing Citrix servers to or from
the list of configured Citrix servers for selected application(s). For example, you can add a new
Citrix server "CTX10" to all applications that already have Citrix server "CTX01" in their list of
configured Citrix servers.
Defaults tab
On the Defaults tab, you can configure the default settings for all Citrix XenApp published
applications and published content. Any managed application for which you enable Citrix XenApp
publishing will be preconfigured with the defined default settings.
All these default settings can then be changed for each individual managed application, with the
exception of the Instant Passthrough ("Setting up Instant Passthrough for Citrix XenApp published
applications" on page 222) setting Use template ICA file. Selecting this option defines a global
custom ICA file that will be used for ALL instant passthrough connections, and will overrule any ICA
files configured at application level. To create a custom ICA file per published application, ensure
that the global option Use template ICA file is NOT selected. Then, for each Citrix published
application for which the default ICA file generated by RES ONE Workspace does not suffice, go to
the application's Publishing tab, select Use a custom ICA file for this application and click [Edit].
To update the available servers / groups list, click the Refresh button. This button is only available
when using the RES ONE Workspace Console on a machine with Citrix Studio installed on it or when
using the RES ONE Workspace Console on the Citrix Delivery Controller. Every 12 hours, RES ONE
Workspace updates the list with available Delivery Groups for all configured Citrix Sites if both RES
ONE Workspace and a Citrix Delivery Controller (per Citrix Site) are installed on the machine or if
RES ONE Workspace and Citrix Studio (per Citrix Site) are installed on the machine.
220
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Server Groups tab
Server Groups are a RES ONE Workspace mechanism to combine multiple Citrix XenApp servers (only
for Citrix XenApp 4.x-6.5) into a single unit. They are typically used to represent silos. After
defining a Server Group, you can select this Server Group instead of selecting each individual Citrix
XenApp server (only for Citrix XenApp 4.x-6.5) when publishing an application.
Whenever you change the members of a Server Group, any application that references this group
will automatically be republished.
Citrix XenApp 7.x tab
On the Citrix XenApp 7.x tab, you can configure Citrix XenApp 7.x delivery controller(s) to publish
applications. One delivery controller per site can be specified, a DNS entry is allowed as a delivery
controller. These delivery controllers will be used to publish applications for which delivery groups
for the same site are selected (at Composition > Applications, on the Properties > Publishing >
Citrix XenApp Published Application tab of an application).
Per Citrix Delivery Controller, specify the credentials for RES ONE Workspace to use. If no
credentials are specified, the credentials of the Console user (local publishing) and the RES ONE
Workspace service (remote publishing) will be used. In all cases, the credentials must be of a user
with at least Citrix 'Delivery Group Administrator' role permissions.
Note
Citrix Delivery Groups cannot be created or managed from within RES ONE Workspace. This needs to be done in Citrix Studio.
Tip
When creating Citrix Delivery Groups in Citrix Studio, it is recommended to allow "Domain Users". Restricting users per
Delivery Group is possible, but this will affect, for example, applications that are published to All Users from the RES ONE
Workspace Console.
Specify credentials for Use the following credentials to communicate with Citrix XenApp servers.
If no credentials are given, the credentials of the Console user and the RES ONE Workspace service
will be used. In all cases, the credentials must be of a user with at least Citrix 'Delivery Group
Administrator' role permissions.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
221
Chapter 4: Dynamic Configuration
Configuring the RES Workspace Composer as a Citrix XenApp Published Application
Configuration
To let the RES ONE Workspace Desktop start on a Terminal Server:

In the Citrix Console, publish a Citrix server desktop.


Depending on your Citrix XenApp edition, it may differ how a Citrix server desktop is
published. For more information, refer to your Citrix documentation.
In Microsoft Active Directory, configure a GPO:

Go to User Configuration > Administrative Templates > System > "Custom User Interface".

Enter the correct path to pfwsmgr.exe. This starts RES ONE Workspace when a user launches
a Citrix Desktop.

Create the GPO:




Go to User Configuration > Administrative Templates > System > "Custom user
interface".

Enter the correct path %RESPFDIR%\pfwsmgr.exe.
Enable loopback processing on this GPO:

Go to Computer Configuration > Administrative Templates > System > Group Policy >
"User Group Policy loopback processing mode".

Enable this setting in Replace mode.
Configure security for the GPO:

On the Security tab of the GPO properties (Delegation > Advanced), add the group
containing all users for whom you want a Managed Desktop.

You can remove (or deny) the "apply-rights" for your administrative accounts.
Link the GPO:

Link the GPO to the OU where your Citrix Servers exist in the Microsoft Active Directory.
Notes

For Citrix XenApp 6.0 you should use the Citrix Delivery Services Console.

For Citrix XenApp 6.5 you should use the Citrix AppCenter.

For Citrix XenDesktop/XenApp 7.0-7.6 you should use Citrix Studio.
This best practice applies to:

Microsoft Windows Server 2008 R2 Remote Desktop Services.

Citrix XenApp 6.x and 7.x.
222
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Setting up Instant Passthrough for Citrix XenApp published applications
Where to find the Instant Passthrough settings window
What
Where
Global default Instant
Passthrough settings
In the Setup menu, go to Application Virtualization > Citrix XenApp
Publishing.
Go to the Defaults tab.
Select Enable Instant Passthrough for computers not publishing this
application
Click the button [Settings...]
Instant Passthrough settings
for a specific managed
application
Open or create the managed application at Composition >
Applications.
Go to the Publishing tab in its Properties section
Select Enable Citrix XenApp Application Publishing
Select Enable Instant Passthrough for computers not publishing this
application
Click the button [Settings...]
Use the Instant Passthrough mechanism to start a Citrix XenApp published application on a remote
server, using either an ICA file generated by RES ONE Workspace or a custom ICA file. The ICA file
points to the application on the remote server and is stored in the RES ONE Workspace Datastore in
the \TPI\ICA subfolder.
When a user starts the application, the request will automatically be redirected to the remote
server on which the application is located, after which the remote server will publish the
application to the user's desktop.
Note
Instant Passthrough is not supported when publishing an application to multiple server farms. If the selection of Configured
Servers contains servers from different farms, Instant Passthrough is automatically disabled for this application.
If an application changes from being published to multiple farms to being pubished to a single farm, then the Instant
Passthrough option becomes available again. (The configuration of this option will have reverted to the global default
configuration for Instant Passthrough.)
Configuration
In the Instant Passthrough settings window, you can configure the settings for the passthrough
mechanism and the ICA file.

If you access this window from the global Citrix XenApp Integration node, you are defining the
default Instant Passthrough settings for all Citrix XenApp published applications in your
environment.

If you access this window from the Publishing tab of a managed Citrix XenApp published
application, the Instant Passthrough settings apply only to that application.
Please note that if global Instant Passthrough settings have been configured (at Setup >
Integration > Citrix XenApp Publishing, on the Defaults tab), but the option Enable Instant
Passthrough for computers not publishing this application has been unchecked, the configured
settings will still be shown when enabling Instant Passthrough on application level (at
Composition > Applications, on the Properties > Publishing > Citrix XenApp Published
Application tab of an application).
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
223
Chapter 4: Dynamic Configuration
Properties tab

To use the TCP/IP+HTTP network protocol to locate and connect to the ICA Server, select Use
TCP/IP+HTTP browsing.




To use SSL to locate and connect to the ICA Server, select Use SSL to browse and connect
and enter the server name and port of the ICA server.
Select how passthrough authentication should be handled:

If RES ONE Workspace handles the authentication, then the parameters /username,
/domain, and /password will also be passed to the ICA client with the correct values.

If Citrix XenApp handles the authentication, then the ICA file will be passed to the ICA Client
without any additional parameters.
By default, RES ONE Workspace generates an ICA file for each Instant Passthrough connection.

To create a single custom ICA file for all Instant Passthrough connections, select Use
template ICA file and click [Edit]. Please note that this defines a global custom ICA file that
will be used for ALL instant passthrough connections, and will overrule any ICA files
configured at application level.

To create a custom ICA file per published application, ensure that the global option Use
template ICA file is NOT selected. Then, for each Citrix published application for which the
default ICA file generated by RES ONE Workspace does not suffice, go to the application's
Publishing tab, select Use a custom ICA file for this application and click [Edit].
In the Passthrough method area, configure how the passthrough should be made available.
Launching the passthrough connection using the Citrix Program Neighborhood Client or Agent
can be useful, for example, when smartcards are used for authentication:

Use the Citrix Program Neighborhood Agent: if you select this option, the passthrough
connection is established by launching pnagent.exe with the correct parameters.
When using Legacy Citrix Receiver 3.x (with PNA) with Citrix StoreFront, configure Citrix
Receiver 3.x to connect to the Citrix XenApp Services URL (in the Citrix Storefront console
at Stores -> Configure Legacy Support). In this situation, the name to fill in for XenApp
Services Site Farm Name is the "Citrix Store Service Delivery Controller name".

Use the Citrix Program Neighborhood client: If you select this option, the passthrough
connection is established by launching pn.exe with the correct parameters. Because one of
these parameters is the name of the application set, you also need to provide this name.

Use an ICA file:

Standard RES ONE Workspace ICA file or Use template ICA file: If you select either of
these options, RES ONE Workspace will launch wfcrun32.exe using the Standard RES
ONE Workspace or template ICA file.
Behavior tab
With the option Do not passthrough if application is available on local computer selected, the
published application will only be launched if there is no local version of the application available.

If the user logs on to a computer on which an application has been published (which is
determined by the list of servers on the Servers tab of the Publishing > Citrix XenApp
Published Application tab of the application), the application will be started directly (the
original command line will be used to start the application).

If the user logs on to a computer on which an application has not been published (again,
determined by the list of servers on the Servers tab), the application will not be started
directly. Instead, the Citrix ICA Client will be started with the ICA file passed as a parameter.
224
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
You can optionally choose to ignore the configured behavior inside or outside specific Zones via the
Locations and Devices field.

If you configure to passthrough anyway in specific Zones, at least one of the added Zones must
apply.

If you configure to passthrough anyway outside specific Zones, all of the added Zones must
apply.
Publishing Managed Applications
Configuring a Citrix XenApp published application
Use the Citrix XenApp tab to configure the application as a Citrix XenApp published application or
to publish content. Access to a published XenApp application or published content depends on the
settings that you configured on the Access Control tab.
Citrix XenApp published application
A Citrix XenApp published application is an application that runs on a Citrix XenApp server, but
which behaves as if it were running on the user's local computer. When you configure a Citrix
XenApp published application in the Management Console, this will create the published application
in the Citrix XenApp environment, including all options and access control types that have been
configured in the Management Console. The command line of the Citrix XenApp published
application will point to RES ONE Workspace with the application ID as a parameter, so that the
application will be managed by RES ONE Workspace. Citrix Storefront KEYWORDS can be entered in
the Description field of the application. The parent menu structure of the application will be used
as the Program Neighborhood Folder property of the application. This property changes
automatically when you change the name of one of the parent menus or when you move the
application to another menu.
Configuration

Open the relevant managed application at Composition > Applications.

In the Properties section, go to the Publishing tab.

On the Citrix XenApp Published Application tab, select Enable Citrix XenApp Application
Publishing.

On the Settings tab, configure the settings for the application.

When selecting a value in the Colors field, please note that not all settings listed are
supported in all Citrix versions. If a color depth is selected that is not supported by the used
Citrix version, the nearest supported color depth will be used.

If you use Citrix XenApp Secure Gateway, the default encryption level Basic should be
sufficient.

Instant Passthrough is a mechanism that provides a shortcut to an application located on a
remote server. When a user accesses the shortcut, the request is automatically be
redirected to a remote server on which the application is located. See Instant Passthrough
Settings for Citrix XenApp Application Publishing (see "Setting up Instant Passthrough for
Citrix XenApp published applications" on page 222) for more information.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
225
Chapter 4: Dynamic Configuration

To specify the folder in the Citrix Access Management Console to which the application
needs to be published, click the
applicable folder.
button in the Citrix folder section and select the
If multiple Citrix Server farms are integrated into your RES ONE Workspace site, the browse
window for selecting a folder will show a merged list of all the relevant folders on the
relevant farms. If a selected folder does not exist on each farm, the folder will be created
there. Please note that Citrix Administrator rights are required to create a new folder on the
Citrix server. Otherwise publishing will fail to farms on which the folder needed to be
created.

To publish configured file types as content redirection for published applications, select
Enable content redirection (using configured file types). Content Redirection requires
Citrix Presentation Server/XenApp 4.5 or higher.

To revert to the default settings as configured on the Defaults tab at the global node Setup
> Integration > Application Virtualization > Citrix XenApp Publishing, click the button
[Restore defaults...].

On the Client Settings tab, configure in which folders and with which shortcuts the published
application should be exposed to the end user. Also specify the Category that should be used to
group the applications in the Citrix Receiver.

On the Servers tab, configure to which servers, Server Groups and/or Citrix Worker Groups the
application should be published.
Server Groups are a RES ONE Workspace mechanism to combine multiple Citrix XenApp servers (only
for Citrix XenApp 4.x-6.5) into a single unit. They are typically used to represent silos. After
defining a Server Group, you can select this Server Group instead of selecting each individual Citrix
XenApp server (only for Citrix XenApp 4.x-6.5) when publishing an application.


226

The list of Available servers / groups is populated automatically by RES ONE Workspace. It
shows all the site's Server Groups and Agents that are Citrix servers, and all the Citrix
Worker Groups from the farms in your RES ONE Workspace site.

Changes to the Citrix Worker Groups are automatically processed every 12 hours. To refresh
this information immediately in the lists of Available servers / groups and Configured
servers / groups, use the Refresh icon button.

To define a Server Group, go to the Server Groups tab at Setup > Integration > Application
Virtualization > Citrix XenApp Publishing (Citrix XenApp 4.x-6.x).
Optionally, click the Load Evaluators tab to assign a specific Citrix Load Evaluator to a Citrix
XenApp published application (Citrix XenApp 4.x-6.x).

To participate in load management, each server or published application must have a load
evaluator assigned to it. The rules and their settings determine how the load of a particular
server or published application is managed.

For XenApp 6, only one load evaluator can be selected. For earlier versions of XenApp it is
possible to assign a different load evaluator per configured server.

Note that if a server is added to a server group that is assigned a specific load evaluator, the
application will be republished to all servers using the configured load evaluator.
When you click OK to close the application, it is (re)published on the specified servers with the
specified settings.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Notes

The value 'CTX' in the Published column on at Composition > Applications > Application List indicates that the
managed application is a Citrix XenApp published application.

The value 'CTX (failed)' in the Published column indicates that the application is configured as a Citrix XenApp
published application, but that it has never been published to Citrix successfully from the current RES ONE
Workspace environment. This situation can occur if Citrix XenApp applications are imported from a Building
Block.

Refreshing Citrix Worker Groups from the RES ONE Workspace Console is not available for Citrix XenApp 6.5 Host
Only servers.

If access to a published application is based on, for instance, OU membership or RES ONE Service Store service
(configured on the Access Control > Identity tab of an application), a command line to republish a published
application can be used. The command line is %respfdir%\pwrtech.exe /republishusers
{AppID | AppGUID}. See the RES ONE Workspace Administration Guide for more information.
Configuring a managed application as Citrix XenApp published content
Citrix XenApp published content is a file (such as a PDF document, a media file, or a URL) in any
network location in your environment. When the content is published, a shortcut to the document is
placed in the end user's Start Menu.
Configuration

Open the relevant managed application at Composition > Applications.

In the Properties section, go to the Publishing tab.

On the Citrix XenApp Published Application tab, select Enable Citrix XenApp Application
Publishing.

Select Publish as Content.

On the Client Settings tab, configure in which folders and with which shortcuts the published
content should be exposed to the end user.


Because Content Publishing only requires a command line and Access Control, all other
application configuration options will be disabled.
Return to the application's General tab in the Properties section and ensure that the Command
line field specifies the path to the location of the content that you want to publish.
This check is necessary because if you enter a path to a file in the Command line field when
creating a managed application, RES ONE Workspace checks if there is a file type defined for that
file extension. If so, the command line is automatically changed to the application executable, and
the file is added as a parameter. For example, C:\temp\test.xls in the command line will be
changed to...\...\excel.exe if Excel is associated with the file type XLS. This is not desirable if
you are publishing the file as content.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
227
Chapter 4: Dynamic Configuration
Publishing Citrix XenApp applications manually
Configuration

In the RES ONE Workspace Management Console, go to the node Composition > Applications.

Click New Application (using Wizard) to create an application in RES ONE Workspace. This
opens a wizard. Follow the steps of the wizard to configure the basic settings of the application.
When you have finished the wizard, the Edit application window opens. Click OK to close the
window.


Remember the application GUID or ID for later use.
Open the Citrix XenApp Management Console and create a published application.

When specifying the application executable, enter pwrgate.exe with the parameter
[application GUID or ID] "%*" to specify which application should be started.
Each managed application that is created in the Management Console has its own unique ID number
and GUID.
You can find the ID of a managed application in the Application List at Composition > Applications.
The ID and the GUID are shown when you open the application for viewing or editing (on the
General tab in the Properties section).
Adding and removing Citrix XenApp Servers using the command line
You can use command-line parameters to add or remove Citrix XenApp servers to server groups
without using the Management Console. This is typically used in an automated scenario where RES
ONE Automation is used to re-install a Citrix XenApp Server with new software. Tasks can be
configured in RES ONE Automation to remove a server from a Server Group, then to remove the old
software from the server, to install the new software, and finally to (re-)add this server to the
relevant Server Group.
Command lines
Action
Command line
Example
Add a Citrix XenApp server
to a server group
pwrtech.exe
/serveradd=<server name>
/group=<server group>
C:\progra~1\respow~1\pwrtech.exe
/serveradd=CTX10
/group=CTXServerGroup
Remove a Citrix XenApp
server from a server group
pwrtech.exe
/serverremove=servernaam
/group=servergroup
C:\progra~1\respow~1\pwrtech.exe
/serverremove=CTX10
/group=CTXServerGroup
Remove a Citrix XenApp
server from all server
groups
pwrtech.exe
/serverremove=servernaam
/group=*
C:\progra~1\respow~1\pwrtech.exe
/serverremove=CTX10 /group=*
228
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Citrix Provisioning Services
You can also use this technique for Citrix Provisioning Services scenarios. Suppose you have two
Citrix Presentation Server silos (a Microsoft Office Silo and an SAP Silo):
CTXSRV001
Office Silo
CTXSRV002
Office Silo
CTXSRV003
Office Silo
CTXSRV004
Office Silo
CTXSRV005
Office Silo
CTXSRV006
SAP Silo
CTXSRV007
SAP Silo
CTXSRV008
SAP Silo
CTXSRV009
SAP Silo
Because the SAP silo is overloaded, Citrix Provisioning Services is used to quickly transform servers
CTXSRV004 and CTXSRV005 into SAP servers.
CTXSRV001
Office Silo
CTXSRV002
Office Silo
CTXSRV003
Office Silo
CTXSRV004
SAP Silo
CTXSRV005
SAP Silo
CTXSRV006
SAP Silo
CTXSRV007
SAP Silo
CTXSRV008
SAP Silo
CTXSRV009
SAP Silo
However, the Citrix Presentation Server farm still thinks that CTXSRV004 and CTXSRV005 are servers
on which Microsoft Office has been installed, and the farm will be load balancing Office users to
CTXSRV004 and CTXSRV005. As a result, Microsoft Office users will experience that the application
is unavailable (because it has not been installed) and SAP users will not be load balanced to these
new servers. This is why the servers on which these applications are published need to be adjusted,
by using the above described method. The RES ONE Automation Agent can be embedded in the
Citrix Provisioning Services image together with a RES ONE Workspace installation. When the image
gets online, RES ONE Automation and RES ONE Workspace will automatically perform the necessary
steps.
Do not passthrough if available locally
Instant Passthrough for Citrix XenApp publishing has the option to Do not passthrough if application
is available on local computer. This option gives the ability to define when a published or local
version of the application is launched. You can optionally choose to ignore the configured behavior
inside or outside specific Zones via the Locations and Devices field.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
229
Chapter 4: Dynamic Configuration
Citrix XenApp Streaming
Client-side application virtualization reduces the cost of testing, installing and supporting
applications. Using isolation and application streaming technologies, client-side application
virtualization enables local virtualized applications. Rather than installing applications on user PCs,
applications are streamed to a protected isolation environment on their client device.
Where to find Citrix XenApp Streaming
What
Where
Setting up integration with
Citrix XenApp streaming
Go to Application Virtualization > Citrix XenApp Streaming in the
Setup menu
Setting up Citrix XenApp
streamed applications
Composition > Applications
Integrating Citrix XenApp Streaming
To integrate Citrix XenApp streamed applications in the user workspace, make the following
changes to its streaming profile:

Launch the Citrix Streaming Profiler and open the profile of the Citrix XenApp streamed
application.

Open Properties.

Navigate to Pre-launch and Post-exit scripts.

Add Script with following settings:

Pre-launch script

Isolate script

Script location: C:\program files\RES Software\Workspace Manager\pfgii.exe

Save the changed profile.

Update/Install Citrix Streamed application to the target location from which you want to stream
the application.

In the Management Console, add the Citrix XenApp streamed application to RES ONE Workspace
as a managed application.

On the Settings tab of the application, select Use "generic isolation" integration.
The further configuration of this managed application depends on the availability of a .profile file, a
.rad file, and whether Citrix XenApp Streaming is enabled. Citrix XenApp Streaming can be
enabled at Application Virtualization > Citrix XenApp Streaming in the Setup menu.

If you have a .profile file and Citrix XenApp Streaming is enabled, select the .profile file
directly when configuring the command line on the General tab of the managed application. If
the .profile file contains multiple applications, you will be prompted to select an application.

If you have a .profile file but Citrix XenApp Streaming is disabled, configure the managed
application as follows:
Command line: C:\Program Files\Citrix\Streaming Client\raderun.exe
Working directory: C:\Program Files\Citrix\Streaming Client
Parameters: /app:"application shortcut name" /package:"unc
path\application.profile"
For example: /app:"Adobe reader 8" /package:"\\Server\Streamed
applications\Acrobat 8XP\acrobat 8XP.profile"
230
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
If you do not have a .profile file
If you do not have a .profile file, you need to create a .rad file before creating the managed
application.

Create this file in a text editor such as Notepad. The file must contain the following
information:
[Rade]
InitialApp=<application that is started by the stream>
PackageLocation=<unc path to the .profile file>
For example:
[Rade]
InitialApp=Adobe reader 8
PackageLocation=\\Server\Streamed applications\acrobat 8\acrobat.profile

When adding the application in the Management Console, use the following information:
Command line: C:\Program files\Citrix\Streaming Client\RadeRun.exe
Working directory: C:\Program Files\Citrix\Streaming Client
Parameters: -<Options> "<path>\<streamedapplication.rad>"
For example: -C "\\server\Streamed applications\adobe 8XP.rad"

The .rad file can be placed anywhere because it contains a profile location. You can use the
Custom Resources Feature at Administration > Custom Resources to centrally store these .rad
files in the Datastore. This copies the .rad file to the Agents' local cache when the Workspace
Composer is started. When you do this, you also have to change the " path" parameter of this
streamed application in the Management Console so it points to the "%rescustomresources%"
location. (e.g. -C "%rescustomresources%\adobe 8XP.rad")

On the Settings tab of the application, select Use "generic isolation" integration.
Notes

If a Citrix Steamed Application is added, User Settings are automatically enabled for that application in the Zero
profile mode Process specified settings on session start/end. Also two User Settings are created for that
application, targeting the applicable (streaming application GUID-based) Folder tree and Registry tree for that
application. This covers the most commonly used locations where Citrix Streamed Applications store their
settings. Note that exceptions may occur.

Linked User Settings are not supported for Citrix Streaming Applications.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
231
Chapter 4: Dynamic Configuration
Microsoft App-V
With Microsoft Application Virtualization integration, you can integrate Microsoft App-V applications
into the user workspace. RES ONE Workspace supports Microsoft App-V versions 4.x and 5.x.
Version 4.x
In order to create the integration with App-V 4.x, RES ONE Workspace actively changes the way in
which Microsoft App-V applications are invoked. This is done by launching a RES ONE Workspace
helper process from within the virtual application environment. This helper process makes
configuration changes in the virtual environment (such as registry settings).
Version 5.x
With App-V 5.x virtual applications work like installed applications, allowing RES ONE Workspace to
apply actions and settings to the virtual applications directly. This eliminates the need of a helper
process within the virtual application environment and enables User Settings tracking, prefetching
User Settings and Process interception in RES ONE Workspace sessions.
Where to find Microsoft App-V
What
Where
Setting up integration with
Microsoft App-V
Go to Application Virtualization > Microsoft App-V in the Setup
menu
Setting up Microsoft App-V
applications
Composition > Applications
Integrating Microsoft App-V
Settings
Version 4.x

When selecting the Microsoft App-V 4.x Client that should be used:

As specified in command line of application, RES ONE Workspace uses the Application
Virtualization helper process that is specified in the command line on the Properties tab of
the App-V application at Composition > Applications.

sftrun.exe is the client launcher executable and overrides the default Microsoft App-V
client as resolved by the system.

sfttray.exe works similar as sftrun.exe, but provides feedback to the user by showing a
progress bar in the system tray.

Store patched OSD in RES ONE Workspace database ensures that the OSD files of all Microsoft
App-V applications that are added or changed after selecting this option are stored in the RES
ONE Workspace Datastore. This allows you to edit this file if necessary, using any editing tool
(e.g. Notepad).

Hide Command Window when launching application starts the App-V application without
showing a Windows command prompt.
232
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Version 5.x

When using Microsoft App-V 5.x RES ONE Workspace only checks if Microsoft App-V integration is
enabled. The other settings for Microsoft App-V integration (App-V Client to use, Store patched
OSD and Hide Command Window) are ignored.
Notes

Microsoft App-V was previously called SoftGrid. RES ONE Workspace Microsoft App-V Integration also supports
SoftGrid.

Changes in the Microsoft App-V Integration will be applied to new sessions only.

See http://www.microsoft.com/systemcenter/appv for more information about Microsoft App-V.
Setting up Microsoft App-V applications
Version 4.x
To set up a Microsoft App-V application, add an application in the Console and let the command line
of the application point to an OSD file.

The application title, description, Microsoft App-V client version and application icon are
automatically retrieved from the OSD file.
If the application is correctly identified as an App-V 4.x application, the following line will
appear on the Properties > General tab of the application:
Microsoft App-V 4.x Integration will be used for this application

When you save the application, the OSD file is copied and modified to provide integration
between RES ONE Workspace and Microsoft App-V.

All RES ONE Workspace technologies will automatically be configured to recognize the
application listed in the OSD file.
Please note that the Microsoft App-V 4.x client needs to be installed to be able to retrieve the
correct settings from the OSD file.
Notes

If you create a Building Block of a Microsoft App-V 4.x application and its OSD file is stored in the RES ONE
Workspace Datastore, the Building Block will contain all information about the contents of the OSD file. The OSD
file will be recreated when the Building Block is used to add or update the application in a different Datastore.

The default virtual Microsoft App-V drive points to "Q:". You can change this for all computers or override this
setting for a specific computer or user by setting environment variable %SGDRIVE%.

Microsoft App-V 4.x applications can be set up to run with the SFTRUN or the SFTTRAY command. However,
Microsoft App-V 4.x clients do no longer have the SFTRUN command. RES ONE Workspace will now detect this
situation and replace the SFTRUN on the fly with the command SFTTRAY /HIDE. This will help to resolve
problems with application definitions when migrating from older Microsoft App-V versions to Microsoft App-V
version 4.x.

If the OSD file of a Microsoft App-V 4.x application is stored in the RES ONE Workspace Datastore, you can edit
this file if necessary, using any editing tool (e.g. Notepad).
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
233
Chapter 4: Dynamic Configuration
Version 5.x
To set up a Microsoft App-V 5.x application, add a new application to the Management Console.


The command line can be specified in one of these ways:

On computers running Microsoft Windows Vista or higher, you can point the command line of
the application to an App-V 5.x package (*.appv) in, for example, the shared content share.
This file share will have been set up during the installation of your Microsoft App-V 5.x
server, when you chose the Microsoft App-V distribution method. The command line includes
the App-V application package GUID and a variable for the version GUID. This ensures that
the application can be started even if a new version of the App-V package is deployed.

If the Microsoft App-V 5 client is installed on the computer where the App-V 5 application is
configured, you can let the command line point to the executable of a virtual application in
the package installation root. By default, this is located at %ALLUSERSPROFILE%\AppV\<PACKAGEID>\<VERSIONID>. The App-V application package GUID and version GUID are
included in the command line. Newer versions of the App-V package will not be used.
The application title, description and icon are automatically retrieved from the App-V package.
If the command line is correctly identified as an App-V 5.x application, the following line will
appear on the Properties > General tab of the application:
Microsoft App-V 5 Integration will be used for this application
234
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration

Use Package delivery mode to configure if and how RES ONE Workspace should handle App-V
package delivery.

Selecting Minimal (global) or Minimal (per user) will create symbolic links for the App-V
package. The Microsoft App-V client will not mount the package locally, but instead will use
the links to load the package from the configured (network) storage location.
When using Minimal, the registry value
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AppV\Client\Streaming\AutoLoad must be
set to 0. This will prevent the Microsoft App-V client from fully downloading a Microsoft
App-V application when a user starts that application for the first time (default behavior).

Selecting Full (global) or Full (per user) will mount the App-V package in the background,
after the application is launched. This will load the full package to the package installation
root, even if
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AppV\Client\Streaming\SharedContentStor
eMode is set to 1.


When selecting Always use latest version of package, RES ONE Workspace will look for
newer versions of the App-V package in the configured Package root folder, up to two level
deep.
To configure File Types for the application, click the Import button on the File Types tab.
With Microsoft App-V 5.x integration the RES ONE Workspace features that can be configured are
extended with User Settings Tracking, User Settings Prefetching, and Process interception.
Notes
Microsoft App-V 5.x

After upgrading to RES Workspace Manager 2014 SR2, configuring the Package delivery mode for existing
Microsoft App-V 5 packages (packages that were configured in an earlier version than RES Workspace Manager
2014 SR2) will require you to (re)specify the central location of the Microsoft App-V 5 packages.

When configuring the RES ONE Workspace option Package delivery mode for Microsoft App-V 5 packages with
Minimal (per user) or Full (per user), the feature Folder Redirection for the Windows folder AppData, is not
supported.

On the User Settings > Properties tab, when selecting Track any setting changed by application immediately
for Zero Profile mode, the Registry to track (on the User Settings > Tracking tab of the application) must be
HKEY_CURRENT_USER. If this registry is changed, no User Settings can be tracked for this Microsoft App-V 5
application.
General Microsoft App-V

Changes in the Microsoft App-V Integration will be applied to new sessions only.

See http://www.microsoft.com/systemcenter/appv for more information about Microsoft App-V.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
235
Chapter 4: Dynamic Configuration
VMware ThinApp Integration
RES ONE Workspace can also integrate with other virtualization solutions, but the integration needs
to be set up manually outside of RES ONE Workspace.
VMware ThinApp integration:
VMware ThinApp simplifies application delivery by isolating applications from the underlying
operating system and plugging directly into existing virtual and physical desktop management tools
and infrastructure. ThinApp encapsulates applications inside a Virtual OS that transparently merges
a virtual system environment with the real system environment.
To integrate VMware ThinApp streamed applications in the user workspace, make the following
changes to capture folder of the ThinApp application:

Add respf.vbs in the root of the capture (where package.ini is located). The respf.vbs must
contain this text:
Function OnFirstParentStart
WaitForProcess ExecuteVirtualProcess(GetEnvironmentVariable("pwrgrids")),0
End Function

Add the following folder to the root of the capture (where package.ini is located):
%Local AppData%\RES\Workspace Manager

In the RES ONE Workspace folder, add ##Attributes.ini, containing this text:
[Isolation]
DirectoryIsolationMode=Merged

Rebuild the package by using build.bat.

Make the executables located in the \bin folder available, either by placing them on a network
share or by distributing them to all computers that run RES ONE Workspace.

Add the ThinApp application to RES ONE Workspace using the Console.

Click the Properties > Settings in the Edit application window of the ThinApp application.

Select Use "generic isolation" integration for the ThinApp application.
236
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
LANDesk
LANDesk Integration
With LANDesk Integration enabled in RES ONE Workspace, it is possible to deploy software on RES
ONE Workspace Agents on which a LANDesk client is running. It allows you to deliver, install, and
configure software at the start of a RES ONE Workspace session or when the user clicks on the
application shortcut.
At LANDesk in the Setup menu, you can integrate the installation feature of LANDesk in your
environment.
Global software distributions can be configured at Composition > Actions By Type > LANDesk.
Configure the software distributions for Applications on the Actions tab of the Configuration
section of an application.
Communication
RES ONE Workspace uses MBSDK Web Service to communicate with LANDesk server.
When configuring LANDesk Integration, RES ONE Workspace queries the configured MBSDK Web
Service for available software distribution packages. This is to verify the correct MBSDK Web Service
has been specified.
When configuring software distributions (LANDesk), RES ONE Workspace queries the configured
MBSDK Web Service for available software distribution packages. After selecting a distribution
package, a reference is stored in the RES ONE Workspace Datastore.
For global software distributions, the RES ONE Workspace Agent creates a scheduled task for the
selected distribution package on the LANDesk server at the start of a session. For software
distributions configured for an application, the scheduled task for the selected distribution package
on the LANDesk server is created when the user starts the application.
If the Wait for action to finish before continuing is enabled for a software distribution action for
an application, a Dismiss and notify me when done notification is displayed in the user session
when a user starts the application and the distribution package is deployed. This allows the user to
continue working with already available applications while the package is being installed. The user
receives a message once the installation is completed.
After deployment of the program, the scheduled task will remain on the LANDesk server.
Notes

Software distributions require a LANDesk client to be installed on the RES ONE Workspace Agent.

RES ONE Workspace supports LANDesk 9.5 and 9.5 SP1.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
237
Chapter 4: Dynamic Configuration
Microsoft System Center
Microsoft System Center Configuration Manager Integration
With Microsoft System Center ConfigMgr Integration enabled in RES ONE Workspace, it is possible
to deploy software distribution Programs on RES ONE Workspace Agents on which a Microsoft System
Center Configuration Manager client is running. It allows you to deliver, install, and configure
software at the start of a RES ONE Workspace session or when the user clicks on the application
shortcut.
At Microsoft System Center in the Setup menu, you can integrate the installation feature of
Microsoft System Center Configuration Manager in your environment.
Global software distributions can be configured at Composition > Actions By Type > Microsoft
ConfigMgr. Configure the software distributions for Applications on the Actions tab of the
Configuration section of an application.
Communication
RES ONE Workspace uses Windows Management Instrumentation (WMI) to communicate with both
Microsoft Configuration Manager server and client.
When configuring Microsoft System Center Configuration Manager Integration RES ONE Workspace
queries the configured Management Server for available software distribution Packages. This is to
verify the correct Management Server has been specified.
When configuring Software distributions (Microsoft ConfigMgr), RES ONE Workspace queries the
configured Management Server for available software distribution Packages and Programs. After
selecting a Program, a reference is stored in the RES ONE Workspace Datastore.
For global software distributions, the RES ONE Workspace Agent creates an advertisement for the
selected Program on the Microsoft System Center Management Server at the start of a session. For
software distributions configured for an application, the advertisement for the selected Program on
the Microsoft System Center Management Server is created when the user starts the application.
The advertisement that was created is based on a temporary Collection that contains only the
Configuration Manager client from the computer on which the RES ONE Workspace Agent is running.
The RES ONE Workspace Agent, then notifies the Configuration Manager client about this new
advertisement.
If the option Create subfolder for the temporary Device Collection is selected, you can specify the
Subfolder name used by RES ONE Workspace. The subfolder that will be used for the temporary
Device Collection, will be created in the SCCM Console in the Devices folder (at Overview >
Devices).

238
Microsoft System Center does not support the following characters in the subfolder names
for the temporary Device Collection: \ / : * ? " < > |. If unsupported characters are used in
the subfolder name, when saving, a message is displayed informing you about replacing
these characters with an underscore ("_"). You can then also decide to change the name and
save again.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
If the Wait for action to finish before continuing is enabled for a software distribution action for
an application, a Dismiss and notify me when done notification is displayed in the user session
when a user starts the application and the package is deployed. This allows the user to continue
working with already available applications while the package is being installed. The user receives a
message once the installation is completed.
After deployment of the program, the RES ONE Workspace Agent removes the advertisement from
the Management Server.
Warning
Support for Microsoft Configuration Manager 2012 application deployments was introduced in RES Workspace Manager 2014
RC. If you access a RES Workspace Manager 2014 RC (or later) Datastore using an older Management Console, be aware that
Microsoft ConfigMgr actions that deploy applications (rather than packages/programs) will be hidden from view.
Important: when accessing a RES Workspace Manager 2014 RC (or later) Datastore using an older Management Console, do not
delete any managed application that is configured with a (hidden) Microsoft ConfigMgr 2012 task to deploy an application.
Doing so will cause newer Management Consoles to report a Datastore integrity error.
Notes

Software distributions require a Microsoft System Center Configuration Manager client to be installed on the RES
ONE Workspace Agent.

RES ONE Workspace supports Configuration Manager 2007, 2012, 2012 SP1, and 2012 R2.

For more information, refer to Microsoft documentation.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
239
Chapter 4: Dynamic Configuration
RES Software
RES ONE Automation
With RES ONE Automation integration, you can integrate RES ONE Automation Tasks in the user
workspace. This allows you to run RES ONE Automation Tasks in the user workspace.
Where to find RES ONE Automation
What
Where
Setting up integration with
RES ONE Automation Tasks
Setup > Integration > RES Software > RES ONE Automation
Integrating RES ONE
Automation Tasks

when a session starts: Composition > Actions By Type > Automation
Tasks

when an application starts: Composition > Applications

when a security event occurs: Alerting in the Setup menu
Integrating RES ONE Automation Tasks
When you integrate RES ONE Automation Tasks in RES ONE Workspace, you can run specific RES ONE
Automation Tasks in the user workspace, for example to install software or to create user profiles.
RES ONE Automation Tasks can run when a user session starts or when an application starts, but also
when a security event occurs.
Settings

On the Settings tab, select the Dispatcher detection settings that RES ONE Workspace should
use to detect the RES ONE Automation Dispatchers:

Autodetect allows RES ONE Workspace to search for available RES ONE Automation
Dispatchers by sending a multicast signal.

Use Dispatcher address list allows RES ONE Workspace to search for specific RES ONE
Automation Dispatchers. If you select this option, you need to specify the IP address of at
least one Dispatcher.

Integrate with RES ONE Automation by selecting a RES ONE Automation Environment.

Specify a dedicated RES ONE Automation login for RES ONE Automation Authentication. This
dedicated login must at least have read permissions on the Modules and Projects nodes in RES
ONE Automation.

When you have set up the above settings, you can use the Test now button to test whether you
can actually connect to the selected RES ONE Automation environment.

The Log tab shows a log of all RES ONE Automation actions, including alerting actions.
Notes

RES ONE Automation Integration requires RES Automation Manager Series 4 SR2 or higher. If the RES ONE
Automation environment to which you are connected is not up-to-date, it will not be possible to use Tasks from
this environment.

See the RES ONE Automation Help for more information about RES ONE Automation.
Tip
With the RES Unified Console, you can easily access the RES ONE Workspace and RES ONE Automation Consoles from a single
view.
240
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
RES ONE Service Store
RES ONE Service Store Integration allows you to base access to an application or object on the
availability of RES ONE Service Store Services (already available or created from RES ONE
Workspace).
Where to find RES ONE Service Store
What
Where
Setting up integration with RES ONE
Service Store
Setup > Integration > RES Software > RES ONE Service
Store
Access Control on managed applications on Composition > Applications, on the application's
a delivered RES ONE Service Store Service Access Control > Identity tab
Access Control on objects on a delivered
RES ONE Service Store Service
On the object's Access Control tab
Integrating RES ONE Service Store services
When you integrate RES ONE Service Store services in RES ONE Workspace, you can base access to
an application or object on the availability of RES ONE Service Store Services (already available or
created from RES ONE Workspace with the RES ONE Service Store Service Wizard). For example,
you can base Access Control to the managed application Microsoft Visio on the RES ONE Service
Store Service "Microsoft Visio". This enables you to use the RES ONE Service Store workflow to
approve and install the application, while RES ONE Workspace automatically makes the managed
application available as soon as the service is actually delivered in the end user's workspace.
The RES ONE Service Store Service Wizard is used to create new RES ONE Service Store services
directly from the RES ONE Workspace Console. All communication of this wizard to the Catalog
Services of RES ONE Service Store is SSL-encrypted.
Settings

The Catalog host is the machine on which the Catalog Services run. The Catalog Services are
used by RES ONE Workspace to query which RES ONE Service Store services have been delivered
to a user.
Each user's list of delivered RES ONE Service Store Services is cached to ensure availability of
this information in case the Catalog Service cannot be reached.

The port of the Catalog host.

The Publication name and Publication password are used by RES ONE Workspace to connect to
a RES ONE Service Store Catalog host. This Catalog host contains a selection of available RES
ONE Service Store Services that can be used as Access Principle in Access Control.

When you have setup the above settings, you can use the Test now button to test whether you
can actually connect to the specified Catalog host. If connection is possible, an overview of all
available RES ONE Service Store Services will be shown.
Note
If Access Control is based on a Not RES ONE Service Store Service rule and RES ONE Service Store Integration is disabled,
all users will comply with this rule.
Tip
With the RES Unified Console, you can easily access the RES ONE Workspace and RES ONE Service Store Consoles from a
single view.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
241
Chapter 4: Dynamic Configuration
RES HyperDrive
With RES HyperDrive integration, you can integrate RES HyperDrive into the user workspace. After
enabling RES HyperDrive integration, client settings can be configured for users running RES
HyperDrive. Additionally, a one-time migration from Dropbox to RES HyperDrive can be configured
for end users.
Where to find RES HyperDrive
What
Where
Setting up
Setup > Integration > RES Software > RES HyperDrive
integration with RES
HyperDrive
Integrating RES HyperDrive
When you integrate RES HyperDrive in RES ONE Workspace you can overrule the settings for the RES
HyperDrive Client within a RES ONE Workspace session. If no settings are configured the RES
HyperDrive Client will run with the user's settings.
Settings

RES HyperDrive Client settings includes all settings that are available in the RES HyperDrive
Client. To overrule a setting, select the appropriate value from the list or select <configured>
and fill in a value.

You can override the global settings of this feature for specific Workspace Containers.
The configured settings will be written to the registry at the start of each RES ONE Workspace
session and applied from the registry when the RES HyperDrive Client starts.
Note
You are allowed to use environment variables, e.g. %temp%, to set numeric or string values.
Configuring RES HyperDrive Migration Wizard
When you enable the RES HyperDrive Migration Wizard in RES ONE Workspace, you can configure the
settings for a one-time migration from Dropbox to RES HyperDrive. This will invoke the RES
HyperDrive Migration Wizard for end users running both RES HyperDrive and Dropbox. The wizard
enables these users to mark the business-related folders and (sub)folders stored in their Dropbox
and migrate these to the RES HyperDrive of their choice. Optionally, the data can be deleted from
Dropbox upon completion of the migration.
The Wizard runs at the start of each RES ONE Workspace session until the data migration has been
completed, or until the configured migration deadline has been reached.
242
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
The Wizard starts only if the following criteria are met:

The Dropbox client is running.

The configured Dropbox folder is present on the local machine

RES HyperDrive is running and the user is logged on.

At least one RES HyperDrive is configured and mapped to a driveletter.
Settings

Use Migrate data from Dropbox to RES HyperDrive to encourage your end users to migrate
their business-related Dropbox data.

Select Block Dropbox for user after completing migration wizard or upon deadline expiration
to restrict further access to the Dropbox client and local Dropbox folder. This blocks the users’
access to the Dropbox client and folder from within the RES ONE Workspace session.

Configure a Migration deadline to set a final date for users to complete the data migration.
After this date, the Wizard will no longer be offered to the user. If "Block Dropbox for user after
completing migration wizard or upon deadline expiration" is configured, access to Dropbox will
also be blocked after this date.

Your Custom message for end user will be shown on the welcome page of the RES HyperDrive
Migration Wizard.
Notes

Block Dropbox will restrict access to the Dropbox executable and the users’ Dropbox folder. To block the
Dropbox web interface, deny access to the Dropbox website on the Websites tab of Security > Applications >
Websites.

If the RES HyperDrive Migration Wizard is completed, canceled or cannot be executed, for instance due to no
valid RES HyperDrive, an entry is recorded in the RES ONE Workspace Event Log.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
243
Chapter 4: Dynamic Configuration
RES VDX
RES Virtual Desktop Extender
At Setup > Integration > RES Software > RES VDX, you can enable integration for RES Virtual
Desktop Extender. The RES Virtual Desktop Extender merges local applications and a remote
desktop into a single workspace. This technology eliminates the need to switch between a local and
remote desktop providing an optimized user experience. This is useful if you run applications that
do not function properly in a server-based computing environment, or if you have other reasons to
keep some applications running locally.
With the RES Virtual Desktop Extender, a virtual channel is created between the session and the
locally installed desktop extender as soon as a session is initialized. If the user has been granted
access to an application that is installed locally, that application will be presented in the end user's
session.
To configure an application to run from the local desktop using RES VDX, select Run as Workspace
Extension at its Properties > General tab.
Configuration
Enable RES Virtual Desktop Extender (VDX) integration - Enable or Disable the integration of RES
VDX with RES ONE Workspace. If disabled the VDX functionality remains intact, but is no longer
managed by RES ONE Workspace.

Enable VDX Engine - Enable or Disable the RES VDX Engine. This disables VDX altogether, not
just the integration with RES ONE Workspace.

Let VDX override Workspace Extender - If both VDX and the RES Workspace Extender are
installed, this option will force RES ONE Workspace to use VDX.

Hide client taskbar at session start
Autodetect - Uses the settings as they are used in the scenarios as described in the RES VDX
documentation.
Yes - Hides the local taskbar when starting a remote session.
No - Shows the local taskbar when starting a remote session.

Show already running client applications
Autodetect - Displays running client applications that would be obscured when starting a
remote session.
Yes - Allows applications windows from applications that were running before the RES VDX
session started to be managed by RES VDX.
No - Only new applications windows from applications that were not running before the RES VDX
session started will be managed by RES VDX.
Exception: In case applications share the same process (e.g. explorer.exe and
iexplorer.exe), newly started application windows will not be managed by RES VDX if the
process was already running at the start of the RES VDX session.
When choosing Yes or Autodetect, running client applications can be freely moved in and out of
the session by users.

End running client applications at log off - Ends any applications that are running on the client
when logging off.
244
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration

Windows keys passthrough - Allows the use of the following keyboard shortcuts for Microsoft
Windows in RES VDX sessions:
Windows
key
CTRL
Open / Close Start Menu
+ E
Open Windows Explorer
+ R
Open Run dialog box
+ M
Minimize all windows
+ D
Show desktop
+ number
Start the program pinned to the taskbar in the position indicated by the
number (from left to right). If the program is already running, switch to
that program.
+ Esc
Open / Close Start Menu
+ Shift +
Esc
Open Task Manager
Note: When Windows keys passthrough is enabled for user sessions running on Microsoft
Windows 8/8.1 and 2012/2012 R2, the ALT+Tab key combination to switch between application
windows, does not work.

Let users access client start menu through VDX - Enable this option to show the start menu of
the client in an alternative start menu, accessible from the RES VDX tray icon on the remote
desktop. The client start menu offers a Search option. This enables VDX users to search for
applications easier by typing in (part) of the application name.

Let users access client desktop through VDX - Enable this option to show the desktop shortcuts
of the client in an alternative start menu, accessible from the RES VDX tray icon on the remote
desktop.

Let users access client notification area through VDX - Enable this option to show the
notification area of the client in an alternative start menu, accessible from the RES VDX tray
icon on the remote desktop.

Mode
A (recommended): Enables RES VDX to run in the reverse seamless mode and also supports
Microsoft Windows 8 / 8.1 and 2012 / 2012 R2.
B: Enables RES VDX to run in reverse seamless mode. This mode is not supported for Microsoft
Windows 8 / 8.1 and 2012 / 2012 R2.

Disabled: Enables RES VDX to run in native "Extender mode". Extender mode means that local
applications run seamlessly within the remote desktop, but the local application windows are
not managed by RES VDX: the local applications are not part of the Z-order, but they are
present on the taskbar as if they are running in the remote desktop. Switching to Extender
mode can be useful when you are dealing with applications that cannot properly be managed by
RES VDX.

Disable virtual Z-order for the following processes - Excludes specific local processes from the
remote session. This forces classic behavior: Application on top of the remote session or the
remote session on top of the application. Enter the process names separated by semicolons (;)
(example: proc1.exe;proc2.exe;proc3.exe). This setting can only be configured for Mode: b.

Ignore the following client processes - Ignores running client processes from VDX integration.
These applications will not be available through VDX and/or the client desktop / client Start
Menu folders. Enter the process names separated by semicolons (;) (example:
proc1.exe;proc2.exe;proc3.exe). This setting can be configured for Mode: b and Mode:
disabled.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
245
Chapter 4: Dynamic Configuration

Custom message for the run balloon - Allows you to adapt the title and message of the
information balloon that is displayed with the RES VDX icon in the notification area.
Note
When a RES VDX session is started from a RES ONE Workspace session, the screensaver of the client will be used by default. It
is possible to force the use of the RES ONE Workspace session screensaver by setting the registry value
NoAgentScreenSaver.
Web Portal
Besides creating a physical desktop by replacing the shell, it is also possible to create a virtual webbased desktop. This allows you to integrate the interface with an existing portal environment for
remote access purposes, so that users can connect to their desktop from a remote location via a
web interface.
To create such a web-based desktop, you need to enable Web Portal rendering at Web Portal in the
Setup menu. When Web Portal rendering is enabled, RES ONE Workspace will render a Web Portal in
the \Webtop folder located in the user's temp directory. The Web Portal can be started by launching
a web browser with startup parameter %temp%\webtop\webtop.html.
You can change the Web Portal's appearance by selecting a Web Portal style. There are three
default Web Portal styles to choose from. If you have a basic knowledge of HTML you can edit the
Web Portal style to fit your needs.
To make the Web Portal available to the user, Microsoft Internet Explorer 6 or higher needs to be
made available as a managed application. For this purpose, the installation folder of RES ONE
Workspace contains the Building Block file web-portal-integration.xml with a preconfigured
version of Microsoft Internet Explorer. By importing the Building Block file into the Management
Console, the application Web Portal Integration will be added at Composition > Applications >
Applications.
It is also possible to offer the Workspace Composer through the application Web Portal Integration
only:

At Composition > Applications, open the application Web Portal Integration.

At Properties > General, copy the number in the ID field (for example 63) and close the
application.

At Composition > Applications > Settings, select When online, start a specific application ()
instead of RES ONE Workspace taskbar.

Enter the copied number of the application and click OK. This application ID is now shown in
parentheses in the text. When the user starts a new session, only the application Web Portal
Integration will be started; the desktop will not be shown.
Notes

You can also make a Web Portal available manually, by adding Microsoft Internet Explorer as a managed
application to the Management Console and adding the parameter %temp%\webtop\webtop.html to its
properties.

If the user session uses the RES ONE Workspace shell, you can hide the Start button on the Web Portal by
selecting Hide "Start"-button on RES ONE Workspace Shell taskbar at Composition > Desktop > Lockdown and
Behavior.
246
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Configuring Web Portal styles
Use the Web Portal Style Editor window to configure the appearance of the Web Portal.
Configuration
You can change the basic settings of the Web Portal style at Settings:

The Title field specifies the caption of the Web Portal.

The image file that you select for the Web Portal in the Logo field (e.g. your company logo) will
be saved as a resource in the Datastore.

If necessary, you can specify in the Root URL a URL that is different from the default root of
the Web Portal.

The Menu split field specifies the number of menu items that is shown on the Web Portal before
a split of the menu occurs.

The Application split field specifies the number of applications that is shown on the Web Portal
before a split of the menu occurs.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
247
Chapter 4: Dynamic Configuration
4.9
The order of events when a session starts
Event
Remarks
1. Load language settings
2. Initialize MLS
3. Identify the computer/client and its
properties:

Name

IP address

Session ID

Operating System type
and version

Connection state
By default, a computer's connection state is "online" if it
can reach the IP address of the local network connection.
Advanced connection state settings may apply for specific
Zones, as configured at User Context > Connection States
in the Management Console.
4. Determine primary Directory Service
and OU and group 5. memberships
6. Determine accessible Zones
7. Determine accessible Workspace
Containers
If the option Let user decide which accessible
Workspace Container to use is selected for a managed
application, user is prompted to choose a Workspace
Container.
8. Set:

Managed Applications
Properties

Desktop > Lockdown and
Behavior

Desktop > Background
9. Set Security for:

Applications

Removable Disks

Files and Folders

Read-only Blanketing

Global Authorized Files

Network
10. Set shell
11. Access Balancing
12. Set Environment Variables
Environment Variables are set in the order in which they
appear in the list at Composition > Actions By Type >
Environment Variables in the Management Console.
13. User Settings storage location
Map Drive or connect Full path.
13. Set Folder Redirections
If configured, certain folders of the user profile (e.g.
Appdata, Documents, etc.) are redirected to a different
path, such as a shared network location. If possible, target
folders are created. A backup is made of pre-existing
folder redirections.
248
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Event
Remarks
14. Execute RES ONE Automation Tasks
If configured with the option Run before other actions.
15. Execute Microsoft ConfigMgr
software distributions
If configured with the option Run before other actions.
16. Execute LANDesk software
distributions
If configured with the option Run before other actions.
17. Execute Commands

If configured with the option At logon before
other actions.

Commands are executed asynchronously, in the
order in which they appear in the list at
Composition > Actions By Type > Execute
Command in the Management Console.

If fast connect is enabled, the actual mappings
are not established until the moment of use.

Drive and Port Mappings are processed
asynchronously if the option Wait for task to
finish before continuing is cleared.

If the User Settings storage location could not be
mapped directly after Environment Variables,
then it is mapped now.

If fast connect is enabled for printers, the actual
printer connections are not established until the
moment of use.

Printers are processed asynchronously if the
option Wait for task to finish before continuing
is cleared.
18. Set Drive and Port Mappings
19. Set Drive Substitutes
20. Check/create Folder Redirection
target folders
21. Set Sessions Security + check
passthrough
22. Printers
23. Build User Home Directory
24. Perform Folder Synchronization
actions
25. Process global User Settings:

determine sampling mode

load settings
Global User Settings are set, security for Applications,
Removable Disks processed asynchronously.
26. Set User Registry settings
27. Build User Profile Directory
28. Execute Commands

If configured with the option At logon after
other actions.

Commands are executed asynchronously, in the
order in which they appear in the list at
Composition > Actions By type > Execute
Command in the Management Console.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
249
Chapter 4: Dynamic Configuration
Event
Remarks
29. Execute RES ONE Automation Tasks
30. Execute Microsoft ConfigMgr
software distributions
31. Execute LANDesk software
distributions
32. Set default printer
33. Load language settings and
mappings
34. Data Sources

Remove existing Data Sources

Create Data Sources configured with the option
Create Data Source during logon. (By default,
Data Sources are created when the linked
application is started.)
35. Load settings for:

Usage tracking

CPU Optimization

Instant LogOff

Memory Optimization

Desktop/Screensaver

Web Portal
36. Create Start Menu items
The Start Menu is created asynchronously.
37. Initialize Process Interception
38. Set Security for:

Applications

Removable Disks

Files and Folders

Read-only Blanketing

Global Authorized Files

Network
39. Remove existing File Associations
and create new ones
At this point, the session has started and the user's workspace is available. In the meantime,
application-level User Settings are processed in the background:

determine sampling mode

load settings
Tip
In a user's Workspace Analysis, the Event Logs show full details of each logged session.
250
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
4.10
The order of events at a session refresh
Event
Remarks
1. Query local IP of Subscriber/Desktop
Extender client
2. Determine refresh mode
(silent yes/no)
3. Restart Guardian process
4. Set process priority of pfwsmgr.exe
to Normal
5. Query for license on client through
virtual channel
6. If not silent refresh, hide
desktop/taskbar
7. Reload license info
8. Close desktop process
9. Unload application menus
10. Reload language settings
11. Initialize MLS
12. Re-load user context
(username, group membership, OU membership, Zones,
workspace containers, etc)
13. Load language specific actions
(registry, etc)
14. Check for valid license on client
through virtual channel
15. Reload application menus
16. Initialize Process Interception
17. Load desktop items
18. Set screensaver timeout
19. Set Security for:

Applications

Removable Disks

Files and Folders

Read-only Blanketing

Global Authorized Files

Network
20. Remap removable disks
21. Configure network security
22. Start desktop
23. Load quicklaunch/taskbar items
24. Configure instant file associations
25. Refresh mappings, substitutes
26. Reconnect printers at refresh
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
251
Chapter 4: Dynamic Configuration
Event
Remarks
27. Run folder sync tasks at refresh
28. Run external tasks at refresh
29. Run autolaunch items
30. Show desktop/taskbar
31. Check for new apps in menu (&
display message if needed)
32. Check autolaunch new apps on
refresh
33. Check running apps & terminate if
needed
34. Reset process priority for
pfwsgr.exe to High
35. Save user event log (Actions
(/PowerLaunch) log)
At this point, the session has started and the user's workspace is available. In the meantime,
application-level User Settings are processed in the background:

determine sampling mode

load settings
Note
In sessions running on Microsoft Windows 8, 8.1, 2012 R2, or 10, changes to tiles on the Start screen are not executed at a
session refresh. Microsoft’s architecture on these Operating Systems does not allow a smooth addition or deletion of tiles.
4.11
The order of events when a session ends
Event
1. Disconnect session
Remarks

If Instant Logoff is enabled

2. Save User Settings
"Before RES ONE Workspace splash screen
appears" is enabled for Disconnect user session
when log off is initiated
User Settings are processed synchronously.
3. Run folder sync tasks at logoff
4. Execute Commands
Commands are executed synchronously, in the order in
which they appear in the list at Composition > Actions By
Type > Execute Command in the Management Console.
5. Save Memory Optimization statistics
6. Unload taskbar
7. Release RES VDX license
8. Release any application concurrent
licenses
252
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
Event
Remarks
9. Release RES ONE Workspace license
10. Remove Sessions Security
(SessionGuard) lock
11. Remove drive mappings
12. Restore persistent drive mappings
13. Save default printer
14. Save printer preferences
15. Remove printer connections
16. Remove File Types (Instant File
Associations)
17. Remove policies
18. Remove webtop
19. Close security for:

Applications

Removable Disks

Files and Folders

Read-only Blanketing

Global Authorized Files

Network
and
Close Process Interception
20. Cleanup Folder Redirections
Folder redirections for the user that started the session
are restored.
21. Synchronize User Settings
22. Disconnect session
If "After RES ONE Workspace splash screen disappears" is
enabled for Disconnect user session when log off is
initiated
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
253
Chapter 4: Dynamic Configuration
4.12
Building the end-user's Start Menu, Desktop and Quick Launch bar
In the end-user session, RES ONE Workspace determines which shortcuts are exposed in the end
user' Start Menu, Desktop and Quick Launch bar, and the exact placement of these shortcuts.
Depending on the Shell and the setting 'Windows Shell shortcut creation' settings (on page 254),
RES ONE Workspace leaves the existing Microsoft Windows (i.e. unmanaged) shortcuts unchanged; or
adds managed shortcuts besides the existing ones; or removes all unmanaged shortcuts and exposes
only managed ones.
Note
For the purposes of this description, shortcuts on the Quick Launch bar are equated with items pinned to the task bar.
The Shell and the setting 'Windows Shell shortcut creation'
The applicable Shell and the value of the setting 'Windows Shell shortcut creation' together
determine what RES ONE Workspace does with the Start Menu, Desktop and Quick Launch bar in a
session.

The Shell is set in the Console at Composition > Desktop > Shell.

'Windows Shell shortcut creation' is set on the Settings tab at Composition > Applications.
In the RES ONE Workspace Shell, users get a restricted workspace with a layout that resembles
classic Windows 2000. In this shell, RES ONE Workspace fully controls which icons and shortcuts are
exposed. Users can tweak this by using the Workspace Preferences tool, which allows them to add
or remove managed items on their desktop and Quick Launch bar. Users cannot re-order the icons
and shortcuts, nor use Windows functionality such as "Pin to taskbar".
In the Microsoft Windows Shell, the interface is much like a regular Windows session and users have
more control over their Start Menu, desktop and Quick Launch. In this shell, the 'Windows Shell
shortcut creation' setting determines whether RES ONE Workspace touches the user's Start Menu,
Desktop and Quick Launch bar:
Windows Shell shortcut
creation
Effect on the Start Menu, desktop and Quick Launch bar
do nothing
RES ONE Workspace does not change the Start Menu, Desktop or Quick
Launch area in any way. The user has full freedom to create or
remove items using standard Windows functionality.
merge with existing
shortcuts
Shortcuts to managed applications are added to the user’s existing
Start Menu, Desktop and Quick Launch bar. Any existing unmanaged
items there are left intact. The result is a mix of managed and
unmanaged items.
replace
All unmanaged items are set aside. The user' Start Menu, Desktop and
Quick Launch bar contain only managed items.
254
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
What happens at session logon
At the start of a RES ONE Workspace session, the Workspace Composer first establishes the user’s
identity and context; and then it composes the environment, i.e. which managed applications,
objects and settings are available in the current session. This information is stored in the Agent
cache.
After composing the environment, the Workspace Composer creates an internal list of menus and
managed applications based on information in the Agent cache. This list is then used to set up the
user's Start Menu, Desktop and Quick Launch bar.
The combination of the applicable Shell and the value of the 'Windows Shell shortcut creation'
setting determines how the list is implemented.

The RES ONE Workspace Shell (on page 255)

The Microsoft Windows Shell (on page 255)

Windows Shell shortcut creation: ‘do nothing’ (on page 255)

Windows Shell shortcut creation: ‘replace’ (on page 255)

Windows Shell shortcut creation: ‘merge’ (on page 257)
The RES ONE Workspace Shell
In the RES ONE Workspace Shell, RES ONE Workspace maintains its own desktop (a separate program
called pwrdesk.exe), its own Start Menu, and its own task bar, including Quick Launch and system
tray items.
Windows explorer can run as a file browser, but no actual shell exists.
The Microsoft Windows Shell
The Microsoft Windows Shell uses windows explorer as shell.
The extent to which RES ONE Workspace changes or replaces the Start Menu, Desktop and Quick
Launch in the Microsoft Windows Shell depends on the setting for Windows Shell Shortcut creation:

do nothing

replace

merge with existing unmanaged shortcuts
Windows Shell shortcut creation: ‘do nothing’
In this setup, the user Start Menu, Desktop and Quick Launch bar are the same as they would have
been in a non-RES ONE Workspace session. No managed items are added, no unmanaged items are
removed.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
255
Chapter 4: Dynamic Configuration
Windows Shell shortcut creation: ‘replace’
In this setup, the user is only shown managed items. Unmanaged items are neither available nor
shown.
RES ONE Workspace achieves this by taking the following steps:

The policy nocommongroups is set to 1. This effectively hides the common Start Menu items and
common Desktop items.

The Run keys in the user’s HKEY_CURRENT_USERS_ registry are copied to another location, so
that they are not actually run. (Note that this behavior can be disabled in the console.)
Any existing items in the user’s Start Menu, Desktop, Quick Launch and pinned task bar folder (tree)
are moved to a folder (tree) called <name>.mslinks (for example Desktop.mslinks). Pinned items
are removed from the task bar.
The user’s Start Menu, Desktop and Quick Launch bar is then built up based on the list of managed
items.
The start menu
The Start Menu is created according to the menu structure and applications determined when the
environment was composed.
Menus are created as folders in the user’s profile, and shortcuts are created within these folders.
The actual command line is %respfdir%\pwrgate.exe <application id>.
Which shortcuts are shown on the Desktop
What items are shown on the Desktop depends on the configuration of the Managed Application'
setting for Automatic Shortcuts on the Desktop:

If configured to have a mandatory shortcut, the Managed Application shortcut is shown on the
Desktop and cannot be removed by the user.

If configured to have a voluntary shortcut, the Managed Application shortcut is shown on the
Desktop, but the user has the option to remove it.

If configured with "do nothing", the Managed Application shortcut is not placed on the Desktop.
The user can use the Workspace Preferences tool to add or remove this shortcut.
Information about Managed Application shortcuts that the user has added to or removed from the
Desktop is stored in the ‘desktop=…’ line in the user's PWRUSER.INI file ("Central storage location
of User Settings and other user-specific information" on page 206). The applications are identified
on the basis of their application ID.
The location of Desktop shortcuts
The first time the user logs off, the exact location (x, y coordinates) of items on the Desktop are
determined in the file desktop.loc in the user’s home folder. The next time the user logs on or
refreshes the session, the information in this file is used to position the Desktop items in the right
place.
Notes

Users may initially see their Desktop items left-aligned on the screen, after which they move to the correct
location.

Under some conditions (notably when using a mandatory profile), Microsoft Windows may still move all desktop
items back to the left-aligned positions.
256
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
The Quick Launch bar
As with the Desktop, what items are shown on the Quick Launch bar depends on the configuration of
the Managed Application' setting for Automatic Shortcuts > Quick Launch:

If configured to have a mandatory shortcut, the Managed Application shortcut is shown on the
Quick Launch bar and cannot be removed by the user.

If configured to have a voluntary shortcut, the Managed Application shortcut is shown on the
Quick Launch bar, but the user has the option to remove it.

If configured with "do nothing", the Managed Application shortcut is not placed on the Quick
Launch bar. The user can use the Workspace Preferences tool to add or remove this shortcut.
Information about Managed Application shortcuts that the user has added to or removed from the
Quick Launch bar is stored in the ‘quicklaunch=…’ line in the user's PWRUSER.INI file ("Central
storage location of User Settings and other user-specific information" on page 206). The
additional line ‘pinorder’ stores the order in which the items appear on the bar. The applications
are identified on the basis of their application ID.
Windows Shell shortcut creation: ‘merge’
In this mode, RES ONE Workspace must maintain the user’s existing environment while adding
managed items to it. To accomplish that, an important step is added to the process. Before
configuring the managed items, a full copy is made of the common Startup folder, the common
Desktop folder and the common Quick Launch folder to the user’s profile. Next, the
nocommongroups policy is set to 1, which hides the common items from the user. (If the global
group policy nocommongroups was already set, this step is skipped.)
Hereafter the Start Menu, Desktop and Quick Launch items are configured the same way as for the
‘replace’ mode. Existing items are NOT moved to a .mslinks folder, but items are simply added to
existing folders in the user’s profile.
Once again, managed Desktop items are moved to the location as preserved in the desktop.loc
file. Unmanaged Desktop items are not moved.
Quick Launch items are added to the existing items. As a result, the Quick Launch bar first shows all
existing unmanaged pinned items (i.e. on the left side of the task bar). Any managed items follow
after the unmanaged ones.
Replacing command lines
A Managed Application may be set with the option ‘Replace existing unmanaged shortcuts’. If this is
the case, all existing unmanaged shortcuts are checked to see if their command line (including
parameters) match a Managed Application; if so, the command line is replaced with the correct
‘%respfdir%\pwrgate.exe <app-id>’ command line.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
257
Chapter 4: Dynamic Configuration
What happens at session logoff
During the logoff process, several steps as described in What happens at session logon (on page
255) are reversed in order to return the user’s environment to the state it was in before the RES
ONE Workspace session was started. Some settings related to the user's Start Menu, Desktop and
Quick Launch are preserved, depending on the Shell and on the 'Windows Shell Shortcut creation'
setting (on page 254).

The RES ONE Workspace Shell (on page 258)

The Microsoft Windows Shell (on page 258)

Windows Shell shortcut creation: ‘do nothing’ (on page 258)

Windows Shell shortcut creation: 'replace' (on page 258)

Windows Shell shortcut creation: ‘merge’ (on page 258)
The RES ONE Workspace Shell
In this shell, not much needs to be done, as RES ONE Workspace does not use or show any items in
the user’s profile (because there is no explorer shell).
The Microsoft Windows Shell
Windows Shell shortcut creation: ‘do nothing’
In this configuration, no actions are needed to reverse managed items, as they were not configured
in the user’s GUI.
Windows Shell shortcut creation: 'replace'
In this configuration, extra steps are needed to remove all managed items and restore the original
user environment:

The list of Desktop and Quick Launch shortcuts is updated in the pwruser.ini file.

The current location of each managed desktop item is saved in the desktop.loc file.

The pinned items are unpinned, and the Start Menu, Desktop and Quick Launch folder trees in
the user profile are removed.

The items saved in the .mslinks folders are moved back to their original location.

HKEY_CURRENT_USER \Run keys are moved back from the backup location to the original
location.
Windows Shell shortcut creation: ‘merge’
In this configuration, the following steps are taken to remove all managed items:

The list of Desktop and Quick Launch shortcuts is updated in the pwruser.ini file.

The current location of each managed desktop item is saved in the desktop.loc file.

If any shortcuts had their unmanaged command lines replaced with managed command lines,
the original unmanaged command line is put back in the shortcut.

Any managed pinned items left on the task bar are unpinned.

All managed items are removed from the user’s Start Menu, Desktop and Quick Launch folder
(tree) in the user’s profile.
258
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 4: Dynamic Configuration
What happens at session refresh
During a session refresh, the context of the user is determined anew, so the list of authorized
applications may also change. Therefore, the Start Menu, Desktop and Quick Launch items must be
set again. As at session logon, the exact steps taken depend on the Shell and on the 'Windows
Shell shortcut creation' setting (on page 254).

The RES ONE Workspace Shell (on page 259)

The Microsoft Windows Shell (on page 259)

Windows Shell shortcut creation: ‘do nothing’ (on page 259)

Windows Shell shortcut creation: ‘replace’ (on page 259)

Windows Shell shortcut creation: ‘merge’ (on page 259)
The RES ONE Workspace Shell
In the RES ONE Workspace Shell, the Start Menu, desktop and Quick Launch are setup completely,
as if it were a new session. See What happens at session logon (on page 255).
The Microsoft Windows Shell
Windows Shell shortcut creation: ‘do nothing’
In this setup, the user' Start Menu, Desktop and Quick Launch bar do not change as a result of the
refresh, so no action is taken to rebuild these.
Windows Shell shortcut creation: ‘replace’
In this setup, the following steps are taken:

Current managed items are unpinned from the task bar.

The current location of managed Desktop items is saved in the Desktop.loc file.

The contents of the Start Menu, Desktop and Quick Launch bar are removed.

The new context of the user environment is determined.

Based on this new context the list of authorized applications is determined.

The Start Menu, Desktop and Quick Launch items are created in the same way as at session
start.

Shortcuts in the Quick Launch folder are pinned to the task bar (windows 7 or 2008 R2).

Desktop items are moved to the locations previously saved in Desktop.loc.
Windows Shell shortcut creation: ‘merge’
In this setup, the steps taken are the same as for 'replace' mode, except for the following:

Before removing items, all shortcuts where the unmanaged command line was replaced with a
managed command line are set back to the original unmanaged command line.

When items are removed from the Start Menu, Desktop or Quick Launch / pinned task bar, only
the managed items are removed. Any unmanaged items will remain in place.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
259
Chapter 5: Delegation and Compliance
Chapter 5: Delegation and Compliance
5.1
Advanced Administration
Audit Trail
The Audit Trail shows detailed information about all modifications in your environment, including
the installation of Service Packs (if applicable).
Where to find the Audit Trail
What
Where
Global level
Diagnostics > Audit Trail
Audit Trail of feature or
item
Click the Audit Trail tab of the feature or item or, if this is not
available, click
Audit Trail options
The following options are available in the Audit Trail node:

To display the properties of an entry, right-click it and click Properties.

To refresh the contents of the Audit Trail, click Refresh.

To copy the contents of the Audit Trail to the clipboard, click Copy.

To clear the Audit Trail log of all entries, click Clear log.

To protect the Clear log button with a password, click Security. This opens the Security
window, which allows you to enable password protection.

If you already configured a password click Security to change this password. This opens the
Verify password window. After entering the correct password, the Security window opens,
which allows you to change the password.
Search engine
By default, the first 100 log entries are automatically shown when clicking Search. When the option
Show last 100 entries only is not checked, the log view will be cleared. You can then search for
the desired log entries.
Clicking the More button allows you to group your search (Group By) or specify a Date / Time Filter
for your search. The # incidents at the bottom of the overview is dynamic.
260
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 5: Delegation and Compliance
Administrative Roles
Administrative Roles determine which objects a user of the RES ONE Workspace Console is allowed
to see and to manage. This enables delegation of control over the RES ONE Workspace site.
Each Administrative Role is defined by the following aspects:

its permissions determine which nodes and objects are shown in the RES ONE Workspace
Console, and whether they can be viewed or edited.

its Scope Control determines the users and Workspace Containers for whom the Administrative
Role can edit objects in the RES ONE Workspace Console. This is based on the Access Control
and Workspace Control set on those objects.

the Access Control and Workspace Control set on the Administrative Role determine which
users get the Administrative Role in which locations for which specific time period and
Workspace Containers.
Notes

Administrative Roles can also be selected as part of Access Control on applications and settings. This allows you
to use Administrative Roles to create custom groups of users, independent of the groups available in the
available Directory Services. Remember to use a very restricted set of permissions for Administrative Roles used
in this way.

You can achieve more granular delegation of control by assigning different permission levels to a node’s list of
objects and its settings for Administrative Roles. For example, a role can have "modify" rights to the Printers
tab, but read-only access to the Settings tab and exception tabs for Printers. When upgrading RES ONE
Workspace, the same permissions will be applied to both tabs that were assigned to the whole feature, i.e. if
Printers had "Read" rights, both tabs will get "Read" rights. When downgrading RES ONE Workspace, the lowest
rights will be applied, i.e. if the Printers tab had "Modify" rights and the Settings tab "Read", "Read" rights will
be applied to both tabs.
Where to find Administrative Roles
What
Where
Defining Administrative
Roles
Administration > Administrative Roles
Setting Administrative Roles Composition > Applications > the Identity tab in the application's
as Access Control criterion
Access Control section
on a Managed Application
Setting Administrative Roles Security > User Installed Applications > Access Control
as Access Control criterion
on User Installed
Applications
Setting Administrative Roles on the Access Control tab of the setting
as Access Control criterion
on a setting
Viewing your current
Administrative Roles
Options menu > Show My Administrative Role(s)
Viewing the scope of your
current Administrative
Role(s)
Options menu > Show My Scope
Viewing which users have
which Administrative Roles
Diagnostics > Workspace Analysis, view the Role column
Viewing the details of a
user's Administrative Roles
Diagnostics > Workspace Analysis, select a user and click
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
261
Chapter 5: Delegation and Compliance
Permissions
By default all nodes in an Administrative Role have Deny permissions.
If an administrator has several Administrative Roles with different levels of permissions for the same
node, the greater permission overrules the lesser permission. In other words:

Modify overrules Read and Deny.

Read overrules Deny.
Technical Manager
By default, every RES ONE Workspace site has one Administrative Role: Technical Manager. This
role:

has Modify permissions on all nodes.

does not have any Scope Control.

can never be removed, disabled, renamed, or assigned different permissions.
By default, all users have this role, so that every user can open the RES ONE Workspace Console and
edit everything.
Applications that are managed by application managers are only shown to users with the
administrative role Technical Manager.
Scope Control
Scope Control determines which applications and settings in the RES ONE Workspace Console can be
viewed or changed by the Administrative Role, based on the Access Control and Workspace
Control of these objects.
With the Scope Control Access Control set to a specific Organizational Unit, for example, the
administrator can only modify applications and settings that are assigned to users in that
Organizational Unit. Applications and settings that are assigned to users in a different
Organizational Unit, or that also have additional different Access Control criteria, cannot be
modified.
This makes it possible to give an administrator in a regional office control over the applications
assigned to users from that office, but not over applications that are also used in other parts of the
RES ONE Workspace site.

Global settings for which no Access Control applies, such as Shell exceptions, are always shown,
irrespective of the scope of an Administrative Role.

If an object is not exclusive to the scope of the Administrative Role, it is shown as read-only.

If an administrator has several Administrative Roles with different scopes, the scopes are added
up.

If an administrator has several Administrative Roles with and without Scope Control, the scoped
role overrides the role without a scope.

When a scope is set to a specific Workspace Container, only Workspace Model exceptions are
visible that apply to that Workspace Container. It is not possible to add or edit any exception
data, even if they are within that scope.
262
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 5: Delegation and Compliance
Filters
By default, a filter shows all the objects for which at least one of the specified criteria applies
either directly or indirectly. An exclusive filter shows all the objects to which at least one of the
criteria applies directly.
Solving a Console lockout
An administrator can only access the Management Console if at least one administrative role has
been assigned to him.
If a user is locked out of the RES ONE Workspace Console, RES ONE Workspace can add the user's
Windows account to the Technical manager Administrative Role, thus granting the user full access
to the RES ONE Workspace Console. To verify that the user is legitimate, the user must provide the
correct database credentials for the RES ONE Workspace Datastore. Use of this method, including
failed attempts, is reported in the Audit Trail.
Procedure

Log on with the Microsoft Windows account that needs access to the RES ONE Workspace
Console.

Start the RES ONE Workspace Console with the command line parameter /lockedout. For
example: C:\program files\RES Software\Workspace Manager\pwrtech.exe /lockedout

Provide the correct database login and database password for the RES ONE Workspace
Datastore.
If the credentials are correct, the Microsoft Windows credentials of the user are added to the
Technical manager role, and user will gain access to the RES ONE Workspace Console.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
263
Chapter 5: Delegation and Compliance
Integration
The Integration features of RES ONE Workspace allow you to integrate other products in RES ONE
Workspace.
Alerting
With Alerting, you can set up actions that are performed automatically if a certain event occurs in
RES ONE Workspace that affects the security or functioning of your infrastructure. These can be email notifications, SNMP notifications, external tasks and RES ONE Automation Tasks.
Where to find Alerting
What
Where
Alerting
Go to Alerting in the Setup menu
Setting up Alerting
When setting up Alerting, the Events tab gives an overview of all RES ONE Workspace events that
may trigger an automatic action. These notification types can be set up on the Notification Types
tab.

When you set up e-mail notifications, you can only send e-mails anonymously if your mail server
supports this. If it does not, you need to enter a valid user name and password.

SNMP notifications ("traps") can only be received correctly in an SNMP framework (such as HP
OpenView or CA Unicenter) when you import or load the "resworkspacemanager.mib" file (in
the RES ONE Workspace program folder) into this application. You also need to configure the
correct destination for the SNMP traps: use "255.255.255.255" to broadcast the trap on the local
network or use one or more specific IP addresses to send the traps to one or more specific
computers. RES ONE Workspace uses its own mechanism when sending SNMP traps and therefore
does not require the installation of SNMP agent software on RES ONE Workspace Agents.

External tasks are useful to execute a specific command when an event occurs (for example,
lock a user's ID after three warnings).

You can only select RES ONE Automation Tasks if you have enabled RES ONE Automation
Integration (at Setup > Integration > RES Software > RES ONE Automation).


If the selected RES ONE Automation Project or Module contains parameters, these will be
shown in the Parameters area.

The Schedule timeout field specifies how long RES ONE Workspace should wait for the task
to be scheduled by RES ONE Automation before it will proceed with the next task or process.
You can configure multiple notifications per notification type (for example, a notification that
sends an e-mail and executes a command).
Note
All RES ONE Automation alerting tasks will be logged in the RES ONE Automation log. See RES ONE Automation (on page 240).
264
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 5: Delegation and Compliance
Microsoft Remote Assistance
Microsoft Remote Assistance allows a helpdesk to quickly remote control a user's desktop and
diagnose and repair problems remotely. This decreases resolution time for helpdesks, which in turn
decreases their workload.
Where to find Microsoft Remote Assistance
What
Where
Setting up Remote
Assistance
Go to Microsoft Remote Assistance in the Setup menu
Starting a Remote Assistance Right-click a user session at Diagnostics > User Sessions
session
Setting up Remote Assistance
Settings

Mode: When setting up Remote Assistance, you can choose between three different modes:

Allow helpers to only view the computer: users belonging to a specified helper group can
only view the computer of other users; they cannot make any changes.

Allow helpers to remotely control the computer: users belonging to a specified helper
group are allowed to make changes to the computer of other users.

Do not allow helpers to remote control or view the computer: disables Remote Assistance.

Helper groups: Users belonging to a specified helper group must have access to the
Management Console and they must at least have Read permissions to the nodes Setup >
Integration > Remote Assistance and Diagnostics > User Sessions.

Automatically configure Windows Firewall: If your infrastructures use a firewall, its settings
need to be adjusted to allow Remote Assistance functionality. Select this option to let RES ONE
Automation do this for you.
Notes

Microsoft Remote Assistance has to be enabled on the computer of the helper and on the remote computer.

To use Remote Assistance from a Windows 2008 server to a Workstation the Remote Assistance feature needs to
be installed which it is not by default. To install Remote Assistance in Windows 2008 open Server Manager - Go
to Features - click Add feature - and select Remote Assistance.
Starting a Remote Assistance session
Users who belong to a specified helper group can start a Remote Assistance session by right-clicking
a user session at Diagnostics > User Sessions in the Management Console.
Please note that the administrator needs at least read rights on the Setup > Integration > Microsoft
Remote Assistance node to be able to start a Remote Assistance session. Remote Assistance is
possible on workstations, laptops, and Terminal Servers.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
265
Chapter 5: Delegation and Compliance
Microsoft TS RemoteApp
With Microsoft TS RemoteApp integration, you can integrate RES ONE Workspace with the Terminal
Services RemoteApp feature of Microsoft Windows Server 2008. This allows you to manage Microsoft
TS RemoteApp applications from the Management Console. A Microsoft TS RemoteApp application is
an application that runs on a Terminal Server, but because it integrates seamless with the user
desktop, it behaves as if it were running on the user's local computer. If more than one Microsoft TS
RemoteApp application runs in a user session, they will share the same Terminal Services session.
Notes
In order to use Microsoft TS RemoteApp applications, the following requirements apply:

Servers that host Microsoft TS RemoteApp applications must be running Microsoft Windows Server 2008 and have
installed Terminal Services with the role Terminal Server.

Client computers that need to access Microsoft TS RemoteApp applications must be running RDC 6.0 or higher.

Because of a dependency between the RDC client and the Windows Explorer, it is not possible to start TS
RemoteApp applications from sessions running the RES ONE Workspace shell.
Where to find Microsoft TS RemoteApp
What
Where
Setting up integration with
Microsoft TS RemoteApp
Go to Application Virtualization > Microsoft TS RemoteApp in the
Setup menu
Setting up Microsoft TS
RemoteApp applications
Composition > Applications, on the Properties > Publishing tab of
the application
Integrating Microsoft TS RemoteApp
Settings

Enable Instant Passthrough for computers not publishing this application creates Instant
Passthrough shortcuts to Microsoft TS RemoteApp applications located on a remote server.
When the shortcut is accessed, the user will automatically be redirected to this remote server.
However, if the application should start locally if possible, also select Do not passthrough if
application is available on local computer.

The Available Servers area shows which servers or server groups can be used for Microsoft
RemoteApp applications. The list of available servers contains all Microsoft Windows Server 2008
servers on which RES ONE Workspace has been installed and that point to the current RES ONE
Workspace Datastore.

Enable "Microsoft TS RemoteApp Publishing" by default automatically deploys an application
as a Microsoft TS RemoteApp deployment when you add it as a new Managed Application.
Server groups
Server groups are typically used to represent silos. If your workspace contains existing server groups
(e.g. server farms), these will be listed automatically. Server groups can then be used to deploy a
Microsoft TS RemoteApp application. The list of available servers will be automatically populated
with computers that are running Windows Server 2008 with Terminal Services enabled. You can link
a Microsoft Windows Server 2008 Terminal Server to a Session Broker and have it included in a farm
to facilitate load balancing between several identical Terminal Servers. When a Microsoft Windows
Server 2008 server is configured to communicate with a Session Broker and is joined to a farm, a
server group is automatically created for the farm.
266
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 5: Delegation and Compliance
Setting up Microsoft TS RemoteApp applications
To set up a Microsoft TS RemoteApp application, add an application to the Management Console and
select the option Enable Microsoft TS RemoteApp publishing at Properties > Publishing.

On the Settings tab of Microsoft TS RemoteApp, you can enable Instant Passthrough for the
application. This will automatically detect whether the application is available directly in a
session (if the session is running on a Terminal Server that deploys the application) or whether a
terminal session needs to be started to one of the configured Microsoft Windows 2008 Terminal
Servers to start the application as a Microsoft TS RemoteApp application. If a terminal session
needs to be started, the RDC client is started with a RES ONE Workspace generated RDP file
with the correct information. See Setting up Instant Passthrough for TS RemoteApp applications.

On the Servers tab, specify one or more server groups that should deploy the application. This
will deploy the Microsoft TS RemoteApp application on all Terminal Servers in the server group
that run Microsoft Windows 2008.

The Management Console does not communicate directly with these servers to create or
update the Microsoft TS RemoteApp application. Instead, the RES ONE Workspace Agent
process running on the Microsoft Windows Server 2008 computer will create the Microsoft TS
RemoteApp application. Because of this, it is not necessary to configure Microsoft TS
RemoteApp from a server running Microsoft Windows Server 2012; this can also be done from
a workstation or a server running Microsoft Windows Server 2008.

When a Terminal Server is configured for a server farm, RES ONE Workspace will
automatically create or update a server group with the same name. Therefore, when you
add a new Terminal Server running Microsoft Windows 2008 to an existing server farm, it
will automatically be added to the server group with the same name as the server farm.
Because this new Terminal Server has become part of the server group that has been
specified to deploy the Microsoft TS RemoteApp application, it will also start to deploy the
Microsoft TS RemoteApp application.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
267
Chapter 5: Delegation and Compliance
Setting up Instant Passthrough for TS RemoteApp applications
The Instant Passthrough settings for Microsoft TS RemoteApp applications allow you to set up a
passthrough mechanism to Microsoft TS RemoteApp applications located on a Terminal Server. This
will create an RDP file for each Microsoft TS RemoteApp application. The RDP file points to the
application on the Terminal Server and is stored in the DBcache of all specified Terminal Servers in
the specified Terminal Server farm. When a user accesses the RDP file, the request will
automatically be redirected to the Terminal Server on which the application is located, after which
the Terminal Server will deploy the application to the user's desktop.

If set up Instant Passthrough when configuring Microsoft TS RemoteApp Integration, the Instant
Passthrough settings that you configure will serve as the default values for all Microsoft
RemoteApp applications in your environment.

If set up Instant Passthrough when configuring a Microsoft TS RemoteApp application, the
Instant Passthrough settings that you configure only apply to the Microsoft TS RemoteApp
application.
Properties tab

When specifying the server name and port, you can use the name of a Terminal Server, but also
the name of a Terminal Server farm. If you want to use single sign-on, you should use the fully
qualified domain name.

Bitmap caching can speed up your connection by storing frequently used images on your local
hard disk.
Behavior tab

Do not passtrough if application is available on local computer allows you to define when a
published or local version of the application should be launched. You can optionally choose to
ignore the configured behavior inside or outside specific Zones via the Locations and Devices
field.

If you configure to passthrough anyway in specific Zones, at least one of the added Zones
must apply.

If you configure to passthrough anyway outside specific Zones, all of the added Zones must
apply.
Notes

When an Instant Passthrough session is started from a client running RES ONE Workspace to a Terminal Server, no
extra licenses are claimed.

If a user has logged on to a Terminal Server on which a Microsoft TS RemoteApp application has been deployed
and tries to start this application, it will start directly (the original command line of the application will be used
to start the application).

If the user has logged on to a computer or server on which a Microsoft TS RemoteApp application has not been
deployed and tries to start this application, an RDP session will be started, based on the values of the Instant
Passthrough mechanism.
268
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 5: Delegation and Compliance
Filtering
A filter restricts the current view of the RES ONE Workspace Console. This allows you to focus on a
specific aspect or part of your environment. For example, you can set a filter so that the
Management Console only shows objects for which Access Control has been set based on a specific
Organizational Unit, or for which Access Control has been set according to Zones. Filtering is
especially useful in large RES ONE Workspace environments that contain a very large number of
settings and applications.
Where to find Filtering
What
Where
Indicator of unfiltered view:
in the lower right-hand corner on the RES ONE Workspace Console
and on the Command Bar
Indicator of filtered view:
in the lower right-hand corner on the RES ONE Workspace Console
and in the toolbar and on the Command Bar
Configure and apply a filter
Action menu > Configure filter
or
right-click
Remove filtering and return
to a full view
Action menu > Apply filter, click to remove the check mark
or
right-click
Apply the same filter that
was used last time
> Configure filter
> Apply filter, click to remove the check mark
Action menu > Apply filter
or
right-click
> Apply filter
Filter Criteria and Filter Types
Filter criteria
There are three types of filter criteria:

Base a filter on Access Control criteria to see only objects to which specific users, groups,
Organizational Units and/or Zones have access. For example, see all the objects that apply to
users in the Organizational Unit "Netherlands".

Base a filter on Access Type criteria to see only objects for which access depends on a specific
access method. For example, see all the objects for which access is set according to
administrative role (regardless of which administrative role), or see all the objects for which
access is set depending on Language (regardless of which Language) (for example E-mail
Settings).

Base a filter on Workspace Control to see only objects for which access depends on specific
Workspace Containers. For example, see all the objects that are available to computers in the
Workspace Container "Terminal Servers".
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
269
Chapter 5: Delegation and Compliance
Filter types
There are two types of filter:

A default filter shows all the objects for which at least one of the specified criteria applies
either directly or indirectly.

An exclusive filter shows all the objects to which at least one of the criteria applies directly.
Notes

If the option Exclusive filter is not selected for a filter, items that would be affected if the option was checked
are marked with an "i" (informational) in their icons.

When filtering on Organizational Unit (OU), nested groups or users across boundaries are not taken into account.
Example
Suppose you want to configure a filter based on the Access Control criterion Organizational Unit
(OU) London. The Management Console contains four applications:

Calculator, with Access Control set to membership of OU London (which is part of OU Great
Britain).

Notepad, with Access Control set to membership of OU Great Britain (with inheritance).

Wordpad, with Access Control set to membership of Group Trafalgar Square (part of OU
London).

Paint, with Access Control set to "All users".
This results in:
Object
Filtering
Exclusive Filtering
Calculator
Result: Calculator is shown in filtered
Management Console.
Result: Calculator is shown in filtered
Management Console.
Reason: Direct relationship.
Reason: Direct relationship.
Result: Notepad is not shown in filtered
Management Console.
Result: Notepad is hidden in filtered
Management Console.
Reason: Indirect relationship, but OU
Great Britain is parent OU of OU London
(higher in the hierarchy).
Reason: No direct relationship.
Result: Wordpad is shown in filtered
Management Console.
Result: Wordpad is hidden in filtered
Management Console.
Reason: Indirect relationship, because
Group Trafalgar Square is part of OU
London (lower in the hierarchy)
Reason: No direct relationship.
Result: Paint is shown in filtered
Management Console.
Result: Paint is hidden in filtered
Management Console.
Reason: Indirect relationship, because
"All users" also includes users who are
members of OU London (lower in
hierarchy).
Reason: No direct relationship.
(Access Control
= OU London)
Notepad
(Access Control
= OU Great
Britain)
Wordpad
(Access Control
= Trafalgar
Square)
Paint
(Access Control
= All users)
Warning
Avoid combining filters that combine Access Control, Access Type and/or Workspace Control criteria, as the results are
difficult to predict.
270
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 5: Delegation and Compliance
Nodes excluded from filtering
The following nodes are never restricted in a filtered view:

Composition > Desktop > Shell

Security > Applications > User Installed Applications
All objects in these two nodes remain visible, regardless of the filter that is applied.
Other Management Console nodes will appear empty if they do not contain objects that match the
criteria of the filter that is applied.
Application Managers
In the configuration of Access Control on an application, the task of granting users access to the
application can be delegated to one or more designated users. This is achieved by setting the
Identity area of the application's Access Control to the option Controlled by application
manager(s).
Application Managers do not need access to the RES ONE Workspace Console. Instead, users who are
listed as Application Manager for a specific application automatically get the Access Wizard in their
Workspace (in the Settings section of the Start menu). The Access Wizard allows them to distribute
the application(s) for which they are responsible to other users. The Access Wizard can also be
opened directly from the Console by clicking the Access Wizard button.
When assigning Application Managers to an application, you can limit the range of users to whom
the Application Managers can give the application. The available range limits are:

all users.

only users in the same OU as the Application Manager.

only users in the same domain as the Application Manager.
On the Comments tab you can create a message that will be displayed in the Access Wizard when
an Application Manager grants or revokes application access.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
271
Chapter 5: Delegation and Compliance
5.2
Tracking & Reporting
Usage Tracking
Usage Tracking allows you to monitor the actual use of applications per user, per application, or per
server. It also lets you monitor active sessions and the actual CPU load of an application. You can
use this information to find users or applications that use a more than average amount of system
resources, to re-distribute licenses, or simply for troubleshooting.
Where to find Usage Tracking
What
Where
Usage Tracking
Go to Usage Tracking in the Setup menu
Usage Tracking Overview
Diagnostics > Usage Tracking Overview
The Usage Tracking Viewer
In the Console: Diagnostics > Usage Tracking Overview
In the user's session: Start menu > RES ONE Workspace settings >
Workspace Preferences > Other tab
Setting up Usage Tracking
The following options are available when setting up Usage Tracking:

Log current activity: logs all activity in real-time, making it possible to see instantly which
users are using which applications.

Log history: if selected, all application usage is logged.


Detailed history logs the following items. This information is shown on the Details tab of
the Usage Tracking Viewer, and includes specific dates and times. [Example]:

when the application was used

by whom

for how long

on which system

what the processor usage was for that application during the time it was used.
Cumulative history does not include specific dates and times, but cumulates the application
usage data for the specified time. It logs:

when the application was used

by whom

for how long

on which system

what the processor usage was for that application during the time it was used.
Example:

The Detailed history logs that someone started Microsoft Word on Monday between 11:00 and
13:00, and on Tuesday between 15:00 and 16:00.

The Cumulative history only logs that in Week 2012-35 that user had started Microsoft Word
for a total of 3 hours (specific dates and times are not shown).
272
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 5: Delegation and Compliance

Log Session Information: logs all information concerning sessions. The storage duration of the
session information depends on the number of days you enter in the Keep session history field.

Anonymous logging: filters user names from the information provided. This can be used to
protect users' privacy.

Enable Usage Tracking access for end-users and application managers: provides end users and
Application Managers with access to Usage Tracking from within their RES ONE Workspace
session. A user can only see personal information about his own sessions and applications. An
Application Manager can only see information related to the applications he manages.

Enable Website Usage Tracking and log web sites visited by Internet Explorer: logs all
websites visited by the end user. If selected, you also need to enable third-party browser
extensions in Microsoft Internet Explorer (via Tools > Internet Options > Advanced > Browsing
> Enable third-party browser extensions or via Microsoft Windows system policies that are set
up for your company. Microsoft Internet Explorer Enhanced Security Configuration disables this
option by default.

Log path and executable in addition to application name: logs the application path,
executable and name. This can be used to distinguish between different applications with the
same name, which can be useful when comparing application usage for reporting purposes.
Notes

In some countries or companies, Usage Tracking can conflict with privacy policies. If so, it is advisable not to use
Usage Tracking.

The Usage Tracking database only stores OU information on the lowest OU level. This means that if the OU
structure changes, the information displayed by Usage Tracking will change accordingly.

The Usage Tracking settings Log current activity, Log history and Anonymous logging also apply to WebTrace.

If you enable Usage Tracking access for end users, they can view their website usage in the Usage Tracking
viewer.

Microsoft Internet Explorer instances running as a Workspace Extension (RES Subscriber for VDX and RES VDX) are
not tracked by WebTrace.
The Usage Tracking Viewer
The Usage Tracking Viewer shows all information gathered by Usage Tracking, either in detail or as
a graphical representation. For reporting purposes, the information can be copied to the clipboard,
to be pasted into a spreadsheet or word processor file.
Notes

The Usage Tracking Overview only shows information from the Datastore that is defined at Setup > Datastore.

The Usage Tracking Viewer does not show any information about Organizational Units if Organizational Unit
support has not been configured in the Management Console.

The Usage Tracking database only stores Organizational Unit information on the lowest Organizational Unit level.
This means that if the Organizational Unit structure changes, the information shown by Usage Tracking changes
accordingly.

If Website Security is enabled (at Security > Applications > Websites), the secured browsers that are visited by
the user in a user session are shown in the Usage Tracking Overview.

In all overviews of the Usage Tracking Viewer, you can click
to update your data) and
to create an Instant Report (first click Refresh
to export data to a file (CSV for lists and JPG for graphs).

On the tabs Details, Sessions and Current Activity in the Usage Tracking Viewer, you can type a search string to
search for an object (e.g. user, application, computer or client). Previous search items are retained and using
wildcards (*) in your search is allowed.

Computer names of extended applications are preceeded with an asterisk (*) in the Usage Tracking Overview.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
273
Chapter 5: Delegation and Compliance
User Sessions
With User Sessions, you can gather information about each user that is logged on to your
environment.
You can view the following information:

When was the session started?

When was the session refreshed?

What is the idle time of the user?

What is the state of the user?

On what client is the user working?

Which IP address is assigned to the user?

On what computer is the user working?

What is the IP address of that computer?

What Workspace Container is the user working in?

What is the user's session ID?

What is the protocol used by the user - ICA, RDP, PCoIP, Blast or Local?

Is the license in use?

What is the user's AppGuard mode?

What is the user's NetGuard mode?

What is the user's Workspace Composer version?

What is the user's Workspace Extender version?
Note
The Search functionality is case insensitive and will search within the data filled in for Name, User name, and Computer.
The search will be based on the entire database of User Sessions and not only on the overview displayed at Diagnostics >
User Session.
Where to find User Sessions
What
Where
User Sessions
Diagnostics > User Sessions
274
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 5: Delegation and Compliance
Context menu options
If you right-click a user session, the following options are available from the context menu:
Item
Function
Properties
Displays the user properties.
Refresh
Refreshes the Active Users list.
Force refresh of
"<user>" now
Refreshes the user's session immediately. This is useful when a refresh is
immediately required (e.g. access to a new application was granted or an
AppGuard rule was added).
Analyze Workspace
of this user
Displays the Workspace Analysis (See Workspace Analysis) details for the
selected user.
Ping the user's
workstation
Pings the user's computer to determine the network delay to its computer.
Remote Control
"<user>"
Allows you to remote control the user's session. Remote Control is not
possible on Microsoft Windows Server 2012.
Offer remote
Assistance to
"<user>"
Allows you start a Remote Assistance session with the user.
Send message to
"<user>"
Allows you to send a message to the user.
Log off "<user>"
Allows you to log off the user.
Reset "<user>"
Resets the user's session.
Disconnect "<user>"
Disconnects the user's session.
Restore User Settings Allows you to restore a user's User Setting to a previous value (from an
earlier session) or revert to an application's default configuration.
Create Instant Report Creates an Instant Report (See Instant Reports). Depending on your
selection, you can also select which items should be included in the Instant
report.
Building Block
options
Creates Building Blocks (See: Building Blocks). Depending on your selection,
you can also select items that should be included in the Building Block(s).
Help
Opens the Help for the Active Users node.
Notes

It is possible to select multiple users to refresh, send a message, logoff, reset, or disconnect user sessions. Use
the CTRL key to select multiple users, use the SHIFT key to select a range of users, or use CTRL+A to select all
users in the list.

The use of these options is subject to NT and/or Citrix permissions.

If you group the active users list by server, right-click a server to display the option Send message to all users
on server <server name>. This allows you to send a user-defined message to all users logged on to the selected
server. This option is only available in a Terminal Server environment.

Some options are only available for sessions that are logged on to a Terminal Server.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
275
Chapter 5: Delegation and Compliance
Managed Applications License Metering
Use the Licensing tab of the application properties screen to configure application license
metering. By managing application license usage in your RES ONE Workspace, you can enforce
license compliance to e.g. Microsoft licensing models.
How to configure application licensing

Open the application and click Properties > Licensing.

Select the application license type in the License type field and configure the selected
application license type:

Company-wide license - Grants unlimited access to all users in the RES ONE Workspace
environment. The number of users can still be controlled through the Access Control
options.

Server license - Grants access to the application based on server licenses. If all server
licenses are in use, additional users will not be granted access to the application. Instead, a
message will be displayed that all licenses are in use.

Per seat license - Seat licenses limit application usage to the number of computers that have
logged in and claimed a seat. Click the Seats button to view the number of used seats and
information about the computers (users) that have claimed them.
With "Per Seat" licensing, it is possible to define a maximum number of seats per Zone. This
can be used for example if each physical location within a company has a certain number of
seat licenses available. In this case, define a Zone for each physical location, and set the
maximum number of seats for each Zone. When seat licenses have been configured per
Zone, the View reserved and rejected seat licenses window will let you choose which Zone
to display the seat information for. To define the maximum number of seats per Zone, click
the browse button
next to the # of licenses field (this button will not appear until you
have selected Per seat license). As long as there are no Zone-specific seats configured, RES
ONE Workspace will work as before, with one global number of seat licenses.

Per named user license - Grants access to the application based on specified users. This
allows for back order situations, while keeping track of the actual available number of
licenses. If all licenses are in use, additional users will not be granted access to the
application. Instead, a message will be displayed that all licenses are in use. If application
access is managed by an application manager, this message will be displayed to him.

Per concurrent user license - Concurrent user licenses limit application usage to the number
of concurrent users. This form of licensing is supported for local computing and centralized
computing technology stacks. When all available licenses are in use, the next user who
starts the application receives the message that all licenses are in use, plus a list of the
users who are using the application at that moment. Users can resolve the distribution of
licenses amongst themselves up to the total number of licenses. If the application uses
licenses per concurrent user, click Concurrent usage on the application's Licensing tab to
see which users are currently using the application.
Note
Tip If you select Per seat license or Per concurrent license, the setting Only RES ONE Workspace is allowed to launch this
application on the Security tab will be selected automatically, to ensure that the user can only start the application via his
Start Menu or desktop. This allows RES ONE Workspace to check how many application licenses are in use.
276
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 5: Delegation and Compliance
Difference between # of licenses and # of users
The maximum number of users that can be granted access to an application can be set in the # of
users field.
This is useful if you have granted users access while awaiting the arrival of extra licenses. For
example: there are 100 licenses available and all licenses are already in use. You need to grant
access to an additional 10 users that entered the company today. You can do this by setting the # of
users field to 110 and order an additional 10 licenses. Until the licenses arrive, you can see the
difference between the number of users and the actual number of available licenses, telling you
that you have a back order running of 10 licenses or that you still need to buy 10 additional licenses.
When the licenses arrive, you can then set the # of licenses field to the appropriate value, in this
case 110.
If an application uses Concurrent User licensing and the maximum number of users is reached on all
Terminal Servers or workstations, the next user who starts up the application will receive a message
that the maximum number of licenses has been reached. A list of concurrent users will also be
displayed so that the user can take action without having to contact the IT department.
The Application Manager will see a similar message when he tries to grant a user access to an
application for which the maximum number of available licenses has been reached.
Where to find License Metering
What
Where
License metering for
Managed Applications
Composition > Applications, Properties > Licensing tab
Workspace Model Overview
The Workspace Model Overview shows you which features in your environment are active/enabled,
which are disabled, and which are set in learning mode. If the global settings of a feature are
overridden by exceptions for specific Workspace Containers, these will be shown on separate tabs,
per Workspace Container. Each feature shows whether the global settings apply or whether
different settings apply to the Workspace Container.
You cannot change a feature's mode directly from Diagnostics > Workspace Model Overview. You
can do this from a similar view, at Administration > Workspace Model. It is also possible to change
a feature's mode from the relevant node itself, by selecting a feature and clicking
.
Where to find the Workspace Model Overview
What
Where
Workspace Model Overview
Diagnostics > Workspace Model Overview
Workspace Model
Administration > Workspace Model
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
277
Chapter 5: Delegation and Compliance
Errors
The Errors node shows information about the errors that occurred in your environment:

To view the properties of an event, right-click it and click Properties in the context menu.

You can clear the log from the context menu.
Search engine
By default, the first 100 log entries are automatically shown when clicking Search. When the option
Show last 100 entries only is not checked, the log view will be cleared. You can then search for
the desired log entries.
Clicking the More button allows you to group your search (Group By) or specify a Date / Time Filter
for your search. The # incidents at the bottom of the overview is dynamic.
Where to find Errors
What
Where
Errors
Diagnostics > Errors
5.3
Workspace Branding
Workspace Branding allows you to customize the splash screen that is displayed when starting,
refreshing and ending a RES ONE Workspace session and when starting the RES ONE Workspace
Console. The custom image that is selected is automatically resized to fit the splash screen. This
image (same size as used in the splash screen) also replaces the RES ONE Workspace logo in the
background of the Management Console.
Where to find Workspace Branding
What
Where
Workspace Branding
Go to Workspace Branding in the Setup menu
278
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 6: Adaptive Security
Chapter 6: Adaptive Security
6.1
Security
Security restrictions in RES ONE Workspace help you secure the user workspace at different levels:

Applications: prevents the use of unauthorized applications and executables.

Removable Disks: secures the use of removable disks.

Files and Folders: prevents the use of specific file types and folders.

Read-Only Blanketing: renders all local drives on servers and desktops read-only.

Global Authorized Files: allows you to authorize files, folders and drives.

Sessions: restricts users to a single RES ONE Workspace session at a time.

Network: prevents unauthorized network connections.
Except for security restrictions on network level, all security restrictions are based on a kernel
mode driver (the AppGuard driver), which offers a high level of security while minimizing the
overhead on your system. Security restrictions on network level are based on NetGuard, which is
similar to AppGuard, but secures your network connectivity.

System processes (such as svchost.exe) are also subject to Security. This means that these
processes cannot start sub-processes (such as e.g. Windows Media Player or MP3 files)
indirectly. Global Authorized Files ("Authorized Files" on page 294) contains a default rule
that allows you to control this behavior.

A Microsoft Windows Server console session is never protected by design.

In general, if security restrictions are enabled, all executables that exist in the user's Start Menu
are accessible to the user. All other executables are inaccessible.
Search engine on Log tabs
On the Log tabs, by default, the first 100 log entries are automatically shown when clicking Search.
When the option Show last 100 entries only is not checked, the log view will be cleared. You can
then search for the desired log entries.
Except on the Authorized files > Log tab, a More button is present on the Log tabs. Clicking this
button allows you to group your search (Group By) or specify a Date / Time Filter for your search.
The # incidents at the bottom of the overview is dynamic.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
279
Chapter 6: Adaptive Security
Applications
Managed Applications
With security restrictions on Applications, you can prevent unauthorized applications and
executables from being used in the user workspace. This prevents potentially harmful applications
and executables from causing damage.

Only applications that are made available to the user through RES ONE Workspace are
authorized. All other applications are unauthorized, and are prevented from starting.

Users are prevented from running executables that they received through e-mail or Internet.
This prevents potentially dangerous executables containing viruses, spyware and malware from
contaminating the corporate network.

Users are prevented from using advanced commands in the command box.
Notes

File types other than executables (for example PDF, DOC or VBS) are accessible by default. You can block these
file types (and folders) by configuring security restrictions on Files and Folders. See Files and Folders security
(on page 291).

Technical mangers are exempted from all Managed Applications security.
Where to find Managed Applications security
What
Where
Global level
Security > Applications > Managed Applications
Application level
Open the application at Composition > Applications, go to Security >
Authorized Files
Applications security modes: disabled, learning, enabled
Global level
On global level, there are three modes for the security restrictions on Applications:

In disabled mode, users can start applications and executables that are not managed by RES
ONE Workspace and no data is logged.

In learning mode, attempts to start unauthorized applications and executables will not be
blocked, but can be logged. This helps you identify and authorize any executables that are
started by authorized applications. When you have fine-tuned your environment sufficiently in
learning mode, you can set Application security to enabled mode.

In enabled mode, only authorized applications and executables can be started.
Notes

If you select the option Log security events, security events will be logged if Applications security is in enabled
or learning mode.

If you select the option Notify users about security events, users will be notified if Applications security is in
enabled or learning mode.
280
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 6: Adaptive Security
Application level
If you add a new application, it is not necessary to set Applications security to learning mode on
global level, because this jeopardizes the existing security of the user workspace. Instead, it is
sufficient to set only the new application to learning mode. The workspace remains secured,
because only executables launched by the application will be allowed. Because these executables
can be logged as a security event, this allows you to create application-specific exceptions.
If Applications security is enabled, the authorized files configured for a specific application will, by
default, be enforced. You can configure authorized files for an application at Managed Applications
on the application's Security > Authorized Files tab. See Authorizing files and folders.
Note
If the user is allowed to use the "cmd" command, any attempts to start executables will be blocked (e.g. a ping command). If
necessary, you can authorize additional executables at application level.
Default behavior if running applications are no longer authorized
The availability of an application can be authorized, for example, on the basis of a Locations and
Devices zone. Once an application is running in a user session, it can remain active if the user shuts
down the computer without logging off from the session. Then, if the user logs on from another
computer outside of the zone that authorized the application, the application may still remain
active despite its lack of authorization. Similarly, the application may remain active even if the user
is no longer a member of the Active Directory group that was the basis for the user's access to that
application.
You can configure the default behavior for applications in such situations at Security >
Applications.

With the setting If running application is no longer authorized, terminate application, the
application is terminated immediately (and abruptly) as soon a change in circumstances or
configuration causes the user's authorization to disappear.

If this is not necessary or desirable, for example because the application must be closed down
correctly in order to prevent data loss, you can choose If running application is no longer
authorized, do nothing.
To set different behavior for an individual application, open the application at Composition >
Applications and change the setting on the tab Security > Authorized Files.
Managed Applications: Security section
The security section of a Managed Application determines the application's Files Security mode and
authorized files; and its Network Security mode and authorized connections.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
281
Chapter 6: Adaptive Security
Authorized Files
Use the Authorized Files tab to configure specific security settings for an application.
When a user starts an application, the application usually needs to access other files and
executables to function properly. Access to certain files and folders can be blocked on a global level
at Security > Data > Files and Folders. If a certain application needs a file or folder that is blocked
on a global level, you could authorize these files and executables on a global level, but this may be
undesirable. The alternative approach is to authorize the necessary files and folders for the specific
application only. This approach provides the best protection of the user workspace.

Global authorized files are configured at Security > Global Authorized Files.

Application authorized files are configured at Managed Applications on the application's
Security tab.
Configuration

To add, edit or remove authorized files and folders for a specific application, open the
application at Managed Applications and go to Security > Authorized Files.

Select Run this application in learning mode if all access to files and folders by this application
should be allowed but also logged. Run an application in learning mode for a while to find out
which files and executables should be authorized for the application

To ensure that a user can only start the application in his RES ONE Workspace session, select
Only RES ONE Workspace is allowed to launch this application. This ensures that a user can
only use his Start Menu or desktop to start the application, and not e.g. a command prompt or
Windows Explorer. This is useful if you want to force license compliance in your organization,
because it allows RES ONE Workspace to determine the actual number of application licenses in
use. This setting is also useful if certain settings for the application are indispensable (e.g.
registry settings). In the following situations, this setting is selected automatically and grayed
out:

When using concurrent or seat licenses ("Licensing" on page 108) for the application.

When adjusting the process priority of the application on the Settings (on page 105) tab.

The default value for the setting If running application is no longer authorized is configured at
Security > Applications. You can change the behavior of the current application so that it does
not follow the default anymore.

You can authorize files and executables by adding a file or executable to the list of authorized
files, but you can also authorize a file or executable directly from the log:

Click the Log tab. This shows an overview of security events that were caused by the
application.

Select the file or executable that caused the security event and click Authorize selected
incident. This will open the Authorize file window. The Authorized File field will be
populated with the values of the incident that you selected.

Authorized file security can be enhanced by checking the executable's file hash. To check file
hashes, the global option Only allow authorized file hashes (at Security > Applications >
Managed Applications, on the Settings tab) must be enabled and allowed/denied file hashes
must be configured.

Changes on the Authorized Files tab will not come in effect until you click OK and close the
Edit application window.
Tips

You can easily move authorized files from one application to another; from an application to the global
Authorized Files node; and from the global Authorized Files node to a specific application. To do so, right-click
one or more selected authorized files and choose Move.

On the Applications List tab of the Managed Applications node, the column Learning mode shows whether an
application is set in learning mode or not.
282
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 6: Adaptive Security
Example:
The availability of an application can be authorized on the basis of a Zone. Once an application is
running in a RES ONE Workspace session, it can remain active if the user shuts down the computer
without logging off from the session. Then, if the user logs on from another computer outside of the
Zone that authorized the application, the application may still remain active despite its lack of
authorization.
This breach of authorization can be prevented with the setting If running application is no longer
authorized, [terminate application].
If this is not necessary, RES ONE Workspace can also be configured with If running application is no
longer authorized, [do nothing].
The default for this setting is configured at Security > Applications. Different behavior can be set
for individual applications by opening the application at Composition > Applications and changing
the setting at Security > Authorized Files.
Authorized Connections
Use the Authorized Connections tab in an application's Security section to allow the application to
use network connections that are blocked through the Network Security configured at Security >
Network. This may be necessary for database applications, ICA/RDP clients, telnet applications,
SSH clients, MSN Messenger, etc.
Configuration

If you need to determine which network connections should be authorized for the application,
but you do not want to disable global Network Security, select Run this application in learning
mode. In learning mode, the application can still access unauthorized network connections, but
these are logged.

To convert a Log entry to an Authorized Connection, select the network connection that was
logged as a security event, and click Authorize selected incident.
Note
A rule authorizing a Network Connection at application level overrules a rule blocking that same connection at a global level.
Tip
You can easily move authorized connections from one application to another; from an application to the global node
Network; and from the global Network node to a specific application. To do so, right-click one or more selected authorized
connections and choose Move.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
283
Chapter 6: Adaptive Security
Dynamic Privileges
Use the Dynamic Privileges tab to elevate or restrict rights for applications while maintaining
default privileges for the user. This allows you to grant administrative privileges to specific
applications that need these privileges (such as proprietary applications, Control Panel applets
(using rundll32.exe or control.exe) and applications that allow changes to be made to
hardware settings) without granting the user full rights as an administrator. Reducing user privileges
may be useful for granting a user that is an administrator an application that should not be run as
an administrator, such as a command prompt.
Configuration
Access token:

Do nothing (default) - Does not change any rights for this application.

Add administrator rights - Forces the application to be started with administrator rights.

Remove administrator rights - Forces the application to be started without administrator
rights.
Example:
To make a Control Panel applet available create a new application in the RES ONE Workspace
Console with %systemroot%\windows\rundll32.exe and the appropriate parameter. Add
administrator rights to the applet using Dynamic Privileges. For instance:
Date & Time Properties
Module
TIMEDATE.CPL
Command:
rundll32.exe shell32.dll,Control_RunDLL timedate.cpl,,0
result:
Displays Set Date & Time properties tab
Command:
rundll32.exe shell32.dll,Control_RunDLL timedate.cpl,,1
result:
Displays the Time Zone properties tab
See Making Control Panel Applets (CPL files) available as applications (on page 137) for a more
extensive list of Control Panel applets and their command lines.
Logging
All Applications security events are logged in the Applications Log. This log shows an overview of all
events that occurred when users were prevented from starting an unauthorized executable. The log
is automatically cleaned up periodically.
Many applications need to start up other, legitimate executables in order to function properly. For
example, some application Help features will call on an executable. If that executable is blocked,
the user cannot access the Help. You can allow these specific executables to run in your
environment by authorizing them from the Applications Log. These specific executables will be set
as Global Authorized Files.
284
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 6: Adaptive Security
User Installed Applications
User Installed Applications give users the right to install software on specific computers. This can be
particularly useful to give expert users a degree of control over their own computer, so that they
can install software themselves as and when needed. User Installed Applications are always
restricted to specific computers, based on Workspace Containers and/or Zones, and can optionally
be further restricted to specific users.
For example, a department may be in the process of developing a new application. They receive
new versions several times a week, and each version needs to be installed before it can be tested. It
is extremely inefficient for the administrator to have to do this each time. Instead, you can enable
User Installed Applications with Access Control set to specific people in that department, and
Workspace Control set to a Workspace Container that holds the computers in that department. As a
result, the specified users can install the updates on the specified computers.
Similarly, a small number of people might use a highly specialized software package such as
AutoCAD. They may well know more about the software than the administrator does, and so it
makes more sense to allow them to install the AutoCAD updates or extensions themselves.
Users who are allowed to install User Installed Applications on a computer, get an extra tab in their
"Workspace Preferences" tool, from which they can install software using a wizard. With this wizard,
they can create shortcuts for these applications in their Start menu, on their Desktop, on their
Quick Launch bar and in their Startup items.
Where to find User Installed Applications
What
Where
Configuring the User Installed
Applications feature
Security > Applications > User Installed Applications
Installing, changing and deleting
User Installed applications in the
end-user workspace
Workspace Preferences > Other
Configuring User Installed Applications
 There are three modes in which the User Installed Applications functionality can run (configured
on the Settings tab):

Allow any setup to run - Any application may be installed by the user if the user has local
administrator rights.

Blacklisting - Any application may be installed by the user, except applications that comply
with a set Deny rule. Note that by using Access Control and Workspace Control it is possible
to set a global Deny rule in combination with a specific Allow rule (e.g. Deny all software
installations by a specific Publisher, but allow this for a specific Group). All Deny rules are
checked for a possible match, if a match is found then all Allow rules are checked for
possible exception. If no match is found, the user is notified that this setup is not allowed.

Whitelisting - No applications may be installed, except applications that comply with a set
Allow rule. Note that by using Access Control and Workspace Control it is possible to set a
global Allow rule in combination with a specific Deny rule (e.g. Allow all software
installations by a specific Publisher, but deny this for a specific Group). All Allow rules are
checked for a possible match, if a match is found then all Deny rules are checked for
possible exception. If a match is found to a Deny rule, the user is notified that this setup is
not allowed.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
285
Chapter 6: Adaptive Security
Note
In case Administrative Roles are used (at Administration > Administrative Roles), making changes to the setting Software
installations is only permitted by Administrative Roles that have Modify access to the Security > Applications > User
Installed Applications > Settings tab (on the Settings tab of the Administrative Role).

User Installed Application Rules (i.e. Allow and Deny rules) can be based on:

Publisher in signature

Product name in file properties (only in combination with Publisher)

Product version in file properties (only in combination with Publisher)

Checksum of file (only if no other criteria are selected)

These values can be entered manually or by browsing to a specific installation file. Note that
wildcards are allowed.

To give a user temporary local administrator rights when installing specified applications, the
Software installations mode Whitelisting and Run installation using Dynamic Privileges may
be selected. See Dynamic Privileges.
User Installed Applications must always be restricted to specific computers in a Workspace
Container or in a Zone. Although you can combine several Workspace Containers and/or Zones, the
minimum requirement is one Workspace Container or one Zone.

Specify the Workspace Container(s) on the Workspace Control tab.

Specify the Zone(s) on the Access Control tab under Location.

Optionally, you can restrict the right to install User Installed Applications on the specified
computers to specific OUs, groups, users, administrative roles and RES ONE Service Store
Services. You can specify this on the Access Control tab under Identity.

Optionally, you can restrict access for a specific time period by specifying a Start and/or End
date and time on the Access Control tab under Date and Time.
The Log tab shows who installed or removed what unmanaged applications on which computers.

You can sort columns by clicking on the column headers. Columns can be moved and resized by
dragging and dropping the column headers. In the Options menu, the option Reset all column
properties to defaults can be used to restore the columns to their original position and size.

To filter the view by computer name, select the computer from the Computer drop-down list.

In the filtered view, click
for a list of User Installed Applications on the selected computer.
Warning
Users who are allowed to install User Installed Applications on a computer can choose to install any application they like.
However, what they install can be monitored (at Security > Applications > User Installed Applications on the Log tab).
Notes

User Installed Applications do not become available in the Managed Applications node of the Management
Console.

A user can only install unmanaged software if he has the appropriate local privileges to install new software.

By design, User Installed Applications cannot be installed on Terminal Servers, even if the user session on the
Terminal Server complies with all the criteria set for User Installed Applications.
286
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 6: Adaptive Security
Example
For example, a department may be in the process of developing a new application. They receive
new versions several times a week, and each version needs to be installed before it can be tested. It
is extremely inefficient for the administrator to have to do this each time. Instead, you can enable
User Installed Applications with Access Control set to specific people in that department, and
Workspace Control set to a Workspace Container that holds the computers in that department. As a
result, the specified users can install the updates on the specified computers.
Similarly, a small number of people might use a highly specialized software package such as
AutoCAD. They may well know more about the software than the administrator does, and so it
makes more sense to allow them to install the AutoCAD updates or extensions themselves.
Websites
At Security > Websites, you can enable user specific website filtering based on rules. if Website
Security is enabled, it automatically secures the following browsers: Microsoft Edge, Microsoft
Internet Explorer, Google Chrome, Mozilla Firefox, and Opera.
There are two methods for using Website Security:

Whitelisting means specific URLs are allowed and all others are denied.

Blacklisting means that specific URLs are denied and all others are allowed.
For fine-tuning purposes, exceptions to the set rules can be made.
Note
In case Administrative Roles are used (at Administration > Administrative Roles), making changes to the setting Security
method is only permitted by Administrative Roles that have Modify access to the Security > Applications > Websites >
Settings tab (on the Settings tab of the Administrative Role).
Where to find Websites
What
Where
Configuring the Websites
Security feature
Security > Applications > Websites
Configuring Website Security
 On the Settings tab you may set the feature in learning mode. In Learning mode all rules are
applied, but websites are not blocked, only logged.

You can switch between a Basic and Advanced view on the Settings tab by clicking the Basic
Settings / Advanced Settings button. The Basic view presents the most commonly used options,
while the Advanced view offers the possibility to secure additional browser processes and
logging exclusions, but also allows you to run Website Security in legacy mode instead.

Additional browsers can be secured by specifying their process names at Additional processes
(Advanced setting).
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
287
Chapter 6: Adaptive Security

On the same tab, you can configure the logging of security events:


Log security events - Enable this option if log entries should be created when Website
Security events occur.

Click Message to configure security notifications that will be shown if a Website Security
event occurs. The security notifications are only shown for http:\\ events.

Log security events once - When this option is not enabled, please take into account
that this will cause a lot of extra log entries.

With the option Notify user about security events enabled, in user sessions, to users trying
to browse to a blocked website, a notification is displayed (bottom right corner) informing
him about the blocked site.

Log all visited websites - When enabling this option, all visited whitelisted/allowed
websites will have the value ALLOW in the Action column on the Log tab, and
blacklisted/denied websites the value BLOCK.
Please note that enabling this option may produce quite some extra logging in the
Datastore.

Specify Logging exclusions (Advanced setting) to prevent excessive logging. For instance,
for white- or blacklisted websites that contain pictures, separate log entries for these
pictures might not be desirable. By default, the following extensions are specified as logging
exclusions: ICO, JS, CSS, GIF, JPG, PNG and JPEG. This list can be changed.
Select the Advanced setting Use legacy mode regardless of operating system, to only enable
Website Security for Microsoft Internet Explorer 7 and 8.
Do not select Use legacy mode regardless of operating system, to enable Website Security for
Microsoft Edge, Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, and Opera and any
additional processes you specify, running on Microsoft Windows Vista / 2008 and higher. For
Microsoft Windows XP / 2003 (R2), only Microsoft Internet Explorer 7 and 8 are then secured, as
RES ONE Workspace automatically applies the legacy mode for these Operating Systems.

The options for Redirected websites, i.e. websites containing iFrames that load a
redirected URL in the background, are only applicable for Microsoft Internet Explorer 7 or 8
on Operating Systems on which the legacy mode is applied. For Operating Systems for which
browser independent website security is enabled, redirected websites are treated like any
other, not redirected website.

Log security events - Enable this option if log entries should be created for redirected
websites that are accessed as a result of iFrames.

Notify user with message box - Enable this option to show messages to end users when
they are being redirected to another website as a result of iFrames.

On the Websites tab you may enter allow or deny rules for websites, depending on the method
used (configured on the Settings tab).

Choose the protocol to block (http/https/ftp/all).

Enter the website to be blocked. Rules may contain an asterisk (*). The asterisks are regarded
as wildcards. If an IP address is entered as URL, WebGuard will try to resolve the IP address and
the resulting URL will be checked. If you enter a Rule with http://, https:// or ftp:// this
prefix wil automatically be selected as protocol. If you do not enter a prefix, this has to be
selected manually. By default this is http://. Sub sites (such as
www.ressoftware.com/solutions) are supported.

The default for blacklisting is Allow. Entering only Allow rules therefore, has no effect. Allow
rules are exceptions to the Deny rules. A URL is first checked against the Deny rules. If the URL
passes this check, i.e. there is no Deny rule for this URL, the web page will be displayed. When
a URL has a Deny rule hit, the URL will be checked against the Allow rules. If the URL does
match an Allow rule the web page will be displayed despite the matching Deny rule. The Allow
rules are used as exceptions to the Deny rules and can be used for fine tuning Websites
Security.
288
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 6: Adaptive Security

The default for whitelisting is Deny. Entering only Deny rules, therefore, has no effect. Deny
rules are exceptions to the Allow rules. A URL is first checked against the Allow rules. If the
URL does pass this check, i.e. there is an Allow rule matching the URL, the URL will then be
checked against the Deny rules. If the URL has a Deny rule match, the web page will not be
shown, despite the matching Allow rule. The Deny rules are used as exceptions to the Allow
rules and can be used for fine tuning Websites Security.

If a Deny rule is configured, you may set a specific Learning mode for that rule:

Default learning mode - Use the mode that is selected on the Settings tab.

Yes - Always run this rule in Learning mode (indifferent of the setting on the Settings tab).

No - Never run this rule in Learning mode (indifferent of the setting on the Settings tab).

You can configure exceptions to Websites Security, to give specific users on specific locations
specific permissions.

If necessary, you can authorize websites that caused a security event on the Log tab.

On the Log tab, it is possible to export the log entries to a CSV file.

You can override the global settings of this feature for specific Workspace Containers.
Notes

To prevent users from circumventing the applied rules, the following policies are automatically set:

inPrivate browsing. Internet Explorer 8.0 supports InPrivate browsing mode. When using InPrivate browsing
mode, Helper Browser Objects are not active. In order to prevent users from circumventing WebGuard, the
InPrivate mode is disabled. This registry setting can be found at:
HKCU\Software\Policies\Microsoft\Internet Explorer\Privacy REG_DWORD
EnableInPrivateBrowsing

Protected Mode in Microsoft Internet Explorer 8.0 and higher on Windows 7 / 2008 should be disabled. This
setting is enabled by default. This policy can be found at \Windows Components\Internet
Explorer\Internet Control Panel\Security Page\Internet Zone and is by default
available in inetres.admx on Microsoft Windows 7 / 2008 systems.

NoExtensionManagement. Users should not be able to disable WebGuard. To prevent users from disabling
WebGuard the NoExtensionManagement registry setting is set. This registry setting can be found at:
HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions
REG_DWORD NoExtensionManagement

Prerequisites: Microsoft .NET framework version 2.0 SP2; 32-bit Internet Explorer 6.0 or higher.

For https:\\ URLs, RES ONE Workspace filters on the base URL only, i.e. https:\\www.xxxxx.xxx.
Examples
Mode
Rules
Result
Blacklisting
*.com - deny
All .com URLs are denied except
news.cnet.com - allow
Blacklisting
company.* - deny
company.de - allow
Blacklisting
*.google.com - deny
Maps.*.com - allow
Whitelisting
*.google.com - deny
Maps.*.com - allow
Whitelisting
*.com - allow
news.cnet.com - deny
news.cnet.com
All company URLs are denied except
company.de
The URL http://maps.google.com
will be allowed.
The URL http://maps.google.com
will be denied.
All .com URLs are allowed except
news.cnet.com
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
289
Chapter 6: Adaptive Security
Data
Removable Disks security
With security restrictions on Removable Disks, you can secure the use of removable disks in the
user workspace by giving only specific users on specific locations specific permissions to use
removable disks. This allows you to increase the security of your organization by preventing
unauthorized users from, for example, copying sensitive corporate data to and from floppy disks,
DVD/CD disks, USB sticks, FireWire drives, etc, or accidentally infecting the system network with
viruses and other malware. Other removable media, such as PDAs and CD/DVD burners, can only
connect to a computer using specific software, which you can manage with Managed Applications.
Notes

Access to DVD/CD writing functionality is often managed through application access and not by Removable Disks
security. Standard DVD/CD writing functionality of the operating system (as present in Microsoft Windows XP and
Vista, for example) is managed by Removable Disks Security.

USB 3.0 hubs are supported for Removable Disk Security.
Where to find Removable Disks security
What
Where
Global level
Security > Data > Removable Disks
Removable Disks security modes: disabled, learning, enabled
There are three modes for the security restrictions on Removable Disks:

In disabled mode, users can access any removable storage device and no data is logged.

In learning mode, any user actions will not be blocked, but can be logged. When you have finetuned your environment sufficiently in learning mode, you can set Removable Disks security to
enabled mode.

In enabled mode, only authorized removable storage devices can be accessed.
Notes

If you select the option Log security events, security events will also be logged if Removable Disks Security is in
learning mode.

If you select the option Audit allowed write actions, allowed write actions will also be logged if Removable
Disks Security is in learning mode.

If you select the option Notify users about security events, users will also be notified if Removable Disks
Security is in learning mode.
290
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 6: Adaptive Security
Assigning permissions to users
You can give specific users on specific locations specific permissions to use removable storage
devices.
Permissions
You can assign different permissions (Read and/or Modify) to floppy disks, dvd/cd disks and
removable disks (e.g. you can assign Modify permissions to floppy disks, Read permissions to dvd/cd
disks, and no permissions to removable disks).
Files and folders on removable storage devices are not blocked according to the security restrictions
on Files and Folders:

A user with Modify permissions on a removable storage device can always delete, copy, move
and rename the files and folders on that device.

If certain file types are blocked by the security restrictions on Files and Folders, files of this
type on the removable storage device cannot be opened unless they have been authorized. You
can authorize these files either on global level (from the Log tab or from Security > Global
Authorized Files) or on application level (at Managed Applications on an application's Security
> Authorized Files tab). A blocked file can neither be copied nor moved from the removable
storage device to other locations. See Authorizing files and folders.
Access Control and Workspace Control
By combining Access Control criteria and Workspace Control criteria, you can create situations
where an authorized user can only access a removable storage device at an authorized location on
an authorized computer for a specific period of time.
Drive mappings
If a removable storage device is mapped to a drive, Microsoft Windows remembers this mapping and
will try to use it again next time the removable storage device is used. If that drive letter is no
longer available, the removable storage device does not become visible. To prevent this, select Map
Removable Disk to first available drive letter starting from and provide the drive letter of your
preference. If you enable this option, RES ONE Workspace will first try to map the drive to the
preferred letter. If this is not available, it will proceed alphabetically until a free letter is found.
After Z, it will start at A.
Logging
All Removable Disks security events are logged in the Removable Disks Log. This log shows an
overview of all events that occurred when users were prevented from accessing a removable storage
device. The list specifies time, file name and location, process, computer, user, session, operation,
and action. The log is automatically cleaned up periodically.
You can authorize a blocked file from the Removable Disks Log by selecting it and clicking
Authorize selected file. This exception can be Execute and/or Modify. Alternatively, you can
authorize the file by right-clicking it and then selecting Authorize selected file from the context
menu. It will then automatically be added to the Global Authorized Files.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
291
Chapter 6: Adaptive Security
Files and Folders security
With security restrictions on Files and Folders, you can prevent specific file types and folders (such
as *.vbs, *.avi, or \\server\share\folder\*) from being used in the user workspace.
Where to find Files and Folders security
What
Where
Global level
Security > Data > Files and Folders
Application level
Open the application at Composition > Applications, go to Security >
Authorized Files
Files and Folders security Mode: disabled, learning, enabled
There are three modes for the security restrictions on Files and Folders:

In disabled mode, users can use any file or folder and no data is logged.

In learning mode, attempts to use unauthorized files and folders will not be blocked. However,
you can choose to log these events in the Log file. This allows you to fine-tune the security of
your environment by authorizing additional files, if necessary. When you have fine-tuned your
environment sufficiently in learning mode, you can set Files and Folders security to enabled
mode.

In enabled mode, unauthorized files and folders cannot be accessed. You can choose to log
security events in the Log file.
Notes

If you select the option Log security events, security events will also be logged if Files and Folders security is in
learning mode.

If you select the option Notify user about security events, users will also be notified if Files and Folders security
is in learning mode.

If you configure a blocked resource type, Silent mode on the Settings tab will block the resource, but not log a
security event. This can be useful if the resource causes many security events, and you want to filter these
events from the Files and Folders Log.
Example: blocking and authorizing files
With Files and Folders security, you can set up a situation in which certain files are blocked for
general use, but can be accessed by a specific application.
For example:

MP3 files and AVI files should be blocked for all users.

Only managers should be allowed to access MP3 files and only when using Windows Media
Player.
This setup can be achieved with the following:

Configure blocked resources in Files and Folders security for the file types *.mp3 and *.avi.

Add the application Windows Media Player in the Managed Applications node.

In the Access Control section of the application window, add Management to the list of
selected groups.

In the Security section, select Only RES ONE Workspace is allowed to launch this application.

Add an authorized file for the file type *.mp3.
292
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 6: Adaptive Security
Logging
All Files and Folders Security events are logged in the Files and Folders Log. This log shows an
overview of all events that occurred when users were prevented from accessing an unauthorized file
or folder. The list specifies time, file, process, computer, user, session, operation and action. Use
the drop-down box in the lower part of the screen to sort events by date. The log is automatically
cleaned up periodically.
You can authorize a blocked file from the Files and Folders Log by selecting it and clicking
Authorize selected file. It will then automatically be added to the Global Authorized Files, and
access to it will no longer be prevented.
Read-Only Blanketing
With Read-Only Blanketing, you can render all local drives on servers and desktops in your
environment read-only, without touching Microsoft Windows security permissions on files and
folders. This allows you to safeguard data against unauthorized access or modification by RES ONE
Workspace users, and secures the user workspace against corruption and loss of information.
Read-Only Blanketing allows you to prevent users from:

Saving data on local drives. If Read-Only Blanketing is enabled, data can only be saved on
network drives.

Accidentally overwriting or deleting system files and other important files on their desktops.
The following folders are automatically excluded from Read-Only Blanketing:

The Recycle Bin on each local drive

%userprofile%, %allusersprofile%

Tmp and temp locations

Spool in system32 folder

Debug\usermode in system32 folder

The server console
Where to find Read-Only Blanketing
What
Where
Global level
Security > Data > Read-Only Blanketing
Read-Only Blanketing security Modes: disabled, learning, enabled
There are three modes Read-Only Blanketing:

In disabled mode, users can access and modify data on local disks and no data is logged.

In learning mode, attempts to access local disks will not be blocked. However, you can choose
to log these events in the Log file. When you have fine-tuned your environment sufficiently in
learning mode, you can set Read-Only Blanketing to enabled mode.

In enabled mode, all local drives on servers and desktops are rendered read-only. You can
choose to log security events in the Log file.
Notes

If you select the option Log security events, security events will also be logged if Read-Only Blanketing is in
learning mode.

If you select the option Notify users about security events, users will also be notified if Read-Only Blanketing is
in learning mode.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
293
Chapter 6: Adaptive Security
Logging
All Read-Only Blanketing security events are logged in the Read-Only Blanketing Log. This log
shows an overview of all events that occurred when users were prevented from accessing an
unauthorized file or folder. The list specifies time, file, process, computer, user, session, operation
and action. Use the drop-down box in the lower part of the screen to sort events by date. The log is
automatically cleaned up periodically.
You can authorize a blocked file from the Read-Only Blanketing Log by selecting it and clicking
Authorize selected file. Alternatively, you can authorize the file by right-clicking it and then
selecting Authorize selected file from the context menu. It will then automatically be added to the
Global Authorized Files, and access to it will no longer be prevented.
Authorized Files
With Authorized Files, you can authorize files and folders in the user workspace, and view a list of
all authorized files. Files and folders that are authorized on global level can be accessed by all
users, but you can still maintain a high level of security in the user workspace by applying Access
Control criteria and Workspace Control criteria to each global authorized file.
Before you authorize a file on global level, always consider if the user workspace is better
protected if you authorize the file on application level.
Where to find Authorized Files
What
Where
Global level
Security > Authorized Files
Authorizing files and folders
You can make exceptions to the global blocking of files by authorizing access to specific files and
folders. Authorization can be global, or it can be provided on an application level.

Grant global access to specific files either through the Authorized Files section, or by
authorizing files from the various security logs.

Many applications need to start up other, legitimate executables or to access specific files in
order to function properly. For example, some application Help features will call on an
executable. If that executable is blocked, the user cannot access the Help. You could authorize
these files and executables on a global level, but this may be undesirable. Instead, you can
grant a specific application (rather than all users) the right to access a specific file. This
application is then allowed to access the file, but other applications or users are not. You can
set access to a file for an application on the tab Security > Authorized Files for the specific
application.

With the security restrictions on Files and Folders, you can block certain file types. You can
still authorize individual files of this type on global level (Security > Authorized Files) or on
application level (at Managed Applications on an application's Security > Authorized Files
tab).
294
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 6: Adaptive Security


Authorized file security can be enhanced by checking the executable's file hash. To check file
hashes, the Managed Applications security option Only allow authorized file hashes (at
Security > Applications > Managed Applications, on the Settings tab) must be enabled and
allowed/denied file hashes must be configured.

Files hashes can be added, edited, or deleted for Authorized files on application level (at
Composition > Applications, on the Security > Authorized Files tab when selecting an
Authorized file) and on global level (at Security > Applications > Managed Applications,
from the context menu on the Log tab and at Security > Authorized Files, when editing an
Authorized file).

File hash calculation is done using the Secure Hash Algorithm "SHA-256".

File hashes are not displayed in the Authorized files overview (at Security > Authorized
Files), but are returned when searching for specific file hashes. If the option Show all
Authorized Files is checked, also the file hashes on application-level are included in the
search when searching for a specific file hash.

On the Authorized Files tab, select Import file hashes from the context menu to import
either a comma delimited CSV file or a tab delimited TXT file. File hashes can also be
imported using the command line option Pwrtech.exe /importhashes=<file>
/createifnotexists. See Import file hashes (on page 378) in the Command line Options
section for more information and examples of the import files.
You can easily move authorized files from one application to another; from an application to the
Authorized Files node; and from the Authorized Files node to a specific application. To do so,
right-click one or more selected authorized files and choose Move.
When adding an authorized file or folder to the Global Authorized Files, use the following formats:
Format
Explanation
C:\WINDOWS\inf
File or folder with this name
C:\WINDOWS\inf\
Only this folder
C:\WINDOWS\inf\*
All files and subfolders in folder C:\WINDOWS\inf
C:\WINDOWS\inf\*.txt
All files with the extension .txt in folder C:\Windows\inf
C:\WINDOWS\inf\readme.txt Only the file Readme.txt in folder C:\Windows\inf
Note

Authorized Files contains a default rule for the system process svchost.exe. In some operating systems, this
process causes applications to start when double-clicking a file that is associated with it, even when the
application is blocked by a security rule. This security rule determines whether svchost.exe is allowed to
start other unmanaged applications or file associations (such as e.g. Windows Media Player and MP3 files)
indirectly. In new RES ONE Workspace environments, the rule is disabled by default. In environments that are
upgraded from a previous version of RES ONE Workspace, the rule is enabled by default.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
295
Chapter 6: Adaptive Security
User Sessions security
With the security restrictions on User Sessions, you can restrict users to a single RES ONE
Workspace session at a time. This improves the performance of your application servers and allows
you to manage license usage. It also prevents issues with locked data in a user's home folder, which
sometimes occurs when a user tries to access the same data from two sessions simultaneously.
When users try to start a second RES ONE Workspace session, a message shows that they already
have an active session, and are not allowed another session. This message can be configured.

Allow end users to log on more than once from the same workstation allows the user to start
different applications that are located at different Terminal Servers in the same RES ONE
Workspace session. For example, this allows the user to start Microsoft Office at Terminal
Server A and a financial application at Terminal Server B in the same RES ONE Workspace
session.

If the option Allow end users to end/disconnect an already active session is enabled, end
users can end the previous session and proceed with the logon in the second location. If the
option Show list of applications in the already active session is enabled, they can see which
applications are still open in the active session. This can be useful, because any unsaved data in
the active session will be lost.
Where to find User Sessions security
What
Where
Global level
Security > User Sessions
Configuring different settings for certain parts of the environment
The security restrictions on Sessions apply to the entire RES ONE Workspace environment. However,
in certain situations you may want certain parts of the environment to get different settings.
Excluding certain types of users
There are two options to exclude users from the default security restrictions on Sessions on the
basis of an Administrative role. This can be useful, for example, for a system administrator that
needs to be able to log on at multiple machines, without being hindered by the security restrictions
on Sessions.

With Allow any user with assigned Administrative Role to log on more than once, users with
an Administrative Role are excluded from the security restrictions on Sessions, and can start
several sessions. This applies to any user who has an Administrative Role, whatever that
Administrative Role is.

With Allow technical managers to log on more than once, users who have the Administrative
Role of Technical Manager are excluded from the security restrictions on Sessions. Users with
other Administrative Roles are not excluded from the security restrictions on Sessions.
Excluding passthrough sessions
Passthrough sessions are sessions that occur when a user starts an application that is located on a
remote server from his RES ONE Workspace session. When the user starts the application, a new
session is started on the remote server to deliver the application to the user's desktop. This can be a
Citrix XenApp published application or a Microsoft TS RemoteApp applications. With the option
Always allow passthrough sessions, you can exclude these sessions from the security restrictions on
Sessions.
296
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 6: Adaptive Security
You can read more about Citrix XenApp published applications and Microsoft TS RemoteApp
applications in the chapter Integration (on page 216).
Configuring user-specific settings
RES ONE Workspace stores the Sessions settings in the registry at:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\RES\Workspace Manager\Settings\SessionGuard
You can overrule these settings at user level with RES ONE Workspace Registry Settings
(Composition > Actions By Type > User Registry).
The configurable settings are:

AllowEndSession: Yes/No

AllowFromSameWorkstation: Yes/No

AllowPassthrough: Yes/No

AllowShowApps: Yes/No

AllowSupport: Yes/No

AllowTech: Yes/No

Enabled: Yes/No
Note
Please note that overruling the default settings in the registry can make it difficult to troubleshoot your environment. It
causes behavior that differs from the settings shown in the Management Console. Alternatively, consider if you can create a
Workspace with settings different than the global settings. See Configuring different settings for Workspace Containers.
Logging
All Sessions Security events are logged in the Sessions Log. This log shows an overview of all events
that occurred when users were prevented from starting a new session. The log also shows which
action was taken by the user:

Exited on user request.

Retried (if the user logged off the other session manually, and then retried).

Logged off other session on client 'clientname' (if the user opted to let RES ONE Workspace log
off the other session automatically).
The log is automatically cleaned up periodically.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
297
Chapter 6: Adaptive Security
Network Connections security
With the security restrictions on Network Connections, you can restrict access to resources on the
network per user workspace.
Network Connections security can be configured for the entire user session, or for specific
applications assigned to the user.
Where to find Network Connections Security
What
Where
Global level
Security > Network Connections
Application level
Open the application at Composition > Applications, go to Security >
Authorized Connections
Agent Prerequisites
In order to use Network Security, Agents must be running one of the following operating systems
(including the 64-bit editions):

Microsoft Windows Server 2008

Microsoft Windows 7

Microsoft Windows 8

Microsoft Windows 8.1

Microsoft Windows Server 2012

Microsoft Windows Server 2012 R2
If you enable Network Connections Security while your computer (the administrator's computer)
does not meet the prerequisites, a message will show that the NetGuard driver is not found or is not
running.
If Network Security is enabled, users will not be able to start sessions on Agents that do not meet
the requirements. To allow users to start sessions on such Agents anyway, select Allow session on
computers not running NetGuard.
298
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 6: Adaptive Security
Network Security Modes: disabled, learning, enabled
Global level
There are three modes for the global settings of the Network Security feature:

In disabled mode, Network Security allows all network connections, and no data is logged.

In learning mode, Network Security allows all network connections. However, you can choose to
log these events. Use learning mode to monitor and evaluate which network connections are
used without restricting users in their work.

In enabled mode, Network Security is enforced: authorized network connections are allowed
and unauthorized connections are blocked. You can choose to log attempts to access blocked
connections.
Notes

If you select the option Log security events, security events will be logged if Network security is in enabled or
learning mode.

If you select the option Notify users about security events, users will be notified if Network security is in
enabled or learning mode.
Application level
If Network Security is enabled or in learning mode, all of the configured Authorized Connections will
be enforced to all applications. If you need to determine which network connections should be
authorized for an application, you can run this application's Authorized Connections in learning
mode so that it can still access unauthorized network connections, but these are logged.
Individual blocked connections
If Network Security is enabled or in learning mode, a new blocked connection is set in learning
mode by default. This allows you to monitor the use of this connection, which will be allowed but
also logged. If the connection should indeed be blocked, the rule must be set in blocking mode.
Security Method: Whitelisting or Blacklisting
The global Network Security feature has two Security Methods: Whitelisting and Blacklisting.

Whitelisting allows no network connections, except the ones that are listed on the Authorized
Connections tab.
Whitelisting gives you full control over the network connections in your environment. Only
authorized connections can be accessed. However, for this approach to work, you do need to
know exactly which network connections are required in your environment, so that you can
authorize them. If you find out someone is trying to access a new network connection that
should be allowed, you add that connection to the list of authorized connections. Optionally,
Access Control and Workspace Control can authorize the connection only for certain people or
workspaces.

Blacklisting allows all network connections, except the ones that are listed on the Blocked
Connections tab.
Blacklisting allows you to block network connections that you do not want users to access.
Blocked connections cannot be accessed, all others can. If you find out people are accessing a
new network connection that you do not want them to, you add that connection to the list of
blocked connections. Optionally, use Access Control and Workspace Control to block the
connection for certain people or workspaces.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
299
Chapter 6: Adaptive Security
Exceptions to blocked connections when Blacklisting
With Blacklisting, you can create an exception so that certain people, workspaces or processes can
access a connection that is blocked for others:

To allow a process to access a connection that is blocked on the global level, authorize the
connection on the application's Authorized Connections tab.

To allow certain people and/or workspaces to access a connection that is blocked on the global
level, create an Authorized Connection on the Authorized Connections tab at Security >
Network. Access Control and Workspace Control on this Authorized Connection must result in a
subset of the people and/or workspaces that the global blocked connection applied to.
Creating a Blocked Connection for monitoring purposes in Blacklisting environments
If Network Security is enabled and uses Blacklisting, you can monitor what connections are
actually established by setting up a special blocked connection in learning mode. This blocked
connection for monitoring purposes ensures that all connections that are not blocked are logged.
To create a blocked connection for monitoring purposes, create a blocked connection with a wild
card (*) in all the fields, and set it in learning mode. Ensure that the blocked connection appears at
the very bottom of the list of blocked connections.
Global Network Security and application-based Authorized Connections
Authorizing a specific application to use specific connections
Exempting an application from Network Security Settings
Authorizing a specific application to use specific connections
 With Network Security enabled and using Blacklisting, use an application-level Authorized
Connection to overrule a blocked connection at the global Network Connection Security level.

With Network Connection Security enabled and using Whitelisting, use an application-level
Authorized Connection to add an additional layer of security: the connection is authorized, but
only for the application process. The connection cannot be accessed from another application.
For example, if you authorize connection to a specific server group by an SSH Client application,
the connection will only be available if it is accessed from the SSH Client. If any other
application or process attempts to set up that connection, Network Connection Security will
block or log it, depending on its configuration.
Exempting an application from Network Security Settings
To exempt an application from Network Security settings as configured at Security > Network,
select Run this application in learning mode. This allows the application to access all network
connections, whether they are blocked or not. In learning mode, these network connections are
logged.
This setting is useful if you need to determine which network connections should be authorized for a
new application, but you do not want to disable Network Security.
Subnet Masks
Many large network environments are divided into subnets to reflect an internal logic, to lower
network traffic and to enhance security. For example, if you have a group of Application servers in
your network that are managed by a 3rd party, that group often exists in a separate subnet.
With Network Security, you can use subnet masks to block or authorize connections specifically to a
subnet. A subnet is defined through a combination of a network (IP) address (for example
172.16.0.0) with a subnet mask (for example 255.255.255.248).
300
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 6: Adaptive Security
Examples
Whitelisting
In an environment where Network Security is enabled and uses Whitelisting, RES ONE Workspace
does not allow any connections by default. The connections that users need in order to do their job
must be specifically authorized.
For example, it is not enough to give the administrators of a company's Linux servers an SSH client
in their RES ONE Workspace sessions. In order for the administrators to do their work, the SSH client
must be authorized to connect to the Linux servers using TCP/IP over a given port. This can be
achieved by creating application-level Authorized Connections for the SSH client, authorizing
incoming and outgoing TCP/IP communication over port 22 to the relevant hosts.
Additional restrictions can be added as required. For example:

Workspace Control on the authorized connection can restrict the authorized connection to a
specific set of workstations. The authorized connection will only be available from computers in
that Workspace, but not from other computers.

You can create a separate authorized connection for each Linux server, and restrict each
authorized connection to a set of specific administrators, so that, for example, only
administrators who work in the London office can access the servers for the London office,
while only the French administrators can access the servers for the French office.

Instead of application-based Authorized Connections, you can create global ones with the
relevant Access and Workspace Control.
Note
With Whitelisting, the list of blocked connections is ignored.
Blacklisting
In an environment where Network Security is enabled and uses Blacklisting, RES ONE Workspace
allows all connections by default. The connections that could be harmful need to be blocked for all
users. Furthermore, connections that should be available but only to specific users need to be
blocked for everybody, after which specific users should be excepted using an Authorized
Connection.
For example:

Nobody should be able to transfer information over ports 21 and 22, because these ports are
often used for transferring information using FTP.

Connection to the SQL server holding financial data should be blocked for everyone except staff
of the Finance department, provided they are logging on from a computer located in the office,
not from home.

Connection to the Linux servers is blocked for everyone, but authorized for the administrators
who manage those servers.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
301
Chapter 6: Adaptive Security
This setup can be achieved with:



Blocked Connections that apply to all users for:

the database server holding the financial data

the Linux servers
Authorized Connections configured for:

connection to database server holding the financial data with Access Control set to the
members of the Finance department and Workspace Control set to the office computers.

connection to the Linux servers, with Access Control set to the administrators.
An additional blocked connection for monitoring purposes so that the connections that are
actually established are logged.
Notes

With Blacklisting, an authorized connection is only useful if it narrows down a blocked connection. For example,
there is no point in blocking all traffic over port 22 but specifically allowing TCP/IP traffic over port 23, as that
was already allowed.

With blacklisting, it is also possible to grant access to a specific connection for a specific group. To do so, create
a blocked connection for the specific connection. Set Access Control for this connection to the specific group and
select Exclude members of Selected group. Now this connection is blocked for everyone not in the designated
group.
302
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 6: Adaptive Security
6.2
Performance
The Performance features in RES ONE Workspace help you get the optimal performance out of the
available servers in your environment. This can be achieved by spreading the available memory and
CPU capacity evenly across the server farm and across logons:

Access Balancing (on page 303) sets a maximum number of simultaneous logons to RES ONE
Workspace sessions on servers in a server farm. It is also possible to set different values for
specific servers.

CPU Optimization (on page 305) actively lowers the priority of processes with a sustained high
CPU usage. This keeps the process running, but with a low priority so that other applications in
the system are not hindered anymore. When the process returns to a more acceptable level of
CPU usage, its priority is changed back to the original level.

Instant LogOff (on page 306) ensures that user profiles unload correctly, and it disconnects the
user when a log off is initiated, which improves the speed of the system as experienced by the
user.

Memory Optimization (on page 308) limits the maximum amount of physical memory used per
session and sets a maximum number of running applications per session.
Access Balancing
Access Balancing limits the number of session logons that a server is allowed to process
simultaneously. This optimizes the speed of logons and stabilizes a server's overall performance at
peak logon times.
If many users log on at once, for example at the start of the working day or after a server reboot,
this can impact the speed of session logons and the overall performance of the sessions already
running on the server. Access Balancing serves as a throttle on session logons: logons that exceed
the set limit are queued until the resources are available for them to be processed. Users whose
logons are placed in queue are notified of their position in the queue. As a result, users no longer
experience slow logons, at which only an hour glass is shown. Instead, they are informed about what
is happening and how many users are ahead of them in the queue.
For example, you can set Access Balancing to allow a maximum of 2 simultaneous logons per
server: If 10 users log on to a server more or less simultaneously, the first 2 logons proceed
immediately and at a normal speed. Logons 3 to 10 are queued until a logon slot is freed.
Note
Administrator logons are not restricted by Access Balancing settings.
Where to find Access Balancing
What
Where
Access Balancing
Administration > Performance > Access Balancing
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
303
Chapter 6: Adaptive Security
Configuring user-specific Access Balancing settings
RES ONE Workspace stores the Access Balancing settings in the registry at:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\RES\Workspace
Manager\Settings\AccessBalancing
You can overrule these settings at user level with RES ONE Workspace Registry Settings
(Composition > Actions By Type > User Registry).
The configurable settings are:

Enabled: Yes/No

MaxLogons: Maximum number of simultaneous logons
Note
Please note that overruling the default settings in the registry can make it difficult to troubleshoot your environment. It
causes behavior that differs from the settings shown in the Management Console.
Logging
The Access Balancing Log shows detailed information about Access Balancing events.
The log also shows additional statistics about all the logons in your environment. This is useful as a
basis for determining what limits to configure, but it can also contain valuable information for other
purposes, for example, in relation to Service Level Agreements.
For example, the Average queue length specifies how many logons are held in queue on average
(how many users experience a bottleneck at logon). The Average delay specifies how long users
were held in the queue.

If the Average queue length is high, while the Average delay is short, you can probably allow a
higher number of simultaneous logons.

If the Average queue length is high, while the Average delay is long, you may need additional
server capacity.
Note
The higher the number in the field # of logons, the more reliable the statistics.
304
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 6: Adaptive Security
CPU Optimization
Tip
You can use Alerting to configure notifications for CPU Optimization events. You can find Alerting at Setup > Integration >
Alerting.
Where to find CPU Optimization
What
Where
CPU Optimization
Administration > Performance > CPU Optimization
Exclude an application from Open the application at Composition > Applications, go to Properties
CPU Optimization
> Settings, select Exclude from CPU optimization
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
305
Chapter 6: Adaptive Security
Multicore machines and hyperthreading CPUs
CPU Optimization settings are independent of the number of processors: multi-CPU systems do not
need other settings than single-CPU systems. If the Critical CPU condition is set to 90% on a dualCPU system, processes will be noticed when they use 45% or more of the total CPU capacity (which
is 90% of one CPU).
RES ONE Workspace regards hyperthreading and multicore CPUs as standalone CPUs. This is
reflected in CPU Optimization, but also in Zones with a Hardware Requirement rule: 1 processor
with HyperThreading / 1 dualcore processor is recognized as 2 processors in CPU Optimization and
in Locations and Devices zones. As a result:

1 processor without HyperThreading = 1 processor in CPU Optimization / Zones

1 processor with HyperThreading = 2 processors in CPU Optimization / Zones

2 processors without HyperThreading = 2 processors in CPU Optimization / Zones

2 processors with HyperThreading = 4 processors in CPU Optimization / Zones

etc.
Excluding a specific application from CPU Optimization
If a lower priority of an application affects its performance or if the application only occasionally
has a high CPU utilization, you can exclude it from CPU Optimization. You can configure this by
selecting the option Exclude from CPU Optimization on the application's Settings tab.
Logging
The CPU Optimization Log shows detailed information about CPU Optimization events.
The default CPU Optimization values are a critical CPU condition of 70% with an escalation period of
5 seconds, and an idle CPU condition of 10% with an probation period of 30 seconds. Use the events
displayed in the CPU Optimization log to decide whether these values need to be adjusted.
If a process exceeds the configured CPU Optimization limits, you can view the measured critical CPU
load duration in Usage Tracking, in the Critical CPU load duration column of the Details tab. This
allows you to adjust CPU Optimization settings, to pinpoint "misbehaving" applications and to notice
applications that need to be excluded from CPU Optimization.
306
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 6: Adaptive Security
Instant LogOff
With Instant LogOff, you can manage user profiles that fail to unload during logoff. This behavior
can occur if applications do not close their registry handles when they are terminated. This behavior
is usually caused by improper coding in either Microsoft software or third-party software.

Microsoft Windows 2000 will attempt to unload the user profile 60 times at a one-second
interval. After 60 seconds, during which a "Saving Settings" message will be shown to the user,
the system will give up. Roaming profiles will not be reconciled.

Microsoft Windows XP and 2003 reconcile the profile using a copy of the contents of the
registry. The user does not have to wait. However, the computer cannot recover the memory
used by the profile until it is unloaded. Also, users may not be able to log on again if their
profile was not unloaded. This occurs, for example, if you use anonymous logons.

In some cases (for example, when using anonymous logons), the user cannot log on if his profile
cannot be unloaded.
Instant LogOff performs 2 separate actions:

It enumerates all handles to the user registry when a user logs off, and forces them to close if
they are not closed automatically. This ensures that user profiles are always unloaded. This
prevents problems with the reconciliation of roaming profiles; with the registry size limit; and
with the log off process to become slow (with the process remaining at "Saving Settings" for a
long time).

It disconnects users when they log off. The logoff process continues as normal after the
disconnect, but users experience a faster logoff.
Note
Microsoft Windows Vista, Windows 7 and Windows Server 2008 automatically take care of user profiles that fail to unload.
Instant Logoff does not need to handle this in environments where all Agents run under these operating systems. The
Disconnect options remain relevant under those operating systems.
Where to find Instant LogOff
What
Where
Instant LogOff
Administration > Performance > Instant LogOff
Instant LogOff Modes: disabled, log only, enabled
There are three Instant LogOff modes:

In the mode Disabled (but apply configured disconnect behavior), Instant LogOff does not
enumerate any registry handles and does not force any to close.

In the mode Log only (but apply configured disconnect behavior), Instant LogOff log does not
enumerate any registry handles and does not force any to close, but it does report any problems
that occur with unloading user profiles.

In Enabled mode, Instant LogOff takes action if a user profile fails to unload.
Note
The Instant LogOff mode does not affect the behavior for Disconnect user session when log off is initiated. If this option is
selected, it is applied even if Instant LogOff is disabled or in log only mode.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
307
Chapter 6: Adaptive Security
Disconnect user session when logoff is initiated
In Terminal Server environments and environments that use Microsoft Windows Vista, the setting
Disconnect user session when log off is initiated greatly enhances the speed of the system as
experienced by the user. It does not affect the actual logoff process, which continues and ends
normally in the disconnected session.
Enabling this feature also deactivates the "Saving Settings" message that unexpectedly pops up in
Seamless Windows applications.
Notes

If it is configured, Disconnect user session when log off is initiated is executed independent of the Instant
LogOff mode.

You may want to turn Disconnect off in test environments where users log off and then on again straight away.

After the disconnect, the user remains logged on for a brief period of time while the logoff process continues.
This is reflected, for example, in the list of User Sessions in the Management Console, where the user's name will
remain visible until the session is actually logged off.
Configuring user-specific Instant LogOff settings
RES ONE Workspace stores the Instant LogOff settings in the registry at:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\RES\Workspace
Manager\Settings\InstantLogoff
You can overrule these settings at user level with RES ONE Workspace Registry Settings
(Composition > Actions By Type > User Registry).
The configurable settings are:

AfterSplash: Yes/No

Disconnect: Yes/No

Enabled: Yes/No

Mode: Active/Log
Note
Please note that overruling the default settings in the registry can make it difficult to troubleshoot your environment. It
causes behavior that differs from the settings shown in the Management Console.
308
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 6: Adaptive Security
Memory Optimization
Memory Optimization optimizes the physical memory usage of running processes on computers in
your environment. With Memory Optimization enabled, RES ONE Workspace automatically releases:

reserved physical memory that is no longer used by a recently launched application.

physical memory of applications that have been inactive for a while.
In addition, you can ensure an even spread of memory across sessions on a server by limiting:

the amount of memory used per session.

the number of applications that are allowed to run simultaneously in a session.
It is not recommended to use Memory Optimization alongside of other memory optimization
features such as Citrix Virtual memory Optimization.
Where to find Memory Optimization
What
Where
Memory Optimization
Administration > Performance > Memory Optimization
Exclude an application from Open the application at Composition > Applications, go to Properties
Memory Optimization
> Settings, select Exclude from Memory Optimization
Exclude an application from Open the application at Composition > Applications, go to Properties
the Memory Optimization
> Settings, select Exclude from Memory Optimization Limits
limit on the session's
memory usage and the
maximum number of
applications
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
309
Chapter 6: Adaptive Security
Limiting the total memory usage of a session
With the option Limit amount of memory per session, you can restrict the memory usage of each
RES ONE Workspace session. As soon as the limit is reached, the user is not allowed to start
additional applications. If a user tries to start an additional application, a message shows that
memory must be freed up by closing an application. The contents of this message can be
configured:
As soon as the session's memory usage drops below the configured limit, the user regains the ability
to start applications.
Notes

The Memory Optimization mode does not affect the options Limit the amount of memory per session and Limit
number of running applications per session. If configured, these options are applied, even if Memory
Optimization is disabled.

RES ONE Workspace uses the total memory processes Working Set for the Memory Optimization feature. In the
Windows Task Manager, this is shown in the Working Set (Memory) column. By default, this column is not
displayed in the Windows Task Manager.
Setting Memory Optimization limits
As a rule of thumb, you can use the following procedure to determine a limit for the amount of
memory per session:

Start a Terminal Server without any user sessions.

Make a note of the amount of available memory (this is the amount of installed RAM, minus the
overhead used by the OS).

Divide the amount of available memory by the number of users who are to use this server.
The resulting number is the amount of memory that you can set per session.
310
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 6: Adaptive Security
Limiting the number of applications running in a session
With the option Limit number of running applications per session, you can restrict the number of
applications that are allowed to run in any RES ONE Workspace session. Users are not allowed to
start additional applications above the set limit. If a user tries to start an additional application, a
message shows that an application must be closed before another one can be started. The contents
of this message can be configured:
Notes

The Memory Optimization mode does not affect the options Limit the amount of memory per session and Limit
number of running applications per session. If configured, these options are applied, even if Memory
Optimization is disabled.

Memory Optimization only affects the number of running applications; not the number of open windows
associated with the application.
Excluding a specific application from Memory Optimization
You can exclude an application from Memory Optimization actions:

With the application option Exclude from Memory Optimization Limits, Memory Optimization
will never prevent users from opening this application, even if the set Memory Optimization
limits have been exceeded.

With the application option Exclude from Memory Optimization, Memory Optimization will
never release physical memory reserved by this application, even if it is idle. This may be
necessary if the application needs its memory for background processes, for example.
Configuring user-specific Memory Optimization settings
RES ONE Workspace stores the Memory Optimization settings in the registry at:
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\RES\Workspace Manager\Settings\MemoryShield
You can overrule these settings at user level with RES ONE Workspace Registry Settings
(Composition > Actions By Type > User Registry).
The configurable settings are:

Enabled: Yes/No

LimitSessionApps: Yes/No

LimitSessionMemory: Yes/No

SessionAppsLimit: limit in number of running applications

SessionMemoryLimit: limit in MB
Note
Please note that overruling the default settings in the registry can make it difficult to troubleshoot your environment. It
causes behavior that differs from the settings shown in the Management Console.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
311
Chapter 6: Adaptive Security
Logging
If a session exceeds the Memory Optimization memory limit, this is recorded in the Memory
Optimization Log. This log also records whether Memory Optimization has taken place.

Optimizations are recorded per session after the user has logged off.

Limits are recorded per event.
The amount of memory freed up as a result of the Memory optimizations is shown in the Action
column of the Memory Optimization Log. This amount is cumulative for the session. For example, if
Memory Optimization frees up 5 MB for a specific application, and then frees up another 5 MB at a
later stage, only 5 MB of physical memory is freed up at a time, but a total amount of freed up
memory is 10 MB, and this total amount is shown in the log.
312
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 7: Management
Chapter 7: Management
7.1
Building Blocks
A Building Block stores information about the configuration settings of a RES ONE Workspace site. A
Building Block can be imported back into its original site to recreate these settings as a backup
solution. A Building Block can also be imported into a different environment in order to copy the
settings. This makes Building Blocks useful for change management, and data exchange.
A Building Block is an XML file that can be edited manually. This makes it possible to use a Building
Block as a template: before importing a Building Block into another site, you can replace sitespecific information such as server names with the information applicable to the target
environment.
Where to find Building Blocks in the RES ONE Workspace Console
What
Where
Create or import a Building
Block (node-specific)
click the
button in any RES ONE Workspace Console node > Create
Building Block or > Import Building Block
or
select the node and right-click > Create Building Block or > Import
Building Block
Import a Building Block of all Action menu > Import Building Blocks
or selected items
Create a Building Block of a
specific setting or
application
right-click the item > Create Building Block
Create a Building Block of
selected items
Action menu > Select items for Building Blocks, then Action menu >
Create Building Block of selected items
Import Building Block of all
or selected items
Action menu > Import Building Blocks
Update or delete all
managed applications using
a Building Block
at Composition > Applications, click the
Applications or Delete Applications
Update or delete a selected
managed application using a
Building Block
at Composition > Applications, right-click the application > Building
Blocks > Add/Update Applications or Delete Applications.
button > Add/Update
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
313
Chapter 7: Management
Creating Building Blocks
By default, a Building Block created from the Action menu contains all the settings of the RES ONE
Workspace site, but individual nodes, settings and applications can be excluded manually before the
Building Block is created.
A Building Block created using the
button or by right-clicking a specific node contains all the
settings or applications within that node.
A Building Block created right-clicking a specific settings or applications contains only that setting
or application.
Tip
It is possible to create a Building Block of a Workspace Container with access control set to an OU in domain "A" and import
the building block in a RES ONE Workspace environment in domain "B" where the OU is available under the same path. Access
control on the Workspace Container in domain "B" will then be set to the same OU, but in domain "B".
Importing Building Blocks
Importing a Building Block from the Action menu imports all the settings and applications contained
in that Building Block into the RES ONE Workspace site. Individual nodes, settings and applications
can be excluded manually before the Building Block is imported.
Importing a Building Block using the
button or by right-clicking a specific node imports only the
settings or applications relevant to that node. Other information in the Building Block is not
imported.
Importing a Building Block by right-clicking a specific setting or application only imports that setting
or application. Other information in the Building Block is not imported.
Merge vs. overwrite
In certain parts of the RES ONE Workspace Console, settings imported from a Building Block can
either overwrite the existing contents of these nodes in the target site, or can be added to them as
a merge. This applies to the following nodes:

User Context > Directory Services

Composition > User Settings

Security
The Merge option:

replaces existing settings in that node by settings in the Building Block that have the same
GUID.

adds settings from the Building Block to the target node if the target node contains no existing
settings with the same GUID.
The Overwrite option removes the entire contents of the target node and replaces it with the
contents of that node as defined in the Building Block.
314
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 7: Management
Example
If your target node contains 10 settings, and you import a Building Block that contains 1 setting
(with a GUID that is not matched in the target site):

the import option Merge results in 11 settings in the target node, namely the 10 original
settings plus the imported one.

the import option Overwrite results in 1 setting in the target node, namely the imported one.
Note
When importing a Building Block manually, the account SIDs can be added. Beware however that, when importing a Building
Block "unattended", account names will be used.
Add/Update Applications and Delete Applications
On the basis of a Building Block that contains only application settings, you can delete or add and
update existing applications in the target site.
The options Add/Update Applications and Delete Applications compare the GUIDs of the existing
applications in the RES ONE Workspace Console with the GUIDs of the applications in the Building
Block.
With the option Add/Update Applications, the Building Block is a list of applications to be created
or updated:

applications are added from the Building Block to the target site if the target site does not
contain an application with the same GUID.

applications in the target site are replaced with the applications in the Building Block that have
the same GUID.
With the option Delete Applications, the Building Block is a list of applications to be deleted: any
application in the target site that has the same GUID as an application in the Building Block is
deleted from the target site.
Notes

When importing Building Blocks with custom application icons, the icon information must refer to the full path to
the icon. For example, to specify a different application icon, replace the element
<icon32x256>XXX</icon32x256> (where “XXX” represents encoded data) with <icon32x256
filename=\\srv-fs01\Applications\Notepad\32x256.ico></icon32x256>.

Only default environment variables are supported in the full path to the application icon.

When importing a Building Block that includes application IDs, this ID will be placed in the sequence of already
existing application IDs in the Datastore. If the ID is already used by an existing application, the next available ID
will be assigned to the imported application.

When importing a Building Block, the option Convert Citrix published apps to local apps can be selected to
convert all Citrix published applications that exist in the Building Block to RES ONE Workspace local applications.
You are then responsible yourself for publishing them if this is desired.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
315
Chapter 7: Management
Importing Building Blocks into a specific workspace
When importing a Building Block, the option Import objects into specific workspace sets the
selected Workspace Container as Workspace Control on the imported settings and applications. This
overwrites any Workspace Control information originally contained in the Building Block for these
objects. If the imported objects already existed and already had Workspace Control, their
Workspace Control is also overwritten.
Importing a Building Block into a specific workspace makes it possible to isolate imported settings
and applications from the rest of the RES ONE Workspace site, for example for testing purposes.
If the option Import Objects into a specific workspace is selected, only settings that can be
restricted with Workspace Control are imported from the Building Block into the target
environment. Settings that cannot be restricted with Workspace Control, such as Shell settings and
Desktop lockdown settings, are not imported.
Administrative roles
When accessing the RES ONE Workspace Console on the basis of an Administrative Role, this impacts
your ability to import Building Blocks:

If you only have Read access to the Management Console, it is not possible to import Building
Blocks.

If you have Modify access to only certain nodes of the Management Console, the Import
Building Block window will show which Building Block settings you can import.
Associated items

A Building Block stores information about any Zones, Data Sources, E-mail Settings and linked
User Settings associated with an object. At import, these links are also established in the target
site. The associated objects are created in the target site if they do not exist there.

If you create a Building Block that includes an object containing resources (such as desktop
pictures), an additional (XBB) file is automatically created that contains these resources. When
you import this Building Block into a target site, the items in the XBB file are also added to the
target site.
316
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 7: Management
Command line parameters
The executable program of the RES ONE Workspace Console is pwrtech.exe. The following
command line parameters are available for Building Block actions:
Parameter
Description
/add <path + name XMLfile>
Imports a single Building Block into the Console. For example:
/add <path + wildcards>

C:\Progra~2\RESSof~1\Worksp~1\pwrtech.exe /add
H:\xml\security_network.xml

C:\Progra~1\RESSof~1\Worksp~1\pwrtech.exe /add
H:\xml\security_network.xml
Imports multiple Building Blocks into the Management Console. For
example:
"%respfdir%\pwrtech.exe" /add H:\example.xml
If the Building Block contains settings from the Composition node,
Authorized Files or Blocked Resources, add the option "/overwrite" to
specify that these settings should replace any existing settings (for
the Composition node, only settings for the same type ("Mapping")
and level ("Global") will be replaced). If you do not add this option, all
settings in the specified Building Block files will be merged with the
current settings in the Console.
/del <path + XML-file>
Deletes an application from the Console. For example:
C:\Progra~1\RESSof~1\Worksp~1\pwrtech.exe /del
H:\xml\startmenu_accessories_calculator.xml
Information excluded from Building Blocks
The following nodes cannot be included in a Building Block:

File Types

Diagnostics

Workspace Model

Licensing

Datastore in the Setup menu

Administration > Maintenance
The structure of Building Blocks
Because of its XML format, the contents of a Building Block can be edited manually using any text
editor or XML-authoring solution.
For example, if you have installed a new print server to replace an existing one, then all network
printer settings in your environment need to point to the new server. Instead of editing each setting
individually, create a Building Block of these settings. Open the XML file and replace all references
to the old printer server with references to the new one. Finally, import the edited Building Block
back into the RES ONE Workspace site.
Warning
Modifying a Building Block may lead to unexpected results. Before you modify a Building Block, make sure you have created a
backup.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
317
Chapter 7: Management
GUIDs
Each setting in a RES ONE Workspace environment contains a GUID, with which it is uniquely
identified in the Datastore. When you create a Building Block of a setting, its XML structure contains
an overview of this setting, followed by its GUID.
If you adjust the GUID of a setting in a Building Block (by replacing a number or character with
another number or character), you can prevent overwriting the original setting by creating a clone
of it. This method can be useful if it is not possible to create a clone of a setting using the
Management Console or if you want to test a modified setting first without overwriting the original
setting.
Editing references to external files
For the following settings, encoded information in the Building Block refers to files:

Application settings (application icons)

E-mail Settings (Outlook signatures)

Registry and Policy settings

Desktop and screensaver background images
These references can be edited manually in a Building Block to refer to different external files. The
file(s) specified must be located in the same folder as the Building Block.
Specifying a different application icon, Outlook signature or Registry setting
Follow this procedure:

Find the relevant element in the XML (see table below).

Remove the encoded data in the element contents.

Add the replacement file name as attribute for the empty element.
For example, to specify a different application icon, replace the element
<icon32x256>XXX</icon32x256> (where "XXX" represents encoded data) with <icon32x256
filename="32x256.ico"></icon32x256>.
Setting
XML element(s)
Example
Application
icon
<icon32x256>XXX</icon32x256>
<icon32x256
filename="32x256.ico"></icon32x256>
<icon32x16>XXX</icon32x16>
<icon16x256>XXX</icon16x256>
<icon16x16>XXX</icon16x16>
Outlook
signature
<htmlfile>XXX</htmlfile>
<plainfile>XXX</plainfile>
<rtffile>XXX</rtffile>
<htmlfile
filename="companysign.htm"></htmlfile>
<plainfile
filename="companysign.txt"></plainfile>
<rtffile
filename="companysign.rtf"></rtffile>
Registry file
<registryfile
<registryfile>XXX</registryfile> filename="setting.reg"></registryfile>
318
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 7: Management
Specifying a different Policy settings file
Follow this procedure:
Element
Edit actions
Example
1 <policysettings>XXX Delete the encoded contents <policysettings filename="policy.set">
</policysettings>
. </policysettings>
and add the replacement
file name as attribute to the
empty element.
2 <registryfile>XXX
. </registryfile>
Delete the encoded contents <registryfile filename="setting.reg">
</registryfile>
and add the replacement
registry file name as
attribute to the empty
element.
3 <filename>xxx.adm
. </filename>
Replace the name of the
ADM file in the element
contents with the
replacement ADM file.
<filename>wmplayer.adm</filename>
4 <embeddedbinary>XXX Delete the encoded contents <embeddedbinary></embeddedbinary>
. </embeddedbinary>
and leave the element
empty.
Specifying a different desktop background image
 Replace the name of the desktop image file in the element <desktoppicture> with the
replacement desktop image, for example
<desktoppicture>companylogo.bmp</desktoppicture>.

Delete the encoded contents of the element <desktopbinary> and leave the element empty.
Specifying a different screensaver image
 Replace the name of the screensaver image in the element <screensaverpicture> with the
replacement screensaver image, for example
<screensaverpicture>companyoffices.bmp</screensaverpicture>.

Delete the encoded contents of the element <screensaverbinary> and leave the element
empty.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
319
Chapter 7: Management
7.2
Instant Reports
Instant Reports allow you to document the entire RES ONE Workspace site, or specific parts of it.
This allows you to create complete configuration, license metering and usage reports of your RES
ONE Workspace environment, to gain a complete overview of used resources and their costs.
Instant Reports include information about the properties and values of the documented item(s) and
can include additional information about the RES ONE Workspace version.
Please note that some RES ONE Workspace nodes in the Diagnostics section are not included by
default when creating an Instant Report. This is because these nodes may contain large amounts of
data.
Where to find Instant Reports
What
Where
Create an Instant Report of a click the
node
or
button in any RES ONE Workspace Console node
select the node and right-click > Create Instant Report
Create an Instant Report of
the entire site
Action menu > Create Instant Report
Create an Instant Report of
specific parts of the site
Action menu > Select items for Instant Report, then Action menu >
Create Instant Report of selected items
Create an Instant Report of a right-click the item > Create Instant Report
specific setting or
application
Instant Report format
Instant Reports can be stored as a PDF file including a Table of Contents.
Alternatively they can be printed directly from the window View Instant Report.
Customizing the contents and presentation
The following customization choices are available for Instant Reports:

Whether or not to include a cover page.

Whether or not to include a title on the cover page. The title is editable.

Whether or not to include a Table of Contents.

Whether or not to include a page About RES ONE Workspace. This page shows details about the
version of RES ONE Workspace and its subprocesses running in your environment, plus the start
level and the installation directory.

Whether or not to include empty pages.
To set these options, go to the Action menu and choose Select Items for Instant Report. At the top
of the tree the section Instant report Settings will appear.
320
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 7: Management
Information excluded from Instant Reports
The following nodes cannot be included in an Instant Report:

Diagnostics > Usage Tracking Overview

Administration > Maintenance
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
321
Chapter 7: Management
7.3
Workspace Containers
Workspace Containers are teams of RES ONE Workspace Agents, grouped according to the logic of a
specific RES ONE Workspace site.
While Agents are grouped into Locations and Devices (Zones) on the basis of objective rules, you
can use Workspace Containers to group Agents according to more complex factors that cannot be
defined in Zone rules.
Access to applications and settings can be restricted to specific Workspace Containers.
Examples:

group a diverse set of test computers into a Workspace Container "Test environment". This
allows you to restrict new settings and applications to this test space before they are made
generally available.

in a shared infrastructure, create a set of Workspace Containers to group the Agents belonging
to different customers.

group Agents according to responsibility (e.g. corporate administrators and local administrators)
Where to find Workspace Containers
What
Where
Defining the Workspace Containers
applicable in the RES ONE Workspace
site
User Context > Workspace Containers
Setting Workspace Containers as Access Composition > Applications > the Workspace Containers
Control criterion on a Managed
tab in the application's Access Control section
Application
Setting Workspace Containers as Access Security > User Installed Applications > Workspace
Control criterion on User Installed
Control
Applications
Setting Workspace Containers as Access on the Workspace Control tab of the setting
Control criterion on a setting
Letting a user choose the Workspace
Container when an application starts
Composition > Applications > the Workspace Containers
tab in the application's Access Control section > Let user
decide which accessible workspace container to use.
Letting a user choose the Workspace
start the session using the command line:
Container when the RES ONE Workspace %ProgramFiles%\RES Software\Workspace
session starts
Manager\pfwsmgr.exe /ew ?
Forcing a user session to start in a
specific Workspace Container
start the session using the command line:
%ProgramFiles%\RES Software\Workspace
Manager\pfwsmgr.exe /ew <name of Workspace
Container>
Hiding a Workspace Container from the on the Properties tab of the Workspace Container at User
list when a user is allowed to choose a Context > Workspace Containers
Workspace Container at the start of the
session or application
322
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 7: Management
Computer Control
The Computer Control tab of a Workspace Container lists the RES ONE Workspace Agents that
belong to this Workspace Container.
When defining the computers that form a Workspace Container, there are 2 options:
1. only specifically identified Agents are members.
2. all Agents in the RES ONE Workspace site are members automatically. Agents that are added to
the site later, also become member automatically.
The first option enables you to create a hand-picked set of Agents.
The second option removes the Agent-based aspect of the Workspace Container (since all Agents are
always a member of this Workspace Container). This enables you to use this Workspace Container as
a set of Access Control principles.
Agents can be member of multiple Workspace Containers.
Access Control on Workspace Containers
Workspace Containers can be used part of Access Control on applications and settings.
Optionally, Workspace Containers themselves can also be restricted with Access Control criteria.
This adds an additional layer of control over the availability of the Workspace Container: users who
log on to an Agent that is member of the Workspace Container will also need to meet the Access
Control criteria.
The following Access Control Identity criteria are available for Workspace Containers:

User/Group

NOT User/Group

Organizational Unit

Organizational Unit including child OUs

Language

RES ONE Service Store Service

Not RES ONE Service Store Service
The following Access Control Locations and Devices criteria are available for Workspace Containers:

Zone

NOT in Zone

Client Name
The following Access Control Date and Time criteria are available for Workspace Containers:

Start date and time

End date and time
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
323
Chapter 7: Management
Using Workspace Control to create different configurations for an application or the
user session
By setting different Workspace Control on different settings in RES ONE Workspace, you can
configure an application or the user session to behave differently depending on the Workspace
Container that applies when the user logs on.
Consider the following setup based on the application Microsoft Outlook:

Workspace Container "Laptops" is limited by Access Control criteria to the OU
"\\...\Sales".

Workspace Container "Desktops" is limited by Access Control criteria to the OU
"\\...\Manufacturing".
Both OUs can access the application Microsoft Outlook, for which two E-mail Settings exist:

Mail setup "Outlook for Sales", which is limited by Workspace Control criteria to the
Workspace Container "Laptops".

Mail setup "Outlook for Manufacturing", which is limited by Workspace Control criteria to the
Workspace Container "Desktops".
This leads to the following situation:

If a user in the OU "\\...\Sales" logs on to an Agent in the Workspace Container "Laptops",
only the E-mail Settings that belong to the Workspace Container "Laptops" will be applied.

If a user in the OU "\\...\Manufacturing" logs on to an Agent in the Workspace Container
"Desktops", only the E-mail Settings that belong to the Workspace Container "Desktops" will be
applied.
This allows you to configure a single Microsoft Outlook application that behaves differently,
depending on the Workspace Container that applies to the user.
Allowing users to choose a configuration set based on Workspace Container
If you create different configuration sets for an application or for the user session, and give these
sets different Workspace Control settings, then you can let the user choose between predefined,
differently configured versions of an application or a session.
This setup can be achieved if different configuration sets are created to depend on two or more
Workspace Containers, and two or more of those Workspace Containers are available in the user
session.
324
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 7: Management
Example: allowing a user to choose a pre-set application configuration
An application can connect to two different databases. To change the connection, the user needs
the database credentials and other related information, but this information should not be available
to the user. Information about the currently configured connection is stored in the registry.
To let the user choose which database to connect to when the application starts up:

Create two Workspace Containers, both with the same Computer Control and the same Access
Control. Make sure the names of the Workspace Containers are meaningful to the user of the
application, for example by including the database name.

On the application, create a User Registry Action for each database connection. Link each
Action to a different Workspace Container.

Add both Workspace Containers to Access Control of the application, and select the option Let
user decide which accessible workspace container to use.
As a result, when users start the application, they will be asked to choose an option (= Workspace
Container), and the database connection data in the registry will be set according to the Workspace
Container selected.
Example: allowing a user to choose a pre-set session configuration
If a user works in different roles on different days of the week, this user requires different
applications and settings depending on the current role.
To let the user indicate today's role at logon:

Create two Workspace Containers, both with the same Computer Control and the same Access
Control. Make sure the names of the Workspace Containers are meaningful to the user, for
example by including the role names.

Create the full set of applications for both roles, with Access Control set to the relevant Identity
(always the same user) and Workspace Container (depending on the role for which the
application should be available).

Create variants of any other settings that may be required, such as E-mail Settings, User
Registry Actions, etc.; each with the appropriate Access Control (Identity and Workspace
Control).

Ensure that the user starts the RES ONE Workspace session with the command line:
%ProgramFiles%\RES Software\Workspace Manager\pfwsmgr.exe /ew ?
As a result, when the user starts the session, he will be asked to choose a role (= Workspace
Container). This choice determines the applications and settings that become available in the
session.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
325
Chapter 7: Management
Example: forcing a session to start in an particular, exclusive Workspace Container
When publishing desktops on a Terminal Server, you may want to deliver only one specific
Workspace Container to a user. This can be achieved by configuring the RES Workspace Composer to
start up in an exclusive Workspace Container. This means that only this specified Workspace
Container will be processed for the user session. All other Workspace Containers will be ignored,
even if the Agent is member of additional Workspace Containers. If the specified Workspace
Container is not accessible, access to the session will be disallowed.
If you have sets of applications and settings that are mutually exclusive, you must ensure that they
are never both available at the same time in one session.
To determine which Workspace Container applies when a user session starts, while ignoring all other
Workspace Containers that may also apply:

Create two Workspace Containers, both with the same Computer Control and the same Access
Control.

Create the full set of applications, with Access Control set to the relevant Identity and
Workspace Container (depending on the set in which the application should be available).

Create variants of any other settings that may be required, such as E-mail Settings, User
Registry Actions, etc.; each with the appropriate Access Control (Identity and Workspace
Control).

Ensure that the user starts the RES ONE Workspace session with the command line:
%ProgramFiles%\RES Software\Workspace Manager\pfwsmgr.exe /ew <name of
Workspace Container>
As a result, the RES Workspace Composer will use only the Workspace Container specified in the
command line. All other Workspace Containers are ignored.
Hide this workspace container if user needs to select one
If your RES ONE Workspace site uses the setup where users are allowed to choose a Workspace
Container when they start a session or an application, then your site will contain Workspace
Containers with different purposes:
a) Workspace Containers intended for use in the chosen scenario,
b) Workspace Containers used to organize Agents for other purposes.
Workspace Containers in category (b) should never appear in a user's list of choices.
For these Workspace Containers, select the option Hide this workspace container if user needs to
select one.
326
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 7: Management
Using Workspace Containers to configure exceptions to the global settings of a feature
For global RES ONE Workspace features that do not have Access Control or Workspace Control, you
can create alternative configurations for specific Workspace Containers. This is achieved by adding
one or more Workspace Container tabs to the feature node. The standard configuration is set on the
feature node itself, and then any exceptions get their own tab.
For example, you may wish to enable the Sessions feature in your environment in general, but
disable it for test machines. This can be achieved by enabling Sessions Security at Security >
Sessions and configuring the feature as required for the environment in general. Then, click the [+]
next to the Audit Trail tab to add a Workspace Container tab for the Workspace Container "Test
Machines". On this tab, you disable the Sessions feature. As a result, the feature is disabled for all
sessions to which the Workspace Container "Test Machines" apply. Sessions started outside of this
Workspace Container get the global settings as configured in the Sessions node.
Availability
Workspace Container tabs for exceptions are available at nodes in Composition, Security,
Administration and Setup sections.
Order of processing
If a feature has several Workspace Container tabs with exceptions, the order in which of the
Workspace Container tabs appear determines their priority. The first tab on the left has the highest
priority. The last tab on the right has the lowest priority.

If a user session does not fall into any of the Workspace Containers for which exceptions are
configured, it gets the global settings of the feature.

If several of the Workspace Container tabs apply in a user session, the Workspace Container tab
with the highest priority applies. For example, if the Sessions feature has a Workspace
Container tab for Workspace Container "A", followed by a tab for Workspace Container "B", then
a user session that falls into both these Workspace Containers gets the settings configured for
"A".
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
327
Chapter 7: Management
7.4
Workspace Analysis
With Workspace Analysis, you can gather information about the settings that are applied to your
users during logon. Workspace Analysis can present this information in a general overview of your
users and in a detailed overview of a specific user.
Where to find Workspace Analysis
What
Where
Workspace Analysis
Diagnostics > Workspace Analysis
General information about users
In the Workspace Analysis node, you can get a general overview of the settings that have been
applied to your users by entering search criteria:

The search is always restricted to a specific Directory Service.

For a full list of all users (in a particular Directory Service), start a search without a filter or
search term.

Select a filter to find specific kinds of users, for example users who are application manager,
who have Administrative Roles, who are locked out, etc.
The users that are shown can have the following statuses:
Normal: no immediate attention required.
Dimmed: this user account is unavailable. This could indicate a password lockout or that
the user account has been disabled.
Flagged: there is something special about this account. This user has abnormal rights like
technical manager, or a password that never expires. You can configure the triggers for the
attention flag on the Properties tab
Settings tab
On the Settings tab of the Workspace Analysis node, you can configure the conditions that will
trigger an attention flag and specify how long event logs should be stored.
By default, each user-specific Workspace Analysis shows event logs for 3 consecutive sessions. To
change this number, change the value for Number of event logs to keep. Note that event logs are
only cleaned up once per 24 hours, indifferent of the number of event logs to keep. For example, if
you have specified that event logs for 3 consecutive sessions should be kept, and the user logs on 4
times within 24 hours, 4 event logs will be kept.
328
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 7: Management
Detailed information about users
Besides the basic information that is displayed in the overview, you can gather detailed information
about a specific user by double-clicking this user or by clicking Analyze from the Action >
Workspace Analysis menu. The analysis is based on:

whether the user's current identity meets the Access Control Identity rules currently set for an
application or setting (such as OU and group memberships and Administrative Roles).

whether the actual date and time of the computer on which the Console user is currently
running the Workspace Analysis meets the Date and Time rules set for the application or object.

whether the computer on which the user logged on most recently, met the Locations and
Devices rules and the Workspace Control rules currently set for the application or setting.
The Workspace Analysis Details window contains detailed information about the user's settings. It
is more or less grouped in the same manner as the tree in the Management Console:
User Context

Locations and Devices: The accessible Zones are based on the client and server that were used
when the user last logged on to a RES ONE Workspace session.

Account properties: All properties of the selected user's account. This contains all information
that is available in the "basic" Workspace Analysis, plus account expiration date, e-mail address,
last successful authentication, LDAP user entry, assigned Administrative Roles, (in)direct
membership, OU information.

Workspace Containers: The Workspace Containers that are currently active for this user.
Composition
The Applications section contains the following information:

Applications: All applications that the user has access to, plus who authorized access to the
application (if applicable).

File Types: The File Types configured for this user. That is, for which available
applications file associations have been configured.

E-mail Settings: E-mail Settings that are attached to applications to which the user has
access. E-mail Settings that are not attached to an application, but that do belong to
the scope of the user, will not be displayed.

Data Sources: The Data Sources that are attached to applications to which the user has
access. Data Sources that are not attached to an application, but that do belong to the
scope of the user, will not be displayed.
The Actions By Event section contains information on all of the user's Actions, grouped by the
session event that triggers them and listed in the order of execution:

At logon: May contain actions for Environment Variables, Folder Redirection, Automation
Tasks, Microsoft ConfigMgr, Execute Command, Drive and Port Mappings, Drive Substitutes,
Printers, User Home Directory, Folder Synchronization, User Registry and User Profile
Directory

At Session Refresh: May contain actions for Folder Synchronization and Execute Command.

At Session Reconnect: May contain actions for Folder Synchronization and Execute
Command.

At Logoff: May contain actions for Folder Synchronization and Execute Command.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
329
Chapter 7: Management
The Actions By Type section contains the following information:

RES ONE Automation Tasks: An overview concerning the user's RES ONE Automation Tasks.

Environment Variables: An overview of the user's Environment Variable Actions.

Execute Command: An overview of the user's Execute Command Actions.
The Files and Folders section contains the following information:


Drive and Port mappings: An overview of the user's Mappings. The last logon is used to
determine which language should be used when showing language-based settings.

Drive Substitutes: An overview of the user's Drive Substitutes.

Folder Redirection: An overview of the user's Folder Redirections.

Folder Synchronization: An overview of the user's Folder Synchronizations.

User Home Directory: An overview of the user's Home Directory Actions.

User Profile Directory: An overview of the user's Profile Directory Actions.

LANDesk: An overview concerning the user's LANDesk software distributions.

Microsoft ConfigMgr: An overview concerning the user's Microsoft ConfigMgr Distributions.

Printers: All configured Network Printers for the user.

User Registry: An overview of the user's Registry Settings. When viewing the user's registry
settings, double-clicking End result (at the bottom of the Type column) will merge all
configured registry settings and show the end result in the Registry Viewer. To track registry
values, the source is shown on the right.
User Settings: All configured User Settings for the user.

When clicking View stored Settings for a User Setting, User Settings for files that contain
Unicode or non-Western characters in their name, are displayed with the following text:
<File name contains non-displayable text and formats>.
Security
The Applications section contains the following information:

Managed Applications: The Applications log for the specific user provides an overview of the
applications that were blocked for this user.

User Installed Applications: All User Installed Applications (if applicable).

Websites: The websites log for the specific user provides an overview of all blocked
attempts to access websites for this user.
The Data section contains the following information:

Removable Disks: The Removable Disks Access for the specific user provides an overview
about the user's access to removable media. The log provides an overview of all blocked
attempts to access a removable disk for this user.

Files and Folders: The Files and Folders log for the specific user provides an overview of the
files and folders that were blocked for this user.

Read-Only Blanketing: The Read-Only Blanketing log for the specific user provides an
overview of all blocked attempts to access a drive that is rendered read-only for this user.

Network connections: The Network Connections log for this user provides an overview of all
blocked network connections for this user.

User Sessions: The User Sessions log provides a detailed list of all Sessions security events for
this user.
330
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 7: Management
Diagnostics

User sessions: A list of the user's active sessions. Right-click a session in this list to force a
refresh of the session, remote control the session, etc.

Workspace Model Overview: An overview of the mode in which each RES ONE Workspace
feature is running, including information about any Workspace Container exception that applies
to the user.

Event Log: A log of all Action settings that were processed for this user. The Event Log can be
used to find problems with a user's settings.

Usage Tracking: Double-click the Details pane to open the Usage Tracking viewer for the
selected user.

Delegated access control: The applications of which the user is an application manager.
Selecting an application displays all details of the delegated application (users, capacity in use,
etc.).
The Performance section contains the following information:

Access Balancing: The Access Balancing log provides a detailed list of all Access Balancing
events for this user.

CPU Optimization: The CPU Optimization log provides a detailed list of all CPU Optimization
events for this user.

Instant LogOff: The Instant LogOff log provides a detailed list of all Instant LogOff events for
this user.

Memory Optimization: The Memory Optimization log provides a detailed list of all Memory
Optimization events for this user.
Note
When your RES ONE Workspace environment contains a Relay Server, situations may occur in which the Event Log of certain
users has not been updated, because this happens asynchronous. As a result, the Event log may contain an error that a file is
missing. This is intended behavior of RES ONE Workspace. The error will disappear again when the Relay Server has processed
all data and the Event Log has been updated. The Event Log is available when viewing the detailed Workspace Analysis of a
user at Diagnostics > Workspace Analysis.
Tip
You can minimize the Workspace Analysis Details window to the Taskbar, which allows you to browse the Management
Console while still having quick access to the Workspace Analysis overview for the selected user.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
331
Chapter 7: Management
Workspace Simulation Wizard
The Workspace Simulation Wizard gives you a powerful tool to achieve Desired User State
Management. Based on identity, locations and workspace containers you can view the Workspace
Analysis of a simulated Workspace. For example, by selecting an OU and a number of groups,
locations and workspace containers, you are able to analyze the contents of a Workspace resulting
from the specified context. You can use the wizard to try out various scenarios and to view their
impact before actually applying these to your "live" environment.
The Workspace Simulation Wizard can be started in two ways:


Prefilled with a user identity:

Go to Diagnostics > Workspace Analysis node, select a user and right-click and select Run
Workspace Simulation

Go to Diagnostics > Workspace Analysis node, select a user and select Action > Workspace
Analysis > Run Workspace Simulation
Without a prefilled user identity:

Click the Workspace Simulation button in the Command bar, available at all nodes in
Diagnostics

Right-click anywhere in the Diagnostics tree view and select Workspace Simulation

Select Action > Workspace Simulation, also available throughout Diagnostics
Configuration
The scenario can be based on the following criteria:

Identity:

Existing user from the Directory Service

OU membership or Group membership

You can Search for specific OUs or Groups by entering search criteria. You can use
wildcards (e.g. "*team" will yield all OUs/groups containing "team").

Click Add manually to select one or multiple Group(s) from the Directory Service.
Multiple groups must be separated with semicolons and can be verified for existence by
clicking Check.

Locations and devices. One or multiple Zones. If no Zones have been configured, this step will
be skipped.

Workspace Containers. One or multiple Workspace Containers. You can preselect the data
based on an existing Agent (e.g. if the user logs on from a specific computer). If no Workspace
Containers have been configured, this step will be skipped.
Note
A green check mark indicates that the criteria entered at Identity and/or Zones apply for this Workspace Container. A red
cross indicates the criteria do not apply for this Workspace Container. This helps you to decide whether it is useful to include
this Workspace Container in the scenario.

Time and Connection State. The day of the week, the time and connection state
(Online/Offline) for the workspace you want to preview.
After specifying all criteria, the results of the Workspace Scenario are shown as if the predicted
workspace was an actual workspace.
To create an <IR> of the results, click Action > Create Instant Report. Save or print the report for
later comparisons and analysis.
332
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 7: Management
Example:
You want to check whether a user can access a specific application from home and from work on a
specific day/time.
You can run two scenarios:

Location A = Work, Workspace Container defines access on application level, day/time = e.g.
Monday, 9:00

Location B = Home, Workspace Container defines access on application level, day/time = e.g.
Tuesday 9:00

User identity remains the same, Connection state = Online
The result should be that the application is available from both locations and on both days and
times.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
333
Chapter 8: Registry settings
Chapter 8: Registry settings
The following Registry Settings are available to control the behavior of RES ONE Workspace
components.
Warning
Careless registry editing can cause irreversible damage! Approach this task with caution, and only after you have made a
backup.
8.1
ActiveSetupTimeout
In rare circumstances, Active Setup (which is used to execute an application that is not registered
or if the version in the Current User registry is lower than in the Local Machine registry) takes more
than 60 seconds to complete. This could result in a timeout at logon. With the following registry
value the Active Setup Timeout can be configured:
ActiveSetupTimeout
Key

HKLM\Software\RES\Workspace Manager (32-bits)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bits)
Type
REG_DWORD
Value Name
ActiveSetupTimeout
Value Data
#seconds to wait
8.2
BlockPicaSvcFix
Starting a ThinApp application on a XenDesktop environment could result in a runtime error
generated by picasvc.exe.
This behavior can be blocked by setting the following registry:
Block picasvc.exe
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
BlockPicaSvcFix
Data
yes
334
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 8: Registry settings
8.3
CorrectTaskbar
Force task bar on primary screen in dual screen mode in Citrix environments
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
CorrectTaskbar
Type
String
Data
Yes or No
Default
No
Remarks
With this setting at "No" the task bar is stretched across both screens in the RES ONE
Workspace Shell.
With this setting at "Yes" the task bar is shown only on the primary screen.
In the Windows shell the task bar is always shown on the primary screen.
8.4
ChangePasswordTimeout
Change the default timeout for changing the user's password in the Workspace Preferences tool
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
ChangePasswordTimeout
Type
DWORD
Data
'n' (n in seconds, must be at least 5)
Default
5
8.5
CheckDisabledFolders
Prevent creation of disabled known folders
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
CheckDisabledFolders
Type
REG_SZ
Data
yes
Remarks
When User Settings is enabled at Composition > User Settings, default shell folders
may be created although they were disabled by the "disable known folders" policy. RES
ONE Workspace will no longer create disabled known folders when setting this registry
hook.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
335
Chapter 8: Registry settings
8.6
CheckShutDown
Prevent freezes during reboot procedure initiated with Citrix XenApp Advanced Configuration
tool
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
CheckShutdown
Type
REG_SZ
Data
yes
Remarks
When using the Citrix XenApp Advanced Configuration tool to create a reboot schedule
for Citrix Provisioned XenApp servers, the corresponding server sometimes freezes
during the reboot. If this occurs, the server no longer responds to any requests and
only a hard reset can solve the issue. You can prevent these situations with this
registry hook.
8.7
CheckUpdateOSDFile
Workaround for the automatic SCCM reset, allowing the managed App-V application to launch
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
CheckUpdateOSDFile
Type
REG_SZ
Data
Yes
Remarks
Please note, it is still possible that launching a managed App-V application fails. This
can be a timing-issue: after the workaround was applied, SCCM resets the
UpdateOSDfile policy before the managed App-V application was launched.
336
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 8: Registry settings
8.8
ConsoleNoAppIcons
Don't show application icons in the Console (application list / tree view)
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
ConsoleNoAppIcons
Type
REG_SZ
Data
Yes
Remarks
Setting this registry value is particularly interesting for environments containing a
large number (1000+) of applications.
Instead of the application's icon, a default icon is displayed indicating the application's
type of access (e.g. a globe indicates all users have access to the application). When
editing the application, the application icon will be shown.
8.9
CorrectWorkArea
Disable icon refresh of Microsoft App-V applications
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
CorrectWorkArea
Type
REG_SZ
Data
Yes
Remarks
In exceptional circumstances, when using the RES ONE Workspace Shell, applications
incorrectly change the size of the work area. This behavior can be detected and
corrected with this registry hook.
8.10
CTX_PFDesktopUsesPwrstart
Create a published application for the RES ONE Workspace desktop still used pwrstart.exe in its
command line. This has been changed to pfwsmgr.exe.
To revert to the previous behavior, configure the following registry key:
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
CTX_PFDesktopUsesPwrstart
Data
yes
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
337
Chapter 8: Registry settings
8.11
CTX_PublishAppCmdLineFlag
RES ONE Workspace by default publishes applications with a parameter list shaped like %*. Under
specific circumstances this might fail. Citrix then advises to use a parameter list shaped like %**.
To achieve this, set the following registry key:
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
CTX_PublishAppCmdLineFlag
Data
yes
8.12
CTX_PNLaunchUsesFarmName
By default an application is started with PNagent.exe /QLAUNCH <farmname>:<application
name>. The farm name is saved with the application when configuring the application in the RES
ONE Workspace Console
If you are using Citrix XenApp 6, it might be necessary to enter a farm name manually since with
XenApp 6 the RES ONE Workspace Service resolves the farm name, and this is only possible if the
RES ONE Workspace Service is started with an administrator account, instead of a Local System
Account.
The farm name can be configured with the following registry setting:
Configure Farm Name
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
CTX_PNLaunchUsesFarmName
Data
- / no / "farmname"
Remarks

If no value is entered, the application will use the default farm name.

If the value no is entered, no farm name will be used. The application is started with
PNagent.exe /QLAUNCH <application name>.

If a farmname value is entered, this farm name will be used.
8.13
DirectoryServiceRetryLimit
Increase waiting time before Directory Service to become available
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
DirectoryServiceRetryLimit
Type
REG_SZ
Data
Number of seconds
Remarks
In rare circumstances, the RES ONE Workspace Composer reported online while the
Microsoft Windows Directory Service was not yet fully available. This could happen for
example when connecting via a VPN connection. The default value is 15 seconds. You
can add this registry hook to increase the waiting time for the Directory Service to
become available.
338
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 8: Registry settings
8.14
DisableDHCP
Enable or disable an Agent from obtaining Datastore/Relay Server connection information from
the DHCP server
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
DisableDHCP
Type
String
Data
True or false
Yes or no
1 or 0
Remarks
You can configure DHCP servers in different locations with information about the
Datastore/Relay Server to which RES ONE Workspace Agents should connect in that
location. In an environment with multiple Datastores/Relay Servers, this ensures that
mobile Agents (such as laptops) always connect to a Datastore/Relay Server that is
reachable from their current location. Without the DHCP setup, each Agent always
connects to a fixed, preconfigured Datastore/Relay Server.
If the DHCP server holds Datastore/Relay Server connection information, this
information is transferred to all computers who log on in the network governed by that
DHCP server. Use DisableDHCP=true to exempt specific computers so that they retain
their original Datastore/Relay Server connection information instead.
8.15
DisableExternalGroupCheck
In a multi domain environment, nested group membership cross domain will be discovered by RES
ONE Workspace, e.g. domainA\User is member of domainA\group1, which is member of domain local
group domainB\group2. However, this check may slow down the startup time of the user session.
In cases where the external group membership check is not needed, session startup times can be
improved by disabling this check, by setting the following registry value:
Disable external Group membership check
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
DisableExternalGroupCheck
Type
String
Data
yes
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
339
Chapter 8: Registry settings
8.16
DisableFolderSyncLocalCheck
Use network drives in Composition > Files and Folders > Folder Synchronization where normally
only local drives are allowed.
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
DisableFolderSyncLocalCheck
Type
String
Data
yes
8.17
DisableIconRefresh
Disable icon refresh of Microsoft App-V applications
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
DisableIconRefresh
Type
REG_SZ
Data
Yes
Remarks
In certain circumstances, icons of active Microsoft App-V applications on the taskbar
become blank after a user refreshed the workspace. When the user refreshes the
workspace again, the icons return to normal. As a workaround for this issue, you can
set this registry hook.
8.18
DoNotAllowOverlappedDesktopItems
Prevent desktop shortcuts to be placed on top of each other after a workspace refresh
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier only:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
DoNotAllowOverlappedDesktopItems
Type
REG_SZ
Data
Yes
Remarks
This registry value applies to user sessions that contain managed and unmanaged
shortcuts on the desktop and for which the setting Windows Shell shortcut creation is
set to Merge with unmanaged shortcuts (at Composition > Applications, on the
Settings tab).
340
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 8: Registry settings
8.19
DoNotAnalyseDB
Prevent retrieval of Oracle database size
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
DoNotAnalyseDB
Type
REG_DWORD
Data
1
Remarks
When using an Oracle Database, retrieving the Database size from the RES ONE
Workspace Console at Setup > Datastore can take a long time or could even cause the
Console to hang. You can prevent this behavior with this registry hook.
8.20
EnableMultipleIE
Display multiple Microsoft Internet Explorer application shortcuts on Microsoft Windows 8.1
Apps screen
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
EnableMultipleIE
Type
REG_SZ
Data
Yes
Remarks
Set this registry value when you configure multiple Microsoft Internet Explorer
applications with different Parameters and for which the option Create Start Menu
shortcut is selected (on the Properties > General tab of the application).
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
341
Chapter 8: Registry settings
8.21
ExcludeProcesses
Exclude a process from the check for running subprocesses that must be ended before a RES
ONE Workspace session can end
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
ExcludeProcesses
Type
REG_SZ
Data
executables separated by a comma (","). For example: crss.exe,wispetis.exe
Remarks
In a RES ONE Workspace session, Citrix published applications are effectively started
as a separate session without a task bar and with the application shown full screen.
When the user closes this application, RES ONE Workspace also closes the session. To
prevent the session from closing while there are still subprocesses running that were
started by the application RES ONE Workspace checks the running processes at the end
of the session against a list of the processes that were running at the start of the
session. If additional processes are running, the session is not closed.
Some processes are not a reason to keep the session alive. Use ExcludeProcesses to
exclude these processes, so the session ends even if those processes are still running.
8.22
ExcludeSubscribedTasks
Suppress taskbar icons of applications that run as Workspace Extension
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
ExcludeSubscribedTasks
Type
REG_SZ
Data
<window caption of task to be excluded>,<window caption of other task to be
excluded>, etc.
Remarks
Managed applications that run as a workspace extension in a RES ONE Workspace
session ("subscribed" tasks) appear with their own icon in the taskbar. Under certain
circumstances, this may lead to situations in which the application icon is still shown
in the taskbar, but the application is no longer active. As a result, the taskbar icon no
longer works. For example, this behavior may occur when tasks with a relative short
duration are executed (e.g. 500 ms), such as the windows captions in a RES ONE
Workspace session. You can suppress this behavior with this registry hook.
342
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 8: Registry settings
8.23
ForceComputername
Change the way Desktop Sampler reads computer/client names
Key

HKLM\Software\RES\Desktop Sampler (32-bit)

HKLM\Software\Wow6432Node\RES\Desktop Sampler (64-bit)
Value
ForceComputername
Type
REG_SZ
Data
Yes
Remarks
On a VDI/TS environment the, desktop sampler will per default look for the
computername of the client connecting to the session. You can change the behavior to
look for the hostname of the TS/VM itself with this registry setting.
8.24
ForceDisconnectOnIdle
Force a disconnect of workspace session after a certain amount of time
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
ForceDisconnectOnIdle
Type
DWORD
Data
"n" (n in minutes, at least 1)
8.25
ForcePrinterConnections
Connect printers restored from User Settings
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
ForcePrinterConnections
Type
REG_SZ
Data
yes
Remarks
When you are using User Settings only to restore printer connections, you will notice
that only the default printer gets connected. If you then check the registry
(HKCU\Printers\Connections) , you will notice that the printers are restored
properly, but not connected. You can force to connect all restored printers with this
registry hook.
Notes

Setting this key can cause an increase in logon times depending on how much printers a user has selected.
Printers will get connected one by one.

A User Setting on global level must be in place for capturing the registry tree
HKCU\Printers\Connections.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
343
Chapter 8: Registry settings
8.26
ForceLogoff
Options to force sessions to log off automatically based on session limit, idle time and
disconnected state
Keys

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
ForceLogoffEnabled
Type
String
Data
Yes or No
Value
ForceLogoffTimeout
Type
String
Data
(time in minutes)
Value
ForceLogoffOnIdle
Type
String
Data
Yes or No
Value
ForceLogoffOnDisconnect
Type
String
Data
Yes or No
Value
ForceLogoffTimeoutOnDisconnect
Type
String
Data
(time in minutes)
Examples
To force idle sessions to log off after 30 minutes, set:

ForceLogoffEnabled: Yes

ForceLogoffOnIdle: Yes

ForceLogoffTimeout: 30
To force disconnected sessions to log off after 10 minutes, set:

ForceLogoffEnabled: Yes

ForceLogoffOnDisconnect: Yes

ForceLogoffTimeoutOnDisconnect: 10
Note
If ForceLogoffTimeoutOnDisconnect is not set, then ForceLogoffTimeout is used to determine the timeout. If that is not
available either, then RES ONE Workspace reverts to the default time out of 1 minute. This means that you can set the same
time outs for both mechanisms, or you can set a separate time out for each mechanism.
344
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 8: Registry settings
8.27
ForceShutdown
Forces a shutdown, power-off or restart when a user logs off from the session
Keys

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
ForceShutdown
Type
String
Data
ShutDown
PowerOff
Restart
8.28
IncludeProcesses
Keep user session logged on in case only a system-tray application is launched on the Citrix
XenApp server
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)

HKCU\Software\RES\PowerFuse (32-bit)

HKCU\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
IncludeProcesses
Type
REG_SZ
Data
comma separated list of processes
Remarks
If only a system-tray application is launched in a user session on the Citrix XenApp
server, the Workspace Composer does not pick up on the process and will log off the
session. The processes of these applications can be listed in this registry value, thus
preventing the user session from closing as long as one or more of these processes are
running.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
345
Chapter 8: Registry settings
8.29
Instrumentation
Enable performance metering for pfwsmgr.exe and/or pwrcache.exe
 HKLM\Software\RES\Workspace Manager (32-bit)
Key

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
Instrumentation
Type
String
Data
Yes or No or executables (separated by ; )
Default
No
Notes
The log file is called perfdump_%servername%.txt and is created in the user's pwrmenu folder and in the
%programfiles%\RES Software\Workspace Manager folder on every machine.
346
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 8: Registry settings
8.30
InterceptManagedApps
Prevent RES ONE Workspace from modifying the applications' command line.
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
InterceptManagedApps
Type
REG_SZ
Data
Yes
Remarks
To configure applications for which the command line should not be modified, this
registry value must be set in combination with the following settings:

At Composition > Applications, on the Settings tab, clear the global option Disable process
interception for unmanaged shortcuts.

Configure individual managed applications to intercept their processes if started unmanaged: At
Composition > Applications, on the Properties > General tab of the application, set If
managed shortcut was not used to Intercept new process and apply configuration.
To exclude executables from this behavior, modify the registry value "InterceptManagedApps" to,
for example:
Data
Yes|Notepad.exe|winword.exe|
This will exclude the applications Notepad and Winword from the registry value
"InterceptManagedApps". Their command lines will be changed when a managed application
shortcut is created for these applications in user sessions. The managed shortcut is placed on
the desktop, taskbar and/or in the Start Menu. The command line will be changed to
"....pwrgate.exe nn" (where nn is the RES ONE Workspace application ID). Microsoft Windows
then automatically generates a new AppUserModelID for the application, as it is seen as a new
executable.
Note
The AppUserModelID is used for stacking and pinning application shortcut icons on the taskbar and in the Start Menu,
generating the list of Recent items in the Start Menu and the Jump Lists. Therefore, the changed command line used by RES
ONE Workspace for managed application shortcuts will cause some unwanted side effects and issues.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
347
Chapter 8: Registry settings
8.31
KeepSeamlessHostAgent
Allow session sharing for published application started from a Citrix Published Desktop
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)

HKCU\Software\RES\PowerFuse (32-bit)

HKCU\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
KeepseamlessHostAgent
Type
REG_SZ
Data
Yes
Remarks
When starting a published application from a Citrix Published Desktop, this registry
value will allow session sharing.
8.32
KeepSharesWithROB
By default, Read-Only Blanketing deletes all local shares. Use KeepSharesWithROB to keep local
shares.
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
KeepSharesWithROB
Type
String
Data
Yes or No
8.33
KeepTmpDDEMacros
WinWord might not start properly if the "Reference Manager" plugin is used.
This can be solved by setting the following registry value.
Start WinWord without Reference manager interfering
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
KeepTmpDDEMacros
Data
yes
348
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 8: Registry settings
8.34
KeepUnicodePath
Keep original file name (Unicode)
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)

HKCU\Software\RES\PowerFuse (32-bit)

HKCU\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
KeepUnicodePath
Type
REG_SZ
Data
Yes
Remarks
By setting this registry value, the original file name will be kept and an 8.3 file name
will never be applied in a RES ONE Workspace session. Without this registry value, an
8.3 file name might be applied if a file name contains a lot or special Unicode
characters.
8.35
KeepUserDefaultMAPIProfile
Preserve the default mail profile selected by the user
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)

HKCU\Software\RES\PowerFuse (32-bit)

HKCU\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
KeepUserDefaultMapiProfile
Type
REG_SZ
Data
Yes
Remarks
This registry value is useful in the following situations:

a user creates an additional unmanaged mail profile and makes this profile his default profile.

if multiple mail profiles are attached to Microsoft Outlook, and the user makes one of these
profiles his default profile.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
349
Chapter 8: Registry settings
8.36
KeepWordRunning
Restore auto-correction list of Word
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)

HKCU\Software\RES\PowerFuse (32-bit)

HKCU\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
KeepWordRunning
Type
REG_SZ
Data
Delayed
Remarks
When the auto-correction list of Microsoft Word cannot be restored with User Settings,
you can resolve this with this registry value.
8.37
LingerDisconnectTimerInterval
The Citrix functionality Session Lingering is, via RES ONE Workspace, also possible for Citrix XenApp
7.x on 64-bit systems. When setting the registry value LingerDisconnectTimerInterval, the Citrix
session will linger for the specified number of minutes after having closed the last published Citrix
application in a user session. After this time, the Citrix session will be disconnected.
Session Lingering for Citrix XenApp 7.x
Key
Initial installation RES Workspace Manager 2011 and higher:

HKCU\Software\Wow6432Node\RES\Workspace Manager
Value
(string)
LingerDisconnectTimerInterval
Type
DWORD
Data
1-999 (minutes)
Notes

Lingering Citrix XenApp applications started by RES ONE Workspace will not show the status 'lingering' on the
Citrix server. This is caused by the way RES ONE Workspace starts Citrix published applications.

To enable Session Lingering for Citrix XenApp 7.x, the following registry values can be set:
350

LingerDisconnectTimerInterval

LingerTerminateTimerInterval
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 8: Registry settings
8.38
LingerTerminateTimerInterval
The Citrix functionality Session Lingering is, via RES ONE Workspace, also possible for Citrix XenApp
7.x on 64-bit systems. When setting the registry value LingerTerminateTimerInterval, RES ONE
Workspace will make sure that the Citrix session will linger for the specified number of minutes
after having closed the last published Citrix application in a user session. After this time, the Citrix
session will be terminated.
Session Lingering for Citrix XenApp 7.x
Key
Initial installation RES Workspace Manager 2011 and higher:

HKCU\Software\Wow6432Node\RES\Workspace Manager
Value
(string)
LingerTerminateTimerInterval
Type
DWORD
Data
1-999 (minutes)
Notes

Lingering Citrix XenApp applications started by RES ONE Workspace will not show the status 'lingering' on the
Citrix server. This is caused by the way RES ONE Workspace starts Citrix published applications.

To enable Session Lingering for Citrix XenApp 7.x, the following registry values can be set:

LingerDisconnectTimerInterval

LingerTerminateTimerInterval
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
351
Chapter 8: Registry settings
8.39
LocalCacheOnDisk
Store RES ONE Workspace Agent cache updates in DBcache folder for non-persistent/pooled VDI
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
LocalCacheOnDisk
Type
REG_SZ
Data
Yes
Remarks
With this registry value it is possible to make the cache independent of the Operating
System's (OS) registry. Setting this registry value will convert the UpdateGUIDs and
policy settings automatically from the OS' registry to two new XML files in the RES ONE
Workspace DBcache folder on the persistent disk: UpdateGUIDs.xml and
Settings.xml.
After having set this registry value, when changing the Data to "No" or removing the
registry value from the Agent, the cache will automatically convert UpdateGUIDs.xml
and Settings.xml back into the OS' registry and the files will be deleted from the
DBCache folder.
Setting this registry value will prevent unnecessary network traffic caused by the
initial cache update, but may cause some additional disk I/O load on the RES ONE
Workspace cache folder when processing changes in the Datastore throughout the day.
8.40
LocalCachePath
Relocate the RES ONE Workspace cache folders
 HKLM\Software\RES\Workspace Manager (32-bit)
Key

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
LocalCachePath
Type
String
Data
Path in short name, for example: D:\Worksp~1\dbcache
Default
C:\Progra~1\Ressof~1\Worksp~1\data\dbcache
Note
The local cache path cannot be on a network share.
352
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 8: Registry settings
8.41
LocatePrintersByIP
Remember the default printer based on Client Subnet ID (instead of Client name)
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
LocatePrintersByIP
Type
REG_SZ
Data
yes
Remarks
Please note that the value for Data is case sensitive.
This registry value only works when setting the default printer from a client Operating
System (e.g. Microsoft Windows 7). When setting the default printer from a server
Operating System, the default printer will be saved based on the Client name.
By setting this registry value, a new section will be added to the pwruser.ini file:
RoamingPrintersIP.
Notes

As of RES Workspace Manager 2014 SR3, in the Console, at Composition > Actions By Type > Printers, on the
Settings tab, the option IP network address for all Agents replaces the behavior if the option Force mandatory
default printer (resets default printer during each logon) has not been selected and the registry value
LocatePrintersByIp is present in your RES ONE Workspace environment.

You may choose to select the option IP network address for all Agents in the Console and remove this
registry value from the Agents in your RES ONE Workspace environment or set it to No.
8.42
LogPerformance
Log any function that takes more than 5 seconds, which can be useful for purposes of
troubleshooting and performance monitoring.
Keys

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
LogPerformance
Type
String
Data
Yes or No
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
353
Chapter 8: Registry settings
8.43
MSLimitOnProcIDs
Memory Optimization offers the possibility to limit the number of Applications per session. In fact
this limits the number of tasks on the taskbar which is not always equal to the number of
Applications. For example 3 open e-mails in Outlook count for 3 tasks while there is only one
application.
Via the registry string MSLimitOnProcIDs="yes" in HKCU\Software\RES\Workspace Manager or
HKLM\Software\RES\Workspace Manager it is possible to limit the number of applications where
tasks belonging to the same application count only once.
Count multiple occurrences of the SAME application only once when calculating memory limits
Keys

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
MsLimitOnprocIDs
Type
String
Data
Yes or No
8.44
NoAgentScreenSaver
Force the RES ONE Workspace session screensaver in a RES VDX session that is started from a
RES ONE Workspace session or when RES ONE Workspace Workspace Extender or Subscriber is
detected in a session
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)

HKCU\Software\RES\PowerFuse (32-bit)

HKCU\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
NoAgentScreenSaver
Type
REG_SZ
Data
yes
Remarks
If this registry value is not set (or it is set to "no"), the screensaver of the client will be
used by default.
354
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 8: Registry settings
8.45
NoFullScreenKiosk
Ensures that the task bar is always on top and visible in kiosk mode
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
NofullScreenKiosk
Type
String
Data
Yes or No
8.46
NoListConcurrentUsers
Do not show concurrent users when an application starts while no licenses are available.
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
NoListConcurrentUsers
Type
String
Data
Yes or No
Default
No
8.47
NoPrecedingSlashInPNFolder
If you publish an application via RES ONE Workspace the PN root folder name can be preceded by a
backslash "\".
This "\" will not appear if the following registry entry is set:
Publish application without the PN root folder being preceded by "\".
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
NoPrecedingSlashInPNFolder
Data
yes
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
355
Chapter 8: Registry settings
8.48
OutlookNotificationCheck
Always show New Mail Desktop Alerts from Microsoft Outlook
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)

HKCU\Software\RES\PowerFuse (32-bit)

HKCU\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
OutlookNotificationCheck
Type
REG_SZ
Data
Yes
Remarks
In the RES ONE Workspace Shell not all New Mail Desktop Alerts are shown for several
Outlook languages in the Workspace Composer. These New Mail Desktop Alerts will
always be shown if this registry value is set.
Please note that the transparency and fade effects of the New Mail Desktop Alerts are
lost when using this registry value.
8.49
PIDoNotSetEnvVars
Disable application-level environment variable actions for intercepted processes
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
PIDoNotSetEnvVars
Type
REG_SZ
Data
Yes
356
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 8: Registry settings
8.50
PwrGateAppId
Default AppId for pwrgate.exe
 HKLM\Software\RES\Workspace Manager (32-bit)
Key

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
PwrGateAppId
Type
REG_SZ
Data
<application id to start if arguments are missing>
Remarks
In certain situations, a specific managed application does not start correctly in the
user workspace (e.g. when using the Datatrac application). If this behavior is caused
by the fact that a 3rd party application starts pwrgate.exe without any arguments,
you can set this registry hook.
8.51
PwrGateFileMapping
Enable starting managed applications if called as a process
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
PwrGateFileMapping
Type
REG_SZ
Data
no
Remarks
In very rare circumstances Managed Applications will not start if that application is
called as a process, e.g. by pressing a specific button in a third-party application. You
can prevent this behavior with this registry hook.
8.52
Pwrgatesleep
Set pwrgate to sleep for a specified number of seconds after it starts an application, so that
pwrgate.exe can be examined with procexp before it exits. This can be useful for purposes of
troubleshooting.
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
pwrgatesleep
Type
String
Data
[timeout in seconds]
Default
0
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
357
Chapter 8: Registry settings
8.53
PMWAutoAllowFolders
Authorize all executables found in installation folder for application security and read-only
blanketing after User Installed Applications
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
PMWAutoAllowFolders
Type
REG_SZ
Data
Yes/No
8.54
ProtectLocalCache
By default RES ONE Workspace blocks access to the local cache folder, even if security is disabled or
not available.
Disable the default protection of the local cache folder
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
ProtectLocalCache
Type
REG_SZ
Data
True or false
Yes or no
1 or 0
Default
True
Note
The following folders are excluded from the default protection:

IconCache

Within Resources:
358

custom_resources

sft_int

ctx_int

app_desk

app_scr.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 8: Registry settings
8.55
RefreshAllMappedDrives
During a workspace refresh, remove all drive mappings before remapping those drive mappings
that are valid for the user session
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)

HKCU\Software\RES\PowerFuse (32-bit)

HKCU\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
RefreshAllMappedDrives
Type
REG_SZ
Data
Yes
Remarks
This registry value can be set to bypass the default behavior: during a workspace
refresh only the drives that need to be added or removed because of a context change
will be added or removed.
8.56
RemoveStartmenuPinlist
On Microsoft Windows versions prior to Microsoft Windows 7, the pin list was not automatically
cleared. It is now possible to clear the pin list by setting the following registry key:
Clear the pin list
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
RemoveStartmenuPinlist
Data
yes
This will work in RES ONE Workspace sessions using the windows shell, and with Composition >
Applications > Properties > Windows Shell shortcut creation set to Replace all unmanaged
shortcuts.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
359
Chapter 8: Registry settings
8.57
RestoreMappingsAtLogoff
Skip restore of drive mappings that were available outside of session
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
RestoreMappingsAtLogoff
Type
REG_SZ
Data
no
Remarks
At Composition > Drive and Port Mappings > Settings, when you have disabled the
settings Disconnect all network drives before logging on/off, all persistent drive
mappings that were removed at the start of a RES ONE Workspace session will be
restored at logoff. If this is an unnecessary action and you want to skip the restore of
drive mappings that were available outside of the RES ONE Workspace session, you can
prevent this behavior with this registry hook.
8.58
RunCPUShld
Prevent cpushld.exe from running if CPU optimization is enabled
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
RunCPUshld
Type
REG_SZ
Data
No
Remarks
At Administration > Performance > CPU Optimization, on the Settings tab, when
CPU Optimization was enabled, cpushld.exe still runs on all Agents. To prevent
cpushld.exe from running on Agents, this registry setting can be set for each Agent.
When you want to use the CPU Shield, enable CPU Optimization (at Administration >
Performance > CPU Optimization, on the Settings tab) and remove the registry
setting from the Agents.
360
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 8: Registry settings
8.59
RunWMSync
Prevent the WMSync process to be started immediately at the start of the Workspace Composer
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)

HKCU\Software\RES\PowerFuse (32-bit)

HKCU\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
RunWMSync
Type
REG_SZ
Data
No
Remarks
The WMSync process is started immediately at the start of the Workspace Composer to
improve local caching of User Settings.
Warning
Setting this registry value will prevent local caching from working.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
361
Chapter 8: Registry settings
8.60
SCCMDelayBeforeRunningProgram
Define delay starting SCCM application after successful installation
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)

HKCU\Software\RES\PowerFuse (32-bit)

HKCU\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
SCCMDelayBeforeRunningProgram
Type
REG_DWORD
Data
1-999 (seconds)
Remarks
Default delay is 3 seconds, which might not be long enough in some environments.
This registry value is applicable for applications for which a Microsoft ConfigMgr Action
is defined.
8.61
SessionCheckInterval
Increase the interval time for RES Operator (resop.exe) to check active sessions
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
SessionCheckInterval
Data
60-3600 (seconds)
Remark
By default, the Agent checks once every 60 seconds (and additionally every time the
Agent service is restarted) if there are sessions in the Datastore that are not present
anymore on the local machine. These are sessions that were not logged off in a normal
way (i.e. sessions that were reset) and that may prevent RES ONE Workspace from
correctly releasing locked RES ONE Workspace licenses and resetting driver-related
session data.
With this registry setting, the interval time for checking session information in the
Datastore and, if applicable, releasing locked licenses and reset driver-related session
data, can be increased to a maximum of 3600 seconds (60 minutes). Setting a higher
interval time will reduce the number of queries to the Datastore.
362
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 8: Registry settings
8.62
ShowSearchFieldAlways
Always show the Search field on the Application List tab (at Composition > Applications)
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)

HKCU\Software\RES\PowerFuse (32-bit)

HKCU\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
ShowSearchFieldAlways
Type
REG_DWORD
Data
yes
Remarks
If this registry value is not set, the Search field will appear automatically when typing
in letters on the Application List tab.
8.63
SilentRefresh
Turns a refresh caused by a display change, USB change, a reconnect and a 'force refresh' from
the Console into a silent refresh, where the desktop does not disappear and the splash screen is
not shown. The task bar does disappear briefly (in the RES ONE Workspace shell).
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
SilentRefresh
ValueData
Yes
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
363
Chapter 8: Registry settings
8.64
SkipCloseWFShell
Prevent unexpected results during logoff from Citrix server
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)

HKCU\Software\RES\PowerFuse (32-bit)

HKCU\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
SkipCloseWFShell
Type
REG_SZ
Data
Yes
Remarks
At logoff from a Citrix Server, RES ONE Workspace terminates the WFShell.exe in
order to speed up the logoff process. Sometimes this termination leads to unexpected
results. You can prevent this situation with this registry value.
8.65
SkipCLSID
Open CSV files from Internet Explorer
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
SkipCLSID
Type
REG_SZ
Data
yes
Remarks
Under certain circumstances, opening a CSV file from Internet Explorer can fail. You
can solve this with this registry hook.
364
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 8: Registry settings
8.66
SkipDSWhenOffline
Decrease logon time
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)

HKCU\Software\RES\PowerFuse (32-bit)

HKCU\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
SkipDSWhenOffline
Type
REG_SZ
Data
Yes
Remarks
When a user starts a RES ONE Workspace session on an offline device, the session
startup may take a very long time. This is caused by the system querying for a domain
controller. The long logon time can be decreased with this registry value.
8.67
SkipFullNames
Skip the resolving of full user names
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
SkipFullNames
Type
REG_SZ
Data
Yes
Remarks
Access Control for applications may be based on groups whose members are users
and/or groups from multiple domains. In such situations, determining the full user
name may take a long time. This registry value may be set to skip the resolving of full
user names, speeding up access to these applications in the Management Console.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
365
Chapter 8: Registry settings
8.68
SpecialFoldersFromRegistry
Under some circumstances folder redirection was properly installed, but not recognized at the time
RES ONE Workspace is building up the desktop, start menu and so on. As a workaround, it is possible
to force RES ONE Workspace to resolve the special folders from the registry by creating the
following registry value:
Force RES ONE Workspace to resolve the special folders from the registry
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
SpecialFoldersFromRegistry
Data
yes
8.69
StartHiddenPexplorer
In rare circumstances it might not be possible to open UNC paths in the RES ONE Workspace Shell
from within another application (e.g. Microsoft Outlook). Setting the following registry entry solves
the problem:
Enable opening UNC paths from another application
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
StartHiddenPexplorer
Data
yes
8.70
StartWithShortCut
Stack Microsoft Office applications on taskbar
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
StartWithShortCut
Type
REG_SZ
Data
no
Remarks
Under rare circumstances, Microsoft Office applications that are started by external
applications, do not stack properly on the Windows taskbar within a RES ONE
Workspace session. You can prevent this behavior with this registry hook.
366
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 8: Registry settings
8.71
SuppressShowDesktopButton
Suppress Show/Hide Desktop button on taskbar
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
SuppressShowDesktopButton
Type
REG_SZ
Data
yes
Remarks
For users who use the RES ONE Workspace shell, you can suppress the Show/Hide
Desktop button on the taskbar. To do so, set the following registry key:
8.72
SuppressUnknownRequestMessage
Suppress "poll to port 1942" informational message from Microsoft Windows Application Event
Log
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)

HKCU\Software\RES\PowerFuse (32-bit)

HKCU\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
SuppressUnknownRequestMessage
Type
REG_SZ
Data
Yes
Remarks
When using a product that scans ports (for a legitimate reason), a poll to port 1942 will
result in an informational message in the Microsoft Windows Application Event Log.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
367
Chapter 8: Registry settings
8.73
Tracing
Enables full tracing of RES ONE Workspace functions, which can be useful for purposes of
troubleshooting and performance monitoring
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
Trace
Type
String
Data
Yes or No
Value
TraceFile
Type
String
Data
file name, for example %programfiles%\RES Software\Workspace
Manager\trace.log
Value
TraceDetailed
Type
String
Data
Yes or No
Value
TraceFilter
Type
String
Data
filter options, separated with semicolon (;).
Value
TraceClasses
Type
String
Data
classes, separated with a vertical bar (|). For example: 1|2
Warning
Tracing may affect performance of the user session.
Notes

Variables are not allowed in the file name or path in versions prior to 2008 SR6.

All users require modify permissions on the trace file.
368
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 8: Registry settings
8.74
UseClassicLogoff
Use RES ONE Workspace's classic logoff
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)

HKCU\Software\RES\PowerFuse (32-bit)

HKCU\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
UseClassicLogoff
Type
REG_SZ
Data
Yes
Remarks
For user sessions running Microsoft Windows 7 or higher, setting this registry value might
cause:
8.75

a system power down instead of a restart when the logoff or restart was forced (e.g. when a user
executes the Install updates and restart option).

a regular logoff not to be completed correctly. This may result in, for instance, User Settings not
being saved.
UseMsgBox
Show message box when WebGuard blocks URL
Key
HKCU\Software\Policies\RES\WebGuardIE
Value
UseMsgBox
Type
REG_DWORD
Data
0=on / 1=off
Key
HKCU\Software\Policies\RES\WebGuardIE
Value
MsgTimeout
Type
REG_DWORD
Data
5 (Timeout 5 seconds)
Remarks
WebGuard has the possibility to show a message box when a URL is blocked. The
message box can be configured to disappear automatically after an adjustable
timeout. This can be done with this registry hook.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
369
Chapter 8: Registry settings
8.76
UseOnlyComputerNameForShadow
Prevent error when remote controlling user session
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)

HKCU\Software\RES\Workspace Manager (32-bit)

HKCU\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)

HKCU\Software\RES\PowerFuse (32-bit)

HKCU\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
UseOnlyComputerNameForShadow
Type
REG_SZ
Data
Yes
Remarks
When trying to remote control a user session, this may fail with the error: The
parameter is incorrect. You can prevent this error by setting this registry value.
8.77
WaitBeforeStart
Configurable waiting time before Composer starts
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
WaitBeforeStart
Type
REG_DWORD
Data
Number of seconds to wait. Maximum is 3600 seconds (= 1 hour)
Remarks
In certain situations, it may be desirable to have the Workspace Composer wait a few
seconds before starting. You can set this behavior with this registry hook.
370
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 8: Registry settings
8.78
WaitForUpdatedCache
Forcing a cache to be up to date before starting a session
Key

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Value
WaitForUpdatedCache
Type
REG_DWORD
Data
<Max # seconds to wait for the cache to be updated before session is
started>
Remarks
In certain situations, it is desirable to make sure that the local RES ONE Workspace
cache is up to date, before the composer starts the RES ONE Workspace session. If you
want the cache to be up to date before the session is started, you can set this registry
hook.

Applying this registry setting bypasses the Poll for database changes interval specified at Setup
> Agents > Properties tab, after every initial startup or reboot of the computer.

This registry settings forces an immediate cache update.

Additionally, applying this registry setting may cause a delay in the logon process.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
371
Chapter 9: Registry settings for Relay Servers
Chapter 9: Registry settings for Relay Servers
Use this template for course material only. Insert text here. You can use this template for the topic
at the beginning of a Chapter, at the top level of your Book. The topic does not have to contain any
content itself.
In your Printed output, there is a section break before the topic, the RES Course Chapter Section
media object is used, a Chapter super heading is inserted above the topic's heading but it will be
hidden, and page numbering continues from the previous section.
In your Web outputs, the RES Course Chapter Section media object is used.
9.1
CertificateAlgorithm
Additional encryption algorithms for Self Signed Certificates of the Relay Server
Key
HKLM\Software\RES\Workspace Manager\Relay Server
Value
CertificateAlgorithm
Type
REG_SZ
Data
SHA256RSA or SHA384RSA or SHA512RSA
Remarks
A Self Signed Certificate is used for the SSL (Secure Sockets Layer) connection
between the Relay Server and RES ONE Workspace Agents.
The default encryption algorithm used is SHA1RSA.
Please note that after setting this registry value, the Relay Server might not start
properly after a reboot. To resolve this, execute the following actions:

Open a command box with Administrative rights (cmd.exe).

9.2
Enter the following command: "sc config ResRls depend= KeyIso".
CertificateKeyLength
Set the Certificate Key Length for a Relay Server
Key
HKLM\Software\RES\Workspace Manager\Relay Server
Value
CertificateKeyLength
Type
REG_DWORD
Data
512, 1024, 2048, 4096
Remarks
The default value is 1024. For any other value than the specified values above, the
default value 1024 will be filled in.
A key length of at least 1024 is necessary when running RES ONE Workspace sessions on
Microsoft Windows 10. On Microsoft Windows 8 / 8.1 / 2012 (R2) and earlier, a key
length of 512 suffices.
372
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 9: Registry settings for Relay Servers
9.3
CustomCertificate
For the connection between a RES Agent (RES service) and a Relay Server and between Relay
Servers custom certificates can be used.
To use custom certificates, the CustomCertificate registry value needs to be set. With this
registry setting, the value that is used to identify the custom certificate in the certificate store will
be specified. By default, the Relay Server will look for the custom certificate's "Subject name" in the
"Personal" folder in the certificate store. Optionally, one or both values can be changed by setting
the registry values CustomCertificateStoreFindBy and CustomCertificateStore.
CustomCertificate
Use custom certificates for the connection between a RES Agent (RES service) and a Relay
Server and between Relay Servers
Key
HKLM\Software\RES\Workspace Manager\RelayServer
Value
CustomCertificate
Type
REG_SZ
Data
Value used to identify the custom certificate in the certificate store.
Remark
By default, the "Subject name" will be used to identify the custom certificate in the
certificate store.
With the registry value CustomCertificateStoreFindBy the certificate's Thumbprint
or SerialNumber can also be used to identify it in the certificate store.
CustomCertificateStoreFindBy (optional)
By default, the "Subject name" will be used to identify the custom certificate in the certificate
store. With the registry value CustomCertificateStoreFindBy, the custom certificate can be
identified by its Thumbprint or SerialNumber. By setting this registry value, make sure to specify
the correct Data for the registry value CustomCertificate.
Use the certificate's Thumbprint or SerialNumber to identify it in the certificate store
Key
HKLM\Software\RES\Workspace Manager\RelayServer
Value
CustomCertificateStoreFindBy
Type
REG_SZ
Data
Thumbprint or SerialNumber
Remark
The values for Thumbprint and SerialNumber may not contain any spaces.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
373
Chapter 9: Registry settings for Relay Servers
CustomCertificateStore (optional)
By default, the Relay Server will look for the custom certificate in the "Personal" folder in the
certificate store. With the registry value CustomCertificateStore, a different folder in the
certificate store can be specified. In case a non-English version of Microsoft Windows is being used,
the Microsoft Windows internal folder names must be specified for Data.
The supported Microsoft Windows internal folder names are specified below:
Microsoft Windows internal folder
name
Name of folder on an English Microsoft Windows Operating
System
Root
Trusted Root Certification Authorities
CertificateAuthority
Intermediate Certification Authorities
TrustedPublisher
Trusted Publishers
Disallowed
Untrusted Certificates
AuthRoot
Third-Party Root Certification Authorities
TrustedPeople
Trusted People
AddressBook
Other People
Specify a different folder than "Personal" in the certificate store in which the Relay Server will
look for the custom certificate
Key
HKLM\Software\RES\Workspace Manager\RelayServer
Value
CustomCertificateStore
Type
REG_SZ
Data
Folder in certificate store the custom certificate is stored in
Remark
In case a non-English version of Microsoft Windows is being used, the
Microsoft Windows internal folder names must be specified for Data.
Notes

The Subject name on the custom certificate must match the Fully Qualified Domain Name (FQDN) that RES
Agents use to connect to a Relay Server (configured at Administration > Agents, on the Settings tab).

If the custom certificate cannot be found or is not valid or trusted in some way, an entry will be logged in the
Windows event log and connecting to the Relay Server will not be possible.
Disallow use of self-signed certificates
In case the registry value CustomCertificate (and optionally CustomCertificateStoreFindBy and
CustomCertificateStore) has not been specified, a self-signed certificate will be used for the
connection between the RES service and Relay Server, and between Relay Servers. To disallow the
use of a self-signed certificate for these connections, the registry value
DoNotAcceptSelfSignedCert must be set. See DoNotAcceptSelfSignedCert (on page 375) for more
information.
374
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 9: Registry settings for Relay Servers
9.4
DBCleanupDuration
Specify the duration of the daily cleanup for Relay Servers that are connected directly to the
Datastore
Key
HKLM\Software\RES\Workspace Manager\Relay Server
Value
DBCleanupDuration
Type
REG_DWORD
Data
0-24 (hours)
Remarks
If the duration is not specified, the daily cleanup is not time limited (default behavior)
and will continue until finished.
RES ONE Workspace will start (or continue) with the daily cleanup of the Datastore at
the time configured at Setup > Advanced Settings (obsolete log files) and Setup >
Usage Tracking (obsolete Usage Tracking data).
9.5
DoNotAcceptSelfSignedCert
In case the registry value CustomCertificate (on page 373) (and optionally
CustomCertificateStoreFindBy and CustomCertificateStore) has not been specified, a selfsigned certificate will be used for the connection between a RES Agent (RES service) and a Relay
Server, and between Relay Servers. Set the registry value DoNotAcceptSelfSignedCert to disallow
the use of a self-signed certificate for these connections.
Disallow the use of a self-signed certificate for the connection between a RES Agent and a Relay
Server
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
DoNotAcceptSelfSignedCert
Type
REG_SZ
Data
Yes/1/True
Remark
By default, if no custom certificate has been specified, a RES Agent will connect to a
Relay Server that uses a self-signed certificate. Setting this value will prevent this
from happening.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
375
Chapter 9: Registry settings for Relay Servers
Disallow the use of a self-signed certificate for the connection between different Relay Servers
Key
HKLM\Software\RES\Workspace Manager\RelayServer
Value
DoNotAcceptSelfSignedCert
Type
REG_SZ
Data
Yes/1/True
Remark
By default, if no custom certificate was specified, a Relay Server will connect to
another Relay Server that uses a self-signed certificate. Setting this value will prevent
this from happening.
Note
If the registry value DoNotAcceptSelfSignedCert is set without setting the registry value CustomCertificate,
an entry will be logged in the Windows event log and connecting to the Relay Server will not be possible.
9.6
RemoveObsoleteLogFiles
Exclude Relay Server from daily cleanup of obsolete log file
Key
HKLM\Software\RES\Workspace Manager\Relay Server
Value
RemoveObsoleteLogFiles
Type
REG_DWORD
Data
0
Remarks
This registry value can only be set for Relay Servers that are connected to the
Datastore. In environments where no Agents, but only Relay Servers are connected to
the Datastore, please note that by setting this registry value on all Relay Servers,
obsolete log files will not be deleted anymore. This may cause an unexpected growth
of the Datastore resulting in performance degradation.
9.7
RSConnectTimeout
Lower the number of seconds of the default connection wait time of 10 seconds
Key
Initial installation RES Workspace Manager 2011 and higher:

HKLM\Software\RES\Workspace Manager (32-bit)

HKLM\Software\Wow6432Node\RES\Workspace Manager (64-bit)
Initial installation RES PowerFuse 2010 and earlier:

HKLM\Software\RES\PowerFuse (32-bit)

HKLM\Software\Wow6432Node\RES\PowerFuse (64-bit)
Value
RSConnectTimeout
Type
REG_SZ
Data
1-9 (number of seconds)
Remarks
Every Relay Server that is not available will cause a 10-second delay, because the
default connection wait time is 10 seconds.
376
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 10: Command line Options
Chapter 10:
10.1
Command line Options
Pwrgate
You can create Managed Applications that start pwrgate.exe with one of the following command
line parameters in order to perform an action or start a session.
RES ONE Workspace will perform the specified action or start the specified tool if a user starts the
Managed Application.
Commandline parameters for pwrgate.exe
-2
Force a session refresh
-3
Force log off/exit
-15
Start the Restore User Settings wizard
-16
Start the User Installed Applications Wizard
-66
Force the Workspace Composer to perform all the actions that it normally does
after a refresh. However, this does not refresh the desktop image.
-66 deskpic
Force the Workspace Composer to perform all the actions that it normally does
after a refresh, including refreshing the desktop image.
3
Start PowerHelp
8
Start Workspace Preferences
15
Start Printing Preferences
The file pwrgate.exe is available in the RES ONE Workspace program directory.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
377
Chapter 10: Command line Options
10.2
Pwrtech
Building Blocks and using FIPS compliant security algorithms
When creating a Building Block in a RES ONE Workspace 2015 environment, a password must be
specified. When importing this Building Block via the Management Console, this password must be
specified again (plain text). When importing this Building Block via a command line, i.e.
/passwordfips, the hash of this password must be specified. RES ONE Workspace 2015 Building
Blocks with FIPS enabled can only be imported one by one.
Import file hashes
File hashes can be imported in the RES ONE Workspace Console using a command line option:
Pwrtech.exe /importhashes=<file> /createifnotexists

Specify the full path to a CSV (comma delimited) or TXT file (tab delimited) for <file>.
Below more information about the format of CSV and TXT files and several examples.
CSV file
Format: <authorized file name or full path>,<file hash>,<process of authorized
file (optional)>,<mode (optional)>,<WorkspaceContainer|WorkspaceContainer (optional)>
Enclose the file name or path in quotation marks if it includes spaces.
To remove files, file hashes, or specific Workspace Containers, the filenames, file hashes, or
Workspace Containers in the CSV file must start with a hyphen (-)
TXT file
Format: <Authorized file or application (or the full path to authorized
file/application)>
<file hash>
<process of authorized file (optional)>
<WorkspaceContainer|WorkspaceContainer (optional)>
Enclose the file name or path in quotation marks if it includes spaces.
To remove files, file hashes, or specific Workspace Containers, the filenames, file hashes, or
Workspace Containers in the TXT file must start with a hyphen (-)
378
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 10: Command line Options
Examples of when an existing Authorized File matches an imported rule
Scenario
Authorized File
Authorized
Process
Outcome
Existing data in RES
ONE Workspace
Notepad.exe
Excel.exe
Imported data
Notepad.exe
Excel.exe
Existing and imported data
match -> update data in RES
ONE Workspace
Existing data in RES
ONE Workspace
Notepad.exe
Allow any process
to launch or access
this file
Imported data
Notepad.exe
Not specified (left
blank)
Full
No Authorized Process
Existing and imported data
match -> update data in RES
ONE Workspace
Wildcard in Authorized File path
Existing data in RES
ONE Workspace
*\Notepad.exe
Excel.exe
Imported data
*\Notepad.exe
Excel.exe
Existing and imported data
match -> update data in RES
ONE Workspace
Wildcard in existing Authorized File path only
Existing data in RES
ONE Workspace
*\Notepad.exe
Imported data
C:\files\Notepad.exe Excel.exe
Excel.exe
Existing and imported data
match -> update data in RES
ONE Workspace
Wildcard in imported Authorized File path only
Existing data in RES
ONE Workspace
C:\files\Notepad.exe Excel.exe
Imported data
*\Notepad.exe
Excel.exe
Existing and imported data
match -> update data in RES
ONE Workspace
Wildcard in Authorized File name only
Existing data in RES
ONE Workspace
Note*
Excel.exe
Imported data
Notepad.exe
Excel.exe
Existing and imported data
match -> update data in RES
ONE Workspace
Specific existing Authorized File name, wildcard in imported Authorized File name
Existing data in RES
ONE Workspace
Notepad.exe
Excel.exe
Imported data
Note*
Excel.exe
Existing and imported data
match -> update data in RES
ONE Workspace
No process specified for existing Authorized File, specific process specified for imported
Authorized File
Existing data in RES
ONE Workspace
Notepad.exe
Allow any process
to launch or access
this file
Existing and imported data
do not match -> ignore
imported data or create new
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
379
Chapter 10: Command line Options
Scenario
Authorized File
Authorized
Process
Outcome
Imported data
Notepad.exe
Excel.exe
in RES ONE Workspace
Process specified for existing Authorized File, no process specified for imported Authorized
File
Existing data in RES
ONE Workspace
Notepad.exe
Excel.exe
Imported data
Notepad.exe
Not specified (left
blank)
Existing and imported data
do not match -> ignore
imported data or create new
in RES ONE Workspace
Example scenarios when importing file hashes
CSV file format: <authorized file name or full path>,<file hash>,<process of
authorized file (optional)>,<mode (optional)>,<WorkspaceContainer|WorkspaceContainer
(optional)>
Existing configuration in
RES ONE Workspace
Allow hash [XYZ] for
Notepad.exe
Imported rules (that match existing
configuration)
 Notepad.exe,filehashXYZ,,deny,
Result in RES ONE Workspace

Allow hash [XYZ] for
Notepad.exe,filehashXYZ,,allow, Notepad.exe
Allow hash [XYZ] for
Notepad.exe

Notepad.exe,filehashXYZ,,allow, Deny hash [XYZ] for

Notepad.exe,filehashXYZ,,deny,
Authorized File for
Notepad.exe

-Notepad.exe,,,,
No Authorized Files for
Notepad.exe
Allow hash [XYZ] for
Notepad.exe

Notepad.exe,filehashPQR,,,
Allow hashes [XYZ] and [PQR]
for Notepad.exe
Authorized File for
Notepad.exe with
Workspace Control set to
Workspace Container
"Laptops"

Notepad.exe,filehashPQR,,,Laptops
Authorized File for
Notepad.exe with Workspace
Control set to all Workspace
Containers
Authorized File for
Notepad.exe with
Workspace Control set to
Workspace Container
"Laptops"

Notepad.exe,,,,Production

Notepad.exe,,,,Laptops
Authorized File for
Notepad.exe with Workspace
Control set to Workspace
Containers Laptops and
Production
Authorized File for
Notepad.exe with
Workspace Control set to
Workspace Container
"Laptops"

Notepad.exe,,,,Production

Notepad.exe,,,,Laptops|Production

Notepad.exe
Authorized File for
Notepad.exe with Workspace
Control set to Workspace
Container Production
/createifnotexists is an optional value and specifies that the authorized file must be created
if it does not yet exist. It will then be created with the specified file hash and process. This
value is only applicable for authorized files.
380
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 10: Command line Options
Example:
The CSV file for the authorized file File_example contains the following data:
C:\windows\system32\notepad.exe,56746574657623856,cmd.exe
Commandline option:
Pwrtech.exe /importhashes=File_example /createifnotexists
Result:
The file hash 56746574657623856 will be imported for the authorized file
C:\windows\system32\notepad.exe with process cmd.exe.
If the file hash does not yet exist, it will be created for notepad.exe with process cmd.exe.
If an application and an authorized file for C:\windows\system32\notepad.exe exist in the
Console, the hash will be added to both the application and the authorized file.
When importing file hashes for Authorized Files using a CSV or TXT file, please take into
consideration the following:

For each imported rule, the system checks if there are existing Authorized Files (global and
application-level) that match the imported combination of authorized executable and additional
process.

If one or more matches are found, then:

If the imported file hash is not yet listed in the matching Authorized Files, it is added to
them.

If the imported file hash is already listed in the matching Authorized Files, and the imported
file hash includes a Mode property (= Allow or Deny) then the imported file hash overwrites
the Deny/Allow mode of the existing file hash.


If the imported file hash does not include a Mode property, then the file hash will be
imported with an Allow mode.
If the imported rule includes Workspace information, then the specified Workspace
Containers are added to or removed from Workspace Control on the matching global
Authorized Files.

Application-level Authorized Files do not have Workspace Control, so Workspace changes
do not take effect there.

If multiple Workspace Containers exist with the same name, they are all added or
removed as result of the import. Alternatively, specify the Workspace Container GUID in
the import rule.

Rules in the import are imported and processed top-down, so if the import contains multiple
rules that update the same Authorized File or file hash, the end result depends on the order in
which the rule appear in the file.

An import file that contains a string that is recognized as neither MD5 nor SHA-1 nor SHA-256
will cause the import of the entire file to fail.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
381
Chapter 10: Command line Options
Obtain hashed version of Environment password
Technical managers can obtain the hashed version of the Environment password by using one of the
following command lines on the machine running the RES ONE Workspace Console:

pwrtech.exe /gethashedpassword

pwrtech.exe /gethashedpassword /f=<full file path>
With Ctrl+C, the hashed password can be copied from the dialog box to the clipboard.
The hashed password is saved in the specified file at the given location.
During an unattended installation of RES ONE Workspace, this password can be provided as an
installation parameter (RSPASSWORD) to connect RES ONE Workspace to a Relay Server.
Process Building Blocks and Custom Resources in batches
You can process Building Blocks and Custom Resources in batches from the RES ONE Workspace
Console (pwrtech.exe).
Commandline parameters for pwrtech.exe
pwrtech.exe /del <buildingblock file>
Any object that is in the specified Building Block
(<buildingblock file>) will be deleted.

Specify the full path to the Building Block
for <buildingblock file>
pwrtech.exe /del /guid={objectguid}
Delete the object with the GUID as specified
between {...}.
pwrtech.exe /export <filepath>
[/type=(type1,type2....) |
/guid={objectguid} ]
Create Building Block with limited number of
features.

Specify the specific feature(s) (Type(s)) that
need to be included in the Building Block for
/type. The list with the different Types can
be found below.

Separate different Types with a comma
(",").

If no Types are specified, a Building
Block for the entire environment will be
created.
Examples:
pwrtech.exe /export C:\temp\bb.xml
/type=printer -> the Building Block bb.xml
will be created in C:\temp and will only
include data from Type PRINTER.
pwrtech.exe /export
C:\temp\printer_mapping.xml
/type=printer,mapping -> Building Block
with only data of Types PRINTER and
MAPPING will be created.

382
Use /guid, to create a Building Block for
one specific object. Object GUIDS can be
found in the Datastore.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 10: Command line Options
Commandline parameters for pwrtech.exe
pwrtech.exe /addresource
Add a resource file as a Custom Resource in the
<resourcefile> /path=<path> [/guid={guid}] specified location.

For <resourcefile>, specify the resource
file that needs to be added to the RES ONE
Workspace environment (full path).

For /path, specify the location (full path)
where the resource file must be added in
the Console (at Administration > Custom
Resources).

If no path is specified, the resource file
will be added as a Custom Resource to
the root folder at Administration >
Custom Resources.

If the specified path does not exist, a
new folder will be created in the folder
tree at Administration > Custom
Resources and the resource file will be
added to that folder as a Custom
Resource.
Example:
pwrtech.exe /addresource
C:\temp\mine.ico
/path=\mycustomresources\subfolder ->
The resource file mine.ico will be added as
a Custom Resource in "subfolder" at
Administration > Custom Resources in the
MyCustomResources folder.

Giving a value for /guid is optional. /guid
can be used to overwrite an existing Custom
Resource.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
383
Chapter 10: Command line Options
Commandline parameters for pwrtech.exe
pwrtech.exe /exportresource
/target=<file> [/path=<path> |
/guid={guid}]
Export a Custom Resource from RES ONE
Workspace and place it in the specified location.

For /target, specify the resource file name
and full path the Custom Resource must be
exported to.

For /path, specify the full path to the
Custom Resource in the Console.

If only a file name is specified,
pwrtech.exe will try to extract the
Custom Resource from the root folder at
Administration > Custom Resources.

Specify a value for /guid to extract the
Custom Resource with that guid.

Important: Either /path or /guid may be
used, not both.
Example:
pwrtech.exe /exportresource
/target=C:\temp\dummy.ico
\path=mine.ico -> the Custom Resource
mine.ico will be extracted from the root
folder at Administration > Custom
Resources in the Console and be placed as
the resource file dummy.ico at C:\temp\.
pwrtech.exe /delresource [/path=<path> |
/guid={guid}]
Delete a Custom Resource from RES ONE
Workspace.

For /path, specify the full path to the
Custom Resource in the Console.

384
If only a file name is specified,
pwrtech.exe will try to remove the
Custom Resource from the root folder at
Administration > Custom Resources.

Specify a value for /guid to remove the
Custom Resource with that guid.

Important: Either /path or /guid may be
used, not both.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 10: Command line Options
The following Types can be used with /type in the Command line for pwrtech.exe /export:
Type
Feature in Management Console
APPLICATION
Composition > Applications
AUTOMATIONTASK
Composition > Actions By Type > Automation Tasks
CONFIGMGR
Composition > Actions By Type > Microsoft ConfigMgr
DATASOURCE
Composition > Applications > Data Sources
DIRECTORYSERVICE
User Context > Directory Services
EMAIL
Composition > Applications > E-mail Settings
EXECUTECOMMAND
Composition > Actions By Type > Execute Command
FOLDERREDIRECTION
Composition > Actions By Type > Files and Folders > Folder
Redirection
FOLDERSYNC
Composition > Actions By Type > Files and Folders > Folder
Synchronization
HOMEDIRECTORY
Composition > Actions By Type > Files and Folders > User Home
Directory
LOCATION
User Context > Locations and Devices
MAPPING
Composition > Actions By Type > Files and Folders > Drive and Port
Mappings
PRINTER
Composition > Actions By Type > Printers
PROFILEDIRECTORY
Composition > Actions By Type > Files and Folders > User Profile
Directory
REGISTRY
Composition > Actions By Type > User Registry
SUBSTITUTE
Composition > Actions By Type > Files and Folders > Drive
Substitutes
USERSETTING
Composition > User Settings
VARIABLE
Composition > Actions By Type > Environment Variables
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
385
Chapter 10: Command line Options
To facilitate these batch scripts, the following error levels are available and will be returned in
%errorlevel%:
Error level
Description
0
The command line was executed successfully.
1
The file was not specified in the command line.
2
The file was not a valid XML file.
3
The object was not found in the Datastore.
4
Saving the Custom Resource in the Datastore failed.
5
Deleting the object or Custom Resource failed.
6
The /guid has an invalid guid specified.
7
The object specified with /guid does not exist.
8
The Custom Resource specified with /guid does not exist.
9
Insufficient rights, the caller belongs to an administrative role which
does not have modify permissions for the object type or Custom
Resources.
10
Required command line options not specified.
11
The path specified for /path does not exist.
12
Importing a Building Block via the command line with /passwordfips
failed, because the the file name contains a wildcard (* or ? or |).
14
Importing a Building Block via the command line failed, because no
/passwordfips is provided or the password is incorrect.
Republish a published application
You can republish a published application with the following command line:
%respfdir%\pwrtech.exe /republishusers {AppID | AppGUID}
This command line is useful in situations where access to a published application is based on, for
instance, OU membership or RES ONE Service Store Service (configured on the Access Control >
Identity tab of an application). For example, using this command line in the workflow of the RES
ONE Service Store Service that gives users access to the application, will trigger an immediate
republish of the application when the user requests it. Without this command line, the user could
request the published application, but the published application could not yet be accessed through
Citrix. Republishing the application is necessary for this.
Examples
Command line with AppID: %respfdir%\pwrtech.exe /republishusers 167
Command line with AppGUID: %respfdir%\pwrtech.exe /republishusers {3F634F83-504846E4-9D2B-61CCF3761A4A}
386
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 10: Command line Options
10.3
Setprint
Command line parameters for setprint.exe
/allowconnect Allow users to connect other printers
10.4
Application executables
Pwrgatekeepalive
For applications that open attachments from mail clients (and other similar situations): keep
pwrgate.exe alive so that mail client does not remove temporary file before associated
application has opened that file.
Key
HKLM\Software\RES\Workspace Manager
Value
pwrgatekeepalive
Type
Data
Yes or No
Default
No
Variable:
You need to set this variable at "Yes" for RES ONE Workspace-managed applications such as Word,
Excel and Adobe Reader that are used to open attachments from other applications, mainly e-mail
clients such as Outlook.
In Windows, when an application such as Outlook needs to open an attachment such as a Word file,
the application places the attachment in a temporary location and then starts the associated
process (in this case winword.exe). The application then checks whether the process is still running.
When it is no longer running, the application removes the attachment file from the temporary
location again.
This does not work if an attachment is opened from an application that is managed by RES ONE
Workspace because then pwrgate.exe is always started instead of winword.exe, etc. Pwrgate.exe
checks the File Types, calls the relevant application (such as Word), and then stops. As soon as
pwrgate.exe stops - which is before Word has started - the mail client removes the attachment
from the temporary location. As a result, the attachment can no longer be found when Word is
actually started through RES ONE Workspace.
To prevent this, set an environment variable %pwrgatekeepalive% with the value "yes" to be
PowerLaunched when the application that needs to open attachments (such as Word) is started.
This will ensure that the pwrgate.exe process does not stop until Word stops - and so the Word file
will not be removed from its temporary location too soon.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
387
Chapter 10: Command line Options
10.5
Network Security Log
You can export the Network Security log file in the interchangeable XML format using the following
command line.
Command line for Network Security XML log
Pwrtech.exe /exportlog /type=network /output=output location /start=start date
/end=end date
Example:
Pwrtech.exe /exportlog /type=network /output=C:\networklogs.xml /start=20130101
/end=20130115
You need to set the value for output. The values for start and end need to be set in the
YYYYMMDD (optionally YYYMMDDHHMMSS) format and are not mandatory.
Note
At least read permission on the Network Connections node (at Security > Network Connections) is needed to export this
network security log successfully. With insufficient access rights, the XML export file will contain no data.
388
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 11: Disabled Features
Chapter 11:
Disabled Features
If a feature is Disabled at global level and you add an object related to this feature for the first
time, a message will be shown that the configuration will not take effect until the feature is
enabled. This message will not be shown if the feature is in Learning mode.
The following examples show situations in which a notification is shown:

At Security > Applications, Managed Applications Security is disabled. The first time you
configure an Authorized File when editing a Managed Application, a message will be shown that
Managed Applications Security has to be enabled first before the rule will take effect. If you
have sufficient rights, the rule will be added anyway.

At Composition, User Settings is disabled. The first time you configure User Settings when
editing a Managed Application, a message will be shown that User Settings has to be enabled
first before the user setting will take effect. If you have sufficient rights, the rule will be added
anyway.
Exception
Global nodes for which Actions exist on application level (e.g. Drive and Port Mappings, Drive
Substitutes, Folder Synchronization, etc.) form an exception. In this case, an additional message
will be shown, stating that the Actions will be performed regardless of the global disabled status.
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
389
Chapter 12: Compatibility Matrix RES ONE Workspace 2015 SR1
Chapter 12:
Compatibility Matrix RES ONE Workspace 2015 SR1
Irrespective of this compatibility matrix, RES Software does not support versions of products for
which End of Life (EOL) has been declared by their respective vendors.
Supported Operating Systems
Platform
Microsoft Windows Server 2008
x86/x64
Microsoft Windows Server 2008 R2
x64
Microsoft Windows Server 2012
x64
Microsoft Windows Server 2012 R2
x64
Microsoft Windows 7
x86/x64
Microsoft Windows 8
x86/x64
Microsoft Windows 8.1
x86/x64
Microsoft Windows 10, build
10.0.10240.xxx.150916-2039
x86/x64
Supported Directory Services
Microsoft Windows NT Domain
Microsoft Windows 2000 Active Directory
Microsoft Windows 2003 Active Directory
Microsoft Windows 2008 Active Directory
Microsoft Windows 2008 R2 Active Directory
Microsoft Windows 2012 Active Directory
Microsoft Windows 2012 R2 Active Directory
Novell eDirectory 8.x or higher
Samba 3.25 or higher
390
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 12: Compatibility Matrix RES ONE Workspace 2015 SR1
Supported Databases
Platform
Microsoft SQL Server 2005
x86/x64
Microsoft SQL Server 2008
x86/x64
Microsoft SQL Server 2008 R2
x86/x64
Microsoft SQL Server 2012
x86/x64
Microsoft SQL Server 2014
x86/x64
Microsoft SQL Azure
IBM DB2 9.5 or higher
x86/x64
IBM DB2 10.5
x86/x64
MySQL 5.0 or higher
x86/x64
Oracle 11.x
x86/x64
Supported Hosted desktops/applications
Platform
Citrix XenApp 6.5
x64
Citrix XenDesktop 7.0 App Edition
x64
Citrix XenDesktop 7.1 App Edition
x64
Citrix XenApp 7.5
x64
Citrix XenApp 7.6
x64
Microsoft Terminal Services 2003
x86/x64
Microsoft Terminal Services 2003 R2
x86/x64
Microsoft Terminal Services 2008
x86/x64
Microsoft Remote Desktop Services 2008 R2
x64
Microsoft Remote Desktop Services 2012
x64
Microsoft Remote Desktop Services 2012 R2
x64
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
391
Chapter 12: Compatibility Matrix RES ONE Workspace 2015 SR1
Supported Virtual desktop infrastructures
Citrix XenDesktop 5
Citrix XenDesktop 5.5
Citrix XenDesktop 5.6
Citrix XenDesktop 7.0
Citrix XenDesktop 7.1
Citrix XenDesktop 7.5
Citrix XenDesktop 7.6
VMware View 5 (except for the RES ONE
Workspace feature Remote Assistance)
VMware View 5.2 (except for the RES ONE
Workspace feature Remote Assistance)
VMware View 5.3 (except for the RES ONE
Workspace feature Remote Assistance)
VMware View 6.0 (except for the RES ONE
Workspace feature Remote Assistance)
VMware View 6.0.2 (except for the RES ONE
Workspace feature Remote Assistance)
Supported Application Virtualization
Platform
Microsoft Application Virtualization 4.x up to
4.6
x86/x64
Microsoft Application Virtualization 5
x86/x64
Microsoft Application Virtualization 5 SP1, SP2, x86/x64
SP3
Citrix Application Streaming 1.x, 5.2
x86/x64
Citrix Application Streaming 2.x, 6.0
x86/x64
VMware ThinApp 4.x
VMware ThinApp 5.x
Supported Applications for E-mail Settings
Lotus Notes Mail
Microsoft Mail
Microsoft Office 2010, 2013
Microsoft Office 365
Microsoft Outlook Express
Nortel CallPilot Desktop Messaging 1.07.x,
2.50.x or higher
Oracle Collaboration Suite (Oracle Connector
version 9.x or higher)
Zarafa Groupware Server 6.x, 7.x
392
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Chapter 12: Compatibility Matrix RES ONE Workspace 2015 SR1
Supported Browsers for Website Usage
Tracking / Website Security
Platform
Google Chrome 42, 43
x86/x64
Microsoft Edge 20.10240.16384.0 with
EdgeHTML (engine) 12
x86/x64
Microsoft Internet Explorer 9, 10, 11
x86/x64
Mozilla FireFox 38, 39
x86/x64
Opera 29, 30
x86/x64
Supported Provisioning Services
LANDesk 9.5
LANDesk 9.5 SP1
Microsoft System Center Configuration
Manager 2012
Microsoft System Center Configuration
Manager 2012 SP1
Microsoft System Center Configuration
Manager 2012 R2
Citrix Ready certified for
Platform
XenApp 4.5 (Presentation Server)
x64/x32
XenApp 5.0
x64/x32
XenApp 6.0
x64
XenApp 6.5
XenApp 7.5
XenApp 7.6
XenDesktop 4.0
XenDesktop 5.0
XenDesktop 5.5
XenDesktop 5.6
XenDesktop 7.0
XenDesktop 7.0 App Edition
XenDesktop 7.1
XenDesktop 7.1 App Edition
XenDesktop 7.5
XenDesktop 7.6
VMware Ready certified for
VMware View 5
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
393
Chapter 13:
Index
A
About RES ONE Workspace • 4
Access Balancing • 303
Access Control based on context • 79
Access Control on Workspace Containers • 323
Access principle • 78
Access Wizard • 121
Actions • 112, 151
ActiveSetupTimeout • 334
Adaptive Security • 279
Add/Update Applications and Delete Applications • 315
Adding and removing Citrix XenApp Servers using the command line • 228
Additional User Setting options • 209
Administrative roles • 316
Administrative Roles • 261
Advanced Administration • 260
Advanced Settings • 35
Agent Prerequisites • 298
Agents • 45
Agents Settings • 45
Alerting • 264
Allow users to restore their own settings • 212
Allowing users to choose a configuration set based on Workspace Container • 324
AppguardDump • 134
Application executables • 387
Application level • 281, 299
Application List tab • 90
Application Managers • 80, 271
Application Virtualization • 217
Applications • 90, 91, 102, 280
Applications and ApplicationsSaveMandatory • 127
Applications security modes
disabled, learning, enabled • 280
Applications User Settings • 213
Architecture • 5
Architecture Overview • 13
Assigning permissions to users • 291
Associated items • 316
Audit Trail • 260
Audit Trail options • 260
Authorized Connections • 283
Authorized Files • 279, 282, 294
Authorizing a specific application to use specific connections • 300
Authorizing files and folders • 294
AutoHide • 131
Automation Tasks • 176
Availability • 327
B
Background • 182
Blacklisting • 301
394
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
BlockPicaSvcFix • 334
Building Blocks • 313
Building Blocks and using FIPS compliant security algorithms • 378
Building the end-user's Start Menu, Desktop and Quick Launch bar • 254
C
Capture targeted items on application/session end • 195
Central storage location of User Settings and other user-specific information • 206, 208, 256, 257
CertificateAlgorithm • 372
CertificateKeyLength • 372
ChangePasswordTimeout • 335
CheckDisabledFolders • 335
Checking the connection settings of an Agent to a Datastore or Relay Server • 49
CheckShutDown • 336
CheckUpdateOSDFile • 336
Citrix streamed applications • 216
Citrix XenApp Integration • 75
Citrix XenApp Publishing • 217
Citrix XenApp Streaming • 230
Command line Options • 377
Command line parameters • 317
Communication Model • 10
Compatibility Matrix RES ONE Workspace 2015 SR1 • 390
Components • 5
Computer Control • 323
Configuration • 112
Configuration Wizard • 41
Configuring a Citrix XenApp published application • 225
Configuring a managed application as Citrix XenApp published content • 227
Configuring Access Control for Workspace Preferences, PowerHelp, Printing Preferences and Refresh
Start menu • 137
Configuring Agents • 26
Configuring Automation Tasks • 176
Configuring commands • 172
Configuring different settings for certain parts of the environment • 296
Configuring Directory Maintenance • 149
Configuring directory services • 73
Configuring Drive and Port Mappings • 152
Configuring Drive Substitutes • 156
Configuring Environment Variables • 178
Configuring folder synchronization • 161
Configuring linked actions • 180
Configuring printers • 162
Configuring registry policies • 170
Configuring Registry Settings • 166
Configuring Relay Servers • 62
Configuring RES HyperDrive Migration Wizard • 242
Configuring the Datastore • 29
Configuring the Datastore dynamically • 43, 64
Configuring the RES Workspace Composer as a Citrix XenApp Published Application • 220, 222
Configuring the Shell • 26
Configuring User Installed Applications • 285
Configuring user-specific Access Balancing settings • 304
Configuring user-specific Instant LogOff settings • 308
Configuring user-specific Memory Optimization settings • 311
Configuring user-specific settings • 297
Configuring Web Portal styles • 247
Configuring Website Security • 287
Configuring Workspace Extensions • 119
Connection States • 77, 172
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
395
Connections • 31
ConsoleNoAppIcons • 337
Contacting RES Software • 3
Context menu options • 275
CorrectTaskbar • 335
CorrectWorkArea • 337
CPU Optimization • 303, 305
Create a drive mapping using information from Active Directory • 155
Creating a Blocked Connection for monitoring purposes in Blacklisting environments • 300
Creating a list from which users can choose a printer • 122
Creating a new application with rundll32.exe and the appropriate parameter • 138
Creating Building Blocks • 314
CTX_PFDesktopUsesPwrstart • 337
CTX_PNLaunchUsesFarmName • 338
CTX_PublishAppCmdLineFlag • 338
Custom Resources • 38
CustomCertificate • 373, 375
Customizing the contents and presentation • 320
D
Data • 290
Data Sources • 118
Datastore connection and port • 65
Datastore Management • 30
Datastore Migration Wizard • 31, 33
Datastore Split/Join Wizard • 34
Date and Time • 89
DBCleanupDuration • 375
Default behavior if running applications are no longer authorized • 281
Default Hide drives behavior • 154
Defaults for new applications • 99
Delegation and Compliance • 260
Desktop • 181
Desktop and DesktopSaveMandatory • 125
Desktop Sampler • 69
Desktop Transformation • 68
DesktopBackGround • 128
DesktopBackGroundPlacement • 128
DesktopColor • 124
DesktopForeColor • 124
Detailed information about users • 329
Directory Maintenance • 149
Directory Services • 73
DirectoryServiceRetryLimit • 338
Disabled Features • 389
DisableDHCP • 339
DisableExternalGroupCheck • 339
DisableFolderSyncLocalCheck • 340
DisableIconRefresh • 340
Disabling various tabs on Control Panel applets • 148
Disconnect user session when logoff is initiated • 308
Distributed environment • 15
Do not passthrough if available locally • 229
DoNotAcceptSelfSignedCert • 374, 375
DoNotAllowOverlappedDesktopItems • 340
DoNotAnalyseDB • 341
DoNotShowAgain • 132
Drive and Port Mappings • 152
Drive mappings • 291
Drive Substitutes • 156
396
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Dynamic
Dynamic
Dynamic
Dynamic
Configuration • 68
Datastore configuration for Agents • 25, 43
Privileges • 284
Relay Server configuration • 64
E
Editing references to external files • 318
E-mail Settings • 116
EnableMultipleIE • 341
Environment Variables • 178, 182
Errors • 278
Event Log • 65
Example • 44, 179, 287
allowing a user to choose a pre-set application configuration • 325
allowing a user to choose a pre-set session configuration • 325
blocking and authorizing files • 292
forcing a session to start in an particular, exclusive Workspace Container • 326
Using a USB device for authentication purposes • 88
Examples • 150, 159, 161, 289, 301
Examples multiple Directory Services • 76
Exceptions to blocked connections when Blacklisting • 300
ExcludeProcesses • 342
ExcludeSubscribedTasks • 342
Excluding a specific application from CPU Optimization • 306
Excluding a specific application from Memory Optimization • 311
Excluding certain types of users • 296
Excluding passthrough sessions • 296
Execute Command • 172
Exempting an application from Network Security Settings • 300
F
File Types • 114
Files and Folders security • 280, 292
Files and Folders security Mode
disabled, learning, enabled • 292
Filter Criteria and Filter Types • 269
Filtering • 269
Filters • 263
Flex Profile Kit INI files • 204
Folder Redirection • 157
Folder Synchronization • 160
ForceComputername • 343
ForceDisconnectOnIdle • 343
ForceLogoff • 344
ForcePrinterConnections • 343
ForceShutdown • 345
G
General • 99
General information about users • 328
Global level • 280, 299
Global Network Security and application-based Authorized Connections • 300
GUIDs • 318
H
Hide this workspace container if user needs to select one • 326
HideDescription • 129
HideMyNameInScreensaver • 130
HotKeyModifier and HotKeyKey • 131
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
397
I
Identity • 80
Import file hashes • 295, 378
Importing Building Blocks • 314
Importing Building Blocks into a specific workspace • 316
IncludeProcesses • 345
Individual blocked connections • 299
Information excluded from Building Blocks • 317
Information excluded from Instant Reports • 321
Install RES ONE Workspace Agent Service under different account • 19, 20
Installation • 18
Installation and Licensing • 16
Installing the Desktop Sampler • 69
Instant LogOff • 303, 307
Instant LogOff Modes
disabled, log only, enabled • 307
Instant Report format • 320
Instant Reports • 320
Instrumentation • 346
Integrating Citrix XenApp Publishing • 218
Integrating Citrix XenApp Streaming • 230
Integrating File Types with Workspace Extensions • 120
Integrating Microsoft App-V • 232
Integrating Microsoft TS RemoteApp • 266
Integrating RES HyperDrive • 242
Integrating RES ONE Automation Tasks • 240
Integrating RES ONE Service Store services • 241
Integration • 217, 264, 297
InterceptManagedApps • 347
Introduction • iii
K
Keeping RES ONE Workspace up to date • 58
KeepSeamlessHostAgent • 348
KeepSharesWithROB • 348
KeepTmpDDEMacros • 348
KeepUnicodePath • 349
KeepUserDefaultMAPIProfile • 349
KeepWordRunning • 350
Known limitations RES ONE Workspace and Microsoft Windows 8.1, 2012 R2, and 10 • 96
L
LANDesk • 175, 237
Language Identity • 80, 170
Languages • 78
Languages Example • 78
LCID • 130
Licensing • 50, 109, 282
Licensing Model • 50, 51
Licensing Process • 55
Limiting the number of applications running in a session • 311
Limiting the total memory usage of a session • 310
LingerDisconnectTimerInterval • 219, 350
LingerTerminateTimerInterval • 219, 351
Linked Actions • 180
Linking • 211
LocalCacheOnDisk • 48, 352
LocalCachePath • 352
LocatePrintersByIP • 353
398
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
Location based printing - example • 165
Locations and Devices
Zones • 81
Lockdown and Behavior • 182
Logging • 132, 284, 291, 293, 294, 297, 304, 306, 312
LogPerformance • 353
M
Maintenance • 39
Making Control Panel Applets (CPL files) available as applications • 138, 284
Managed Applications • 72, 280
Security section • 281
Managed Applications License Metering • 276
Management • 313
Manual Configuration • 26
Memory Optimization • 303, 309
Merge vs. overwrite • 314
MessageDefaultPrinter • 130
Methods • 77
Microsoft App-V • 232
Microsoft App-V applications • 215
Microsoft Remote Assistance • 265
Microsoft System Center • 238
Microsoft System Center Configuration Manager Software Distributions • 174
Microsoft TS RemoteApp • 266
Migration settings when switching to another Zero Profile mode • 203
MLS • 130
MSLimitOnProcIDs • 354
Multicore machines and hyperthreading CPUs • 306
Multiple Rules for a Zone • 87
N
NetguardDump • 134
Network Connections security • 298
Network Security Log • 388
Network Security Modes
disabled, learning, enabled • 299
NoAgentScreenSaver • 354
NoAppguard • 124
Nodes excluded from filtering • 271
NoFullScreenKiosk • 355
NoListConcurrentUsers • 355
NoNetGuard • 132
NoPrecedingSlashInPNFolder • 355
NoRecordLimit • 134
NoScreensaver • 135
Notifications • 112
NotifyDefaultPrinterChange • 133
Novell Directory Services • 75
NoVistaAppguard • 124
O
Obtain hashed version of Environment password • 382
OnTop • 131
Order of processing • 327
OutlookNoOpenDialog • 133
OutlookNotificationCheck • 356
Override local caching • 213
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
399
P
Pattern matching in Zones • 88
Performance • 303
Performance Monitor • 66
Permissions • 262
PIDoNotSetEnvVars • 356
PMWAutoAllowFolders • 358
PowerHelp • 136
PowerPrintView • 133
Prerequisites • 16, 160
PreviousPrinter • 133
Printer • 132
Printers • 162
Printing Preferences • 122
Process Building Blocks and Custom Resources in batches • 382
Process interception for unmanaged shortcuts • 92, 94
Properties • 99
ProtectLocalCache • 358
Publishing Citrix XenApp applications manually • 228
Publishing Managed Applications • 225
Pwrgate • 377
PwrGateAppId • 357
PwrGateFileMapping • 357
Pwrgatekeepalive • 387
Pwrgatesleep • 357
Pwrtech • 378
Q
QuickLaunch and QuickLaunchMandatory • 126
R
Read-Only Blanketing • 293
Read-Only Blanketing security Modes
disabled, learning, enabled • 293
RefreshAllMappedDrives • 359
RefreshInterval • 134
Registry settings • 334
Registry settings for Relay Servers • 372
Relay Server Local cache • 65
Relay Server Service • 65
Relay Servers • 62
Removable Disks security • 290
Removable Disks security modes
disabled, learning, enabled • 290
RemoveObsoleteLogFiles • 376
RemoveStartmenuPinlist • 359
Replacing command lines • 257
Republish a published application • 386
RES HyperDrive • 242
RES ONE Automation • 240, 264
RES ONE Service Store • 241
RES ONE Workspace Applications for end users • 121
RES ONE Workspace modules • 31, 50, 60
RES ONE Workspace Relay Servers • 8
RES Software • 240
RES Software Support • 2
RES Software Training • 1
RES VDX • 244
RestoreMappingsAtLogoff • 360
400
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
RSConnectTimeout • 376
RunCPUShld • 360
RunHistory • 132
RunWMSync • 361
S
Sampling • 209
Save printing preference • 212
Scalability and performance • 13
SCCMDelayBeforeRunningProgram • 362
Scope Control • 262
Screensaver • 192
Security • 279
Security Method
Whitelisting or Blacklisting • 299
Selecting RES ONE Workspace modules • 50, 54
Server-based Computing • 27
SessionCheckInterval • 362
Setprint • 387
Setting Memory Optimization limits • 310
Setting up Alerting • 264
Setting up Instant Passthrough for Citrix XenApp published applications • 193, 220, 223, 225
Setting up Instant Passthrough for TS RemoteApp applications • 268
Setting up Microsoft App-V applications • 233
Setting up Microsoft TS RemoteApp applications • 267
Setting up Remote Assistance • 265
Setting up the Datastore • 29
Setting up Usage Tracking • 272
Settings • 106, 282
Settings tab • 91
Shell • 181
Shortcuts • 102
ShowAllApplication • 127
ShowAllOndesktop • 125
ShowEmptyDates • 135
ShowFullOUName • 135
ShowOUinReports • 135
ShowSearchFieldAlways • 363
SilentRefresh • 363
SkipCloseWFShell • 364
SkipCLSID • 364
SkipDSWhenOffline • 365
SkipFullNames • 365
SmallIcons • 129
Solving a Console lockout • 263
SpecialFoldersFromRegistry • 366
Specifying a different application icon, Outlook signature or Registry setting • 318
Specifying a different desktop background image • 319
Specifying a different Policy settings file • 319
Specifying a different screensaver image • 319
Start Menu tab • 90
StartHiddenPexplorer • 366
Starting a Remote Assistance session • 265
Startup • 128
StartWithShortCut • 366
Storage method • 205
Storage of users' User Setting data • 205
Subnet Masks • 300
SuppressShowDesktopButton • 367
SuppressUnknownRequestMessage • 367
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
401
SwapMouse • 129
T
Technical Manager • 262
The location of Desktop shortcuts • 256
The Microsoft Windows Shell • 255, 258, 259
The order of events at a session refresh • 251
The order of events when a session ends • 252
The order of events when a session starts • 248
The Quick Launch bar • 257
The RES ONE Workspace Agent Cache • 12
The RES ONE Workspace Agent Service and its sub processes • 11
The RES ONE Workspace Agents • 6
The RES ONE Workspace Console • 5
The RES ONE Workspace Datastore • 6
The RES ONE Workspace Shell • 255, 258, 259
The RES Workspace Composer • 9
The Shell and the setting 'Windows Shell shortcut creation' • 254, 258, 259
The start menu • 256
The structure of Building Blocks • 317
The Usage Tracking Viewer • 273
TimeoutScrnSaver • 131
Toggle Remove • 170
Tracing • 368
Track any changed setting within scope immediately (global) • 200
Track any setting changed by application immediately (application) • 201
Tracking & Reporting • 272
Troubleshooting Relay Servers • 65
U
Unattended Installation • 19, 20, 52
Usage Tracking • 272
Usage Tracking Viewer • 121
UseClassicLogoff • 369
UseMsgBox • 369
UseOnlyComputerNameForShadow • 370
User Context • 73
User Installed Applications • 285
User Registry • 166, 199
User Sessions • 274
User Sessions security • 296
User Settings • 193, 215
User Settings Caching • 206, 208
Using Locations and Devices for Printers • 165
Using User Home Directory Maintenance to change Pwruser.ini • 123
Using Workspace Containers to configure exceptions to the global settings of a feature • 327
Using Workspace Control to create different configurations for an application or the user session •
324
V
Variables and special folders • 200, 202, 214
VDX Licensing • 57
VMware ThinApp Integration • 236
W
WaitBeforeStart • 370
WaitForUpdatedCache • 371
Web Portal • 246
Websites • 287
402
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
What happens at session logoff • 258
What happens at session logon • 255, 258, 259
What happens at session refresh • 259
What is saved as part of a Targeted Item • 204
Where to find Access Balancing • 303
Where to find Access Control • 79
Where to find Administrative Roles • 261
Where to find Agents • 45
Where to find Alerting • 264
Where to find Applications • 90
Where to find Authorized Files • 294
Where to find Automation Tasks • 176
Where to find Building Blocks in the RES ONE Workspace Console • 313
Where to find Citrix XenApp Publishing • 217
Where to find Citrix XenApp Streaming • 230
Where to find Connection States • 77
Where to find CPU Optimization • 305
Where to find Desktop • 181
Where to find Directory Maintenance • 149
Where to find Directory Services • 73
Where to find Drive and Port Mappings • 152
Where to find Drive Substitutes • 156
Where to find Dynamic Datastore Configuration • 43
Where to find Environment Variables • 178
Where to find Errors • 278
Where to find Execute Command • 172
Where to find Files and Folders security • 292
Where to find Filtering • 269
Where to find Folder Synchronization • 160
Where to find Instant LogOff • 307
Where to find Instant Reports • 320
Where to find languages • 78
Where to find License Metering • 277
Where to find Licensing • 51
Where to find Linked Actions • 180
Where to find Managed Applications security • 280
Where to find Memory Optimization • 309
Where to find Microsoft App-V • 232
Where to find Microsoft Remote Assistance • 265
Where to find Microsoft TS RemoteApp • 266
Where to find Network Connections Security • 298
Where to find PowerHelp • 136
Where to find Printers • 162
Where to find Printing Preferences • 122
Where to find Read-Only Blanketing • 293
Where to find Relay Servers • 62
Where to find Removable Disks security • 290
Where to find RES HyperDrive • 242
Where to find RES ONE Automation • 240
Where to find RES ONE Service Store • 241
Where to find Shell Configuration • 26
Where to find the Access Wizard • 121
Where to find the Audit Trail • 260
Where to find the Datastore • 30
Where to find the Workspace Model Overview • 277
Where to find Usage Tracking • 121, 272
Where to find User Installed Applications • 285
Where to find User Registry • 166
Where to find User Sessions • 274
Where to find User Sessions security • 296
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.
403
Where to find User Settings in the RES ONE Workspace Console • 194
Where to find Websites • 287
Where to find Workspace Analysis • 328
Where to find Workspace Branding • 278
Where to find Workspace Containers • 322
Where to find Workspace Extensions • 119
Where to find Workspace Preferences • 123
Where to find Zones • 81
Which shortcuts are shown on the Desktop • 256
Whitelisting • 301
Windows Shell shortcut creation
‘do nothing’ • 255, 258, 259
‘merge’ • 255, 257
‘merge’ • 258
‘merge’ • 258
‘merge’ • 259
‘merge’ • 259
‘replace’ • 255, 256
‘replace’ • 259
‘replace’ • 259
'replace' • 258
Workspace Analysis • 328
Workspace Branding • 278
Workspace Containers • 322
Workspace Designer • 71
Workspace Extensions • 115, 119
Workspace Model • 72
Workspace Model Overview • 277
Workspace Preferences • 123
Workspace Simulation Wizard • 332
Z
Zero Profile Modes • 194
Zone Members
Nested Zones • 87
Zone rules • 81
404
Copyright © 1998-2016 Real Enterprise Solutions Nederland B.V. All rights reserved.