Citrix Secure Access client now supports single sign-on for the Workspace URL when already logged in via Citrix Workspace app.
Citrix Session Recording service allows you to install Session Recording servers from within the cloud and allocate sites to the servers.
When you create a catalog to provision machines using Machine Creation Services (MCS) in Google Cloud, you can now use MachineProfile property to capture hardware properties from a virtual machine and apply them to newly provisioned VMs in the catalog.
Auto-tagging allows administrators to set and remove tags on various DaaS objects automatically, based on custom rules. This eliminates the need to maintain different scripts that run periodically for environment optimization.
When you create a catalog in Azure environment, you can now specify the page file setting, including the location and size, explicitly using the PoSH command. This will override the value determined by MCS.
In Azure environments, this feature tags catalog resources using ProvSchemeID for resources created for a particular catalog
In Full Configuration, when you create a catalog, an Azure Active Directory joined identity type is now available in Machine Identities. With that identity type, you can use MCS to create machines that are joined to Azure Active Directory. You also have an extra option, Enroll the machines in Microsoft Intune, to enroll the machines in Microsoft Intune for management.
Using Full Configuration, you can choose the Linux OS license type when creating Linux VM catalogs. You have two choices for bring-your-own Linux licenses: RHEL_BYOS and SLES_BYOS. The setting defaults to Azure Linux licensing.
Access assurance dashboard - Logon Network
The Logon Network section is newly added and provides the following user details:
The organizations associated with the IP addresses from which the users have logged on.
The total unique public subnet and private subnet from where the users have logged on.
The details that the user has logged on using proxies and private VPN services.
Using these additional details, an administrator can validate the user logon details and ensure that the user logon is within the security expectation of the organization.
For more details, see Access Assurance Dashboard.