Overview of Citrix Isolation Options
AdminStudio 2025 | 29.0 | Citrix Assistant
The Citrix XenApp uses isolation environments to control application compatibility and accessibility. The isolation option that is assigned to a file, folder or registry key specifies how the isolation environment will provide access to system resources requested by the application.
The default settings for isolation environments are set on the Citrix XenApp, and those defaults are adequate for most environments. However, in the Citrix Assistant, you can override the default settings for selected files, folders, or registry keys to exert control over application interactions with client operating system resources.
You set isolation options on the Isolation Options dialog box, which is opened by selecting Isolation Options on the context menu when you have a file or folder selected on the Profile Files page or a registry key selected on the Profile Registry page.
On the Isolation Options dialog box, you can choose one of the following isolation options:
Option |
Description |
||||||||||||
Select this option if you want the default isolation option for this file/folder/registry key as defined on the Citrix XenApp to be applied to this selection. This is the default selection for all files, folders, and registry keys. Caution:You should select this option unless you require specific custom handling. |
|||||||||||||
Choose the Ignore option to direct the isolation environment to always use the copy of this selected file/folder/registry key that is on the system, not the one inside the isolation environment. Choosing this option gives the isolation environment direct access to the same location on the system that a non-isolated version of this application would have. By assigning the Ignore isolation option, you are creating a “hole” in the isolation environment to allow an application to write to the underlying system. For example, you would select Ignore in the following situations:
|
|||||||||||||
Choose the Isolate option to direct the isolation environment to first try to find the copy of this file/folder/registry key that is inside the isolation environment. If the item is not found there, then the isolation environment will use the copy of this file/folder/registry key that is on the system. Selecting Isolate ensures that the isolation environment is not given direct write access to the specified system resource. |
|||||||||||||
Choose the Strictly Isolate option to direct the isolation environment to always use the copy of this file/folder/registry key that is in the isolation environment, not on the system. This is useful when running two versions of an application on the same machine. |
|||||||||||||
Choose the Redirect option to redirect a request by the isolation environment for a file/folder/registry key to a specified location on the system (without first searching the user profile root and installation root locations). When selecting this option, you also need to select the location that the isolation environment should redirect to:
|