From Citrix PVS to Azure Virtual Desktop: A Deep Dive Migration Blueprint for Architects

Enterprises currently operating Citrix XenDesktop with Provisioning Services (PVS) on Windows Server are increasingly transitioning to Azure Virtual Desktop (AVD). This shift is driven by the need to streamline operations, modernise identity and security, benefit from elastic, cloud-scale delivery and consolidate license. This comprehensive guide presents an architect-level blueprint, detailing the target architecture, landing zone and identity setup, image conversion process, FSLogix profile strategy, networking and security design, cutover planning, and steady-state operations. Included are step-by-step instructions, runbooks, and guardrails to ensure a successful migration.

1) Baseline: Current Citrix XenDesktop + PVS

Typical components and roles within the existing Citrix XenDesktop and PVS environment include:

Operational Considerations

Key operational aspects in the Citrix environment should be carefully reviewed ahead of migration. This include applications landscape, performance metrics like resource utilisation, load index, disk latency, etc.

2) Target State: AVD Reference Architecture

The recommended Azure Virtual Desktop architecture includes several core building blocks:

Diagram Description

A hub-and-spoke topology is recommended, with AVD session hosts located in a spoke virtual network. Private Endpoints connect to Azure Files/ANF, a central firewall is deployed in the hub, and the management plane (bastion/automation) resides in a separate spoke. Peering to on-premises is facilitated via VPN or ExpressRoute.

3) Migration Prerequisites & Readiness
4) Migration Methodology (End‑to‑End)
Phase 0 – Assessment & Planning
  1. Estate Inventory: Document Delivery Controllers, StoreFront, License Server, PVS, SQL, catalogues, delivery groups, vDisk, and VDA versions.
  2. Application Rationalisation: Decide between RemoteApps and full desktops; assess compatibility with multi-session; plan packaging and installation approach.
  3. Persona Mapping: Identify task, knowledge, and engineering cohorts; establish concurrency and session density assumptions.
  4. Profile Strategy: Map UPM/Roaming profiles to FSLogix Profile and Office containers; select appropriate storage class and region pair.
  5. Security Posture: Review Conditional Access, MFA, device compliance, and RBAC model.
  6. Test Plan: Define user cohorts, acceptance criteria, and rollback procedures.
Phase 1- Landing Zone & Hybrid Identity
Landing Zone
Hybrid Identity
Phase 2 – Image Conversion & Engineering (From PVS to AVD)

Objective: Transition PVS-based Windows 10/11 vDisk to a cloud-ready golden image for AVD.

Detailed Steps
  1. Export/Convert vDisk to VHD/VHDX format suitable for Azure deployment.
  2. Remove Citrix agents/components from the image, including:
    • PVS Target Device
    • Citrix VDA
    • Citrix-specific optimisations, services, and drivers
  3. Install AVD stack:
  4. AVD Agent & Agent Bootloader
  5. FSLogix
  6. Endpoint protection and platform agents (such as Defender and monitoring tools)
  7. Optimise Windows for multi-session usage, including adjustments to scheduled tasks, services, search indexer, delivery optimisation, and antivirus exclusions for FSLogix paths.
  8. Generalise and capture the image using Sysprep if required; upload the VHD to storage; create a Managed Image; publish to Azure Image Gallery with versioning.
  9. Governance: Tag images with environment, owner, and version information; maintain a promotion workflow from Development to UAT to Production; implement change control for image updates.

Example: key FSLogix settings baked into the image (also can be enforce via GPO or Intune Config Profile):

[HKEY_LOCAL_MACHINE\SOFTWARE\FSLogix\Profiles]

“Enabled”=dword:00000001

“DeleteLocalProfileWhenVHDShouldApply”=dword:00000001

“VHDLocations”=”\\<fileshare>\profiles”

“VolumeType”=”vhdx”

“IsDynamic”=dword:00000001

“ConcurrentUserSessions”=dword:00000001


Phase 3 – Host Pools, Application Delivery, and Autoscaling
Hostpools

Host pools play a central role in the deployment, offering flexibility for different user and workload requirements. There are two main types of host pools:

Scaling

To optimise resources, a scaling plan is defined. This plan aligns with business hours and concurrency patterns, specifying minimum and maximum hosts, ramp‑up and ramp‑down schedules, and hibernation or stopping during off‑hours.

Application Delivery
Phase 4 – User Profiles & Data (FSLogix)
Storage Choices
Network & Security
Permissions
Migration Approach
  1. Identify UPM, Roaming, and Local profiles that need to be migrated.
  2. Pre‑create user folders or allow FSLogix to create them upon first logon.
  3. Use Robocopy or scripted copy methods to seed user data, preserving Access Control Lists (ACLs).
  4. Pilot attachment, OST handling, and caches for Teams/OneDrive, as well as exclusions, are validated during migration.
Robocopy Example

The following command provides a sample for migrating profile data using Robocopy:

robocopy “\\oldfile\profiles” “\\newfiles\profiles” /E /COPYALL /R:1 /W:1 /MT:32 /NFL /NDL /LOG:C:\Temp\profiles_migration.log

Phase 5 — Testing, UAT, and Optimisation
Pre‑Migration Validation
Pilot
Phase 6 – Production Cutover & Decommission
Approach
Decommission (Post‑Acceptance)
Networking & Security Design
Network Topology
Security Guardrails
Monitoring, Observability, and Disaster Recovery
Monitoring & Logging
Backup & Disaster Recovery
Governance, Change, and Runbooks
Common Pitfalls and How to Avoid Them
  1. Treating AVD like Citrix: Misapplying Citrix paradigms can lead to suboptimal outcomes.
  2. Under‑sizing profile storage: Insufficient storage allocation may impact performance and user experience.
  3. Skipping Private Endpoints: Omitting these increases exposure to security risks.
  4. Neglecting persona‑based UAT: Failing to test with representative user types can result in oversights.
  5. Missing rollback runbook: Lack of documented procedures for rollback hinders rapid recovery from issues.
Cutover Checklist (Field‑Ready)
Azure Ready
Image Ready
Profiles Ready
Operations Ready
Migration
Decommission
Conclusion

Transitioning from Citrix PVS to Azure Virtual Desktop is a strategic move towards modernisation, rather than a simple lift‑and‑shift. By adopting cloud‑native image management, FSLogix for consistent user profiles, Zero Trust security guardrails, and observability from the outset, operational overhead is reduced and a stable, measurable user experience is delivered at enterprise scale. The detailed approach outlined above provides a prescriptive, field‑tested blueprint, ready for adaptation to your organisation’s standards.

About the Blog

The Modern Endpoints Brief is a personal, practitioner-led blog focused on the real-world challenges and opportunities of managing modern endpoints and digital workspaces. It covers insights, strategies, and notes from the field on topics such as endpoint management, device security, identity, automation, and user experience across today’s hybrid and cloud-first environments.

Written for IT professionals, the blog blends practical guidance with architectural thinking cutting through vendor noise to share what actually works, what doesn’t, and why. The goal is to provide clear, experience-driven perspectives that help IT teams design, operate, and evolve modern endpoint platforms with confidence.

Newsletter

Subscribe to my email newsletter full of inspiring stories about my journey that continues.