Scenario: When reviewing the activity logs for a web application, a Citrix Engineer notices a high number of requests for the page, /setup.aspx. Further investigation reveals that most of these requests originated from outside the network. Which protection can the engineer implement to prevent this?
Michel
3 months agoMargart
3 months agoAlbert
4 months agoJuliann
4 months agoBrock
4 months agoMeaghan
4 months agoSantos
4 months agoDortha
5 months agoDaron
5 months agoAlaine
5 months agoGeorgene
5 months agoDell
5 months agoCharlene
5 months agoMarguerita
5 months agoGracia
9 months agoTony
10 months agoDawne
8 months agoMalissa
8 months agoKenneth
9 months agoOzell
9 months agoAlita
10 months agoJani
10 months agoOrville
9 months agoChristene
9 months agoMagda
9 months agoTegan
11 months agoOctavio
11 months agoShelton
11 months ago