Scenario: When reviewing the activity logs for a web application, a Citrix Engineer notices a high number of requests for the page, /setup.aspx. Further investigation reveals that most of these requests originated from outside the network. Which protection can the engineer implement to prevent this?
Gracia
13 days agoTony
15 days agoAlita
26 days agoJani
28 days agoMagda
13 days agoTegan
2 months agoOctavio
2 months agoShelton
2 months ago