Scenario: When reviewing the activity logs for a web application, a Citrix Engineer notices a high number of requests for the page, /setup.aspx. Further investigation reveals that most of these requests originated from outside the network. Which protection can the engineer implement to prevent this?
Michel
5 months agoMargart
5 months agoAlbert
5 months agoJuliann
5 months agoBrock
6 months agoMeaghan
6 months agoSantos
6 months agoDortha
6 months agoDaron
6 months agoAlaine
6 months agoGeorgene
6 months agoDell
6 months agoCharlene
6 months agoMarguerita
7 months agoGracia
11 months agoTony
11 months agoDawne
9 months agoMalissa
10 months agoKenneth
10 months agoOzell
10 months agoAlita
11 months agoJani
12 months agoOrville
10 months agoChristene
11 months agoMagda
11 months agoTegan
1 year agoOctavio
1 year agoShelton
1 year ago