Scenario: When reviewing the activity logs for a web application, a Citrix Engineer notices a high number of requests for the page, /setup.aspx. Further investigation reveals that most of these requests originated from outside the network. Which protection can the engineer implement to prevent this?
Gracia
2 months agoTony
2 months agoDawne
10 days agoMalissa
13 days agoKenneth
30 days agoOzell
1 months agoAlita
2 months agoJani
2 months agoOrville
1 months agoChristene
2 months agoMagda
2 months agoTegan
3 months agoOctavio
3 months agoShelton
3 months ago