Book description
Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it's running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious hackers. To compromise a server running Citrix Presentation Server, a hacker need not penetrate a heavily defended corporate or government server. They can simply compromise the far more vulnerable laptop, remote office, or home office of any computer connected to that server by Citrix Presentation Server.All of this makes Citrix Presentation Server a high-value target for malicious hackers. And although it is a high-value target, Citrix Presentation Servers and remote workstations are often relatively easily hacked, because they are often times deployed by overworked system administrators who haven't even configured the most basic security features offered by Citrix. "The problem, in other words, isn't a lack of options for securing Citrix instances; the problem is that administrators aren't using them." (eWeek, October 2007). In support of this assertion Security researcher Petko D. Petkov, aka "pdp", said in an Oct. 4 posting that his recent testing of Citrix gateways led him to "tons" of "wide-open" Citrix instances, including 10 on government domains and four on military domains.
- The most comprehensive book published for system administrators providing step-by-step instructions for a secure Citrix Presentation Server
- Special chapter by Security researcher Petko D. Petkov'aka "pdp detailing tactics used by malicious hackers to compromise Citrix Presentation Servers
- Companion Web site contains custom Citrix scripts for administrators to install, configure, and troubleshoot Citrix Presentation Server
Table of contents
- Cover image
- Table of Contents
- Technical Editor
- Contributors
- Chapter 1. Introduction to Security
- Chapter 2. Security Guidance for Operating Systems and Terminal Services
- Chapter 3. Terminal Services and XenApp Server Deployment
- Chapter 4. Understanding XenApp Security
- Chapter 5. Security Guidance for Citrix XenApp Server
- Chapter 6. Policies and Procedures for Securing XenApp
- Chapter 7. Locking Down Your XenApp Server
- Chapter 8. Security Guidance for ICA and Network Connections
- Chapter 9. Securing Access to XenApp Using Citrix Secure Gateway
- Chapter 10. Auditing and Security Incidents
- Index
Product information
- Title: Securing Citrix XenApp Server in the Enterprise
- Author(s):
- Release date: August 2008
- Publisher(s): Syngress
- ISBN: 9780080569987
You might also like
book
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in …
book
Practical Embedded Security
The great strides made over the past decade in the complexity and network functionality of embedded …
book
Official (ISC)2 Guide to the CSSLP CBK, 2nd Edition
Application vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue …
book
Official (ISC)2 Guide to the CSSLP
As the global leader in information security education and certification, (ISC)2 has a proven track record …