Chapter 5. Security Guidance for Citrix XenApp Server
Solutions in this chapter:
▪ Deployment Considerations
▪ Maintaining Software Integrity
▪ Configuring XenApp Components
▪ Securing Your XenApp Farm
▪ Securing the Data Store
▪ Monitoring Your XenApp Farm
Summary
Solutions Fast Track
Frequently Asked Questions
Introduction
Whenever you're connecting a computer to the Internet, that computer is open to sabotage. Worms and viruses can destroy entire systems, from the operating system right down to the hardware. Intruders can access servers on the Internet and obtain the passwords for administrative functions, using them later to wreak havoc on the system. Bored or unskilled programming students, also known as
script kiddies, can download complex scripts ...
Get Securing Citrix XenApp Server in the Enterprise now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.