Scenario: When reviewing the activity logs for a web application, a Citrix Engineer notices a high number of requests for the page, /setup.aspx. Further investigation reveals that most of these requests originated from outside the network. Which protection can the engineer implement to prevent this?
Gracia
21 days agoTony
23 days agoAlita
1 months agoJani
1 months agoChristene
8 days agoMagda
21 days agoTegan
2 months agoOctavio
2 months agoShelton
2 months ago