Chapter 5. Security Guidance for Citrix XenApp Server

Solutions in this chapter:

▪ Deployment Considerations
▪ Maintaining Software Integrity
▪ Configuring XenApp Components
▪ Securing Your XenApp Farm
▪ Securing the Data Store
▪ Monitoring Your XenApp Farm
Summary
Solutions Fast Track
Frequently Asked Questions

Introduction

Whenever you're connecting a computer to the Internet, that computer is open to sabotage. Worms and viruses can destroy entire systems, from the operating system right down to the hardware. Intruders can access servers on the Internet and obtain the passwords for administrative functions, using them later to wreak havoc on the system. Bored or unskilled programming students, also known as script kiddies, can download complex scripts ...

Get Securing Citrix XenApp Server in the Enterprise now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.