Securing Citrix XenApp Server in the Enterprise - 1st Edition - ISBN: 9781597492812, 9780080569987

Securing Citrix XenApp Server in the Enterprise

1st Edition

Authors: Tariq Azad
eBook ISBN: 9780080569987
Paperback ISBN: 9781597492812
Imprint: Syngress
Published Date: 24th June 2008
Page Count: 528
Sales tax will be calculated at check-out Price includes VAT/GST
Price includes VAT/GST
× DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.


Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it's running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious hackers. To compromise a server running Citrix Presentation Server, a hacker need not penetrate a heavily defended corporate or government server. They can simply compromise the far more vulnerable laptop, remote office, or home office of any computer connected to that server by Citrix Presentation Server. All of this makes Citrix Presentation Server a high-value target for malicious hackers. And although it is a high-value target, Citrix Presentation Servers and remote workstations are often relatively easily hacked, because they are often times deployed by overworked system administrators who haven't even configured the most basic security features offered by Citrix. "The problem, in other words, isn't a lack of options for securing Citrix instances; the problem is that administrators aren't using them." (eWeek, October 2007). In support of this assertion Security researcher Petko D. Petkov, aka "pdp", said in an Oct. 4 posting that his recent testing of Citrix gateways led him to "tons" of "wide-open" Citrix instances, including 10 on government domains and four on military domains.

Key Features

  • The most comprehensive book published for system administrators providing step-by-step instructions for a secure Citrix Presentation Server.
  • Special chapter by Security researcher Petko D. Petkov'aka "pdp detailing tactics used by malicious hackers to compromise Citrix Presentation Servers.
  • Companion Web site contains custom Citrix scripts for administrators to install, configure, and troubleshoot Citrix Presentation Server.


Security professionals, system administrators, and consultants worldwide who are responsible for securely deploying Citrix presentation server in corporate or government networks.

Table of Contents

1: Advanced Encryption Standard Support; 2: Citrix Password Manager; 3: Security Considerations in a Citrix Presentation Server Deployment; 4 FIPS 140 and Citrix Presentation; 5 Kerberos Authentication; 6 Citrix Presentation Server Clients; 7 Virtual Channels; 8: Additional Citrix Presentation Server Security Features 9: Deploying SSL Relay; 10: Deploying Secure Gateway; 11: Using Secure Gateway (Double-Hop); 12: Using SSL Relay and the Web Interface.


No. of pages:
© Syngress 2008
eBook ISBN:
Paperback ISBN:

About the Author

Tariq Azad

Affiliations and Expertise

Citrix Certified Instructor and Citrix Certified Enterprise Administrator

Ratings and Reviews