A Citrix Engineer is reviewing the log files for a sensitive web application and notices that someone accessed the application using the engineer's credentials while the engineer was out of the office for an extended period of time.
Which production can the engineer implement to protect against this vulnerability?
Currently there are no comments in this discussion, be the first to comment!