Server Security in a Citrix Presentation/Terminal Server Environment
This document serves to discuss the special security needs of this environment, and to recommend strategies for its implementation. There will is a Security Checklist to summarise the strategies and recommendations made in this document. As is the case with all security strategies, planning is the...