Solved

Citrix Proxy

Posted on 2008-06-18
4
554 Views
Last Modified: 2012-05-05
Hi, I have a network set up using Citrix. I want to run a proxy server. What I want is an easily configurable proxy that can set different access rights for different Citrix users and monitor in all user activity in a log file that will show me what sites etc each citrix user has been to visit and when. Does anybody have any suggestions - I have already began the set up using dansguardian and squid though I have not really got the time to investigate how to integrate this system with citrix, perhaps there is a solution I can buy that is easier to set up?
0
Comment
Question by:xrayroom
  • 3
4 Comments
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 21811837
Sophos has a great proxy product that can do exactly what your wanting, and in addition it does virus scanning and malware detection, much like DansGuardian or SafeSquid + ClamAV.
ccProxy is a cheaper but lacks AV/Malware protection, but works well: http://www.youngzsoft.net/ccproxy/accmgr.htm Squid is great, but it's a lot more work than most others.
-rich
0
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 21811850
I've not used ISA, but M$ has a proxy product, http://www.microsoft.com/isaserver/default.mspx
-rich
0
 

Author Comment

by:xrayroom
ID: 21872796
I have CCProxy - It will detect other machines on the network. It detects my citrix server as a  user, is it possible to detect the individual usernames and passwords that are logged on to citrix from individual thin clients?
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 250 total points
ID: 21873586
You have to use Socks 5 proxy settings if you want users to auth as individuals
http://www.youngzsoft.net/ccproxy/client-others.html
http://www.youngzsoft.net/ccproxy/accmgr.htm
-rich
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
Smart phones, smart watches, Bluetooth-connected devices—the IoT is all around us. In this article, we take a look at the security implications of our highly connected world.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question