Improve company productivity with a Business Account.Sign Up

x
?
Solved

Citrix Proxy

Posted on 2008-06-18
4
Medium Priority
?
563 Views
Last Modified: 2012-05-05
Hi, I have a network set up using Citrix. I want to run a proxy server. What I want is an easily configurable proxy that can set different access rights for different Citrix users and monitor in all user activity in a log file that will show me what sites etc each citrix user has been to visit and when. Does anybody have any suggestions - I have already began the set up using dansguardian and squid though I have not really got the time to investigate how to integrate this system with citrix, perhaps there is a solution I can buy that is easier to set up?
0
Comment
Question by:xrayroom
  • 3
4 Comments
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 21811837
Sophos has a great proxy product that can do exactly what your wanting, and in addition it does virus scanning and malware detection, much like DansGuardian or SafeSquid + ClamAV.
ccProxy is a cheaper but lacks AV/Malware protection, but works well: http://www.youngzsoft.net/ccproxy/accmgr.htm Squid is great, but it's a lot more work than most others.
-rich
0
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 21811850
I've not used ISA, but M$ has a proxy product, http://www.microsoft.com/isaserver/default.mspx
-rich
0
 

Author Comment

by:xrayroom
ID: 21872796
I have CCProxy - It will detect other machines on the network. It detects my citrix server as a  user, is it possible to detect the individual usernames and passwords that are logged on to citrix from individual thin clients?
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 750 total points
ID: 21873586
You have to use Socks 5 proxy settings if you want users to auth as individuals
http://www.youngzsoft.net/ccproxy/client-others.html
http://www.youngzsoft.net/ccproxy/accmgr.htm
-rich
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Cloud computing is a model of provisioning IT services. By combining many servers into one large pool and providing virtual machines from that resource pool, it provides IT services that let customers acquire resources at any time and get rid of the…
A discussion about Penetration Testing and the Tools used to help achieve this important task.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…

608 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question