If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.
|ICACLS "No mapping between account names and security IDs was done"||12||140|
|How to detect attacks on AWS (ie shimming, Blue Pill, Hyper jumping, etc)||2||66|
|Block file sharing site (Dropbox, Google Drive) for only some users||10||32|
|Malware infection with local user rights?||6||34|