![]() ![]() While we continue to identify and address them, we cannot guarantee full protection in specific configurations and deployments.Ĭitrix App Protection policies work effectively with underlying operating system components, including ICA files. However, as operating systems evolve, new ways of capturing screens and logging keys can emerge. Doing so means that App Protection policies can provide protection even against custom and purpose-built hacker tools. On the App Protection page, you can enable Anti-keylogging and Anti-screen capturing.Īfter purchasing this feature, ensure you enable the App Protection license.Īpp Protection policies work by filtering access to required functions of the underlying operating system (specific API calls required to capture screens or keyboard presses). Select a group and then select Edit in the action bar. To choose an App Protection method for a delivery group, follow these steps: To enable XML trust, go to Settings > Enable XML trust. To configure App Protection through Web Studio, follow these steps:Īpp protection requires XML trust. You configure the policies through PowerShell and through Web Studio. To take screenshots using the print screen button, minimize any protected apps. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |