Scenario: A Citrix Engineer is reviewing the log files for a protected application. The engineer discovers a lot of errors pertaining to invalid data being supplied by
users.
Which protection can the engineer implement at the Citrix Web App Firewall to reduce these errors?
Submit