Scenario: When reviewing the activity lags for a web application, a Citrix Engineer notices a high number of requests for the page, /setup.aspx. Further investigation reveals that most of these requests originated from outside the network.
Which protection can the engineer implement to prevent this?