Citrix Cloud Services Data Protection Overview

1y ago
24 Views
2 Downloads
684.27 KB
22 Pages
Last View : 18d ago
Last Download : 3m ago
Upload by : Kelvin Chao
Transcription

White PaperCitrix Cloud ServicesData ProtectionOverviewMarch 2022Enterprise SalesNorth America 800-424-8749Worldwide 1 408-790-8000LocationsCorporate Headquarters 851 Cypress Creek Road, Fort Lauderdale, FL 33309, United StatesSilicon Valley 4988 Great America Parkway, Santa Clara, CA 95054, United States 2020 Citrix Systems, Inc. All rights reserved. Citrix, the Citrix logo, and other marks appearing herein are property of CitrixSystems, Inc. and/or one or more of its subsidiaries, and may be registered with the U.S. Patent and Trademark Office and inother countries. All other marks are the property of their respective owner(s).

ContentsINTRODUCTION . 3CITRIX CLOUD SERVICES COVERED . 3CATEGORIES OF DATA PROCESSED . 3DATA ACCESS . 4GEOGRAPHIC OPTIONS . 6SECURITY . 8PRIVACY . 9DATA RETENTION AND DELETION . 10CERTIFICATIONS . 10APPENDIX A: CITRIX CLOUD PLATFORM DATA COLLECTION . 12APPENDIX B: CITRIX VIRTUAL APPS AND DESKTOPS (CVAD) DATACOLLECTION . 14APPENDIX C: CITRIX ENDPOINT MANAGEMENT (CEM) DATA COLLECTION. 19

Citrix Data Protection OverviewIntroductionCitrix understands that data protection is one of the top priorities for our customers when selecting a cloudservice. Data protection is also a rapidly evolving domain and requires enterprises to assess moreinformation over time about the data handling practices of their vendors.Citrix has created this document to help provide our customers an overview of Citrix Cloud Services dataprotection practices. It is organized around the following topics: What types of data Cloud services processWho has access to itWhat regional controls you haveHow data is securedWhat privacy controls are appliedWhat third party certifications are in placeHow data is deleted upon service terminationIn short, our goal is to provide the information you need to gain a better understanding of the controls wehave implemented in Citrix Cloud Services and an access point for more detailed Citrix Cloud Servicedocumentation.Citrix Cloud Services CoveredThis document covers the data protection practices for the following: Citrix WorkspaceCitrix Virtual Apps and Desktops ServiceCitrix Virtual Apps and Desktops for Azure (formerly Managed Desktops)Citrix Virtual Apps and Desktops Service for Google CloudCitrix Endpoint ManagementCitrix Content CollaborationCitrix Analytics ServiceCitrix Intelligent Traffic ManagementCitrix Application Delivery ManagementCitrix App Delivery and Security ServiceCitrix Secure Private AccessFor a more detailed description of the Cloud Services and the related legal terms and conditions,customers should refer to their master agreement and applicable Cloud Services order documentation(collectively the “Agreement”) as well as online service descriptions and/or product documentation.Categories of Data ProcessedDuring the performance of services, different types of data are processed by our Cloud Services. For ourdata handling practices, we classify this data into two categories: customer content and logs.3

Citrix Data Protection Overview4Customer ContentCustomer Content means any data uploaded to the customer’s account for storage or data in thecustomer’s computing environment to which Citrix is provided access in order to perform the Services.LogsLogs include records of Services, including, but not limited to: Data and information on performance, stability, usage, security, supportTechnical information about devices, systems, related software, services or peripheralsassociated with Customer’s use of ServicesData AccessCustomer AccessThe customer determines the Customer Content that they upload to a Citrix Cloud Service. Citrix enablescustomers to access and export their Customer Content throughout the duration of their agreement.Citrix AccessCustomer ContentCitrix accesses Customer Content processed for any of the Citrix Cloud Services as needed to provide theservice and customer support. For information about the Customer Content used by each of the CitrixCloud Product Services, see Data Collection for Citrix Cloud Product Services.LogsCitrix collects data in Logs in order to perform and improve the service, support customers, and addresssecurity concerns.Citrix safeguards Logs against unauthorized disclosure, improper destruction, and alteration. Citrixrequires that log data remains in a read-only state. Log access is granted on a need-to-know basis basedon least privilege principle. Only members of the Citrix Site Reliability Engineering (SRE) Cloud Operationsteam and key developers have access to this information. Access to Logs requires approved, timesensitive, multifactor login to a separate Cloud Console. For information about the Logs collected by eachof the Citrix Cloud Product Services, see Data Collection for Citrix Cloud Product Services.Data Collection for Citrix Cloud Product ServicesCitrix Cloud PlatformCitrix Cloud Services integrate with the Citrix Cloud Platform to provide a unified experience, includingoptional services for identity and access management with the Citrix Identity Platform. For moreinformation regarding the collection of Customer Content and Logs by Citrix Cloud Platform, please seeAppendix A: Citrix Cloud Platform Data Collection.

Citrix Data Protection Overview5Citrix Virtual Apps and Desktops ServiceCitrix Virtual Apps and Desktops service (CVAD) provides virtualization services designed to give thecustomer’s IT organization control of its virtual machines, applications, and security while providing endusers remote access for any device managed within the environment. For more information regarding thecollection of customer content and logs by Citrix Virtual Apps and Desktops service, please see AppendixB: Citrix Virtual Apps and Desktops (CVAD) Data Collection.Citrix Endpoint ManagementCitrix Endpoint Management (CEM) is a solution for managing endpoints and offering mobile devicemanagement (MDM) and mobile application management (MAM) capabilities. For more informationregarding the collection of Customer Content and Logs by Citrix Endpoint Management, please seeAppendix C: Citrix Endpoint Management (CEM) Data Collection.Citrix Content CollaborationCitrix Content Collaboration Cloud Service (formerly ShareFile) is designed to enable the customer toeasily and securely exchange documents, send large documents by secure email, and securely handledocument transfers to third parties. Learn more information about Citrix Content Collaboration by visitingCitrix Content Product Documentation. For more information regarding the collection, storage, andretention of Customer Content and Logs by Citrix Content Collaboration, please see the ShareFile SecurityWhite Paper.Citrix Workspace with IntelligenceCitrix Workspace intelligent features, such as Data Integration Provider, Credential Wallet, and IntelligentMicroapps, collect Customer Content and Logs that may be in-flight, stored or both. For more informationabout these features, please see the Microapps Technical Security Overview and the Citrix MicroappsService Tech Brief. For more information regarding the collection, storage, and retention of CustomerContent and Logs by Citrix Workspace with Intelligence, please see Citrix Workspace Microapps CustomerContent and Logs.Citrix Analytics ServiceCitrix Analytics is designed to provide customers insight into activities in their Citrix computingenvironment. For more information regarding the collection, storage, and retention of Customer Contentand Logs by Citrix Analytics Service, please see Citrix Analytics Data Governance.Citrix Intelligent Traffic ManagementCitrix Intelligent Traffic Management is designed to provide customers visibility into the network experienceof shared cloud services and private infrastructures as measured by a community of website andapplication users. For more information regarding the collection, storage, and retention of CustomerContent and Logs by Citrix Intelligent Traffic Management, please see Citrix Intelligent Traffic ManagementCustomer Content and Logs.Citrix Application Delivery ManagementCitrix Application Delivery Management (ADM) Service provides centralized network management,analytics, and automation as a service from the cloud to support virtualized or containerized applications

Citrix Data Protection Overview6deployed across public clouds and on-premises datacenters. For more information regarding thecollection, storage, and retention of Customer Content and Logs by Citrix Application DeliveryManagement, please see the Citrix Application Delivery Management Data Governance Document.Citrix App Delivery and Security ServiceCitrix App Delivery and Security (CADS) service is a part of Citrix Cloud services, and it uses Citrix Cloudas the platform for signup, onboarding, authentication, administration, and licensing. Citrix collects andstores data in Citrix Cloud as part of the CADS service. For more information about what data is collectedand methods of data collection, storage, and transmission, please see Citrix App Delivery and Securityservice Data Governance.Citrix Secure Private AccessCitrix Secure Private Access is a cloud delivered Zero Trust Network Access (ZTNA) solution that deliversadaptive access to IT sanctioned applications whether they are deployed on-prem, or in the cloud. CitrixSecure Private Access provides access to applications at the application layer and provides customeradmins with a set of security controls enabling their users to access IT sanctioned applications on anydevice, whether managed or BYO. For more information regarding the collection of customer content andlogs by Citrix Secure Private Access service, please see Citrix Secure Private Access Data Governance.Geographic OptionsCitrix Cloud Services are available across multiple regions. When a customer is onboarded to Citrix Cloud,they are asked to choose one of the following regions for the location of their Cloud Services environment: United StatesEuropean UnionAsia Pacific SouthCitrix Cloud Services use the customer’s designated region to store Customer Content and Logs, exceptwith select data for which non-regional storage is necessary for performance of the service (as describedin the Non-regional Data section and Table 1: Regional Options for Citrix Cloud Services).Regional DataCustomer Content is stored in the customer’s selected region on their chosen publicly available cloudinfrastructure, AWS, Azure, or Google Cloud. Citrix accesses Customer Content processed for any of theCitrix Cloud Services as needed to provide the service and customer support (which may be non-regional).Non-regional DataCertain Logs, including information related to the customer’s use of the Cloud Services, are non-regional innature. This data may be replicated and accessed non-regionally as necessary to support the CloudServices, including for support or troubleshooting, monitoring performance, security, auditing, and to allowfor cross-region authentication (for example, when an EU-based support engineer needs to access a USbased environment).Logs might be processed non-regionally by Citrix Third-Party Providers as necessary to perform theServices.

Citrix Data Protection OverviewCitrix Cloud Platform and the optional Citrix Identity Platform use a non-regional deployment for maximumavailability and global performance. Citrix Cloud Platform uses Citrix Cloud Services administrator andend-user details non-regionally, which may include name and username. Citrix Cloud Platform also usesnon-regional data resulting from traffic directed through your region by any connectors you install, such asauthentication data using your domain controllers (whether managed on your premises or through yoursubscription with a public cloud vendor).If the Citrix Identity Platform is used, the authentication aspects of Citrix Cloud can be non-regional, withfederation back to the customer managed authentication systems which are or can be within a givencustomers country.Most Product services use a regional deployment, shown in Table 1: Regional Options for Citrix CloudServices.Table 1: Regional Options for Citrix Cloud ServicesServiceData TypeUSEUAPSCitrix CloudPlatformCustomer ContentNon-regionalLogsNon-regionalCustomer ContentNon-regionalLogsNon-regionalCustomer lRegionalCustomer ContentRegional withchoiceRegional with choiceRegional withchoiceLogsRegional withchoiceRegional with choiceRegional withchoiceCitrix Virtual Appsand DesktopsCustomer nalRegionalRegionalApplication DeliveryManagementCustomer lRegionalCustomer ContentRegional withchoice for StorageZoneRegional with choicefor Storage ZoneUses US or EURegion with choicefor Storage ZoneLogsRegional withchoice for StorageZoneRegional with choicefor Storage ZoneUses US or EURegion with choicefor Storage ZoneCustomer lRegionalCitrix IdentityPlatformCitrix WorkspaceCitrix EndpointManagement1Citrix ContentCollaboration1Citrix Analytics7

Citrix Data Protection OverviewCitrix App Deliveryand SecurityServiceCustomer lRegionalCitrix Secure PrivateCustomer ContentNon-regionalLogsNon-regionalCustomer ContentNon-regionalLogsNon-regionalAccess3Citrix IntelligentTraffic Management81. Services with more options for service location within regions2. CVAD Service for Google Cloud Platform uses US Region.3. Data used for optional Adaptive Authentication service may be non-regional.See Geographical Considerations for more details.Cloud Service BackupsFor all Cloud Services, Logs and Customer Content may be included in backups. Online backups may bemade to Microsoft Azure, Amazon AWS, or Google Cloud. Offline backups are not made for any CloudService.Files are frequently backed up to a disaster recovery datacenter and mirrored in real time to a secondaryserver location to ensure service can be quickly resumed in case of a disruption at the primary location.Backups may be stored in different regions for redundancy. Please see the Citrix Cloud BusinessContinuity Overview for more information.SecurityThe Citrix Services Security Exhibit describes in-depth the security controls applied to Citrix CloudServices, including access and authentication, system development and maintenance, security programmanagement, asset management, encryption, operations management, HR security, physical security,business continuity, and incident management.The security of Citrix Cloud products is controlled by encryption and key management policies. Refer to theSecurity Development Processes whitepaper for more details on how Citrix employs security throughout itsproduct development lifecycle.EncryptionCitrix maintains a Certificate, Credential, and Secret Management policy which covers authentication andcredential lifecycles, including the requirements for encryption key management.In transitAll data in transit is encrypted using TLS 1.2 or higher. Citrix Cloud authenticates administrators and storesuser tokens as needed (by prompting the administrator explicitly) on encrypted storage.At rest

Citrix Data Protection Overview9Citrix Cloud storage is encrypted during the provisioning process (e.g., Storage Accounts, Microsoft AzureSQL databases, etc.). Encryption keys are AES-256 bit or higher.Hypervisor passwords have a second level of encryption with keys managed by Citrix.Key managementCitrix has key management policies in place to ensure the protection of all customer data, and Citrix doesnot bind keys to identifiable owners.Citrix manages the unique encryption of customer data in the Citrix Cloud Platform by leveraging cloudnative key management.Depending on the customer’s choice of control plane, Azure Key Vault or Google Cloud Platform SecretManager is used for key management in Citrix Cloud in accordance with Citrix's Global Security Assurancepolicies and standards. The customer can manage encryption of the data in the resource domain that theycontrol. For DevOps engineers that administer the services, the keys that have access to the services arerotated at a regular frequency. Per Citrix's Security Encryption Standards, database administrators do nothave access to keys stored in databases.Third-Party ProvidersCitrix may use third-party service providers to store or process Logs and Customer Content. Third-partyservice providers for Citrix products are obligated to meet Citrix information security and compliancestandards as outlined in the Citrix Supplier Security Standards when accessing Citrix customer facilities,Networks and information Systems, and when accessing, processing, or storing Citrix ConfidentialInformation, including Customer Content or Logs.These third-party service providers are subject to change, and not all third-party service providers areutilized by all Citrix Cloud Services. More details are available in the Sub-processor list for Citrix products.PrivacyCitrix describes its Cloud Services privacy practices in the Citrix Data Processing Addendum (DPA), whichis posted to the Citrix Trust Center and incorporated into the Citrix Services Agreement used to acquire theServices. Built around the core GDPR data processor requirements but designed to cover all applicableglobal data protection laws, the DPA specifies, among other things, our limitations on use, controls onthird-party providers, legal terms around international transfer of data, incident reporting, procedures foraudit and assistance, and data deletion practices.Citrix products and services are designed to facilitate customer’s GDPR compliance by supporting GDPRrequirements around data management, access, and security. Citrix has performed data protection impactassessments of its products and Citrix strives to provide functionality that will assist your ongoingcompliance efforts. In addition, the international data transfer section of the DPA has recently beenupdated to incorporate the new EU Standard Contractual Clauses (2021/914/EU).Citrix will not disclose Customer Content in response to a subpoena, judicial or administrative order, orother binding instrument (a demand) unless required by law. Citrix will promptly notify customers of anydemand unless prohibited by law and provide reasonable assistance to facilitate a timely response to thedemand.

Citrix Data Protection Overview10Data Retention and DeletionActive accountsCustomer Content, files and golden images (required for provisioning), stay under customer control andprotection. The customer is responsible for managing encryption, backup, and recovery related tocustomer's user data and environment.Citrix has documented retention policies that permit the retention of logs for as long as the data isnecessary to provide the services and as required by law. Deleted data is maintained within an activeaccount for a period of time. After the time period has expired, files go into a deletion queue. Data isdeleted and the encryption key is destroyed.Service terminationCustomers have 30 days to download their Customer Content after the service is terminated. Customersmust contact Citrix technical support for download access and instructions. Citrix will promptly delete thedata following that period, except for back-ups that are deleted in the ordinary course, or as required byapplicable law. During such time, Citrix will continue to apply the controls specified in the Citrix ServicesSecurity Exhibit and the DPA to protect this information.CertificationsCitrix has products certified by industry-accepted security standards that can provide customers assuranceconcerning Citrix Cloud Services. For details about the services assessed, please see the Citrix TrustCenter.System and Organization Controls (SOC) 2 reportsMany Citrix services undergo regular SOC 2 assessments by a licensed CPA firm that issues a resultingSOC 2 report. The SOC 2 report is used to verify the design and operating effectiveness of the Citrixsystem of internal controls. The report provides detailed information and assurance about the protectionsat Citrix relevant to the security, availability, and confidentiality of customer data.ISO/IEC 27001Citrix has services certified with the internationally recognized ISO/IEC 27001 standard. This is part of theISO 27000 series of standards that focuses on information security, risk management, and privacymanagement which, when combined, creates a globally recognized framework applicable to organizationsof all sizes and sectors.HIPAACitrix offers HIPAA-compliant configurations for certain products and services and Business AssociateAgreements for those customers who need to store or process covered health information in the cloud.

Citrix Data Protection Overview11Citrix undergoes an annual independent assessment evaluating our services and controls under theHIPAA Security, Privacy, and Breach Notification rulesFIPS 140-2Citrix has services certified with the United States Federal Information Processing Standard (FIPS) 140-2.This standard provides a benchmark for implementing cryptographic software.IRAPCitrix has services accredited at the “Protected” level with the Australian Information Security RegisteredAssessors Program (IRAP) standard.Common CriteriaCitrix is committed to providing secure software to our customers, as evidenced by our progress inattaining the Common Criteria Certification, an ISO standard for software security function. Our definedSecurity Target, Configuration Guide and Certification Report are available for download on the CommonCriteria page on the Citrix Trust Center.

Citrix Data Protection OverviewAppendix A: Citrix Cloud Platform Data CollectionAll services integrate with the Citrix Cloud Platform to provide a unified experience across Citrix Cloud.Citrix Cloud implements services that are common across all services, including optional service with theCitrix Identity Platform.The table, Data Collected by Citrix Cloud Platform, lists the Customer Content and Logs that are used torun the services.12

Citrix Data Protection OverviewData Collected by Citrix Cloud PlatformPlatformCustomer ContentLogsAdministrator email, First Name,Last NameCitrix Gateway URLResource Location NameEnd User email, First Name,Last NameAD DomainsCompany Name & AddressOrgIdCC Customer IdCitrixCloudPlatformCC Connector referenceUserIDAzure AD tenantIDPer-customer encryption keyResource Location IDNotification InformationSIEM dataAdministrator Login email, FirstName, Last Name, addressSub (subscription)OrgIdPasswordCC CustomerIdCitrixIdentityPlatformPartner NameAad tenantID Athena CustomerIdClientidsDevice IDsBackup CodesFeatureIDsSIEM data13

Citrix Data Protection Overview14Appendix B: Citrix Virtual Apps and Desktops (CVAD) DataCollectionCVAD provides virtualization services designed to give the customer’s IT organization control of its virtualmachines, applications, and security while providing remote access for any device.With the Citrix Virtual Apps and Desktops service, application servers remain under the customer’s control,in a resource location consisting of the customer’s own datacenter or a customer-provided account with athird-party cloud vendor such as Microsoft Azure, Amazon Web Service, or Google Cloud Platform. WhileCitrix provides management and monitoring capabilities for these servers, it does not have access to thedata within the servers, including the contents of user files, applications, and disk images (unless enabledby the customer, e.g., as part of customer support). The Citrix Virtual Apps and Desktops service does notcollect, inspect or transfer Customer Content files (for example, Microsoft Word and Excel files) from thevirtual machines that end-users access. End-usersʼ virtual machines are under the customer’s control.All data processed by the CVAD service is encrypted at rest using encryption keys managed by the CitrixVirtual Apps and Desktops Cloud service, and all data in transit is encrypted using TLS 1.2 or higher.Application activity, such as keystrokes, screen contents, and mouse clicks, is sent over the Citrix HDXprotocol. The customer may choose to enable the Citrix Gateway Service, in which case, this HDX trafficpasses through, but is not captured by, Citrix. The customer may instead choose to use their own gatewayservers, in which case no HDX traffic passes through Citrix infrastructure.For a list of selected categories and data elements that may be processed by the CVAD service, see thetable below. This list is not exhaustive, but is designed to provide customers an understanding of thetypes of data being processed as part of the CVAD service. For more information about the CVADservice, please see the Citrix Virtual Apps and Desktops service product documentation.

Citrix Data Protection OverviewSelected CVAD API PropertiesCategoryPropertyDescriptionIdUnique identifier for the User. (Citrix Created)SidSecurity Identifier for the user. (synced with customer'sAD)UpnUser Principal Name - has two parts: the UPN prefix (theuser account name) and the UPN suffix (a DNS domainname). The parts are joined together by the at sign (@)symbol to make the complete UPN. (synced withcustomer's AD)UserNameUsername in the form of DOMAIN\UserName (synced withcustomer's AD)FullNameFull name of the user (usually in the form "FirstnameLastname") (synced with customer's AD)DomainDomain the user is associated with (synced withcustomer's AD)ClientNameThe host name of the client connected to the sessionClientAddressThe IP address of the client connected to the sessionClientVersionThe version of the Citrix Receiver running on the clientconnected to the sessionClientPlatformThe name of client platform, as indicated by client productID for sessionClientProductIdThe product ID of the client connected to the session.DeviceIdUnique identifier for the client device that has mostrecently been associated with the session.HardwareIdUnique identifier for the client hardware that has beenmost recently associated with the session.End UsersSessionStartVDA UsageSessionEndIdleDurationPeriod for which session has been idle, or null if it is notconsidered idle.15

Citrix Data Protection OverviewUntrustedUserNameThe name of the logged-on user reported directly from themachine (in the form DOMAIN\user). This may be usefulwhere the user is logged in to a non-domain account,however the name cannot be verified and must thereforebe considered untrusted.EffectiveLoadIndexPercentage of Total loadCpuPercentage of CPU loadMemoryPercentage of Memory loadDiskPercentage of Disk loadNetworkPercentage of Network loadSessionCountPercentage of Session Count load maps toProcessNameAverageProcessorLoadVDAProcessLevel yUtilizationPeakNameSpecifies the name of the application (must be uniquewithin folder).CommandLineExecutableSpecifies the name of the executable file to launch. Thefull path need not be provided if it's already in the path.Environment variables can also be used.AdminFolderThe folder in which the new application should reside (ifany).ClientFolderSpecifies the folder that the application belongs to as theuser sees it. This is the application folder that is seen inthe Citrix Online Plug-in, in Web Services, and also in theend-user's Start menu.CommandLineArgumentsSpecifies the command-line arguments to use whenlaunching the executable. Environment variables can beused.Applications16

Citrix Data Protection OverviewMachines(VDAs)DescriptionSpecifies the description of the application. This is onlyseen by Citrix administrators and is not visible to users.PublishedNameThe name seen by end users who have access to thisapplication.StartMenuFolderSpecifies the name of the start menu folder that holds theapplication shortcut (if any).WorkingDirectorySpecifies which working directory the executable islaunched from. Environment variables can be used.DescriptionDescription of the machine.DNSNameThe DNS host name of the machine.HostedMachineNameThe friendly name of a hosted machine as used by itshypervisor. This is not necessarily the DNS name of themachine.HostingServerNameDNS name of the hypervisor that is hosting the machine ifmanaged.IPAddressThe IP address of the machine.MachineNameDNS host name of the machine.OSTypeA string that can be used to identify the operating systemthat is running on the machine.OSVersionA string that can be used to identify the version of theoperating system running on the machine, if known.SIDThe SID of the machine.TagsA list of tags associated with the machine.HypervisorAddressSpecifies the address to be used. The address will bevalidated and the hypervisor must be contactable at theaddress supplied.XenServer (ConnectionType XenServer) The addressbeing added must reference the same XenServer poolreferenced by an

Citrix App Delivery and Security (CADS) service is a part of Citrix Cloud services, and it uses Citrix Cloud as the platform for signup, onboarding, authentication, administration, and licensing. Citrix collects and stores data in Citrix Cloud as part of the CADS service. For more information about what data is collected

Related Documents:

Virtual Apps and Desktops. It connects to hosted resources through the Citrix Cloud Connector on any cloud or infrastructure. Citrix Cloud allows Citrix Service Providers to create multiple types of workspace hosting environments as resource locations (for example on-premises, public cloud, private cloud, or hybrid cloud). 4.2 Citrix Workspace

There is no Citrix Client after update push for upgrade from Citrix Plug-in 11.2 to Citrix Receiver 3.3. Issue. SCCM successfully uninstalled Citrix Plug-in 11.2, but the install of Citrix Receiver 3.3 did not process. Resolution. Run the "Citrix Receiver 3.3 Up

Citrix Receiver 3.3 correctly, all older version of the Citrix Client must be uninstalled. The following steps should be taken to make sure The all old Citrix Clients are uninstalled, and then install the new Citrix Receiver 3.3. . Once you uninstall a

Verify Citrix Workspace version a. Click on the desktop to bring up Finder and then click "Applications" under the "Go" menu. b. Locate and click on "Citrix Workspace" and verify the version is at least 18.9.0. The Citrix client was recently renamed from Citrix Receiver to Citrix Workspace. If Citrix Receiver is currently installed

Citrix Receiver 使得圖示可置於 Windows � 開啟 Citrix Receiver︰ 在「開始」畫面,輸入 Citrix,然後選取搜尋結果中的 Citrix Receiver。 針對 Citrix Receiver 啟用單一登入 1. 解除安裝預先安裝的 Citrix Receiver。 2. 從 HP 支援網站下載 Citrix .

Citrix Online Division 6500 Hollister Avenue Goleta, CA 93117, USA T 1 805 690 6400 About Citrix Citrix Systems, Inc. (NASDAQ:CTXS) is the leading provider of virtualization, networking and software as a service technologies for more than 230,000 organizations worldwide. Its Citrix Delivery Center, Citrix Cloud Center (C3) and Citrix Online .

Citrix Online Division 6500 Hollister Avenue Goleta, CA 93117, USA T 1 805 690 6400 www.citrix.com About Citrix Citrix Systems, Inc. (NASDAQ:CTXS) is a leading provider of virtual computing solutions that help people work and play from anywhere on any device. More than 230,000 enterprises rely on Citrix to create better ways for people, IT and .

April 23-25, 2018 ASTM International Headquarters West Conshohocken, Pennsylvania, USA October 14-17, 2018 The Pulitzer Hotel Amsterdam, The Netherlands Annual Business Meeting June 24, 2018 Sheraton San Diego Hotel & Marina San Diego, California, USA. 2018 Board of Directors www.astm.org 3 Chairman of the Board Dale F. Bohn Vice Chairmen of the Board Taco van der Maten Andrew G. Kireta Jr .