
Chapter 4 Securing the Enterprise 99
/eventlog:filename
Specifies the name of a backup security event log to use as input to Auditlog.
Create a backup security log from the Event Log Viewer or with the
Auditlog/Clear:filename utility, which saves the current event log in filename
and clears the event log.
/clear[:backup_log_file_name]
Closes the current logon/logoff log file, optionally saves it as filename (for
back up purposes), and opens a new log file.
/? (help)
Displays the syntax for the utility and information about the utility’s options.
Remarks
Auditlog gives the administrator a powerful tool to verify and maintain system
security and correct usage. The information can be extracted as reports or as
comma-delimited files that can be used as input to other programs.
You must enable logon/logoff accounting in order to collect the information used
by Auditlog. To enable logon/logoff accounting:
1. Click Start, Programs, and then Administrative Tools to open Local
Security Policy.
2. On the Tree tab (left pane), select Local Policies and then Audit Policy.
3. Right click Audit Logon Events and Audit Account Logon Events, then
select Security.
4. Select Success and Failure under Local Policy. Click OK to save your
changes.
Securing Data and Applications
SecureICA Services
Citrix SecureICA Services enhances the security of ICA connections by allowing
users to access Citrix MetaFrame servers over secure communications channels.
This section provides details about the SecureICA encryption software.
SecureICA Features
Citrix SecureICA contains features to enhance the security of data communication
across any type of connection supported by ICA. SecureICA Services uses the
RC5 encryption algorithm from RSA Data Security, Inc. The Citrix server and
ICA Client use the Diffie-Hellman key agreement algorithm with a 1024-bit key
to generate RC5 keys.
Comentarios a estos manuales