© 1999-2017 Citrix Systems, Inc. All rights reserved. p.12https://docs.citrix.com
Security recommendations
Feb 26, 2018
Session Recording is designed to be deployed within a secure network and accessed by administrators, and as such, is
secure. Out-of-the-box deployment is designed to be simple and security features such as digital signing and encryption can
be configured optionally.
Communication between Session Recording components is achieved through Internet Information Services (IIS) and
Microsoft Message Queuing (MSMQ). IIS provides the web services communication link between Session Recording
components. MSMQ provides a reliable data transport mechanism for sending recorded session data from the Session
Recording Agent to the Session Recording Server.
Warning
Editing the registry incorrectly can cause serious problems that might require you to reinstall your operating system. Citrix cannot
guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk. Be
sure to back up the registry before you edit it.
Consider these security recommendations when planning your deployment:
Ensure that you properly isolate the different administrator roles in the corporate network, in the Session Recording
system, or on individual machines. By not doing so, security threats that can impact the system functionality or abuse
the system might occur. Citrix recommends that you assign different administrator roles to different persons or
accounts. Do not allow general session users to have administrator privileges to the VDA system.
XenApp and XenDesktop administrators do not grant VDA local administrator role to any users of published apps or
desktops. If the local administrator role is a requirement, protect the Session Recording Agent components by using
Windows mechanisms or third-party solutions.
Separately assign the Session Recording database administrator and Session Recording policy administrator.
Citrix recommends that you do not assign VDA administrator privileges to general session users, especially when using
Remote PC Access.
Session Recording Server local administration account must be strictly protected.
Control access to machines where the Session Recording Player is installed. If a user is not authorized as the Player
role, do not grant that user local administrator role for any player machine. Disable anonymous access.
Citrix recommends using a physical machine as a storage server for Session Recording.
Session Recording records session graphics activities without regard to the sensitivity of the data. Under certain
circumstances, sensitive data (including but not limited to user credentials, privacy information, and third-party screens)
might be recorded unintentionally. Take the following measures to prevent risks:
Disable core memory dump for VDAs unless for specific troubleshooting cases.
To disable core memory dump:
1. Right-click My Comput erMy Comput er, and then click Propert iesPropert ies.
2. Click the Advanced Advanced tab, and then under St art up and RecoverySt art up and Recovery , click Set t ingsSet t ings.
3. Under Writ e Debugging Inf ormat ionWrit e Debugging Inf ormat ion, select (none)(none).
See the Microsoft article at https://support.microsoft.com/en-us/kb/307973.
Session owners notify attendees that online meetings and remote assistance software might be recorded if a