PoC Guide: Citrix Secure Internet Access with Citrix Secure Private Access

Overview

Citrix Secure Internet Access provides a full cloud-delivered security stack to protect users, apps, and data against all threats without compromising the employee experience. This proof of concept (PoC) guide is designed to help you quickly configure Citrix Secure Internet Access within your Citrix Cloud environment. At the end of this PoC guide you are able to protect your Citrix Secure Private Access deployment with Citrix Secure Internet Access. You are able to allow your users access applications using Direct Internet Access (DIA) without compromising on performance.

Citrix SIA OVERVIEW

Scope

In this Proof-of-Concept guide, you experience the role of a Citrix administrator and you create a connection between your organization’s Secure Private Access deployment and Citrix Secure Internet Access for Corporately Owned Devices.

This guide showcases how to perform the following actions:

  • Logging into Citrix Secure Internet Access (CSIA)
  • Interfacing CSIA Security Groups with Groups from Domain Integration
  • Configuring the Proxy settings of the CSIA cloud platform
  • Configure web security policies to allow/deny access to certain websites or categories via the CSIA Console.
  • Applying Policies to Security Groups
  • Download the CSIA agent (Cloud Connector)
  • Configure the CSIA agent (Cloud Connector) via Agent Policy
  • Configure the CSIA agent (Cloud Connector) Manually (OPTIONAL - Windows Only)
  • Deploy CSIA agent (Cloud Connector) via AD group policy to Corporate Windows Devices
  • Deploy CSIA agent (Cloud Connector) via Endpoint Management Solution to Corporate Devices
  • Deploy CSIA agent (Cloud Connector) manually to Corporate Devices

Prerequisites

  • Microsoft Windows 7, 8, 10 (x86, x64, and ARM64)
  • Microsoft Server 2008R2, 2012, 2016, 2019
  • Microsoft .NET 4.5, or above
  • PowerShell 7 (only for Windows 7)
  • The following Firewall rules

Network Requirements

Port / Firewall settings

CSIA –> Outbound

Source Destination Protocol Port Description
CSIA ibosscloud.com TCP 80 Proxy connections & Custom block pages
TCP 443 PAC script retrieval over HTTPS & Proxy authentication over HTTPS
TCP 7443 Alternative port for PAC script retrieval over HTTPS
TCP 8009 Alternative port for proxy connections
TCP 8015 Proxy authentication over HTTP
TCP 8016 Alternative port for proxy authentication
TCP 8026 Cloud categorization port for Android Enterprise
TCP 8080 Default block page
TCP 10080 PAC script retrieval over HTTP
CSIA api.ibosscloud.com TCP 443 PAC script retrieval over HTTPS & Proxy authentication over HTTPS
TCP 7443 Alternative port for PAC script retrieval over HTTPS
TCP 8009 Alternative port for proxy connections
TCP 8015 Proxy authentication over HTTP
TCP 8016 Alternative port for proxy authentication
TCP 8026 Cloud categorization port for Android Enterprise
TCP 8080 Default block page
TCP 10080 PAC script retrieval over HTTP
CSIA accounts.iboss.com TCP 443 PAC script retrieval over HTTPS & Proxy authentication over HTTPS
TCP 7443 Alternative port for PAC script retrieval over HTTPS
TCP 8009 Alternative port for proxy connections
TCP 8015 Proxy authentication over HTTP
TCP 8016 Alternative port for proxy authentication
TCP 8026 Cloud categorization port for Android Enterprise
TCP 8080 Default block page
TCP 10080 PAC script retrieval over HTTP
CSIA Customer CSIA Node-swg.ibosscloud.com TCP 443 PAC script retrieval over HTTPS & Proxy authentication over HTTPS
TCP 7443 Alternative port for PAC script retrieval over HTTPS
TCP 8009 Alternative port for proxy connections
TCP 8015 Proxy authentication over HTTP
TCP 8016 Alternative port for proxy authentication
TCP 8026 Cloud categorization port for Android Enterprise
TCP 8080 Default block page
TCP 10080 PAC script retrieval over HTTP
CSIA Customer CSIA Node-reports.ibosscloud.com TCP 443 PAC script retrieval over HTTPS & Proxy authentication over HTTPS
TCP 7443 Alternative port for PAC script retrieval over HTTPS
TCP 8009 Alternative port for proxy connections
TCP 8015 Proxy authentication over HTTP
TCP 8016 Alternative port for proxy authentication
TCP 8026 Cloud categorization port for Android Enterprise
TCP 8080 Default block page
TCP 10080 PAC script retrieval over HTTP

Citrix Secure Internet Access (CSIA) Cloud Configuration

In this section we focus on the configuration of CSIA within the administration console.

Log into Citrix Secure Internet Access

  1. Log into Citrix Cloud and Access the Secure Internet Access tile.Log into Citrix Cloud

  2. Select theConfigurationtab and ClickOpen Citrix SIA Configurationto access the Configuration Console.Citrix SIA Configuration

Configure the Citrix Secure Internet Access PAC Settings

  1. From theConfigurationtab navigate toLocations & GeomappingCitrix SIA PAC Configuration
  2. On theZonestab clickEdit Default ZoneCitrix SIA PAC EDIT
  3. ClickPAC SettingsCitrix SIA PAC SETTINGS
  4. If you must bypass a domain, use theAdd a FunctionCitrix SIA PAC ADD A FUNTION
  5. These are the recommended Citrix Domain and Subdomains to be added to the PAC File: ⋅ cloud.com & *.cloud.com ⋅ citrixdata.com &*.citrixdata.com ⋅ citrixworkspaceapi.net & *.citrixworkspaceapi.net ⋅ citrixworkspacesapi.net & *.citrixworkspacesapi.net ⋅ citrixnetworkapi.net & *.citrixnetworkapi.net ⋅ nssvc.net & *.nssvc.net ⋅ xendesktop.net & *.xendesktop.net ⋅ cloudapp.net & *.cloudapp.net ⋅ netscalergateway.net & *.netscalergateway.net
  6. Note the node shown “node-clusterxxxxxx-swg.ibosscloud.com:80”. This must match the customer’s SWG node in Node Collection ManagementCitrix SIA PAC NODE SHOWN

Interfacing CSIA Security Groups with Groups from Domain Integration

Users connecting to Citrix Secure Internet Access (CSIA) communicates domain OU information if it is available from their current user login and device. The CSIA cloud platform can be used to match the groups provided by domain-controlled user accounts. Correlating the groups of your domain integration with the security groups contained on the CSIA cloud platform allows you to administer policies and restrictions in a manner similar to the existing security policies within your organization.

The strategy for integrating domain group information into the CSIA cloud platform is to edit security groups to match the aliases of domain groups reported to the platform.

Integration Example

To demonstrate the execution of this concept, let’s map the domain credentials of a Windows user into a security group on the CSIA cloud platform.

  1. Open a command prompt on the target computer, and run the command “net user (user name) /domain”
  2. Gather the aliases of groups reported back by the domain controller.Citrix SIA AD ALIASES OR GROUPS
  3. Go to the CSIA cloud platform and edit either theGroup Nameor theAlias Nameto correspond to one of the groups reported by the domain user.Citrix SIA AD ADD ALIAS OR GROUP
  4. Now when users from the integrated domain group authenticate to the CSIA cloud platform, they are assigned automatically to their corresponding security group.

Configuring the Proxy settings of the CSIA cloud platform

  1. Navigate to theProxy & Cachingmodule.Citrix SIA PROXY & CACHING
  2. SetEnable Proxy SettingstoYESCitrix SIA PROXY & CACHING ENABLE
  3. SetUser Authentication MethodtoLocal User Credentials + Cloud ConnectionsCitrix SIA PROXY & CACHING AUTH
  4. ClickSaveCitrix SIA PROXY & CACHING SAVE

Configure Web Security Policies

In this section we focus on the configuration of CSIA Web Security Policies within the administration console. This is the main place where we set actions on web categories.

Applying Policies to Security Groups

  1. Navigate to theWeb Securitymodule.Citrix SIA WEB SECURITY
  2. For web security policies that have a group-based implementation available a drop-down menu presents at the top of the page above the configuration form for the policy. The status of this drop-down menu indicates which group’s policy configuration you are currently viewing.Citrix SIA WEB SECURITY GROUP
  3. Click theGroupdrop-down menu and thenselect group您想要重新配置为当前网络年代ecurity policy.Citrix SIA WEB SECURITY GROUP 2
  4. ClickingSave, saves the current policy’s configuration only to the currently selected security group from theGroupdrop-down menu.Citrix SIA WEB SECURITY GROUP SAVENote:If you are looking to apply these settings to multiple groups
  5. (Optional)ClickSave to Multiple Groupsopens a window that allows you to assign the current policy’s configuration to multiple security groups simultaneously.Citrix SIA WEB SECURITY MULTI GROUP
  6. Click thecorresponding check boxfor any security group you want to apply the current policy configuration.Citrix SIA WEB SECURITY MULTI GROUP 2
  7. ClickAddto add the selected security groups to the configure group.Citrix SIA WEB SECURITY MULTI GROUP ADDGroups can either be reconfigured to accept only configuration changes that have currently been applied or accept and overwrite all configuration settings for the current policy.
  8. The default selection isApply Changed Settingswhich applies changes you have configured. Select to overwrite all configured settings for the designated security groups.Citrix SIA WEB SECURITY MULTI GROUP APPLY
  9. Individual groups can be removed by clickingRemoveorremove all groupsselected for configuration by clickingRemove All。ClickSaveto confirm the configuration being applied to all designated security groups.Citrix SIA WEB SECURITY MULTI GROUP SAVE

Web Categories

Domains are tagged with web categories based on their content. The categories of visited websites are recorded in Reporting & Analytics.

Category Actions

You can associate actions with web categories. This enables you to deploy security policies quickly while minimizing the need to allow or block individual URLs. Possible actions include Allow, Block, Stealth, Soft Override, or SSL Decryption Enabled.

  1. Each category can have actions that are applied independently from the other categories.

    Action Description
    Allow Allows users to access sites of this category. Allow is the default state for all categories.
    Block Blocks access to sites of a particular category.
    Stealth Flags traffic to that category as violations in the logs but still allows access to the site.
    Soft Override Presents a block page to the user but includes an option to bypass the block temporarily. This allows users to access blocked content without requiring immediate administrator intervention. Soft overrides last until the next day at 2:00 AM in the time zone configured for the gateway. Any block page presented with a soft override appears in Reporting & Analytics as “soft-blocked.” After a user has requested a soft override, any traffic to that URL shows as “allowed” until the override has expired.
    SSL Decryption Disable this option to clear SSL Decryption for a specific category. This ensures privacy compliance and concerns with specific categories like Finance or Health. The priority value for this category does NOT apply to this setting. If a site belongs to multiple categories, and any of those categories has the “SSL Decryption Disabled” option on, that site is not be decrypted.
    Lock When a category is locked by the primary administrator into either an Allowed or Blocked state, delegated administrators cannot log in to the web gateway management interface and change the status of that category.
    Category Override When you activate a category override, a delegated administrator cannot log in to the web gateway management interface and add a URL to the allow list that would contradict the rule for this category. For example, the “Art” category is blocked and set to “Overrides,” so delegated administrators cannot add art.com to the Allow List for that group.
  2. Click each icon to toggle the action for the respective web category.Citrix SIA WEB CAT 1Citrix SIA WEB CAT 2Citrix SIA WEB CAT 3

  3. Actions that you want to generally apply to all web categories can be implemented with the Actions drop-down menu.Citrix SIA WEB CAT 1NOTE:Be careful with the “Not Rated” category, as it matches against many sites that are not categorized

Category Priorities

If a domain is associated with multiple categories, the action is determined by comparing the priority values for the categories. Categories with higher priority value take precedence.

Example:

  1. 一个域是归类为政府和工厂king. In the web categories configuration, the government is allowed with a weight of 100 while hacking is blocked with a weight of 200.Citrix SIA EXAMPLE 1
  2. This domain would be blocked when visited by a user due to the block action of the hacking web category possessing a higher priority value.
  3. Click the priority value field and enter a numerical value to reconfigure a category’s priority level. The priority value has a configurable range of 0-65535.

Additional Settings

Settings relevant to web categories are configured with toggles underAdditional Settings。Configuring a toggle toYesenables the setting while configuring a toggle toNodisables the setting. For a full set of descriptions for all available web category settings refer to the following table:

Feature Description
Enable Logging Enable and disable logging of violation attempts for the current set of blocked website categories. Log reports may be viewed on the CSIA Reports page. The report information includes the date, time, user, website address, and category of the violation.
Enable Stealth Mode 它允许你暗地里监视互联网活性ity without blocking access to forbidden sites. With both Logging and Stealth Mode enabled, you can monitor Internet web surfing activity by viewing the log reports on the CSIA Reports page while remaining unnoticed by Internet users on the network. Note: Websites and online applications are not be blocked when the action for the web category is configured to Stealth Mode.
Enable HTTP Scanning on Non-Standard Ports If this feature is enabled, CSIA scans for HTTP web requests on non-standard ports.
Allow Legacy HTTP 1.0 Requests If this feature is enabled, CSIA allows HTTP 1.0 requests that are missing the “HOST” header. Disabling this feature provides a higher level of Security and makes bypassing the Security more difficult. If this feature is enabled, it may offer more compatibility with older non-HTTP 1.1 compliant software.
Enable ID Theft / IP Address URL Blocking Protects against potential identity theft attempts by notifying you when someone is trying to steal your personal information through Internet Phishing. Enabling this feature also blocks users from navigating to websites using IP address URLs.
Enable Blocked Site Override Enabling this feature activates a soft override action, allowing users to proceed to the site belonging to a blocked category. When this setting is active, the user is warned that a page is blocked but provides a button to proceed anyway.
Auto Categorize Uncategorized Sites When this toggle is switched to Yes, any sites that are not categorized are automatically submitted for categorization. Note: When this toggle is set to Yes, uncategorized sites may be assigned a Web Category of “Informational” or other such designation. This is only in effect while the category is being appropriately categorized. When this switch is set to No, uncategorized are automatically designated as “Not Rated,” which is controlled as its own Web Category.

Category Scheduling

Block events can also be configured on an advanced weekly schedule to allow access during particular times.

  1. Set Category Scheduling toAllow Selected Categories Using an Advanced Scheduleto enable the scheduling feature. ClickAdvanced Schedulingto begin scheduling blocked categories.Citrix新航目前RY SCHEDULING 1
  2. The current advanced schedule can either be configured to apply to all blocked categories or only to a particular blocked category.Citrix新航目前RY SCHEDULING 2
  3. Each day during the week can be delegated specific periods of time that the category is be allowed. These particular periods of time are indicated by a blue rectangle.Citrix新航类别调度3
  4. After finalizing the schedule for a particular category, you can click the category drop-down menu once again and select a new category to configure.
  5. ClickSaveto confirm all schedule configurations.Citrix新航目前RY SCHEDULING SAVE

Allow List

The allow lists selectively provides access to a specific website or network resource. This feature enables you to override security policies and allow certain users to access a website. In particular, you can use this to grant access to specific URLs for a domain that is otherwise blocked. This is sometimes referred to as “punching a hole.”

Adding a URL to an Allow List

  1. Navigate toWeb Security Policies
  2. On the drop-down menu clickAllow ListCitrix SIA ALLOW LIST
  3. From above the list section, clickURL/IP RangeCitrix SIA ALLOW LIST URL/IP
  4. Type adomain, subdomain, URL, IP address, or IP Range。This is the only required field, but many other criteria can be specified.
  5. From the right side of the list, click+Add。The entry is now added to the list.

Scrape Tool

TheAllow Listsection includes the handy Scrape Tool. Use this to quickly identify all of the domains that a website uses. In the modern web, many sites use resources from other domains that are not immediately apparent. With the Scrape Tool, these are easily revealed and added to an allow list.

Another use for the Scrape Tool is to selectively only allow portions of a website, while not allowing unwanted content, such as ad servers.

  1. From above the list section, clickScrapeCitrix SIA SCRAPE TOOL
  2. Enter the URL to Scrape and clickScanCitrix SIA SCRAPE SCAN
  3. Select domains to add to Allow List and click Add Selected to Allow List.Citrix SIA SCRAPE ADD

Keyword Block List / Allow List

Keyword filtering is used to inspect URLs for specific words. If a keyword is identified, the content can be allowed or blocked.

Adding a URL to a Block List / Allow List

  1. Navigate toWeb Security Policies
  2. On the drop-down menu clickKeywordsCitrix SIA KEYWORD
  3. Enter thekeywordthat you would like to block in theKeywordfield and specify the designations that apply to this keyword. ClickAddCitrix SIA KEYWORD ALLOW
Option Description
Allow Keyword Checking this option allows the word if it is in the URL within a keyword parameter.
High Risk When any words designated as “High Risk” are searched, an email notification is sent to the administrator of the group.
Wildcard Match When enabled, keywords are filtered even when they are just substrings of a larger word. For example, a wildcard match for the keyword “base” blocks searches that include “base” or “baseball.” Without wildcard matching, it only blocks “base.”
Global This option spans across all Security groups when selected. When removing a “Global” entry, it removes the entry from all filtering groups.

Pre-defined Keyword Lists

You can enable filtering for pre-defined lists of Adult and High-Risk keywords or add more keywords manually.

The Pre-defined Keyword Lists contain common Adult and High-Risk keywords. Wildcard matching is applied to all keywords in these lists. A wildcard match recognizes the keyword’s sequence of characters anywhere in the URL, including the host name. The High-Risk list generates an email to the recipient of alert emails when a High-Risk keyword is detected by the Reporting & Analytics functionality of the CSIA cloud platform.

  1. To enable either one of the keyword lists, set the Adult or High-Risk toggle toYes。ClickSaveCitrix SIA KEYWORD ALLOW

Citrix Secure Internet Access Agent Configuration

In this section we focus on the configuration and the installation of the Citrix Secure Internet Access (CSIA) Agent.

Configure the CSIA Agent Download (Cloud Connector)

  1. From the CSIA admin console, go toConnect Device to Cloud > Cloud ConnectorsCitrix SIA AGENT
  2. ClickConfigure Connector DownloadCitrix SIA AGENT DOWNLOAD CONFIGURE
  3. Click theUse HTTP PACdrop-down menu and selectNo。(Note:Use HTTP PAC to“No”if you want to useHTTPSfor PAC download)Citrix SIA AGENT HTTP PAC
  4. ClickSecurity Groupand select the desired default security group for this particular installation file download.Citrix SIA AGENT SECURITY GROUP
  5. Keep the remaining connector download settings asDefaultand ClickSaveCitrix SIA AGENT SAVE

Configure the CSIA Agent Advanced Connector Settings (Cloud Connector)

  1. From the CSIA admin console, go toConnect Device to Cloud > Cloud Connectors > Advanced Connector SettingsCitrix SIA AGENT ADV SETTINGS
  2. Under Global Settings Enable the following: ⋅Enable Security Cloud Connector FilteringConfigure Auto Login Cloud Connectors to use Key for GroupUse Session Encryption
  3. Under Source IP Logging Enable -Use private source IP of client (if available)
  4. Under Group Specific Settings verify that theCorrect Groupis selected and ClickSaveCitrix SIA AGENT ADV SETTINGS SAVE

下载Citrix安全上网代理(Cloud Connector)

  1. From the CSIA admin console, go toConnect Device to Cloud > Cloud Connectors > Download ConnectorsCitrix SIA AGENT DOWNLOAD
  2. Under WindowsCloud Connector, clickDownloadandDownload AllCitrix SIA AGENT DOWNLOAD ALLThe .msi installation packages can be downloaded directly from the CSIA admin console. Before starting the installation, be sure that you are using the correct package for the version of Windows and processor architecture.
Platform Package
Windows 10 ARM64 ibsa64-win10-arm64.msi
Windows 10 x64 or Windows 8 x64 or Windows Server 2019 or Windows Server 2016 ibsa64-win8.msi
Windows 10 x86 or Windows 8 x86 ibsa32-win8.msi
Windows 7 x64 or Windows Server 2012 or Windows Server 2008R2 ibsa64.msi
Windows 7 x86 ibsa32.msi

Configure the CSIA Agent Policies in the CSIA Admin Console

  1. From the CSIA admin console, go toConnect Device to Cloud > Agent PoliciesCitrix SIA AGENT POLICIES
  2. ClickAdd Agent PoliciesCitrix SIA AGENT POLICIES ADD
  3. Provide aNamefor your Agent Policy and SelectAdd Agent PolicyCitrix SIA AGENT POLICIES NAME
  4. To configure the policy, clickEdit Agent PolicyCitrix SIA AGENT POLICIES EDIT
  5. ClickAgent Settingsand set the recommended settings.Citrix SIA AGENT POLICIES SETTINGS

    Recommended Settings for Corporate Owned Devices

    Setting Recommended Value
    Multi-User Mode: Disable Multi-User/Terminal Server Mode - Enable to support multiple user sessions when running a terminal server. This must be enabled for terminal servers even if users are not logged in simultaneously.
    Use Machine Name for User name: Disable Setting - Use the user account name as the user name.
    Use UPN for User name: Disable Setting - Use the Security Account Manager (SAM) account name, such as DOMAIN\user name.
    Redirect All Ports: Enable Setting
    Bypass Private Subnets: Enable Setting
    Captive Portal Detection: Disable Setting
    Auto-Update Enabled: Enable Setting
    Auto-Update Release Level: Level 1 - Mature
    Enable Windows Desktop App: (Agent do not run-on Multi-User Deployments) Enable Setting
    Allow End Users to Disable Security: Disable Setting
    Require Password to Disable Security: Enable Setting
    Require Password to View Diagnostics Info: Enable Setting
  6. ClickDynamic Linkingand select the Groups you want to assign the policy too.Citrix SIA AGENT POLICIES DYNAMIC LINKING
  7. ClickSaveCitrix SIA AGENT POLICIES SAVE

(OPTIONAL)Manual Configuration of the Citrix Secure Internet Access Agent

The CSIA Agent for Windows .msi editing via Orca is only recommended for troubleshooting.

Orca.msi is available in the WindowsCloud Connector“Download All” option

Opening an .MSI File with Orca

  1. Open Zip file and install Orca.msiCitrix SIA AGENT MSI
  2. Locate the desired installation file in a file explorer program.
  3. Right-click the .msi installation file.
  4. ClickEdit with OrcaCitrix SIA AGENT MSI EDIT

Configuring Properties of an .MSI in Orca

  1. Double-click to open theProperty tableCitrix SIA AGENT MSI PROPERTY
  2. Each property can be edited by double-clicking the property’sValuefield.Citrix SIA AGENT MSI PROPERTY VALUE

    Recommended Settings for Corporate Owned Devices

    Setting Recommended Value
    Multi-User Mode: (PARAM_MULTI_USER_SUPPORT) (0): Disable multi-user mode. Enable to support multiple user sessions when running a terminal server. This must be enabled for terminal servers even if users are not logged in simultaneously.
    Terminal Server Mode: (PARAM_TERMINAL_SERVER_MODE) (0): Disabled - this appears to be deprecated in favor of Multi-User Support
    Use Machine Name for User name: (PARAM_USE_MACHINE_NAME_FOR_USERNAME) (0): Disabled - Use the user account name as the user name.
    Redirect All Ports: (PARAM_REDIRECT_ALL_PORTS) (1): Enabled - Redirect all ports to the proxy.
    Bypass Private Subnets: (PARAM_BYPASS_PRIVATE_SUBNETS) (1): Enable bypass
    Captive Portal Detection: (PARAM_CAPTIVE_PORTAL_DETECTION) (0): Disabled
    Auto-Update Enabled: (PARAM_AUTO_UPDATE_ENABLE) (1): Enabled – The cloud connector to be updated automatically.
    Restart After Upgrade: (PARAM_RESTART_AFTER_UPGRADE) (0): Disabled - Does not prompt a restart.
  3. Within Orca, click theSaveicon to save changes made to the parameters of the Windows Cloud Connector.Citrix SIA AGENT MSI PROPERTY SAVENote:Ensure files are saved within Orca only using this method(not using Save As)。This causes issues with the functionality of the Windows cloud connector if it is not saved in this manner.

Citrix Secure Internet Access Agent (Cloud Connector) Deployment

Citrix recommends that for a CSIA PoC you only install the CSIA Agent to Corporate Devices.

Deploy CSIA agent via AD group policy to Corporate Windows Devices

Create a Distribution Point

  1. Create folderon an AD joined computer that acts as the file server.
  2. Savethe CSIA Agent .msi package inside that folder.
  3. Right Clickthe newly created folder,select properties
  4. Go to“Sharing”tab.
  5. Select“Advanced Sharing”
  6. Enable“Share this Folder”
  7. In Settings under Share name add a$after the CSIA Agent folder name. (Example. SIA_Agent$).
  8. SelectApply
  9. ThenClose

Create Group Policy Object

  1. OpenGroup Policy Management.
  2. Right clickGroup Policy Object.
  3. SelectNew, and name new GPO (Example: Deploy CSIA Agent).
  4. Right clickthe newly created Group Policy Object from above, Select Edit.
  5. ExpandSoftware Settings folder.
  6. Selectsoftware installation
  7. Right clickin the right panel.
  8. SelectNew
  9. SelectPackage
  10. In the corresponding window, type in the location (file path) of your CSIA Agent folder containing the CSIA Agent .msi package.
  11. Select theMSI
  12. SelectOpen
  13. In the Deploy Software window, choose“Advanced”underneath Select Deployment Method.
  14. Under Deployment selectUninstall This Application when…。(this means next time the endpoint runs a gpupdate and the CSIA Agent has been removed it is removed from the endpoint as well).
  15. SelectOKandClose

Deploy CSIA agent via Citrix Endpoint Management Solution to Corporate Devices

Installing the Windows Agent

  1. In the Endpoint Management console, navigate toConfigure > Apps。ClickAdd
  2. ClickEnterpriseCitrix SIA AGENT DEPLOY CEM
  3. On the App information page, configure the following: ⋅Name:Type a descriptive name for the app. The name appears under App Name on the Apps table. ⋅Description:Type an optional description of the app. ⋅App category:Optionally, in the list, click the category to which you want to add the app.
  4. ClickNext。TheApp Platformspage appears.
  5. Select the platform:Windows Desktop/Tablet
  6. On the Windows Desktop/Tablet Enterprise App page, clickUploadand navigate to the file.
  7. Configure these settings:Citrix SIA AGENT DEPLOY CEM APP SETTINGS
  8. Specifydeployment rulesandstore configurationas needed.
  9. ClickNextuntil you get to the Summary page and then clickSave
  10. In the Endpoint Management console, navigate toConfigure > Delivery Groups。Select the delivery group to configure and click theApps page
  11. Drag the desired apps to theRequired Appsbox.Citrix SIA AGENT DEPLOY CEM REQ APPS
  12. On the Summary page, ClickSave

For Deploying the CSIA Agent via a third Party UEM

See your Unified Endpoint Management Documentation for deploying .MSI file.

Installing the macOS Agent

  1. In the Endpoint Management console, navigate toConfigure > Apps。ClickAdd
  2. ClickEnterpriseCitrix SIA AGENT MAC DEPLOY CEM
  3. On the App information page, configure the following: ⋅Name:Type a descriptive name for the app. The name appears under App Name on the Apps table. ⋅Description:Type an optional description of the app. ⋅App category:Optionally, in the list, click the category to which you want to add the app.
  4. ClickNext。TheApp Platformspage appears.
  5. Select the platform:macOS
  6. Uploadthe PKG file (macOS) and complete the configuration. ClickNextCitrix SIA AGENT MAC DEPLOY CEM UPLOAD
  7. ClickNextuntil you get to the Summary page and then click Save.
  8. In the Endpoint Management console, navigate toConfigure > Delivery Groups。Select the delivery group to configure and click theApps page
  9. Drag the desired apps to theRequired Appsbox.Citrix SIA AGENT MAC DEPLOY CEM RWQ APPS
  10. On the Summary page, ClickSave

For Deploying the CSIA Agent via a third Party UEM

See your Unified Endpoint Management Documentation for deploying .PKG file.

Deploy CSIA agent via manually to Corporate Devices

Installing the Windows Agent

  1. Power onthe Windows Machine and log on.
  2. Installthe appropriate CSIA Agent .msi package for your platform.Citrix SIA AGENT DEPLOY MANUAL

Installing the macOS Agent

  1. Navigate to and open the downloaded archive in Finder.
  2. Open the installation package file.
  3. Complete the installation process.

Validated Use Cases

CSIA Website Filtering via the CSIA Agent

Citrix Workspace app Launching a

  1. SaaS app without enhanced security enabled is protected via the CSIA Policies
  2. SaaS app with enhanced security enabled is protected via the CSIA Policies
  3. Internal Web app without enhanced security enabled is protected via the CSIA Policies
  4. Internal Web app with enhanced security enabled is protected via the CSIA Policies

Citrix Workspace HTML Launching a

  1. SaaS app without enhanced security enabled is protected via the CSIA Policies
  2. SaaS app with enhanced security enabled isNOTprotected via the CSIA Policies
  3. Internal Web app without enhanced security enabled is protected via the CSIA Policies
  4. Internal Web app with enhanced security enabled isNOTprotected via the CSIA Policies

Citrix Workspace via Browser Extension

  1. SaaS app without enhanced security enabled is protected via the CSIA Policies
  2. SaaS app with enhanced security enabled isNOTprotected via the CSIA Policies
  3. Internal Web app without enhanced security enabled is protected via the CSIA Policies
  4. Internal Web app with enhanced security enabled isNOTprotected via the CSIA Policies

Troubleshooting

Important Tools for Troubleshooting

  1. Windows Event Log
  2. CSIA Real-Time Dashboard(Reporting & Analytics > Real-Time Log)
  3. CSIA Event Logs(Reporting & Analytics > Logs > Event Log)
  4. CSIA IPS Logs(Reporting & Analytics > Logs > IPS Log)
  5. Registration Information for Connected Devices(Users, Groups & Devices > Cloud Connected Device > Info)
  6. URL Lookup Tool(Tools > URL Lookup)
  7. Enhanced Logging ⋅ To set this, the following registry key must be altered, varying from 0 to 4, the higher giving more verbose logging. ⋅HKEY_LOCAL_MACHINE\SOFTWARE\IBoss\IBSA\Parameters\LogLevel⋅ Once the registry key has been set, the IBSA service under Windows Services must be restarted for the setting to take effect. Checking windows event viewer, you see many entries being logged depending on log level set.
  8. Windows Agent Logs (C:\Windows\SysWOW64\ibsa_0.log)

A Keyword is not Being Blocked

There is a multitude of policies and variables within and surrounding the operations of the CSIA cloud platform that can interfere with properly blocking configured keywords. Refer to the following;

  1. Ensure that SSL decryption is active for this website. Keywords cannot be observed or controlled for HTTPS websites.
  2. If the source IP of the client workstation or the destination IP of the webserver has been added to theNetwork > Bypass IP Rangeslist, web security controls are not be enforced.
  3. Keywords configured to block do not take effect if the website is added to theWeb Security > Allow List without the Keyword/Safesearchoption enabled. With the Keyword / SafeSearch check box selected, Web Gateway allows access to the website but still to enforce Keyword controls and Safesearch.
  4. The keyword contains asterisks, instead remove the asterisks and activate Wildcard matching for the keyword if that is the desired effect.
  5. The keyword has multiple words, and Wildcard Matching is not enabled, or the spaces were not indicated with a plus sign (“+”).
  6. The user is not associated with the expected web security group that has the keyword control enabled.

Conflicting Actions from Pre-defined Keyword Lists

In some situations, a word in one of the built-in lists of keywords may inadvertently block content unexpectedly. To correct this action, edit the specific pre-defined keyword list. When you click the pencil icon to edit a built-in list, the CSIA cloud platform interface presents a page of keywords with check boxes next to them. To remove the keyword from the built-in list, clear the box next to the keyword you would like to remove and clickSave。To apply this action to all groups, check the box that is labeledApply to All Groups

Identifying the Customer’s Citrix Secure Internet Access Node

  1. From theHomenavigate to theNode Collection ManagementCitrix SIA NODE
  2. ClickNode GroupsCitrix SIA NODE 2
  3. This provides you with both theCustomer CSIA Node-reports.ibosscloud.com and theCustomer CSIA Node-swg.ibosscloud.com Node Clusters.

Splunk Integration with Citrix Secure Internet Access Node

Splunk Server Setup

  1. Navigate to the Splunk Server instance and click theSettingslink at the top of the page, followed by theData inputslink under the “Data” subsection.Citrix SIA SPLUNK
  2. Click the Add new link to the right of the “UDP” section.Citrix SIA SPLUNK 1
  3. Enter a port into the “port” field (above 1023, if possible, to avoid security restrictions with the operating system). In the “Only accept connection from” field, enter your CSIA Reporter Node’s IP address. If nothing is entered in this field, connections from all hosts are accepted. When done, clickNextCitrix SIA SPLUNK 2
  4. On the next page, clickSelect Source Typeand type“syslog,”then select it.Citrix SIA SPLUNK 3
  5. Change the App Context toSearch & Reporting (search)Citrix SIA SPLUNK 4
  6. Change the Host Method toIPCitrix SIA SPLUNK 5
  7. ClickReview(review current configuration), then clickSubmitCitrix SIA SPLUNK 6

CSIA Reporting & Analytics Module Setup

  1. Navigate toReporting & Analytics > Log Forwarding > Forward From Reporterin the iboss cloud platform interface.Citrix SIA REPORTING
  2. UnderSplunk Integration, clickActions, then clickAdd ServerCitrix SIA REPORTING 1
  3. Add the Address/Host name of the Splunk Server to the “Host name” and the port number chosen on the Splunk server. Next, in the drop-down menu “Splunk Integration Protocol,” choose a protocol. The options available when adding a Splunk server appear as follows:Citrix SIA REPORTING 2
  4. You can also configure the Splunk server’s integration protocol as HEC. Configuring integration with a Splunk server using the HEC protocol requires the acquisition of the HEC token from the configuration of the Splunk server. Place the retrieved token into the Token field below the Splunk Integration Protocol selection drop-down menu.Citrix SIA REPORTING 3
  5. If implementing anELFFlog format for Splunk logging theSplunk Integration ELFF Batch Sizefield becomes available for configuration. The default value for configuration is100Citrix SIA REPORTING 4
  6. A toggle called “Accept All SSL Certs” is available under the “Splunk Integration” section withinSettings > External Logging。如果一个非标准的SSL Certificate such as a Self-Signed certificate or a certificate signed by a non-trusted root CA is used, switch this toggle to “YES” to bypass SSL certificate verification, otherwise leave the switch off.
  7. Select the format in which the log data is delivered from the “Log Format” drop-down menu. Finally, switch one or more of the toggles at the bottom of the interface to select the desired logging information types. Click theSavebutton to update the changes. The logging begins immediately. Perform a search on the Splunk instance to check data is being sent and indexed properly. See the sample output below.Citrix SIA REPORTING 5

Changing the Proxy Port

The CSIA proxy port may be changed, but you mustn’t attempt to change the proxy port to one that the gateway uses for other services.

Ports thatcannotbe used include: 53, 139, 199, 443, 445, 953, 1080, 1344, 5432, 6001, 7009, 7080, 7443, 8008 ,8015, 8016, 8025, 8026, 8035, 8036, 8080, 8200, 8201, 9080, 9443, 17500, 22022

All other ports are an acceptable alternative to the default port.

  1. Navigate to代理和缓存>代理设置Citrix SIA PROXY CHANGE
  2. Under theSettings tab, enter the desired port number on which the proxy listens for traffic into the Proxy Port field.Note:The port configured for this setting is used when configuring proxy settings in other platform functionalities. Some ports may not be available for assignment to this setting due to pre-configured gateway services.Citrix SIA PROXY CHANGE 1
  3. ClickSaveto apply this change.Citrix SIA PROXY CHANGE 2

Appendix

Main Category List

Note:Be careful with the “Not Rated” category, as it matches against many sites that are not categorized.

Category Description
Abortion* Sites related to abortion
Ads Sites used to distribute advertising graphics or content in addition to online coupons, advertising sales, voucher, deals, and offers
Adult Content Sites that contain adult-oriented material. Sites in this category do not contain any nudity but do feature profane and vulgar content. Sites that self-identify as being inappropriate for those under 18 falls under this category.
Alcohol/Tobacco Sites that contain alcohol and tobacco content. Also includes sites related to alcohol such as bars. Sites in this category do not contain illegal drugs, but may discuss, encourage, promote, offer, sell, supply, or otherwise advocate the use or creation of alcohol/tobacco.
Art Sites that contain art or discuss art, including museums. May also include printable coloring books, sculptures, mosaic, tattoos, calligraphy, fonts, painting, graffiti, Christian or religious designs, animation drawing, artistic design
Auctions Sites related to auctions and bidding on goods and services, both online and live
Audio & Video Sites that contain streaming or downloadable audio/video content such as mp3s, movie clips, and TV shows, in addition to sites that sell this content.
Business Sites that represent a business’s online presence. May be engaged in commerce or the activity of buying and selling products and services between the company and consumer. Includes Manufacturers, Producers, Suppliers, Dealers, Distributors, Wholesalers, Retailers, Family-owned businesses, and any other business-oriented entities.
CDN* Content Delivery Networks (CDNs) and sites related to CDNs
Dating & Personals Sites that offer dating services or aid in the establishment of romantic relationships
Dictionary 网站包含大量收藏备用ion and knowledge. Includes resources such as wikis, lexical dictionaries, maps, censuses, almanacs, library catalogs, genealogy-related sites, scientific information, and directories in addition to utilities like clocks, calculators, timers, and templates.
Drugs Sites containing content relating to illegal drugs such as Amphetamines, Barbiturates, Benzodiazepines, Cocaine, Designer Drugs, Ecstasy, Heroin. Does not refer to Cannabis/Marijuana
Drugs - Controlled* Sites related to controlled drugs and substances
Dynamic DNS* Sites that utilize dynamic DNS services to map their domain names to dynamic IP addresses.
Education Sites that provide educational services such as schools and universities, in addition to sites that offer educational materials for sale or reference. Includes websites that offer information on education or trade/vocational/career schools and programs. Also includes sites that are sponsored by schools, educational facilities, faculty, or alumni groups.
Entertainment Sites that contain or promote television, movies, magazines, radio, books, food, fashion, and lifestyle. More specifically, sites that provide information about or promote popular culture including (but not limited to) film, film critiques, and discussions, film trailers, box office, television, home entertainment, music, comics, graphic novels, literary news, and reviews, in addition to other entertainment-oriented periodicals, interviews, fan clubs, celebrity gossip, podcasts, and music and film charts, show, events, quotes, memes, lyrics, musicians, bands, theater arts, drama, opera, orchestra.
Extreme* Sites containing intensely vulgar, graphic, shocking, or disgusting content that would be considered highly offensive to most individuals.
File Sharing Sites for services that provide online file storage, file sharing, synchronization of files between devices, and or network-based data backup and restoration. These services may provide the means to upload, download, paste, organize, post, and share documents, files, computer code, text, non-copyright-restricted videos, music, and other electronically formatted information in virtual data storage. Also, this category covers services that distribute software to facilitate the direct exchange of files between users.
Finance Sites that contain content about banking, financial news and tips, the stock market, investing, credit cards, insurance, and lending.
Food Sites that contain content related to restaurants, food, dining, in addition to sites that list, review, discuss, advertise and promote food, catering, dining services, cooking, and recipes.
Forums Sites containing message boards, online chat rooms, and discussion forums
Freeware / Shareware* Sites related to distributing freeware and shareware software
Friendship Sites that contain platonic friendship related materials and social networking sites.
Gambling Sites that promote or contain gambling-related content such as online poker and casinos, sports betting, and lotteries. Sites where a user can place bets or participate in betting pools, lotteries, or receive information, assistance, recommendations, or training in such activities. This category does not include sites that sell gambling-related products or sites for offline casinos/hotels unless they meet one of the above requirements.
Games Sites that contain online games, or provide services and information about electronic games, household video games and consoles, computer games, and role-playing games. Also includes game guides/cheats, and accessories
Government Sites sponsored by or representing government agencies, including military and political organizations. May provide information on taxation, emergency services, and laws of various governmental entities. Also includes sites that provide adoption services, information about adoption, immigration information, and immigration services.
Guns & Weapons Sites that promote, sell, or provide information regarding firearms, knives, and other weapons
Hacking* Sites related to hacking and hacking tools
Health 网站包含相关内容健康,illnesses, and ailments, including hospitals, doctors, and prescription drugs, including sites primarily focusing on health research. Also, sites that provide advice and information on general health such as fitness and well-being, personal health, medical services, over-the-counter and prescription medications, health effects of both legal and illegal drug use, alternative and complementary therapies, dentistry, optometry, and psychiatry. Also, includes self-help and support organizations dedicated to a disease or health conditions.
Humor* Sites primarily related to jokes, humor, or comedy
Illegal Activity* Sites related to illicit activities or activities illegal in most countries
Image/Video Search Sites for image and video searching, including sharing of media (for instance, photo sharing) and have a low risk of including objectionable content such as adult or porno graphic material.
Informational Sites containing informational content such as regional information or advice
Infosec* Sites featuring content related to Information Security
Internet Communication Sites Related to internet communication and VOIP
IoT* Sites related to the Internet of Things and IoT devices
Jobs Sites that contain job search engines and other materials such as advice and strategies for seeking employment.
Kids* Sites primarily related to kids and young adults
Malware Content* Sites containing malicious software, viruses or malware, software hacks, illegal codes, and computer hacker-related material A common practice is to block the Malware category for all groups.
Marijuana* Sites related to the production, use, or sale of marijuana
Messaging* Site related to instant messaging and chat
Mobile Phones Sites that sell or provide information and services about mobile (cellular) phones
News 网站,提供新闻和时事,萤火虫ing online newspapers. Sites that primarily report information or comments on current events or contemporary issues of the day. Also includes news radio stations and news magazines. May not include sites that can be better captured by other categories.
Nudity* Sites containing any form of nudity
Online Meetings* Sites related to software for online meetings or hosting online meetings
Organizations Sites that contain content related to organizations that foster volunteerism for charity such as non-profits, foundations, societies, associations, communities, institutions. Also includes recognized pageants (Miss Earth), boys/girls scouts, and bodies that cultivate philanthropic or relief efforts.
P2P* Sites related to Peer-to-Peer (P2P) file sharing
Parked Domains Sites that are parked, meaning the domain is not associated with any service such as email or a website. These domains are often listed “for sale.”
Phishing* Sites and sites used in phishing and spearfishing campaigns
Piracy* Sites related to digital piracy
Political Sites that contain political content, including those representing political organizations or organizations promoting political views
Porn - Child Sites that contain adult-oriented content, including sexually explicit graphics and material featuring children, or appearing to feature children.
Porn/Nudity Sites that contain adult-oriented content, including sexually explicit graphics and material. Includes art with nudity, sex shops, and websites with ads showing nudity, games with nudity
Private Websites Sites created by individuals containing personal expressions such as blogs, personal diaries, experiences, or interest
Professional Services Sites offering professional, intangible products, or expertise (as opposed to material goods). Includes sites for services performed expertly by an individual or team for the benefit of its customers. The typical services include cleaning, repairs, accounting, banking, consulting, landscaping, education, insurance, treatment, and transportation services. Also, includes online tutoring, dance, driving, martial arts, musical instrument lessons, and essay writing.
Real Estate Sites focusing on real estate including agents, renting and leasing residences and offices, and other real estate information
Religion Sites that promote or provide information regarding religious beliefs and practices
Remote Access Tools* Remote access tools such as screen sharing services
Scams* Sites related to scams
Search Engines Sites that are used to search the web
Sex Ed Sites that contain content relating to sexual education. Content may be graphic but is designed to inform about the reproductive process, sexual development, safe sex practices, sexuality, birth control, tips for better sex, and sexual enhancement products.
Shopping Sites that are used to purchase consumer goods, including online auctions and classifieds. Includes event tickets
Spam* Sites related to spam or used in spam email campaigns
Sports Sites relating to sports and active hobbies. This includes organized, professional, and competitive sports in addition to active hobbies such as fishing, golf, hunting, jogging, canoeing, archery, chess.
Streaming Radio/TV Sites that contain streaming radio or television content
Suicide* Sites related to suicide, including suicide information
Suspicious* Sites that do not necessarily contain malware or malicious content, but, due to certain attributes, have been flagged as questionable. iboss’ Malware Analysis classifies these sites as “Unsafe”, even if no malware is detected. The Web Request Heuristic Protection, if active, also flags sites categorized as suspicious.
Swimsuit Sites that contain sexually revealing content, but no nudity. Includes shopping sites for bikini, swimsuits, lingerie, and other intimate apparel.
Technology Sites that contain content related technology, including software, computer hardware, technology companies, and technical computer help. Also, sites that sponsor or provide information, news, reviews, opinions, and coverage of computing, computing devices and technology, consumer electronics, and general technology.
Terrorism/Radicalization Sites that feature radical groups or movements with aggressive anti-government convictions or beliefs.
Tech Infrastructure* Sites Related to technology infrastructure
Toolbars Sites that offer toolbar downloads for web browsers
Translation Services* Sites providing translation services
Transportation Sites that contain content related to transportation. This includes information on trains, bus routes, and public transportation, and also sites selling, promoting, or relating to cars, motorcycles, boats, and aircraft.
Travel Sites that provide travel-related services or information such as online travel discussion, planning, tourism, lodging, and transportation such as airlines, trains, and buses, and the pertinent schedules and fares. Sites that promote or provide travel reservations, travel experiences, vehicle rentals, descriptions of travel destinations, or promotions for hotels/casinos or other travel-related accommodations. May include festivals and Amusement Parks.
Violence & Hate Sites that promote violent behavior or depict gratuitous images of death, gore or bodily harm
Web Hosting* Web hosting providers
Webmail Sites offering web-based email services
Web Proxies Sites that offer information on, services for, or downloads of web proxies, method often used in an attempt to bypass URL and Content Filters
PoC Guide: Citrix Secure Internet Access with Citrix Secure Private Access