{"id":65874,"date":"2023-06-03T18:00:00","date_gmt":"2023-06-03T22:00:00","guid":{"rendered":"http:\/\/74d2948405.nxcli.io\/resources\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\/"},"modified":"2025-02-13T06:53:00","modified_gmt":"2025-02-13T11:53:00","slug":"80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os","status":"publish","type":"post","link":"https:\/\/xentegra.com\/hi\/resources\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\/","title":{"rendered":"80: IGEL Weekly: Enhance Endpoint Security with Citrix Endpoint Analysis (EPA) for IGEL OS"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/www.buzzsprout.com\/1555814\/episodes\/12971906-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os?iframe=true\" scrolling=\"no\" width=\"100%\" height=\"200\" frameborder=\"0\" style=\"width: 100%;height: 200px\"><\/iframe><\/p>\n<p>IGEL and Citrix have enjoyed a strong technical and marketing alliance within end-user computing for decades. The latest evidence of this is IGEL integrating the Citrix Gateway plugin into the IGEL OS for direct access to Citrix Endpoint Analysis.<\/p>\n<p>This integration in IGEL OS is unique and supports our joint customers with easy, direct access so they can run device checks centrally from the IGEL Universal Management Suite (UMS) management console without requiring any further plugin permission or installation.<\/p>\n<div class=\"transcript\">\n<p><!--block-->\u0935\u0947\u092c\u0935\u0940\u091f\u0940\u091f\u0940<\/p>\n<p>1<br \/>00:00:02.640 &#8211;&gt; 00:00:19.170<br \/>Andy Whiteside: Everyone welcome to the episode. 79 of Idl Weekly and Host Andy White Side this week is at a corporate edition. We&#8217;re gonna to mix it up, though, and actually, we&#8217;ll blog from the citric site and talk a little bit about endpoint analysis, and simply how it relates to I gel got Chris, Feeney with me. Chris, how&#8217;s it going?<\/p>\n<p>2<br \/>00:00:19.190 &#8211;&gt; 00:00:28.269<br \/>Chris Feeney: It&#8217;s going well, man, I feel like it&#8217;s been forever in a day since we&#8217;ve been together in the same. Podcast been busy first part of the year. That&#8217;s for sure.<\/p>\n<p>3<br \/>00:00:28.540 &#8211;&gt; 00:00:36.720<br \/>Andy Whiteside: Things are Things are well, yeah, part of the year. It&#8217;s June, almost right. We&#8217;re still. It&#8217;s crazy. Not only remember where the first half, when?<\/p>\n<p>4<br \/>00:00:37.860 &#8211;&gt; 00:00:47.250<br \/>Chris Feeney: Yeah, looking at the lot of expense reports getting in and out. And now but there&#8217;s been a lot of things to talk about, and exciting beginning of the year, for sure. So<\/p>\n<p>5<br \/>00:00:47.750 &#8211;&gt; 00:01:07.579<br \/>Andy Whiteside: so your ears are probably burning. I met a several people, several health care customers last week, and you know they&#8217;re working with Itel, and some of them know you slightly, and some of them don&#8217;t know you at all. And I was like, Well, that&#8217;s the guy we need to get you hooked up with if you&#8217;re talking about it. And some of these health care workflows So hopefully, my team is doing that. And you should<\/p>\n<p>6<br \/>00:01:07.640 &#8211;&gt; 00:01:20.450<br \/>Chris Feeney: get a couple more customers wanting to just chat with you and us occasionally. Yeah, I, the area that you cover at least the original area. I I spent a lot of time developing that territory. and<\/p>\n<p>7<br \/>00:01:20.630 &#8211;&gt; 00:01:24.889<br \/>Chris Feeney: and there are some people still around that I know and a few that I don&#8217;t. But<\/p>\n<p>8<br \/>00:01:25.090 &#8211;&gt; 00:01:26.840<br \/>Chris Feeney: yeah, it. It&#8217;s<\/p>\n<p>9<br \/>00:01:27.020 &#8211;&gt; 00:01:45.419<br \/>Chris Feeney: starting to get engaged more in those conversations, and the exciting thing is we we are bringing something to market. We are not talking about today. But we&#8217;re we&#8217;re weeks away from launching a new integration within provider that I&#8217;ve been very excited about. So more to come on that we&#8217;ll, we&#8217;ll definitely highlight on a podcast in the in the coming weeks.<\/p>\n<p>10<br \/>00:01:45.900 &#8211;&gt; 00:02:12.300<br \/>Andy Whiteside: Well, this is actually well, okay, so this is off the suit. The blog we&#8217;re talking about today is enhanced endpoint security with citrix endpoint analysis. EPA for I, Jo OS, and it&#8217;s from a guest. So the guess is actually Catherine, what looks like Gallagher Yup marketing. And I gel so it&#8217;s technically is an id blog just happens to be hosted on the the Citrix blog site.<\/p>\n<p>11<br \/>00:02:12.400 &#8211;&gt; 00:02:41.410<br \/>Andy Whiteside: The longstanding partnership we&#8217;ve had with Citrix over the decades now. and this is yet another integration that we can talk about today.<\/p>\n<p>12<br \/>00:02:41.810 &#8211;&gt; 00:02:56.240<br \/>Andy Whiteside: 0 trust as integral. We eliminated the idea by the the only way you could use VoIP is to log into our workspace and get a mitigated, a mitigated experience, where you only have access to say like a virtual desktop.<\/p>\n<p>13<br \/>00:02:56.380 &#8211;&gt; 00:03:22.639<br \/>Andy Whiteside: at the same time, if you have a byod device, but you move from a U d pocket, then all of a sudden you can have it, and then you can have access to everything again. So that&#8217;s a that&#8217;s the future design here. It&#8217;s integrated somewhat in place now. But you know, using citrix input analysis to determine. Okay, is this an igl unit or not? That&#8217;s that&#8217;s what we&#8217;re going to be doing. And one things I love about our company is we use the technology. Therefore we can stand behind things that we believe we&#8217;re<\/p>\n<p>14<br \/>00:03:22.640 &#8211;&gt; 00:03:30.840<br \/>Andy Whiteside: and you don&#8217;t have to, Mr. Customer. Guess at what works or try to figure it out. You can follow our blueprint, or you can talk to us about, you know, deviations from<\/p>\n<p>15<br \/>00:03:31.630 &#8211;&gt; 00:03:33.959<br \/>Chris Feeney: yeah, no doubt. I think that&#8217;s<\/p>\n<p>16<br \/>00:03:34.080 &#8211;&gt; 00:03:47.260<br \/>Chris Feeney:&nbsp; using it. Certainly getting a feel for it. I I&#8217;ve been heavily testing this this new integration. We&#8217;ve had, you know, on on different platforms and trying different things, and and getting a sense of.<\/p>\n<p>17<br \/>00:03:47.390 &#8211;&gt; 00:03:55.259<br \/>Chris Feeney: you know, do we feel like it&#8217;s, you know, ready to go, but but using it, certainly it gives you that confidence. And like, I said, when I&#8217;m on the road<\/p>\n<p>18<br \/>00:03:55.350 &#8211;&gt; 00:04:00.730<br \/>Chris Feeney: I carry my agile laptop, and it&#8217;d be pockets and swap them back and forth. So<\/p>\n<p>19<br \/>00:04:00.790 &#8211;&gt; 00:04:16.889<br \/>Chris Feeney: And with this. This is this really this idea, that store? This is remind me of my first year at Ijo and one of the Federal accounts they I wouldn&#8217;t call endpoint analysis, but their users needed to. In order to access their rise and desktop. They needed to<\/p>\n<p>20<br \/>00:04:17.140 &#8211;&gt; 00:04:25.549<br \/>Chris Feeney: have a VPN client that they were using. But it wasn&#8217;t enough just to have that. They wanted to be able to know that it was an ideal device coming in.<\/p>\n<p>21<br \/>00:04:25.600 &#8211;&gt; 00:04:28.109<br \/>Chris Feeney: And so we did something to try to make that<\/p>\n<p>22<br \/>00:04:28.160 &#8211;&gt; 00:04:36.139<br \/>Chris Feeney: acceptable when they were connecting in. And then once they passed that checkmark essentially, then they could, you know, proceed forward. So this is<\/p>\n<p>23<br \/>00:04:36.290 &#8211;&gt; 00:04:40.790<br \/>Chris Feeney: that similar kind of idea here, I&#8217;m sure it&#8217;s way better.<\/p>\n<p>24<br \/>00:04:41.000 &#8211;&gt; 00:04:50.459<br \/>Andy Whiteside: Yeah, he, Chris, your audio, maybe a little low, so maybe turn it up a little bit, or just speak up a little bit, but no part. Let me just check my microphone.<\/p>\n<p>25<br \/>00:04:50.920 &#8211;&gt; 00:04:52.840<br \/>Chris Feeney: Yeah, I know exactly what the prominent.<\/p>\n<p>26<br \/>00:04:53.160 &#8211;&gt; 00:04:54.820<br \/>Andy Whiteside: So I think we&#8217;ve covered.<\/p>\n<p>27<br \/>00:04:54.930 &#8211;&gt; 00:05:14.310<br \/>Andy Whiteside: you know, the general idea here. the the first real topic, once you get past the introduction is granular control enables direct access to analyze and check device posture. first paragraph, just talking about grants the it it administrators such in point out to how run health check<\/p>\n<p>28<br \/>00:05:14.370 &#8211;&gt; 00:05:17.529<br \/>Andy Whiteside: to to the targeted device.<\/p>\n<p>29<br \/>00:05:17.750 &#8211;&gt; 00:05:31.160<br \/>Andy Whiteside: and then really goes into this section here where it talks about the detect. What I think is most important here. When it comes to Ig because some of this other stuff doesn&#8217;t matter. And that is what is the actual operating system. Do you do you know, if there&#8217;s a specific<\/p>\n<p>30<br \/>00:05:31.520 &#8211;&gt; 00:05:36.350<br \/>Andy Whiteside: check that it checks specifically, for I gel when it&#8217;s looking at the endpoint.<\/p>\n<p>31<br \/>00:05:36.440 &#8211;&gt; 00:05:47.260<br \/>Chris Feeney: Yeah, I was just looking at. I need to check, because it&#8217;s obviously it&#8217;s it&#8217;s And, by the way, it is my audio better, it is alright. This is just a live demonstration of using a much better<\/p>\n<p>32<br \/>00:05:47.260 &#8211;&gt; 00:06:10.910<br \/>Andy Whiteside: audio like this. Epo headset little side we should have them as a sponsor. By the way, anyway, I think we&#8217;re caring about them all done my webcam wasn&#8217;t getting the job done. So we&#8217;re we&#8217;re working much better. Audio now, simple put if if you use virtual apps and virtual desktops and use, and you don&#8217;t use at least something similar to epo. You&#8217;re using the wrong thing. Correct?<\/p>\n<p>33<br \/>00:06:10.910 &#8211;&gt; 00:06:20.190<br \/>Chris Feeney: but yes, I believe there is. you know some level of checking there. I was checking to see, since it is part of the workspace app more specifically 2302<\/p>\n<p>34<br \/>00:06:20.300 &#8211;&gt; 00:06:29.180<br \/>Chris Feeney: That&#8217;s where I was looking to see if there&#8217;s a I see if it&#8217;s not on our side on their side where you say make sure it&#8217;s an igl, or you could specify it<\/p>\n<p>35<br \/>00:06:29.300 &#8211;&gt; 00:06:31.010<br \/>Chris Feeney: as such. So.<\/p>\n<p>36<br \/>00:06:31.810 &#8211;&gt; 00:07:01.430<br \/>Andy Whiteside: and you get checked. And it&#8217;s determined that your OS is Ij or some supported operating system, or, better yet not some not supported operating system or your your updates, your OS updates, your antivirus updates or antivirus period, your firewall, your web browser. Certain software is are up to date. you know. Do you? Can you explain what happens next? Yeah, this is a great question. So obviously, one of the benefits of I gel is.<\/p>\n<p>37<br \/>00:07:01.450 &#8211;&gt; 00:07:09.959<br \/>Chris Feeney: is it read on the OS. We don&#8217;t need a lot of that stuff like the end of our software or various things, but other things that might make sense to check our<\/p>\n<p>38<br \/>00:07:10.140 &#8211;&gt; 00:07:40.040<br \/>Chris Feeney: if the OS version does need to be updated, and on version 11 that but obviously include whatever the citrix workspace app is, or maybe the chromium browser. For, for, for example, what versions of those are out there? If, for example, there is a need to go to a higher version. I guess, as of 2302, anything higher than that. would they check for that? And And then, before proceeding, make sure that the OS gets an update. Now<\/p>\n<p>39<br \/>00:07:40.380 &#8211;&gt; 00:07:52.260<br \/>Chris Feeney: for those that administer idol, they know that as soon as the device comes online, whether it&#8217;s on the in the office talking to the Ums server directly or remotely managed, you can push out an update rather quickly.<\/p>\n<p>40<br \/>00:07:52.330 &#8211;&gt; 00:08:05.560<br \/>Chris Feeney: so that it is up to speed before it tries to connect into resources. So there are ways to handle that. But assuming that had not occurred this. This would basically do that check and say, hang on, you gotta you gotta update before you can connect.<\/p>\n<p>41<br \/>00:08:06.430 &#8211;&gt; 00:08:10.030<br \/>Andy Whiteside: Yeah. And I guess what I would highlight. In addition to that is.<\/p>\n<p>42<br \/>00:08:10.060 &#8211;&gt; 00:08:25.599<br \/>Andy Whiteside: you can grant access to some resources. but not others. So you can pick and choose. Do you give them a virtual desktop. Maybe. Probably I don&#8217;t know. You give them a virtual desktop. But turn off. You know, file redirection. Yeah. Maybe printings turned off. All kinds of things can happen.<\/p>\n<p>43<br \/>00:08:26.330 &#8211;&gt; 00:08:30.910<br \/>Chris Feeney: Yeah, the power of of those policy driven decisions.<\/p>\n<p>44<br \/>00:08:31.050 &#8211;&gt; 00:08:40.330<br \/>Chris Feeney: that is, I think, where you guys definitely excel on the Citrix knowledge mine. not so much. I could make a educated guess as to what those options might be. It could be.<\/p>\n<p>45<br \/>00:08:44.540 &#8211;&gt; 00:09:04.839<br \/>Andy Whiteside: and and part of that, too is, and this is, I struggle. I I meet people every week, and even though it&#8217;s 2023 people still either see Citrix as published apps, or some type of virtual server desktop or Vdi desktop. And if I were to long and it log into my workspace today, you would see just, you know, 50 different things that I can go and do<\/p>\n<p>46<br \/>00:09:05.060 &#8211;&gt; 00:09:08.060<br \/>Andy Whiteside: most of them. I don&#8217;t have to launch a virtual app or desktop to do.<\/p>\n<p>47<br \/>00:09:08.270 &#8211;&gt; 00:09:13.090<br \/>Chris Feeney: Yeah. And it&#8217;s really we talked about a lot. I mean, windows is just a<\/p>\n<p>48<br \/>00:09:13.200 &#8211;&gt; 00:09:22.389<br \/>Chris Feeney: a platform to access apps, you know, and there&#8217;s just a lot of apps that still need that type of platform, but a lot of them have migrated over<\/p>\n<p>49<br \/>00:09:22.630 &#8211;&gt; 00:09:25.870<br \/>Chris Feeney:&nbsp; and are easier to get into.<\/p>\n<p>50<br \/>00:09:25.930 &#8211;&gt; 00:09:34.750<br \/>Chris Feeney: let alone some of the, you know. authentication scenarios where you can authenticate once, and then it kind of gives you access seamlessly across your<\/p>\n<p>51<br \/>00:09:34.760 &#8211;&gt; 00:09:36.109<br \/>your resources.<\/p>\n<p>52<br \/>00:09:36.210 &#8211;&gt; 00:09:44.030<br \/>Chris Feeney: And I&#8217;ve tried. I know, for example, we talked about it before I I I&#8217;ve tried to work out of just the edge browser, for example, for a day<\/p>\n<p>53<br \/>00:09:44.290 &#8211;&gt; 00:09:47.719<br \/>Chris Feeney: and everything I need out of there, and honestly.<\/p>\n<p>54<br \/>00:09:47.890 &#8211;&gt; 00:09:49.410<br \/>Chris Feeney: a terrible experience.<\/p>\n<p>55<br \/>00:09:49.560 &#8211;&gt; 00:09:56.730<br \/>Chris Feeney: You know. I&#8217;m sorry it didn&#8217;t come through. Did you say? A terrible experience or not? No, not a terrible, I mean.<\/p>\n<p>56<br \/>00:09:56.820 &#8211;&gt; 00:10:05.660<br \/>Chris Feeney: Remember, when you guys had your kick off in Nashville, I forced myself to present from. We&#8217;re doing it through teams, but from the browser.<\/p>\n<p>57<br \/>00:10:05.950 &#8211;&gt; 00:10:11.379<br \/>Chris Feeney: in this case, edge on my device. I think it was my igl device. And it worked great.<\/p>\n<p>58<br \/>00:10:11.530 &#8211;&gt; 00:10:12.250<br \/>\u090f\u0902\u0921\u0940 \u0935\u094d\u0939\u093e\u0907\u091f\u0938\u093e\u0907\u0921: \u0939\u093e\u0901\u0964<\/p>\n<p>59<br \/>00:10:12.900 &#8211;&gt; 00:10:25.539<br \/>Andy Whiteside: yeah, the only real real wild part of your environment set up is network latency, and I did it last week at a Ruth Chris, and you know it 5 years ago. I&#8217;ve been really scared these days. I was less scared, and it worked worked really? Well.<\/p>\n<p>60<br \/>00:10:27.200 &#8211;&gt; 00:10:34.549<br \/>Chris Feeney: Yeah, I&#8217;m less scared about the the latency pieces, I mean, especially when you&#8217;re running a virtual desktop these days. It just seems to have<\/p>\n<p>61<br \/>00:10:35.790 &#8211;&gt; 00:10:58.279<br \/>Andy Whiteside: the experience. Factors go on on way way up, even if it&#8217;s just on for G. Lt, or whatever. It&#8217;s not terrible. Yeah. Well, yeah, it&#8217;s the. It&#8217;s the latency that&#8217;s the key. And I&#8217;m I&#8217;m using it this morning on my all in one back here and working. And you know a little bit of typing latency which I could talk to my team about, but other than that, it&#8217;s been a phenomenal experience, and very secure all at the same time.<\/p>\n<p>62<br \/>00:11:00.000 &#8211;&gt; 00:11:23.369<br \/>Andy Whiteside: Nice. Well, I think, you guys, you mentioned earlier, you&#8217;re going to try to implement some of this EPA stuff or already, are is that correct? Well, we&#8217;ve gone from, you know, being a Citrix partner, that was all about byod to being a partner who understands that boid be. Oh, bring your own device, Byod is a is a good thing, but needs to be mitigated and controlled.<\/p>\n<p>63<br \/>00:11:23.370 &#8211;&gt; 00:11:30.240<br \/>Andy Whiteside: you know, between single identity sign on a multi-factor challenge.<\/p>\n<p>64<br \/>00:11:30.240 &#8211;&gt; 00:11:42.770<br \/>Andy Whiteside: you know, good identity provider scenario between all that, plus plus controlling the devices with either a tanium agent, or, you know, limiting devices to something that we send out.<\/p>\n<p>65<br \/>00:11:42.830 &#8211;&gt; 00:11:57.159<br \/>Andy Whiteside: If you do. If you have all that, then you get, see everything. If you don&#8217;t have one of those, and you get, see a small subset of things. But for the most part it&#8217;s what the people need to do their job. So we&#8217;re you know, we&#8217;re implementing a user experience, a 0 trust.<\/p>\n<p>66<br \/>00:11:57.270 &#8211;&gt; 00:12:05.999<br \/>Andy Whiteside: High definition, user experience is probably the best way to say that I think not enough. People say those 2 things in conjunction. and it really needs to be both at the same time.<\/p>\n<p>67<br \/>00:12:06.660 &#8211;&gt; 00:12:17.790<br \/>Andy Whiteside: Yeah, the the 0 trust, the high definition experience. Is that what you said? High definition, user experience, 0 trust or 0 trust with a high definition user experience. That&#8217;s actually your goal.<\/p>\n<p>68<br \/>00:12:17.910 &#8211;&gt; 00:12:18.710<br \/>Chris Feeney: Yeah.<\/p>\n<p>69<br \/>00:12:19.310 &#8211;&gt; 00:12:23.139<br \/>Chris Feeney: no, I like that. It it. It&#8217;s it&#8217;s, you know, it goes back to<\/p>\n<p>70<br \/>00:12:23.400 &#8211;&gt; 00:12:33.119<br \/>Chris Feeney: what I learned years ago. trying to implement. you know, new technology or enhance technology and health care. You gotta find the right mix between security and convenience.<\/p>\n<p>71<br \/>00:12:33.290 &#8211;&gt; 00:12:41.129<br \/>Andy Whiteside: And if you get that blended together and the user doesn&#8217;t really know that behind the scenes there&#8217;s a bunch of security in place to make that a great experience.<\/p>\n<p>72<br \/>00:12:41.270 &#8211;&gt; 00:12:42.320<br \/>Chris Feeney: That&#8217;s<\/p>\n<p>73<br \/>00:12:42.650 &#8211;&gt; 00:12:52.250<br \/>Andy Whiteside: once, they say the Holy Grail, if you will. But that&#8217;s that&#8217;s what you&#8217;re aiming for. The the restaurant in town with the best food, but without a good customer. Experience is not going to be a great restaurant.<\/p>\n<p>74<br \/>00:12:52.800 &#8211;&gt; 00:12:53.770<br \/>indeed.<\/p>\n<p>75<br \/>00:12:54.270 &#8211;&gt; 00:13:02.870<br \/>Chris Feeney: that we yeah, we went to one we this weekend we been there years and years, but admin in a while we went back, and<\/p>\n<p>76<br \/>00:13:03.750 &#8211;&gt; 00:13:07.849<br \/>Chris Feeney: they they could have made it a much better experience if they even just had.<\/p>\n<p>77<br \/>00:13:08.290 &#8211;&gt; 00:13:14.740<br \/>Chris Feeney: like music playing lightly above. Right? It was just it was dead quiet, if you will, and you can kind of hear whether you were<\/p>\n<p>78<br \/>00:13:14.750 &#8211;&gt; 00:13:16.360<br \/>Chris Feeney: talking about it, and<\/p>\n<p>79<br \/>00:13:16.630 &#8211;&gt; 00:13:38.209<br \/>Chris Feeney: you know just all. You always use a little bit of ambience, and it would have made it a little bit better. It could actually have bad food. But good omni and people would actually maybe likely like it come back. Yeah. So just that little thing we&#8217;re like, you know what? I probably will come back here for a while, if at all. So it&#8217;s all about understanding that crazy thing that matters the most, and that is the human being.<\/p>\n<p>80<br \/>00:13:38.610 &#8211;&gt; 00:13:42.320<br \/>Chris Feeney: I guess, to look at it this way. If if the end user knows that<\/p>\n<p>81<br \/>00:13:43.050 &#8211;&gt; 00:13:53.789<br \/>Chris Feeney: it&#8217;s Citrix or I jail, or whatever. And they start using those words. Then you realize you&#8217;re kind of in a bad situation. Generally speaking, you know, if if they&#8217;re having problems and they&#8217;re like, oh, it&#8217;s this.<\/p>\n<p>82<br \/>00:13:53.920 &#8211;&gt; 00:14:00.100<br \/>Chris Feeney: you know you you want to try to make that invisible if you will. and<\/p>\n<p>83<br \/>00:14:00.120 &#8211;&gt; 00:14:06.859<br \/>Chris Feeney: you know, you can do a lot. Obviously with these combination of technologies. But if they are already starting to put those words in a bad context, you<\/p>\n<p>84<br \/>00:14:06.900 &#8211;&gt; 00:14:08.670<br \/>Chris Feeney: you&#8217;re fighting an uphill battle.<\/p>\n<p>85<br \/>00:14:08.840 &#8211;&gt; 00:14:31.770<br \/>Andy Whiteside: Well, and what I dislike the most, and I&#8217;ve done it with people. Multiple times in my career is when you make that support call and the tier one guy starts specifically telling the end user what it is they&#8217;re dealing with and potentially blaming the part that isn&#8217;t even the problem. But they don&#8217;t know any different. They just think they sound smart by by throwing out the the different technologies under the covers that will get me red up in a heartbeat.<\/p>\n<p>86<br \/>00:14:32.070 &#8211;&gt; 00:14:34.590<br \/>Chris Feeney: Yeah, I&#8217;m very much<\/p>\n<p>87<br \/>00:14:35.170 &#8211;&gt; 00:14:37.210<br \/>Chris Feeney: my approach is is<\/p>\n<p>88<br \/>00:14:37.250 &#8211;&gt; 00:14:42.450<br \/>Chris Feeney: obviously understanding. What is the the use case we&#8217;re trying to achieve? Has that been<\/p>\n<p>89<br \/>00:14:42.470 &#8211;&gt; 00:14:45.289<br \/>Chris Feeney: correctly set up? And if so<\/p>\n<p>90<br \/>00:14:46.320 &#8211;&gt; 00:14:51.449<br \/>Chris Feeney: are we dealing with? Okay, something&#8217;s not quite working. We got to fix that, or is it? You know.<\/p>\n<p>91<br \/>00:14:51.960 &#8211;&gt; 00:15:03.710<br \/>Chris Feeney: it&#8217;s something they want to do that we have never done before or whatever right? Or maybe it&#8217;s a true bug, whatever. Yeah, so and there are true bugs. But more than not as configuration issues.<\/p>\n<p>92<br \/>00:15:03.770 &#8211;&gt; 00:15:07.309<br \/>Chris Feeney: I just. I can&#8217;t live driving into the weeds right out of the gate.<\/p>\n<p>93<br \/>00:15:07.680 &#8211;&gt; 00:15:14.090<br \/>Chris Feeney: My I do a trust, but verify I love that. That was my Ronald Reagan&#8217;s kind of approach when they were<\/p>\n<p>94<br \/>00:15:14.300 &#8211;&gt; 00:15:26.380<br \/>Chris Feeney: keeping the Russians at bay. Right? You know they had this and that really, honestly, from my days in the Federal that really referred to the verify was our spy satellites checking on them, making sure they were.<\/p>\n<p>95<br \/>00:15:26.490 &#8211;&gt; 00:15:28.949<br \/>Chris Feeney: you know, staying through to the<\/p>\n<p>96<br \/>00:15:29.230 &#8211;&gt; 00:15:35.539<br \/>Chris Feeney: negotiations, and and whatever. But but yeah, trust the verify. I I use that.<\/p>\n<p>97<br \/>00:15:35.810 &#8211;&gt; 00:15:41.100<br \/>Chris Feeney:&nbsp; yeah, I understand what your problem is. But let me just take a look at a couple of things first. So.<\/p>\n<p>98<br \/>00:15:42.460 &#8211;&gt; 00:15:53.210<br \/>Chris Feeney: we actually can do that today with one of your teams customers trying it out. And something&#8217;s not quite going right. I don&#8217;t know exactly what the problem is. We&#8217;re gonna take a look. And my, I suspect it&#8217;s just configuration, and should be<\/p>\n<p>99<br \/>00:15:53.310 &#8211;&gt; 00:15:55.660<br \/>Chris Feeney: in and out in 10&nbsp;min hopefully.<\/p>\n<p>100<br \/>00:15:56.000 &#8211;&gt; 00:15:56.800<br \/>Chris Feeney: So<\/p>\n<p>101<br \/>00:16:00.340 &#8211;&gt; 00:16:01.659<br \/>Chris Feeney: I can hear you.<\/p>\n<p>102<br \/>00:16:01.710 &#8211;&gt; 00:16:03.360<br \/>Chris Feeney: Not really, I think.<\/p>\n<p>103<br \/>00:16:03.580 &#8211;&gt; 00:16:05.309<br \/>Chris Feeney: check your audio, my friend.<\/p>\n<p>104<br \/>00:16:08.980 &#8211;&gt; 00:16:10.170<br \/>Chris Feeney: Nope.<\/p>\n<p>105<br \/>00:16:22.910 &#8211;&gt; 00:16:25.740<br \/>Andy Whiteside: okay, how about now?<\/p>\n<p>106<br \/>00:16:26.020 &#8211;&gt; 00:16:31.269<br \/>Andy Whiteside: A microphone would die on me or something. Anyway, I&#8217;ll tell you. I&#8217;ll get excited because<\/p>\n<p>107<br \/>00:16:31.400 &#8211;&gt; 00:16:39.609<br \/>Andy Whiteside: Max from E post. Just let me know kind of the headset for me. So I&#8217;m excited about that.<\/p>\n<p>108<br \/>00:16:39.980 &#8211;&gt; 00:16:46.849<br \/>Chris Feeney: I whether it&#8217;s the Speaker phone or this one that I use, and I&#8217;m walking around the house or something or the adapt ones that I carry on the road with me.<\/p>\n<p>109<br \/>00:16:47.130 &#8211;&gt; 00:16:50.200<br \/>Chris Feeney: this stuff&#8217;s awesome. So<\/p>\n<p>110<br \/>00:16:50.750 &#8211;&gt; 00:16:52.210<br \/>Chris Feeney: makes a difference.<\/p>\n<p>111<br \/>00:16:52.420 &#8211;&gt; 00:17:00.109<br \/>Andy Whiteside: Yeah, it&#8217;s over to one, my Yeti Mike whatever, however, quit working on me, and now I&#8217;m on the device for right sound and<\/p>\n<p>112<br \/>00:17:00.280 &#8211;&gt; 00:17:10.139<br \/>Andy Whiteside: save the day again. All right. Well, Chris, thank you for the time. I know you got a lot to do coming off a holiday weekend. I know I got a ton to do but appreciate it, and we&#8217;ll do it again a couple of weeks.<\/p>\n<p><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>IGEL and Citrix have enjoyed a strong technical and marketing alliance within end-user computing for decades. The latest evidence of this is IGEL integrating the Citrix Gateway plugin into the &hellip;<\/p>","protected":false},"author":7,"featured_media":65861,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-65874","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-podcast"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>80: IGEL Weekly: Enhance Endpoint Security with Citrix Endpoint Analysis<\/title>\n<meta name=\"description\" content=\"Learn more about how the integration in IGEL OS is unique and supports our joint customers with easy, direct access.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xentegra.com\/hi\/resources\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\/\" \/>\n<meta property=\"og:locale\" content=\"hi_IN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"80: IGEL Weekly: Enhance Endpoint Security with Citrix Endpoint Analysis\" \/>\n<meta property=\"og:description\" content=\"Learn more about how the integration in IGEL OS is unique and supports our joint customers with easy, direct access.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xentegra.com\/hi\/resources\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\/\" \/>\n<meta property=\"og:site_name\" content=\"XenTegra\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XenTegra\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-03T22:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-13T11:53:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/IGEL-WEEKLY.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chase Newmyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xentegra\" \/>\n<meta name=\"twitter:site\" content=\"@xentegra\" \/>\n<meta name=\"twitter:label1\" content=\"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chase Newmyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 \u092e\u093f\u0928\u091f\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\\\/\"},\"author\":{\"name\":\"Chase Newmyer\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\"},\"headline\":\"80: IGEL Weekly: Enhance Endpoint Security with Citrix Endpoint Analysis (EPA) for IGEL OS\",\"datePublished\":\"2023-06-03T22:00:00+00:00\",\"dateModified\":\"2025-02-13T11:53:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\\\/\"},\"wordCount\":3723,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/IGEL-WEEKLY.png\",\"articleSection\":[\"Podcast\"],\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\\\/\",\"name\":\"80: IGEL Weekly: Enhance Endpoint Security with Citrix Endpoint Analysis\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/IGEL-WEEKLY.png\",\"datePublished\":\"2023-06-03T22:00:00+00:00\",\"dateModified\":\"2025-02-13T11:53:00+00:00\",\"description\":\"Learn more about how the integration in IGEL OS is unique and supports our joint customers with easy, direct access.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\\\/#breadcrumb\"},\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/IGEL-WEEKLY.png\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/IGEL-WEEKLY.png\",\"width\":1100,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xentegra.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"80: IGEL Weekly: Enhance Endpoint Security with Citrix Endpoint Analysis (EPA) for IGEL OS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"name\":\"XenTegra\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xentegra.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hi-IN\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\",\"name\":\"XenTegra\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"width\":200,\"height\":200,\"caption\":\"XenTegra\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XenTegra\\\/\",\"https:\\\/\\\/x.com\\\/xentegra\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/xentegra-llc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\",\"name\":\"Chase Newmyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"caption\":\"Chase Newmyer\"},\"url\":\"https:\\\/\\\/xentegra.com\\\/hi\\\/resources\\\/author\\\/chasenewmyer\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"80: IGEL Weekly: Enhance Endpoint Security with Citrix Endpoint Analysis","description":"Learn more about how the integration in IGEL OS is unique and supports our joint customers with easy, direct access.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xentegra.com\/hi\/resources\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\/","og_locale":"hi_IN","og_type":"article","og_title":"80: IGEL Weekly: Enhance Endpoint Security with Citrix Endpoint Analysis","og_description":"Learn more about how the integration in IGEL OS is unique and supports our joint customers with easy, direct access.","og_url":"https:\/\/xentegra.com\/hi\/resources\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\/","og_site_name":"XenTegra","article_publisher":"https:\/\/www.facebook.com\/XenTegra\/","article_published_time":"2023-06-03T22:00:00+00:00","article_modified_time":"2025-02-13T11:53:00+00:00","og_image":[{"width":1100,"height":600,"url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/IGEL-WEEKLY.png","type":"image\/png"}],"author":"Chase Newmyer","twitter_card":"summary_large_image","twitter_creator":"@xentegra","twitter_site":"@xentegra","twitter_misc":{"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924":"Chase Newmyer","\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f":"17 \u092e\u093f\u0928\u091f"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xentegra.com\/resources\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\/#article","isPartOf":{"@id":"https:\/\/xentegra.com\/resources\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\/"},"author":{"name":"Chase Newmyer","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7"},"headline":"80: IGEL Weekly: Enhance Endpoint Security with Citrix Endpoint Analysis (EPA) for IGEL OS","datePublished":"2023-06-03T22:00:00+00:00","dateModified":"2025-02-13T11:53:00+00:00","mainEntityOfPage":{"@id":"https:\/\/xentegra.com\/resources\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\/"},"wordCount":3723,"commentCount":0,"publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"image":{"@id":"https:\/\/xentegra.com\/resources\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/IGEL-WEEKLY.png","articleSection":["Podcast"],"inLanguage":"hi-IN","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xentegra.com\/resources\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xentegra.com\/resources\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\/","url":"https:\/\/xentegra.com\/resources\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\/","name":"80: IGEL Weekly: Enhance Endpoint Security with Citrix Endpoint Analysis","isPartOf":{"@id":"https:\/\/xentegra.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xentegra.com\/resources\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\/#primaryimage"},"image":{"@id":"https:\/\/xentegra.com\/resources\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/IGEL-WEEKLY.png","datePublished":"2023-06-03T22:00:00+00:00","dateModified":"2025-02-13T11:53:00+00:00","description":"Learn more about how the integration in IGEL OS is unique and supports our joint customers with easy, direct access.","breadcrumb":{"@id":"https:\/\/xentegra.com\/resources\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\/#breadcrumb"},"inLanguage":"hi-IN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xentegra.com\/resources\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\/"]}]},{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/resources\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\/#primaryimage","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/IGEL-WEEKLY.png","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/IGEL-WEEKLY.png","width":1100,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/xentegra.com\/resources\/80-igel-weekly-enhance-endpoint-security-with-citrix-endpoint-analysis-epa-for-igel-os\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xentegra.com\/"},{"@type":"ListItem","position":2,"name":"80: IGEL Weekly: Enhance Endpoint Security with Citrix Endpoint Analysis (EPA) for IGEL OS"}]},{"@type":"WebSite","@id":"https:\/\/xentegra.com\/#website","url":"https:\/\/xentegra.com\/","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","description":"","publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xentegra.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hi-IN"},{"@type":"Organization","@id":"https:\/\/xentegra.com\/#organization","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","url":"https:\/\/xentegra.com\/","logo":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","width":200,"height":200,"caption":"XenTegra"},"image":{"@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XenTegra\/","https:\/\/x.com\/xentegra","https:\/\/www.linkedin.com\/company\/xentegra-llc"]},{"@type":"Person","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7","name":"Chase Newmyer","image":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","caption":"Chase Newmyer"},"url":"https:\/\/xentegra.com\/hi\/resources\/author\/chasenewmyer\/"}]}},"_links":{"self":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/65874","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/comments?post=65874"}],"version-history":[{"count":1769,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/65874\/revisions"}],"predecessor-version":[{"id":716295,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/65874\/revisions\/716295"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media\/65861"}],"wp:attachment":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media?parent=65874"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/categories?post=65874"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/tags?post=65874"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}