Continuing on with our monthly meetup series, the October ACE (Ask the Cloud Experts) meetup covered Citrix Secure Workspace Access. We’ve recapped the questions asked and included their corresponding answers below. You can access the full on-demand recording at the bottom of the ACE registration page.

Be sure to join us each month to stay up to date on the latest cloud features and updates and then stick around to get your cloud questions answered by our panel of experts! Who doesn’t like free expert advice?

Our next ACE meetup. on November 20, will cover image management using Machine Creation Services and Citrix Provisioning. Register today.

Can my organization integrate analytics with Citrix Secure Workspace Access?
Yes. Citrix Analytics is integrated with Citrix Secure Workspace Access and presents information on the activities of users such as websites visited, bandwidth spent and detected threats.

Can I redirect traffic off our network with Citrix Secure Workspace Access?
Yes. Suspicious traffic can be denied or redirected with Citrix Secure Browser. Administrators can make policy changes to allow or block website access or redirect access in a Citrix Secure Browser service session.

Which SaaS applications does Citrix Secure Workspace Access support?
Citrix supports over 300 SaaS applications including Office 365, Slack, and GoToMeeting. In addition, Citrix is continually adding support for more applications.

What is the fastest way to reach support for Citrix Cloud-related issues?
Go to Citrix Cloud home, open a ticket, or call support directly.

How do you track Citrix Cloud outages?
The service health dashboard for Citrix Cloud is status.cloud.com. It reports performance issues and service disruptions.

Is there a way to receive email notifications on certain events within Citrix Cloud?
In addition to reporting performance issues and service disruptions, status.cloud.com enables administrators to subscribe for notifications on immediate incident updates. Notifications can be enabled for all services or selected services.

What happens if there’s a conflict of policies?
When using multiple policies, you must determine how to prioritize them, how to create exceptions, and how to view the effective policy when policies conflict. By default, new policies are given the lowest priority. If policy settings conflict, a policy with a higher priority (a priority number of 1 is the highest) overrides a policy with a lower priority.

How is traffic secure to SaaS applications in Citrix Secure Workspace Access?
Traffic opens in a standard browser if enhanced security is off; however, if enhance security is enabled the traffic is denied or redirected through a secure browser. The secure browser is hosted on a Linux machine by Citrix.

Thanks for reading, and don’t forget to register for the November ACE meetup on image management using Machine Creation Services and Citrix Provisioning.

— Belair Albahagwi, Customer Success Engineer