Additional Features

User Activity Logging

The User Activity Logging feature lets customers track and audit user browsing activity during Citrix Remote Browser Isolation (RBI) sessions. The feature captures visited host names, access timestamps, user identifiers, and allowlist enforcement status. All collected data is stored in the customer’s Azure Storage Account, which provides full data ownership and control.

Important:

This feature must be enabled at both the customer level and the application level. Browsing activity data is uploaded hourly and is not real-time.

Key Benefits

  • Compliance and auditing: Meet enterprise audit requirements and regulatory compliance standards.
  • Security analysis: Identify abnormal browsing patterns and potential security threats.
  • Policy optimization: Analyze user behavior to refine allowlist configurations.
  • Data sovereignty: Keep data under your control in your Azure environment.

Prerequisites

Before configuring User Activity Logging, ensure that you have the following:

  • A valid Azure subscription.
  • An Azure Storage Account for browsing activity data.
  • A catalog created under the Remote Browser Isolation service.

Configuration steps

Step 1: Retrieve Azure Storage connection string

This guide assumes that an Azure Storage Account exists. To create one, see Azure Storage documentation.

  1. Sign in to Azure portal and open the Storage Account.
  2. In the left menu, go to Security + networking and select Access keys.
  3. Copy the Connection string from either key1 or key2.
  4. Store the connection string securely for use in the step 3 (Verify the feature is working).

Note:

Citrix RBI automatically creates a container named user-activity when you save the configuration. Manual container creation is not required.

Azure Portal

Step 2: Configure User Activity Logging for applications

Azure Storage connections can be configured per application.

Create or update configuration
  1. In the Admin Console, navigate to the Manage page.
  2. Select the catalog and application for which User Activity Logging must be enabled.
  3. Find the User activity logging setting.
  4. Enable User activity logging.
  5. Paste the Azure Storage connection string from Step 1.
  6. Click Save.

Session Monitor Test

User Activity Logging

When the configuration is saved, the system:

  • Validates the connection string.
  • Checks connectivity to Azure Storage.
  • Creates a container named user-activity if it does not exist.
  • Confirms connection permissions.
Delete configuration

To stop tracking browsing activity for a specific application:

  1. Navigate to the settings page for that application.
  2. Find the User activity logging setting.
  3. Disable User activity logging.
  4. Click Save.

After deleting the configuration, newly launched user sessions no longer record browsing activity. Historical data already uploaded to Azure Storage is not deleted.

Step 3: Verify the feature is working

After configuration is complete, verify the feature:

  1. Launch a new browser session using the application configured with User Activity Logging.
  2. Visit several websites, for example www.google.com and www.microsoft.com.
  3. Wait for upload. Browsing activity is saved locally first and uploaded hourly.
  4. For initial verification, wait at least 1-2 hours.
  5. In Azure portal, open the Storage Account and then the user-activity container.
  6. Verify that new JSON files appear.
  7. Download a JSON file and confirm it contains hostnames of visited websites.

Viewing and analyzing browsing activity

Data Storage Structure

Browsing activity data is organized in Azure Blob Storage by date and file name:

Container: user-activity
|- YYYY-MM-DD/
|  |- {VDAHostname}_{GUID}_{AppName}_{YYYY-MM-DD-HH}.json
|  |- {VDAHostname}_{GUID}_{AppName}_{YYYY-MM-DD-HH}.json
|  `- {VDAHostname}_{GUID}_{AppName}_{YYYY-MM-DD-HH}.json
`- YYYY-MM-DD/
    `- ...
<!--NeedCopy-->

File naming convention

  • Folder structure: {YYYY-MM-DD}/ (organized by date).
  • File name pattern: {VDAHostname}_{GUID}_{AppName}_{YYYY-MM-DD-HH}.json
  • {VDAHostname}: Hostname of the VDA machine.
  • {GUID}: Unique identifier for each upload batch.
  • {AppName}: Name of the Secure Browser application.
  • {YYYY-MM-DD-HH}: Upload timestamp in 24-hour format.

New files are generated every hour for each active VDA.

Data format description

Each JSON file contains multiple records in NDJSON format (newline-delimited JSON). Each line represents one access event.

{"accessHostEvent":{"hostName":"www.google.com","acceptHost":true},"accessTime":"2026-01-29T14:23:45.123Z","sessionId":"abc123-def456-ghi789","userName":"user@example.com","appName":"MySecureBrowser"}
{"accessHostEvent":{"hostName":"www.microsoft.com","acceptHost":true},"accessTime":"2026-01-29T14:25:10.456Z","sessionId":"abc123-def456-ghi789","userName":"user@example.com","appName":"MySecureBrowser"}
{"accessHostEvent":{"hostName":"malicious.site","acceptHost":false},"accessTime":"2026-01-29T14:30:22.789Z","sessionId":"abc123-def456-ghi789","userName":"user@example.com","appName":"MySecureBrowser"}
<!--NeedCopy-->

Field descriptions

Field Description Example
accessHostEvent.hostName Hostname of the website accessed by the user. www.google.com
accessHostEvent.acceptHost Whether access is allowed by the allowlist (true means allowed and false means blocked). true
accessTime Access timestamp (UTC). 2026-01-29T14:23:45.123Z
sessionId Unique session identifier. abc123-def456-ghi789
userName User identifier. user@example.com
appName Application name. MySecureBrowser

Privacy protection: The system records only hostnames such as www.example.com. It does not record full URL paths, query parameters, or user-entered content.

Methods for viewing data

Use the following methods to view browsing activity records:

Azure Storage Explorer
  1. Download and install Azure Storage Explorer.
  2. Connect to the Storage Account.
  3. Browse the user-activity container.
  4. Download JSON files and review their content.
Azure portal
  1. Sign in to Azure portal.
  2. Navigate to the Storage Account.
  3. Select Containers > user-activity.
  4. Download files to view their contents.

Tip: For deeper analysis, import the data into Excel, Power BI, or another analytics tool.

Key features and considerations

Feature highlights

  • Automatic recording: Captures website access events without manual intervention.
  • Blocked attempts included: Captures blocked access attempts (acceptHost: false) for allowlist analysis.
  • Hourly uploads: Uploads data in hourly batches to reduce network overhead.
  • Data sovereignty: Stores all data in the customer’s Azure environment.
  • Multi-application support: Supports separate or shared Storage Account configuration across applications.

Limitations

  • Not real-time: Data can take up to one hour to appear in Azure Storage.
  • Dedicated Edition only: Available only for Dedicated Edition applications.
  • Fixed container name: The container name is user-activity and cannot be customized.
  • VDA restart impact: Data not uploaded yet can be lost if a VDA restarts before upload.

Troubleshooting

Issue 1: No Data in Azure Storage

Possible causes:

  • The feature toggle is not enabled.
  • The connection string is incorrect or expired.
  • Insufficient wait time (at least one hour is required).
  • The application is not Dedicated Edition.

Resolutions:

  1. Check feature toggle status.
  2. Reconfigure the connection string and save.
  3. Start a new session, visit websites, and wait 1-2 hours.
  4. Confirm the application is Dedicated Edition.
  5. Verify that the user-activity container was created.

Issue 2: Validation fails when configuring connection string

Possible causes:

  • Connection string format is incorrect.
  • Storage Account network restrictions block access.
  • Insufficient permissions to create containers.

Resolutions:

  1. Copy the complete connection string again from Azure portal.
  2. Check Storage Account firewall settings. For testing, temporarily allow broader network access.
  3. Verify that the connection string grants container creation permissions.
  4. Ensure that the Storage Account is not locked or otherwise restricted.

Issue 3: User sessions are interrupted or slow after data upload

No, data uploads run in the background and do not interrupt normal browser usage. Upload uses asynchronous I/O with minimal resource consumption.

Issue 4: Does configuration take effect immediately for active user sessions?

No, users must close the current session and start a new one for updated settings to apply. Active sessions continue using the configuration present at launch time.

Issue 5: Can multiple applications use the same Storage Account?

Yes, multiple applications can share the same Storage Account and user-activity container. File naming and the appName field help distinguish data between applications.

Integration with Chrome Enterprise Premium (CEP)

This topic introduces the integration between Citrix Remote Browser Isolation (RBI) and Google Chrome Enterprise Premium (CEP) for Linux VDAs. It explains what the feature enables, how it works, and what administrators must know before enabling it.

Introduction

Google Chrome Enterprise Premium (CEP) provides advanced security, browser management, and policy enforcement for enterprise environments. With this feature, the Citrix RBI browser can enroll into Chrome Enterprise policies by using a Google enrollment token. Administrators can then centrally manage organizational and departmental secure browser policies from Google Admin console.

This integration provides a scalable, cloud-managed approach to enforce security and compliance on untrusted endpoint devices without requiring an EDR agent.

What this feature enables

With CEP integration:

Administrators can:

  • Apply Chrome Enterprise policies to all Citrix RBI browser users in the same catalog.
  • Centrally manage those policies through Google Admin console.

Users can:

  • Use an RBI browser that becomes a managed browser after enrollment.
  • Receive consistent enterprise policies, for example copy and paste controls and URL blocklists.
  • Receive automatic policy updates from Google Cloud.

How to use it

Preparation

Before enabling CEP integration:

  1. Confirm that Google Workspace supports Chrome Enterprise Premium.
  2. Make sure at least one Citrix RBI catalog exists. If not, create one.
  3. Identify which RBI catalogs must be governed by Chrome policies.
  4. Generate one enrollment token per organizational unit (OU) in Google Admin console, if needed.

Configuration on Citrix Cloud portal

CEP requires an enrollment token for each catalog. Citrix automatically distributes the token to user sessions launched from that catalog.

Enrollment flow
  1. Obtain an enrollment token from Google Admin console.
  2. Sign in to Citrix Cloud and navigate to Remote Browser Isolation.
  3. Select Manage in the left menu.
  4. Select the target catalog, then open Configuration Details.
  5. Enable Enable Google Token Enrollment and enter the enrollment token.
  6. Select Apply token.

CEP Integration

When a user launches a secure browser application under that catalog, token enrollment happens automatically and browsing continues in the CEP-enrolled browser.

Administrator tasks

  • Disable or re-enable Enable Google Token Enrollment, or update the enrollment token.
  • Monitor Chrome policy enforcement using chrome://policy.
  • Review the Google Admin device list periodically and remove stale records.

Limitations and known behaviors

User profile sync is not supported

Chrome user profile cloud sync does not function inside a CEP token-enrolled RBI browser.

Reboot is required for each configuration change

Because RBI uses ephemeral file systems, a reboot is required if administrators enable or disable CEP integration, or update the CEP token.

Allow list policy behavior

If the allow list configured for an RBI browser application under the catalog is modified from the default *:*, include *.google.com:* to complete CEP enrollment. After CEP is launched, the RBI allow list policy is not honored.

Google admin may show duplicate devices

After an image upgrade, a machine can receive a new ID. This can create an additional device record in Google Admin console.

Reboot machines under a catalog

For each machine listed in the catalog:

  1. Select the menu on the right.
  2. Select Restart.

Reboot Machine

Configuring Azure Firewall for Customer-Managed RBI Catalog Virtual Network

Azure Firewall enables you to filter outgoing web requests from your catalog machines in your Remote Browser Isolation service. By deploying Azure Firewall in your existing Azure Virtual Network, you can control and monitor outbound traffic. This helps you enhance network security and manage outbound connections for your workloads.

Prerequisites:

  • A catalog created under the Remote Browser Isolation service in your Azure subscription.
  • Sufficient permissions to create and manage Azure resources.

Locate the Azure Virtual Network

  1. In the Citrix Cloud DaaS console, identify the machine catalog you want to secure.
  2. Select a machine from the catalog and copy the first part of its name (for example, RBI3BLR6-O80001).
  3. In the Azure portal, search for the VM using this name.
  4. In the VM’s overview, select the linked virtual network.

Create an Azure Firewall

  1. In the virtual network’s menu, select Subnets under Settings.
  2. Add a new subnet with the purpose set to Azure Firewall (use default settings).
  3. Return to the virtual network overview and select Azure Firewall under Capabilities.
  4. Click Add a new firewall.
  5. Complete the following fields:
    • Subscription and Resource group: Select as appropriate.
    • Name: Enter a name for your firewall.
    • Region: Match the region of your virtual network.
    • Firewall tier: Select Standard.
    • Virtual Network: Choose the network identified in Step 1.
    • Firewall Policy: Select Use a Firewall Policy to manage this firewall.
    • Policy Name: Click Add new and enter a name (for example, Test-policy).
    • Firewall Management NIC: Disable this setting.
  6. Review your settings and create the firewall.

Configure Routing

  1. After deployment, open the Azure Firewall resource and note its private IP address.
  2. In the Azure portal, navigate to your virtual network and select Subnets.
  3. Identify the subnet where your catalog VMs reside (typically named default).
  4. Create a new route table or select an existing one associated with this subnet.
  5. Add a new route:
    • Destination: 0.0.0.0/0
    • Next hop type: Virtual appliance
    • Next hop address: Enter the Azure Firewall’s private IP address.
  6. Save the route.

Configure Firewall Rules

  1. In the Azure portal, go to Firewall Manager > Azure Firewall Policies.
  2. Select the policy that you created (for example, Test-policy).
  3. Go to Rules.
  4. Add a new Application rule collection (recommended for web filtering).
  5. Define rules to allow or deny specific FQDNs or URL categories. For example, to deny access to www.example.com:
    • Name: DenyExampleWebsite
    • Source IP address: The subnet range of your catalog VMs.
    • Destination FQDNs: www.example.com
    • Protocols: http:80, https
    • Action: Deny
  6. Save the rule collection.
  7. Add additional Allow or Deny rules as needed, adjusting priorities accordingly. (Optional)

Test the Configuration

  1. Launch a browser session from a machine in the configured catalog.
  2. Try accessing both allowed and blocked websites to confirm that access controls are working correctly.
  3. Verify that the firewall is correctly filtering network traffic according to the defined rules.

Troubleshooting

If you encounter issues, refer to the Azure Firewall Documentation.

Limitations

All browsers within the same catalog use the same firewall, policies, and rules.

Enable Network Address Translation (NAT) (Secure Web) Gateway

On the Configuration Details page, you have the option to add a Secure Web Gateway for specific catalogs.

Software Upgrades and Patch Management

Citrix creates and manages the machine images and catalogs, including software management. When new versions of catalogs are available, Citrix pushes these upgrades to customer catalogs, ensuring that their machines receive the latest fixes and patches next time they get restarted. RBI uses the DaaS Catalog service to facilitate these upgrades in the customer’s subscription.

Integration with Citrix Workspace

Remote Browser Isolation can be integrated with Citrix Workspace. To ensure that it’s integrated:

  1. Sign in to Citrix Cloud.
  2. In the upper left menu, select Workspace Configuration.
  3. Select the Service Integrations tab.
  4. Confirm that the Remote Browser Isolation service entry indicates Enabled. If it does not, click the ellipsis menu and select Enable.

If you haven’t already done so, configure the Workspace URL, external connectivity, and workspace authentication for your Workspace, as described in Configure authentication to workspaces.

Remote Browser Isolation supports authentication with Active Directory and Azure Active Directory. Authentication with Active Directory is configured by default. For information about configuring authentication using Azure Active Directory, see Connect Azure Active Directory to Citrix Cloud.

If you configure authentication using Azure Active Directory, the on-premises domain containing your Active Directory domain controllers must contain one (preferably two) Cloud Connectors.

Integrate with your on-premises StoreFront™

Citrix Virtual Apps and Desktops™ customers with an on-premises StoreFront can easily integrate with the Remote Browser Isolation service to provide the following benefits:

  • Aggregate your published remote isolated browsers with your existing Citrix Virtual Apps™ and Desktops apps for a unified store experience.
  • Use native Citrix Receivers for enhanced end user experience.
  • Strengthen security for Remote Browser Isolation launches by using your existing multifactor authentication solution integrated with your StoreFront.

For details, see CTX230272 and the StoreFront configuration documentation.