IT security audit of central components by means of a privileged and unprivileged penetration test of the remote desktop/Citrix solution, the firewall configuration including the defined rules as well as a configuration review and penetration test of the WLANs used