DELL Wyse Management Suite Software User Guide
- June 3, 2024
- Dell
Table of Contents
DELL Wyse Management Suite Software
Preface
Topics:
- Deployment models
- Security hardening third-party components
- Security profiles
Legal disclaimer
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.” DELL MAKES NO
REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN
THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. In no event shall Dell
Technologies, its affiliates or suppliers, be liable for any damages
whatsoever arising from or related to the information contained herein or
actions that you decide to take based thereon, including any direct, indirect,
incidental, consequential, loss of business profits or special damages, even
if Dell Technologies, its affiliates or suppliers have been advised of the
possibility of such damages. The Security Configuration Guide intends to be a
reference. The guidance is provided based on a diverse set of installed
systems and may not represent the actual risk/guidance to your local
installation and individual environment. Dell Technologies recommends that all
users determine the applicability of this information to their individual
environments and take appropriate actions. All aspects of this Security
Configuration Guide are subject to change without notice and on a case-by-case
basis. Your use of the information contained in this document or materials
linked herein is at your own risk. Dell reserves the right to change or update
this document in its sole discretion and without notice at any time.
Scope of document
This guide contains information about the security features of Wyse Management
Suite. The document provides guidelines that help you maximize the security
posture of your environment. You will understand the expectations that Dell
has of the environment in which the Wyse Management Suite is deployed.
Document references
The following documents provide a comprehensive reference to Wyse Management
Suite: Dell Wyse Management Suite Release Notes Dell Wyse Management Suite
Administrator’s Guide Dell Wyse Management Suite Migration Guide You can
access the manuals available at
www.dell.com/support/manuals.
Security resources
Dell Technologies provides customers with timely information, guidance, and
mitigation options to minimize risks associated with security vulnerabilities.
Dell Technologies recommends that you run the most recent version of the
software available and apply any remediation, workarounds, or mitigation at
the earliest opportunity. For information about security advisories and
notices for all Dell Technologies product, go to
www.dell.com/support/security.
Getting help
The Dell support page provides access to licensing information, product
documentation, advisories, software downloads, how-to videos, and
troubleshooting information.
Reporting security vulnerabilities
Dell takes reports of potential security vulnerabilities in our products very
seriously. If you discover a security vulnerability, you are encouraged to
report it to Dell immediately. For information on how to report a security
issue to Dell, see the Dell Vulnerability Response Policy on the Dell support
site.
To access the Dell Vulnerability Response Policy, do the following:
- Go to www.dell.com/support.
- In the search bar, enter Dell Vulnerability Response Policy, and press Enter.
- From the search results, click the Dell Vulnerability Response Policy link. The Dell Vulnerability Response Policy page is displayed.
Security quick reference
Topics:
- Deployment models
- Security hardening third-party components
- Security profiles
Deployment models
You can download Dell Wyse Management Suite from
www.dell.com/support. Dell Wyse Management
Suite can be installed using a local path or a network share folder as a
package source for installation. For more information, see Dell Wyse
Management Suite Installation Guide at
www.dell.com/support/manuals. By
default, the on-premise deployment supports HTTPS protocol security
configuration. Following are the recommendations to enable the security
options when you deploy Wyse Management Suite on a private cloud: Before you
install the product in the recommended Windows Server operating system, ensure
that the operating system is
updated with the latest service packs, patches, and updates. Import the SSL
certificate to secure the connection to Wyse Management Suite. Always enable
HTTPS protocol on port 443 for Wyse Management Suite. Enable TLS 1.2 version.
Import trusted certificates and enable CA validation for certificates. Harden
the third-party components. Ensure the security of the SMB protocol by
enabling SMB signing on the host Windows server. For information on
configuring SMB signing, see Overview of Server Message Block signing at
https://docs.microsoft.com/.
Security hardening third-party components
Wyse Management Suite provides you details to harden the third-party
components in order to ensure that the components can be configured to be more
secure. For information about how to harden the following third-party
components, see Hardening Document for Server Security Configuration at
www.dell.com/support/manuals: Mongo database MySQL database JDK Tomcat
Security profiles
Dell Wyse Management Suite runs under the default security profile with secure
HTTP enabled over TLS version 1.2 and 1.3. It is recommended to use the
Certificate Authority (CA) signed certificates for stronger security
environments.
Product and subsystem security
Topics:
- Product overview
- Authentication
- Authorization
- Network security
- Data security
- Cryptography
- Auditing and logging
- Code or product integrity
- Browser support for CSP header
Product overview
Dell Wyse Management Suite is the next generation management solution that
enables you to centrally configure, monitor, manage, and optimize your Dell
Hybrid Client powered endpoints and Dell thin clients. It also offers advanced
feature options such as cloud and on-premises deployment, manage-from-anywhere
option by using a mobile application, and so on..
Authentication
Dell Wyse Management Suite supports the following processes to authenticate
the product subsystems: Wyse Management Suite console authentication Device
registration with Wyse Management Suite Wyse Management Suite remote
repository authentication
Login security settings
Administrator console login settings–By default, you can log in to the console
using the registered administrator credentials enabled during installation.
The registered administrator can access the product with a registered username
and password. After a failed login, you are notified with the text as Your
login attempt was un successful, try again. Reason: Invalid username or
password HTTPS communication is enabled by default. Security on session is
established by enforcing a token authentication for each request to access the
console. You can also configure Active Directory to enable the Domain account
to access the product.
NOTE : Secure connection to Active Directory can be established with the use of LDAPS protocol. For more information, see Wyse Management Suite 3.2 or later version Administrator’s guide at https://www.dell.com/support/manuals. Device login security–Devices are registered with a secured group token. Device check-in and device commands are performed with a unique device authentication code. Device and Wyse Management Suite coordinates using MQTT in a secure way. Remote repository login settings–Repository is registered with the Wyse Management Suite using the administrator user accounts. Disable auto-complete feature settings–Ensure that you disable the browser autocomplete feature if the browser is used in shared computing where multiple users use the browser. For more information, see the respective browser documentation for disabling the autocomplete feature settings. Wyse Management Suite 3.5 supports concurrent login. From Wyse Management Suite 3.8, concurrent login of a user is not supported and a user can have only one active session. When you try to log in to the server from another browser or try to log in from another system without logging off from the previous session, then Your login attempt was not successful. Reason: User account already logged in error message is displayed. The same error is displayed if you do not log off from the session from a browser. The administrator can select the option Log me out everywhere else to log in to the portal forcefully. If the option is selected, the previous login session is invalidated. After you deploy on-premises or public cloud version of Wyse Management Suite , all the active sessions are invalidated. The administrator must relogin to Wyse Management Suite to continue accessing the portal. When the administrator changes the portal administrator role or the username for any other logged in user, then the session of other logged in user gets invalidated. The other administrators must relogin to Wyse Management Suite to continue accessing the portal.
User and credential management
User account and security credentials Administrator Global administrator who
has access to all Wyse Management Suite features. Group administrator who has
access to all assets and functions for an assigned group. Custom global
administrator who has access to customized Wyse Management Suite features.
Viewer who has only read access to all the data and can be assigned
permissions to send real-time commands such as shutdown and restart.
Unassigned administrators–Users who are imported from the AD server are
displayed on the Unassigned admins page. You can assign a role to these users
from the portal. End users–You can add individual users to Wyse Management
Suite using the End Users tab. You can configure and deploy settings to an
individual user. The settings are applied to the user account and are applied
to the thin client when the user logs in. This option is applicable only to
thin clients running the ThinOS 9.x operating system and Dell Hybrid Clients.
Multi-Tenant users–Multi tenant users can be enabled from the Portal
Administration page. For more information, see Wyse Management Suite
Administrator’s Guide at https://www.dell.com/support/manuals. Security
credentials–Wyse Management Suite securely communicates to various devices and
third party servers including active directory, repository, Edge gateways, and
mobile application. The communication protocol is based on proven and safe
encryption protocols. Password complexity–All passwords to access Wyse
Management Suite require you to create a password according to the complexity
and strength rules, including password length and password strength. When a
new password is set, Wyse Management Suite accepts passwords that meet the new
length and complexity requirements. The tooltip on the settings UI displays
the complexity and length requirement for each password. If the password does
not meet the specified requirement, the field is highlighted in red color to
indicate that the entered password is invalid. For third party servers
integrated with Wyse Management Suite, the password complexity is managed by
the third party server.
Authentication to external systems–Kerberos based SSO authentication is
supported for Active directory.
Authentication types and setup
Dell Technologies enables secure HTTPS communication between the device and
Wyse Management Suite. The following three types of authentications are
supported:
Device authentication–Devices are registered to Wyse Management Suite with a
secure group token. User authentication–During installation, a user with
global administrator privileges must be created. Using the global
administrator user, other users and roles can be created. You can also
configure active directory users and roles. Third-party components
authentication–Active directory can be integrated with Wyse Management Suite
by using LDAP or LDAPS. A global administrator can import and configure active
directory users and their roles. It is recommended to use the LDAPS protocol
to integrate the active directory in a secure way.
Authorization
Product services–All Windows product services are provided with limited
privileges to ensure security. Console–Console authorization for Wyse
Management Suite users have the following groups:
Administrator Global administrator who has access to all Wyse Management Suite
features. Group administrator who has access to all assets and functions for
an assigned group. Custom global administrator who has access to customized
Wyse Management Suite features. Viewer who has only read access to all the
data and can be assigned permissions to send real-time commands such as
shutdown and restart.
Unassigned administrators–Users who are imported from the AD server are
displayed on the Unassigned admins page. You can assign a role to these users
from the portal.
End users–You can add individual users to Wyse Management Suite using the End
Users tab. You can configure and deploy settings to an individual user. The
settings are applied to the user account and are applied to the thin client
when the user logs in. This option is applicable only to thin clients running
the ThinOS 9.x operating system and
Dell Hybrid Clients.
Multi-Tenant users–Multi tenant users can be enabled from the Portal
Administration page. For more information, see Wyse Management Suite
Administrator’s Guide at https://www.dell.com/support/manuals.
Device–Device configuration in Wyse
Management Suite has following authorization steps: Device Registration Device
check-in You can also enable or disable Device Enrollment Validation from
Portal Administration page.
Network security
Default installation of Wyse Management Suite establishes HTTPS protocol communication.
Network exposure
The following table lists the network ports that are supported on Wyse
Management Suite. The ports are open by default when you install Wyse
Management Suite.
Table 1. Network exposure
Network vulnerability scanning is performed on Wyse Management Suite and there
are no security issues on the networked subsystems or interfaces. If you
discover a security issue, you are encouraged to report it to Dell
immediately. See, Reporting security vulnerabilities. Communication security
settings–By default Wyse Management Suite enables HTTPS protocol for
communication. Additionally, you can enable the following secure
communications:
Secure communication to MQTT using port 8443. LDAPS protocol for AD
integration. For more information, see Dell Wyse Management Suite 3.2 or later
version
Administrator’s Guide at https://www.dell.com/support/manuals.
Data security
Data at Rest–The data is encrypted and stored in a database. Access to the
database is restricted and you cannot access the database remotely. Also,
passwords or any secure information is not displayed.
Data in Flight–In order to ensure the security, regular updates to the
cipher’s enablement and disablement must be adhered for Wyse Management Suite.
The following list of ciphers can transmit secrets securely:
TLS 1.2 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS_DHE_RSA_WITH_AES_256_CCM TLS_DHE_RSA_WITH_AES_256_CCM_8 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 TLS 1.3 TLS_AES_256_GCM_SHA384
Data integrity
Wyse Management Suite does not allow you to publish or expose user data or
sensitive data in logs or in any format. Wyse Management Suite ensures to send
sensitive data either in Post Request body or in Request headers. But does not
allow in HTTP GET query strings.
Configuring Transport Layer Security
The Wyse Management Suite on-premise installer is improved to select the
Transport Layer Security (TLS) version 1.2 and 1.3 during the installation or
upgrade. You can also enable the TLS versions using the Portal Administration
page.
NOTE : From Wyse Management Suite 3.5, the recommended version of Transport Layer Security is 1.2 and 1.3. Ensure that you select all the appropriate versions of TLS based on the device agent and the merlin image. Older versions of Windows Embedded System, Wyse Device Agent (versions below WDA_14.4.0.135_Unified), and 32-bit merlin image versions are only compatible with TLS version 1.0.
Cryptography
AES-256 is used for encryption in Wyse Management Suite. TLS 1.1 is disabled
and TLS 1.2 is enabled by default with on-premise installation. Dell
Technologies recommends that you use the TLS 1.2 protocol.
Certificate management
You can import your SSL certificate to secure communications with the Wyse
Management Suite server. You can import the console by logging in to the Wyse
Management Suite private cloud and importing from the Portal Administration
page. By default, the Wyse Management Suite imports the self-signed SSL
certificate that is generated during the installation to secure communication
between the client and the Wyse Management Suite server. If you do not import
a valid certificate for your Wyse Management Suite server, a warning message
is displayed when you access the Wyse Management Suite from a device other
than the server where it is installed. A warning message is displayed if the
self-signed certificate that is generated during installation is not signed by
a Certificate Authority such as geotrust.com. You can either import a .pem or
.pfx certificate. Wyse Management Suite provides a provision to enable the CA
validation. Enabling it ensures that the transactions such as file operations,
image push or pull with the clients work in a secure way and with certificate
signature validation.
Auditing and logging
Event audit
Wyse Management Suite manages events by event types such as group creation,
device registration, configuration modification, and file upload. For each
event, a static audit message is generated. Go to Events > Audit to view the
event audit messages. They can be exported from Portal Administration >
Reports.
Log management
By default, Wyse Management Suite manages logs with the default configuration.
You must have sufficient disk space to store the logs. The log levels are
categorized into INFO, WARN, DEBUG, and ERROR. Wyse management suite provides
event logs in the console for the events that are related to device,
configurations, and other required events.
Log protection
Dell Wyse Management Suite product does not share sensitive information in
logs, and users outside the cluster cannot access these logs. Only
authenticated and authorized users can access the logs.
Logging format
Logs from Wyse Management Suite include timestamp and log levels consistently.
A new line separates each log entry. Some log entries such as exception stack
traces may span multiple lines. The timestamp indicate the start of a new
entry, and the entries usually include origination information to distinguish
similar entries.
Code or product integrity
Dell Wyse Management Suite enables you to update system packages and install
third-party applications. All firmware and application packages that are used
in Wyse Management Suite are Dell-signed packages. All files that are
distributed by Dell are signed applications. You can download the packages
from www.dell.com/support and deploy the packages from Wyse Management Suite.
EULA must be accepted for all the packages of Wyse Management Suite. Wyse
Management Suite does not accept the package if: The package does not have a
valid signature. The package has fake signature. The package is altered.
Browser support for CSP header
For enhanced security, CSP headers are added in Wyse Management Suite 3.8.
Dell Technologies recommends that you use the following browsers to access
Wyse Management Suite 3.8, as they take advantage of this added security layer
by processing the CSP headers appropriately: Edge 79 or later Mozilla Firefox
58 or later Chrome 59 or later
Verify code signing
Steps
- Right-click the WMS.exe installer.
- Click Properties.
- From WMS.exe Properties window, click Digital Signatures tab.
- Select Dell Inc from the Signature list and click Details.
- Click View Certificate and a new window is displayed with certificate details.
Ensure that Issued to, Issued by, and Valid from details are validated on the certificate to verify code signing.
Contacting Dell
Prerequisites NOTE: If you do not have an active internet connection, you can
find contact information on your purchase invoice, packing slip, bill, or Dell
product catalog.
For this task, Dell provides several online and telephone-based support and
service options. Availability varies by country and product, and some services
may not be available in your area. To contact Dell sales, technical support,
or customer service issues:
Steps
- Go to www.dell.com/support.
- Select your support category.
- Verify your country or region in the Choose a Country/Region drop-down list at the bottom of the page.
- Select the appropriate service or support link based on your need.
References
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>