Dell Protected Workspace User guide

Type
User guide

Dell Protected Workspace, your new ally for secure browsing, provides a safe and isolated environment to keep your PC shielded from malware and cyberattacks. With this powerful tool, you can confidently navigate the web, open documents, and download files without the fear of compromising your system's security.

Dell Protected Workspace, your new ally for secure browsing, provides a safe and isolated environment to keep your PC shielded from malware and cyberattacks. With this powerful tool, you can confidently navigate the web, open documents, and download files without the fear of compromising your system's security.


Dell Data Protection | Protected
Workspace
DellDataProtection
|
ProtectedWorks
p
acev2.3
 User’s Guide
© 2013 Dell Inc.
Trademarks used in this text: Dell™, the DELL logo, Dell Precision™, OptiPlex™, Latitude™, and Vostro™ are trademarks of Dell Inc.
Intel®, Pentium®, Xeon®, Core™ and Celeron® are registered trademarks of Intel Corporation in the U.S. and other countries.
Microsoft® and Windows® are registered trademarks of Microsoft Corporation in the United States and/or other countries.
June 2013 Rev. A00
3
TableofContents
Purpose and Intended Audience ............................................................................................................... 5
What is Dell Data Protection | Protected Workspace? ........................................................................... 5
Dell Data Protection | Protected Workspace Icons ................................................................................. 5
Dell Data Protection | Protected Workspace Desktop Icon ...................................................................................... 5
Dell Data Protection | Protected Workspace System Tray Icon ................................................................................ 5
Dell Data Protection | Protected Workspace Start Menu Folder ............................................................................... 5
Common End User Tasks........................................................................................................................... 6
Starting the Dell Data Protection | Protected Workspace Environment or Launching new Browser Window ............... 6
Additional ways to launch a new browser window .................................................................................................. 7
Dell Data Protection | Protected Workspace Setup ................................................................................................. 9
Changing your home page in Dell Data Protection | Protected Workspace protected browsers ................................ 10
InternetExplorer...... .................... .................... ............................ ............................. ................... .................10
MozillaFirefox ............................ ............................ .................... ............................. ................................ ......11
Downloading a File in Dell Data Protection | Protected Workspace ......................................................................... 12
FileDownloadAdditionalDialogs....................... ............................ .................... ............................. ..............14
Opening a document with Dell Data Protection | Protected Workspace .................................................................. 15
Dell Data Protection | Protected Workspace Auto Restore ..................................................................................... 18
Dell Data Protection | Protected Workspace Threat Detection ................................................................................ 18
Dell Data Protection | Protected Workspace System Tray Options .................................................... 21
Open Internet Explorer ........................................................................................................................................ 21
Open Firefox ....................................................................................................................................................... 21
Restore............................................................................................................................................................... 21
Suspect Activity Details… ..................................................................................................................................... 22
Import Bookmarks… ............................................................................................................................................ 22
4
Preferences… ...................................................................................................................................................... 22
About… .............................................................................................................................................................. 23
Exit .................................................................................................................................................................... 23
Preference Menu Options......................................................................................................................... 24
General Tab ........................................................................................................................................................ 24
Basics......... ............................ .................... ............................. ................... .......................................... ..........24
Border............................ ............................ ............................. ................... .......................................... ..........25
Apps Tab ............................................................................................................................................................ 26
Privacy Tab (v2.2.1-14451 only) .......................................................................................................................... 27
PrivacySettings..... .................... ................... ............................. ............................ .................... .....................27
Auto-Restore Tab ................................................................................................................................................ 28
AutomaticRestore................... .................... ............................. ............................ .................... .....................28
Security Tab ....................................................................................................................................................... 29
ActivityBlocking................ .................... ............................ .................... ............................ ............................29
Downloads................ ............................. ................... ............................. .................... ....................................30
Trusted Sites Tab ................................................................................................................................................ 30
Subscription Renewal ............................................................................................................................... 31
5
PurposeandIntendedAudience
Thisdocumentisintendedtoprovideinformationandinstructionfortasksthatareconsidereddayto
dayforendusersoftheDDP|ProtectedWorkspaceproduct.
WhatisDellDataProtection|ProtectedWorkspace?
DDP|ProtectedWorkspace(DDP|PW)isanisolatedenvironmentthatiscreatedonthePCandcanrun
webbrowsersanddocumentviewerswhichareisolatedfromthenativePC.Thisprotected
environmenthelpsprotectanenduserPCfrombeinginfectedwithmalwareandhelpsstopother
maliciousattacks.By
browsinginaprotectedbrowserintheDDP|PWisolatedenvironmentandby
viewingdocumentswithintheprotectedenvironment,DDP|PWisabletostopmalwarefrombeing
installedonthelocalPCandexposingthatPCtoothertypesofattacksandsecurityvulnerabilities.
DellDataProtection|ProtectedWorkspaceIcon s
AftertheInstallationofDDP|ProtectedWorkspace,onenewiconwillbelocatedonthedesktop,one
newiconwillbelocatedinthesystemtray(whiletheapplicationisrunning)andanewfolderwillbe
createdwithintheStartMenu.Thefollowingsectionhelpstoidentifyeachof
thesenewiconsand
whattheirfunctionsare.
DellDataProtection|ProtectedWorkspaceDesktopIcon
TheDDP|ProtectedWorkspaceiconfoundonthedesktopisapointofexecutionforthe
application.DoubleclickingonthisiconwillstarttheDDP|PWapplicationifitisnotcurrently
runningorwilllaunchanewbrowserwindowifitisrunninginthebackground.Thisiconcan
pinnedtothequicklaunchtoolbartoallowforeasieraccess.
DellDataProtection|ProtectedWorkspaceSystemTrayIcon
TheDDP|ProtectedWorkspacesystemtrayiconcanbefoundinthePCsystem
traywhenDDP|PWprotectedenvironmentisrunning.EndUseractions,suchas
openinganewbrowserwindow,restoringDDP|PWtoacleanstateormodifying
userpreferencesareavailablefromthistrayicon.Moredetailson
whatoptions
areavailableandhowtousethemcanbefoundlaterinthisdocument.
DellDataProtection|ProtectedWorkspaceStartMenuFolder
DDP|ProtectedWorkspacecanalsobelaunched(eitherstartingthe
programoropeninganewbrowserwindow)bygoingtothestartmenu,
choosingAllPrograms,thenDell,thenProtectedWorkspace.Within
thisfolderisthe DDP|PWlink.Additionally,thisfoldercontainsa
supporttoolthatcanbeused
tosendsupportlogstothesupportteam
incaseofanissuewiththeproduct.
6
CommonEndUserTasks
Thefollowingsectionoffersstepbystepinstructionsformostdaytodayendusertasks.
StartingtheDellDataProtection|ProtectedWorkspaceEnvironmentorLaunchingnew
BrowserWindow
TostarttheDDP|ProtectedWorkspaceisolatedenvironmentortolaunchanewpro tectedbrowser
windowwithintheprotectedenvironment,doubleclickontheDDP|PWicononthedesktop.
Afterclickingontheicon,adialogboxwithprogressbarwillappeariftheproductisnotrunning
already.
Itwillbedisplayedoverthesystemtrayandwillshowtheprogressoftheprotected
environmentstartup.
Oncethisdialogboxclosesoriftheenvironmentisalreadyrunning,theDDP|ProtectedWorkspace
systemtrayiconwillbevisibleandanewbrowserwillopenintheprotected
environment.Anew
protectedbrowserwindowwillbedisplayed immediatelyoroncetheprotectedenvironmentfinishes
loading.
7
ApplicationsrunningintheDDP|ProtectedWorkspaceisolatedenvironmentcontainacustomizable
bordercolor(shownasneongreenabove)thathighlightsanywindowsopenedwithintheprotected
environment.Thisistohelptheenduserdistinguishbetweenthenativeapplicationsandthoserunning
intheisolatedenvironment.
Additionalwaystolaunchanewbrowserwindow
WhenDDP|ProtectedWorkspaceisalreadyrunningandauserwantstoopenaneworadditional
browserwindowintheisolatedenvironment,theycanaccomplishthisbydoingoneofthreesimple
tasks.
ThefirstistodoubleclickontheDDP|ProtectedWorkspaceicononthedesktop.

8
ThesecondistorightclickontheDDP|ProtectedWorkspacesystemtrayicon,andselecteither“Open
Firefox”or“OpenInternetExplorer”fromthemenu.Notethatthepreferredbrowser(theoneopened
bydoubleclickingtheDDP|ProtectedWorkspacedesktop
icon)isbold.Inthisscreenshot,
InternetExploreristhe
preferredbrowser.

Finally,theusercangototheStartMenu,chooseAllPrograms,
opentheDellfolder,thentheProtectedWorkspacefolder,and
finallychoose“DellProtectedWorkspace”.

9
DellDataProtection|ProtectedWorkspaceSetup
WhenDDP|ProtectedWorkspaceisrunforthefirsttime,afirstrunwizardwillbedisplayed.
WhentheenduserselectsNext,theywillbeguidedthroughaquicktouroftheDDP|Protected
Workspaceproduct.Enduserscanclick“Next”toprogressthroughthefirstrun
tour,“Previous”to
returntothepriorscreen,or“SkipTour”toexittheprocess.
Inthe“SelectYourProtection”setupuserscancustomizesomeofthebehaviorsoftheprotected
environment.Thefirst optionallowstheusertochooseiftheDDP|ProtectedWorkspaceprotected
10
environmentwillbeusedtoprotectthedefaultwebbrowser.IftheBrowseroptionisleftunselected,
userswillgetanotificationinformingthemthatthedefaultbrowserwillnotbeprotected.
Thenextoptionisfordocumentprotection.DDP|ProtectedWorkspacewillprot ect MicrosoftWord,
MicrosoftPowerPoint,
andMicrosoftExceldocumentaswellasAdobeAcrobatorAdobeReader
documents.
Thefinaloptiononthisscreenisabouttheborderthatwillbeshownontheapplicationwindowsinthe
protectedenvironment.Ausermaychoosetodisablethebordercompletely,byunselectingthisoption
(notrecommended)
ormaychoosetodefineanalternativecolorbypressingthe“Pickcolor…”button.
Oncefinished,pressingthe“StartTour”buttonwillallowtheendusertowalkthroughthefirstruntour
beforestartingthepro ductforthefirsttime.Alternatively,userscanclick“SkipTour”tostartthe
product.

ChangingyourhomepageinDellDataProtection|ProtectedWorkspaceprotected
browsers
InternetExplorer
Thehomepageof abrowserrunningintheDDP|ProtectedWorkspaceenvironmentiscustomizable
likeanyotherwebbrowser.TochangethehomepagefromInternetExplorerrunningintheprotected
environment,select“Tools”orthetoolsicon,fromthemenuatthetopofprotectedInternetExplorer
window.Afterthe
dropdownmenuappears,select“InternetOptions”fromthelistofoptions.
Note:ScreenshotsbelowarefromIE9,buttheoutlinedstepsshouldalsoworkforIE7throughIE10.
11

WhentheInternetOptionsboxappears,deleteanytextthatexistsintheboxbelow“Tocreate
homepagetabs,typeeachaddressonitsownline.”Oncethisboxiscleared,entertheaddressforthe
newhomepage,suchashttp://www.google.com.

ClickOKwhenfinished.Openanew
DDP|ProtectedWorkspacebrowserwindowtoverifythe
homepageisnowsettothenewpageentered.
MozillaFirefox
TochangethehomepageforMozillaFirefoxintheprotectedenvironment,select“Tools”fromthe
menuatthetopofaprotectedFirefoxwindow.Afterthedropdownmenuappears,select“Options”
fromthelistofoptions.
12
WhentheOptionsboxappears,verifythatthe“General”tabisselected.Nextto“WhenFirefoxstarts:”
select“Showmyhomepage”fromthedropdown(ifnotselectedalready).Nowdeleteanytextthat
existsintheboxlabeled“HomePage”.Oncethisboxiscleared,entertheaddress
forthenew
homepage,suchashttp://www.google.com.Thenclick“OK”.
DownloadingaFileinDellDataProtection|ProtectedWorkspace
WithintheDDP|ProtectedWorkspaceprotectedenvironment,downloadingfilesisslightlydifferent
thaninatypicalwebbrowser.SincetheDDP|PWenvironmentisisolatedfromthePC,thereisaspecial
downloadinterfacethatisneededtodownloadfiles.Thisalsoallowsforsomefilestobecheckedfor
malicious
contentbeforebeingsaved.
TodownloadafilewithintheDDP|ProtectedWorkspaceenvironment,clickonafiledownloadlinkon
awebsitedisplayedintheprotectedenvironment.Oncethedownloadstarts,aDDP|PWDownload
Requestdialogwillappear.Thisisusedtoconfirmthattheuserintendedto
downloadafile,andthe
filewasn’tdownloadedbyaccidentorviaamaliciouswebsite.
Ifthedownloadwasintended,thenchoose“Savetocontinue,otherwisechoose“Cancel.Asthe
downloadprogresses,adownloadprogressdialogwillbedisplayed.Usersalsohavetheabilityto
“Open”thedownloadeditemdirectlyfrom
theprotectedenvironment.Pressingthe“Open”buttonwill
13
downloadthefiletoatemporarydirectoryandthenwillopenitinthedefaultapplicationforthatfile
type.Thisoptionisnotavailableforexecutablefilesorfilesthatdonothaveadefaultapplicationon
thePC.
Whenusersarepresentedwithafilethat
canbeopenedinaprotectedapplication,suchasaPDFfile,
the“Open”buttonwillbehighlightedwithaborderaroundittoindicatethat.
Alternatively,usershavetheoptiontousethe“Save”dropdownmenu(byclic kingonthedownward
facingarrow)todoa“SaveAs...”or
“Saveandopen.”
WhilethefileisbeingdownloadedtothePC,adownloaddialogboxwillbedisplayedwithaprogress
bar.ThedownloadprocessmaytakeslightlylongerfromtheDDP|ProtectedWorkspaceenvironment
thananormalwebbrowserduetotheextrasecuritylayersthatare
inplace.
14
Whenthefilehasfinisheddownloading,DDP|ProtectedWorkspacewillscanitandfinishthetransfer
fromtheisolatedenvironmenttothehostPC.Afinalizingdialogwilldisplayduringthisprocess.When
theprocesshascompleted,aDownloadCompletedialogwilldisplay.Fromthisdialog,thedialog
box
caneitherbeclosedorthefolderthatthefilewasdownloadedtocanbeopened.
The“Save”buttononaDDP|ProtectedWorkspacedownloadrequestfilewillsavethefiletothe
defaultdownloadfolder.ThedefaultdownloadfolderistheUserDownloadsfolder,whichistypically
foundatC:\Users\<username>\Downloads.
FileDownloadAdditionalDialogs
DDP|ProtectedWorkspacealsohasadvanceddownloadfeaturesthathelptoprotecttheenduserPC.
SomeoftheseoptionsmaypreventcertainfilesfrombeingdownloadedintheDDP|PWenvironment.
Oneoftheseoptionsistheabilitytoblockdownloadsforcertaintypesoffiles.Ifafiledownloadis
blockedbytype,thefollowingmessagewillbedisplayedwhenarequesttodownloadthefiletype
happens.Thisoptioncanbeenableinthepreferencesmenu.Whenenabled,thefollowingextensions
willbeblocked:
bas,bat,chm,cmd,com,cpl,crt,dll,exe,hlp,hta,inf,ins,isp,
msc,msi,msp,
mst,pif,reg,scr,sct,shb,shs,sys,vb,vbe,vbs,wsc,wsf,wsh
15
Additionally,downloadscanbeblockedifthedigitalsignatureofafileisnotvalid.Thiscanbeenabled
viatheuserpreferencemenuaswell.Thefollowingdialogwillbedisplayediftheseconditionsaremet.
OpeningadocumentwithDellDataProtection|ProtectedWorkspace
InadditiontopreventingmalwarefrominfectingtheenduserPCviaawebsiteorfiledownload,DDP|
ProtectedWorkspacealsoofferstheabilitytoisolatedocumentsinsidetheprotectedenvironment.
ThishelpstopreventmaliciousdocumentsfromaffectingtheenduserPC.
Bydefault,DDP|PWwillonlyopendocumentsoriginatingfrom theinternetinaprotected
environment.Tochangethissetting,rightclickontheDDP|PWiconinthesystemtrayandselect
Preferences.OncethePreferenceswindowopens,selecttheSecuritytab.UndertheActivityBlocking
sectionuncheck“Onlyopendocumentsoriginatingfromtheinternet”
option.Thiswillnowopenall
documentsinDDP|PWregardlessofwheretheyoriginatefrom.
16
AnexampleofthedocumentprotectionfeatureisusingtheDDP|ProtectedWorkspaceenvironment
toviewPDFdocuments.WhendocumentprotectionisenabledforPDFfilesdoubleclickingonanyPDF
fileonthecomputerwillopenthedocumentinaprotectedinstanceofthedocumentapplication.
The
protecteddocumentscanbeidentifiedbythecustomizedbordercolorthatsurroundsthe
application whenitisactive,justastheprotectedbrow sershows.Thewindowbelowdisplaysagreen
border,identifyingittobeinsidetheprotectedenvironment.
MicrosoftWord,MicrosoftExcel,andMicrosoftPowerPointfilesalsocanbe
accessedintheDDP|
ProtectedWorkspaceenvironment.Afterdoubleclickingasupportedfiletype,thedocumentwillopen
intheprotectedapplicationintheDDP|PWenvironment.Belowarescreenshotsofprotectedinstances
ofMicrosoft Word,MicrosoftExcel,andMicrosoftPowerPointintheDDP|PWenvironment.These
applicationsdisplaythesame
coloredborderastheprotectedbrowsersandPDFreaderstohelp
identifythattheapplicationisbeingprotectedbyDDP|PW.
17
Intheeventofarestorewhileyouareworkinginadocument,anotificationwillinformuserstosave
theworksoarestoremayhappen.
18
DellDataProtection|ProtectedWorkspaceAutoRestore
TheDDP|ProtectedWorkspaceproducthasanautorestorefeaturebuiltinthatwillrestorethe
protectedenvironmentbacktoacleanstateonasetschedule.Thisschedulecanbecustomizedbythe
enduser.
Whenanautorestorehappens,thefollowingdialogappears.Thisallowstheuserto
restore
immediatelyortodelaytherestoreuntilabettertime.Itisrecommendedthatthe“RestoreNow”
optionbeusedtoensuretheprotectedenvironmentisresettoacleanstate.
ItisrecommendedthatAutoRestorebeenabledtoensurethatafreshbrowserisusedeachday.
The
recommended(anddefault)settingisthattheDDP|ProtectedWorkspaceenvironmentberestored
every72hoursifnotmorefrequently.Restoringtheprotectedenvironmentwillhelptoensurethatthe
environmentisalwayscleanandfreeofmaliciousactivity.
ItisalsoimportanttonotethattheDDP
|ProtectedWorkspaceenvironmentisrestartedeachtimethe
computerisrestartedoranewuserlogsontothePC.TheAutoRestoretimerwillrestarteachtimethe
productisrestartedwhentheautorestoretimerisin“AfterElapsed”mode.
DellDataProtection|ProtectedWorkspaceThreatDetection
DDP|ProtectedWorkspacehasabuiltinthreatdetectionagentthatwilldetectunsafebehaviorwithin
theprotectedenvironment.Whenathreatisdetected,theDDP|PWproductwillnotifytheenduser
thatarestoreoftheenvironmentisneeded.Anotificationalertwillbedisplayedabovethesystemtray
indicatingsuspiciousactivity.
Userscanclickthe“Restore”button,whichwillrestarttheprotectedenvironmentto aclean state.
Usersalsohavetheoptiontoclosethenotificationandcontinueworking.Whendoingso,theDDP|
ProtectedWorkspaceIconwillbedisplayedinred.
19
UsingtheDellDataProtection|ProtectedWorkspaceBrowserDropDownMenu
TheBrowserDropDownmenuisaconvenientmenuthatcanbeusedfortwodifferentpurposes.The
menuisfoundontheinthemiddleofthetopedgeoftheanyprotectedbrowserwindow.
Bypressingthegraybutton,adropdownmenuwillappear.
Themenu
providesfortwoaccessibleoptions.Thefirstistheabilitytoopenthepreferencesmenu.
Thisactionisthesameasopeningthepreferencesmenufromthesystemtrayicon.
Thesecondoptionistoopenthecurrentpagethatisbeingviewedinthebrowserinanunprotected
browserwindow.
ThisisusefulifapageisnotrenderingcorrectlyinsideoftheDDP|Protected
Workspacebrowser.SelectingthisoptionwilltakethecurrentURLandopenwithinanunprotected
browser(usingthesamebrowserasintheprotectedenvironment).
Theuserwillbepromptedbeforethesiteis
movetotheunprotectedbrowsertoensuretheyareaware
ofthepotentialdangerofbrowsingoutsideoftheprotectedenvironment.Theusercanchooseto
continuebypressingthe“Unprotect” buttonorcancanceltheactionbypressingthe“Cancel”button.
20
Thereisalsoanoptionto“Alwaystrustthiswebsite”whichwillalwaysopenthesiteinanunprotected
browserifitisbrowsedtoinaprotectedsession.Thesesitescanbemanagedinthepreferencesmenu.
Thepreferencesmenuallowsfortheusertoviewthesites
thathavebeenpermanentlylistedastrusted
sitesandtoalsoremoveasiteifitnolongerneedstobetrusted.Thiscanbedonebyselectingthesite
inthelistandpressingthe“Remove”button.Iftheuserwishestoremoveallsites,theycanpressthe
“Remove
all”button.

  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31

Dell Protected Workspace User guide

Type
User guide

Dell Protected Workspace, your new ally for secure browsing, provides a safe and isolated environment to keep your PC shielded from malware and cyberattacks. With this powerful tool, you can confidently navigate the web, open documents, and download files without the fear of compromising your system's security.

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI