Dell Protected Workspace Owner's manual

  • Hello! I am an AI chatbot trained to assist you with the Dell Protected Workspace Owner's manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!

DellProtectedWorkspaceManagementServerv2.2.2
CreatedandMaintainedbyInvincea,Inc.
ProprietaryForCustomerUseOnly
DellProtectedWorkspaceManagementServer
Installationand
ConfigurationGuide
2
DellProtectedWorkspaceManagementServerInstallandConfigurev2.2
Contents
PurposeandIntendedAudience......................................................................................................................5
SystemRequirements.....................................................................................................................................5
DPWMSSizingRecommendations............................................................................................................................6
DellProtectedWorkspaceManagementServerFeatures...............................................................................7
ThreatsModule........................................................................................................................................................7
ConfigurationModule..............................................................................................................................................7
AdminModule.........................................................................................................................................................7
InstallationonVMwarevSphere4.xorlater...................................................................................................8
InstallingVMwareToolsforDPWMSrunninginavSphereEnvironment................................................................14
UpgradingthenetworkadaptertoVMXNET3forDPWMSrunninginavSphereEnvironment................................16
ConversionoffilesforVMwareWorkstation7or8................................................................................................21
InstallingDPWMSonVMwareWorkstation7.1.xorlater............................................................................22
InstallingtheDPWMSonCustomHardwareoracustomVirtualMachine....................................................24
InstallingtheDPWMSandprerequisite s.................................................................................................................24
ConfiguringtheDPWMSSYSVstartupscript...........................................................................................................25
ConfiguringtheDPWMSconfigurationfile.............................................................................................................27
[server]........................................................................................................................................................................................27
[license].......................................................................................................................................................................................28
[mysql]........................................................................................................................................................................................28
[logging]......................................................................................................................................................................................28
ApplyingNewUpdatesviatheUI..................................................................................................................29
ManualUpgradefromviaSSH/Console........................................................................................................31
Mergingconfigurationfile(ims.conf)changesafterupgrade.......................................................................32
ConfiguringSecureProtocolforClientConnections.......................................................................................32
ConfiguringtheDellProtectedWorkspaceManagementServerforBasicOperationPreBuiltVirtual
MachineOnly................................................................................................................................................33
ObtainingtheDHCPAddressoftheSystem............................................................................................................33
AccessingtheWebUI..............................................................................................................................................34
Changingthetimeortimezone..............................................................................................................................35
NetworkConfiguration...........................................................................................................................................38
SelfSignedCertificateCreation..............................................................................................................................42
Changingtherootandims_adminpasswords.........................................................................................................45
3
DellProtectedWorkspaceManagementServerInstallandConfigurev2.2
AdditionalAdministrativeTasks...................................................................................................................46
ModifyingthedefaultFirewall...............................................................................................................................46
InstallingLinuxUpdates.........................................................................................................................................47
Generatinganewselfsignedcertificateafterinitialconfigurationiscomplete......................................................49
InstallingaTrustedSSLcertificate..........................................................................................................................49
GeneratingaCSR.............................................................................................................................................................................49
ImportingSignedCertificateandKey..............................................................................................................................................51
ConfiguringtheDellProtectedWorkspaceManagementServerforSYSLOG........................................................... 52
TestingSYSLOGconnectionfromDPWMS......................................................................................................................................53
ConfiguringtheThreatsModulewiththeCorrectSYSLOGformat.................................................................................................54
OperationalNotesfortheDellProtectedWorkspaceManagementServer...................................................55
SecurityRestrictions/Features................................................................................................................................55
LoggingintotheApplianceRemotelyviaSSH.........................................................................................................55
ConfiguringDellProtectedWorkspacetoworkwiththeDellProtectedWorkspaceManagementServer
ConfigurationManagementModule.............................................................................................................56
ConfiguringDellProtectedWorkspacetoworkwiththeDellProtectedWorkspaceManagementServer
ThreatDataModule.....................................................................................................................................57
DellProtectedWorkspaceManagementServerAdministrativeTasks..........................................................58
AcquiringthetemporaryadministratorpasswordforDPWMSUI...........................................................................58
LoggingintotheDellProtectedWorkspaceManagementServerConsole ...............................................................59
EnteringtheDPWMSLicenseKey...........................................................................................................................60
DPWMSUIMethod.........................................................................................................................................................................60
DPWMSConfigurationFileMethod................................................................................................................................................62
Modules.................................................................................................................................................................63
AdminModule.................................................................................................................................................................................64
UsersTab....................................................................................................................................................................................64
AddinganewDPWMSUser...................................................................................................................................................65
DeletingauserfromtheDPWMS..........................................................................................................................................66
ActivityTab.................................................................................................................................................................................67
BackupTab..................................................................................................................................................................................67
CreateaDatabaseBackup......................................................................................................................................................68
RecoveringfromaDatabaseBackupFile...............................................................................................................................68
ErrorsTab....................................................................................................................................................................................69
UpgradesTab..............................................................................................................................................................................70
UpgradingtheDPWMS...........................................................................................................................................................70
RestartingtheDPWMSProcess..............................................................................................................................................71
PlatformTab...............................................................................................................................................................................72
DellProtectedWorkspaceHomeModule.......................................................................................................................................73
HomeTab....................................................................................................................................................................................74
ThreatDataSection................................................................................................................................................................74
ConfigurationManagementSection......................................................................................................................................75
4
DellProtectedWorkspaceManagementServerInstallandConfigurev2.2
AdministrationSection...........................................................................................................................................................76
ThreatsModule...............................................................................................................................................................................77
SettingsandPlugins....................................................................................................................................................................78
ThreatDataModuleSettings..................................................................................................................................................78
PluginSettings........................................................................................................................................................................79
OverviewTab..............................................................................................................................................................................80
DetectionsbyDate.................................................................................................................................................................80
DetectionsbyCategory..........................................................................................................................................................80
TopUsersandTopSources....................................................................................................................................................81
DetectionsTab............................................................................................................................................................................82
ThreatCategories...................................................................................................................................................................83
ReportOverviewPage................................................................................................................................................................85
Statistics.................................................................................................................................................................................85
Configuration..........................................................................................................................................................................86
Applications............................................................................................................................................................................87
ThreatReportAnalysisTab.....................................................................................................................................................88
ThreatReportEventTreeTab................................................................................................................................................89
ThreatReportTimelineTab....................................................................................................................................................91
ThreatReportGeographyTab................................................................................................................................................92
ThreatReportPluginTabs......................................................................................................................................................92
ThreatReportActions:...........................................................................................................................................................93
ConfigurationModule.....................................................................................................................................................................94
Hosts...........................................................................................................................................................................................94
Groups........................................................................................................................................................................................94
Packages.....................................................................................................................................................................................94
AccessingtheConfigurationModule..........................................................................................................................................95
ConfigurationModuleInterface.................................................................................................................................................95
PackagesTab..........................................................................................................................................................................95
AddingaPackagetotheDPWMS......................................................................................................................................96
Viewingpackagedetails.....................................................................................................................................................97
EnteringtheClientSoftwareActivationKey....................................................................................................................100
AdditionalGlobalPackageSettings..................................................................................................................................101
GroupsTab...........................................................................................................................................................................102
CreatingaNewGroup......................................................................................................................................................103
RenamingaGroup...........................................................................................................................................................103
GroupDetailsView..........................................................................................................................................................104
SetInstallationMethod....................................................................................................................................................109
AdjustPreferences...........................................................................................................................................................111
AddingCustomPreferences/Attributes.........................................................................................................................113
ManageUnprotectedSites..............................................................................................................................................115
CustomizeAppSettings...................................................................................................................................................118
HostsTab..............................................................................................................................................................................122
AuditTab..............................................................................................................................................................................127
ContactingDellSupport..............................................................................................................................129
5
DellProtectedWorkspaceManagementServerInstallandConfigurev2.2
PurposeandIntendedAudience
ThisdocumentisintendedtoprovideinstructionsforinstallingandconfiguringtheDellProtectedWorkspace
ManagementServer.ItisintendedforITadministratorsthatwillbecompletingtheinitialdeploymentandconfiguration
and/orwillbemanagingtheDellProtectedWorkspaceManagementServer.
SystemRequirements
OneofthefollowingHostPlatforms
o VMwareWorkstation7.1orlater
o VMwareESXorESXi4orlater
2GBofavailableRAMfortheVirtualMachine(forprebuilttemplate)
40GBofavailablediskfortheVirtualMachine(forprebuilttemplate)
1Networkconnection
fortheVirtualMachine
1IPaddresstoassigntothesystem
1DNSSystemNametoassigntothesystem
Externalinternetconnectivity(foractivationandOSupdates)
Compatiblewebbrowsertoaccessthesystem
o InternetExplorer9+
o GoogleChrome30+
o Mozilla
Firefox20+
IMPORTANTNOTE:TheDellProtectedWorkspaceManagementServerrequiresaninternetconnectiontoallow
activationoftheserver.
ThevirtualmachinecanalsoberuninaCitrixorMicrosoftvirtualenvironment;howeverinstallationinstructionsarenot
includedforthoseenvironments.TheprovidedVMwareimagewillalsoneedto
beconvertedtosupporttheseother
platformsbeforedeployment.Postinstallationconfigurationstepswillremainthesame.
6
DellProtectedWorkspaceManagementServerInstallandConfigurev2.2
DPWMSSizingRecommendations
ThefollowingtableoutlinestherecommendedVMconfigurationbasedonnumberofclientsthatwillconnecttothe
DPWMS:
#ofClientSystems #ofDPWMSAPI
Systems
Memorypersystem vCPUpersystem
Upto1000 1 2GB 1vCPU
10002000* 1 4GB 2vCPU
2000+ multiple 2GB 1vCPU
*Thisnumbercanbeincreasedifhear tbeatsaresettodaily,thisisbasedonanhourlyheartbeatsetting
Note:forenvironmentsthatrequiremultipleAPIservers,adedicatedMySQLVM,adedicatedDPWMSUIVManda
dedicatedloadbalancerVMareallrecommended.
Thefollowinggraphicprovidesa
basicoverviewofamultiAPIenvironment,asrecommendedforlargerinstallation
bases.
7
DellProtectedWorkspaceManagementServerInstallandConfigurev2.2
DellProtectedWorkspaceManagement ServerFeatures
TheDellProtectedWorkspaceManagementServer isamodularsystemthatallowsformultipleDellProtected
Workspaceapplicationstorunonasingleappliance.Eachmoduleislicense din dividuallyandwillonlybeavailablewith
avalidlicensekey.
ThreatsModule
TheThreatsModuleallowsDellProtectedWorkspaceclientstoviewThreatReportdetails.Themodulereceivesthe
reportsfromtheEnterpriseclientsoftwareanddispla ysthemforreviewbythesecurityanalysts.Thisfeaturesetwas
previouslyfoundintheDellProtectedWorkspaceThreatDataServer.
ConfigurationModule
TheConfigurationModuleallowsforcentralizedmanagementoftheDellProtectedWorkspaceclients,managingboth
configurationfilesandsoftwareupdates. ThisfeaturesetwaspreviouslyfoundintheDellProtectedWorkspace
ConfigurationManagementServer.
AdminModule
TheAdminModuleallowsforadministrativemanagementoftheDellProtectedWorkspaceManagementServer,
includingmanaginguseraccounts,applyingDPWMSupgrades,viewingerrorlogsandcreatingbackupsofthedatabase.
8
DellProtectedWorkspaceManagementServerIns tallandConfigurev2.2
InstallingtheDellProtectedWorkspaceManagementServer
TheDellProtectedWorkspaceManagementServer isdeliveredasavirtual machine,intheVMwareOVFtemplate
format.ThefollowinginstructionsoutlinehowtoinstalltheDPWMSonei ther VMwarevSphere4.xorlaterorVMware
Workstation7.1.xorlater.Somestepsmaydifferslightlybasedontheversionbeingused.
Thefollowinginstructions
assumethatthelatestDPWMStemplatehasbeendownloadedfromtheDell.
InstallationonVMwarevSphere4.xorlater
1. OpentheVMwarevSphereClientandconnecttotheESX(i)orvCentersystemthattheDPWMSwillbeinstalled
on.
9
DellProtectedWorkspaceManagementServerIns tallandConfigurev2.2
2. SelecttheFilemenuandchoose“DeployOVFTemplate…”
3. ChoosethefilelocationoftheOVFtemplate(thedownloadmustbeunzippedbeforethisstep).Pressthe
“Next”button.
10
DellProtectedWorkspaceManagementServerIns tallandConfigurev2.2
4. ReviewtheOVFinformation.Pressthe“Next”button.

5. Givethevirtualmachineaname(orusethedefaultoneprovided).Choosewhichdatacenter/foldertheVMwill
bedeployedto(ifapplicab le).Pressthe“Next”button.


11
DellProtectedWorkspaceManagementServerIns tallandConfigurev2.2
6. Forclusteredsystems,choosewhichcluster/hosttheVMwillbedeployedon.Pressthe“Next”button.
7. Ifmultipledatastoresareavailable,cho o sethedatastoretodeploytheVMon.Pressthe“Next”button.

12
DellProtectedWorkspaceManagementServerIns tallandConfigurev2.2
8. Choosethedesireddiskformatforthevirtualdisk.Pressthe“Next”button.
9. SelectthenetworkthattheVMwillbeconnectedto.Pressthe“Next”button.

13
DellProtectedWorkspaceManagementServerIns tallandConfigurev2.2
10. Verifyyourconfigurationandpressthe“Finish”button.

11. Optionalstep:OncetheOVFtemplatehasfinisheddeploying,takeasnapshotoftheVMtoretaintheoriginal
settingsbeforeanyconfigurationis done.
12. Poweron
theVM.
13. InstallationoftheDPWMSisnowcomplete.PleasecontinuetotheConfiguringtheDellProtectedWorkspace
ManagementServerforBasicOperationsection.
14
DellProtectedWorkspaceManagementServerInstallandConfigurev2.2
InstallingVMwareToolsforDPWMSrunninginavSphereEnvironment
ToinstallVMwareToolsintotheDPWMSappliance,followthesesteps.
1. ConnecttotheconsoleoftheDPWMSfromthevSphereclient.Usetherootaccount(defaultpasswordis
invincea)
2. FromtheVMmenu,selectGuest,thenInstall/UpgradeVMwareTools
3. Createamountpointforthecdromby
runningthefollowingcommand:
mkdir /mnt/cdrom
4. MounttheVMwareToolsimagebyrunningthefollowingcommand:
mount /dev/cdrom /mnt/cdrom
5. ExtractthetarfileforVMwaretoolstothe/vardirectorybyrunningthefollowingcommand:
tar zxf /mnt/cdrom/VMwareTools-X.X.X-YYYYYY.tar.gz -C /var/
NOTE: replace X.X.X-YYYYYY with the version number of the VMware Tools being
installed
6. Changetotheextracteddirectorybyrunningthefollowingcommand:
cd /var/vmware-tools-distrib/
7. Run
theVMwareToolsinstallerscriptbyrunningthefollowingcommand:
./vmware-install.pl
8. Followtheonscreenpromptsandselectthedefaultsettingforeachoption.
15
DellProtectedWorkspaceManagementServerInstallandConfigurev2.2
9. ConfirmtheinstallationwassuccessfulbyviewingthedetailsoftheVM.Astatusof“VMwareTools:Running
(Current)”shouldbedisplayed.
16
DellProtectedWorkspaceManagementServerIns tallandConfigurev2.2
Upgradingthenetw orkadaptertoVMXNET3forDPWMSrunninginavSphereEnvironment
InsomeVMwareenvironments,changingtheDPWMSappliancenetworkadapterfromthedefaultE1000adaptertoa
VMXNET3adaptermayberequired.Tochangetheappliancetothehighperformancenetworkadapter,follow these
instructions.
1. ConnecttotheDPWMS ap plianceVMviathevSphereconsole.
2. FromtheVMmenu,
chooseEditSettings
3. Selectthe“NetworkAdapter1”devicefromthelistandpressthe“Remove”buttonabovethedevicelist.

17
DellProtectedWorkspaceManagementServerIns tallandConfigurev2.2
4. Pressthe“Add”buttonabovethedevicelist.
5. Select“EthernetAdapter”fromthedevicelistandthenpressthe “Next”button.

18
DellProtectedWorkspaceManagementServerIns tallandConfigurev2.2
6. FromtheNetworkTypewindow,selectVMXNET3astheAdapterTypeandselectthecorrectnetworkfromthe
NetworkConnectiondropdown.Alsomakesurethe“Connectatpoweron”checkboxisselected.Pressthe
“Next”
button.
7. Pressthe“Finish”button.
8. Pressthe“OK”button.
19
DellProtectedWorkspaceManagementServerIns tallandConfigurev2.2
9. Fromtheconsole,loginastherootuserandrunthefollowing com mand:
rm /etc/udev/rules.d/70-persistent-net.rules
10. Confirmthedeleteprocesswhenprom pted .

20
DellProtectedWorkspaceManagementServerInstallandConfigurev2.2
11. Reboottheappliancebyrunningthefo llowing command:
reboot
12. Verifypropernetworkconnectivityafterthesystemreboot.
/