Dell Protected Workspace User guide

Type
User guide

Dell Protected Workspace

Dell Protected Workspace is a security software designed to protect your computer from malware and other online threats. It does this by creating a secure, isolated environment in which you can browse the internet and open files without the risk of infecting your computer.

Here are some of the key features and benefits of Dell Protected Workspace:

  • Protects your computer from malware and other online threats. Dell Protected Workspace creates a secure, isolated environment in which you can browse the internet and open files without the risk of infecting your computer. This environment is protected from malware and other online threats, so you can be sure that your computer is safe.

Dell Protected Workspace

Dell Protected Workspace is a security software designed to protect your computer from malware and other online threats. It does this by creating a secure, isolated environment in which you can browse the internet and open files without the risk of infecting your computer.

Here are some of the key features and benefits of Dell Protected Workspace:

  • Protects your computer from malware and other online threats. Dell Protected Workspace creates a secure, isolated environment in which you can browse the internet and open files without the risk of infecting your computer. This environment is protected from malware and other online threats, so you can be sure that your computer is safe.
S
Dell Data Protection | Protected Workspace
DellDataProtection|ProtectedWorkspace
Administrator’s Guide
© 2013 Dell Inc.
Trademarks used in this text: Dell™, the DELL logo, Dell Precision™, OptiPlex™, Latitude™, and Vostro™ are trademarks of Dell Inc.
Intel®, Pentium®, Xeon®, Core™ and Celeron® are registered trademarks of Intel Corporation in the U.S. and other countries.
Microsoft® and Windows® are registered trademarks of Microsoft Corporation in the United States and/or other countries.
June 2013 Rev. A00

3
TableofContents
Section 1 – Overview and Basic Installation ........................................................................................... 5
Purpose and Intended Audience ............................................................................................................................ 5
What is Dell Data Protection | Protected Workspace? ............................................................................................. 5
System Requirements ........................................................................................................................................... 5
SupportedOperatingSystems............... ...................... ........... ........... ...................... ........... ........... ...................... .5
SupportedHardwarePlatforms................ .......... ...................... ........... ........... ...................... ........... ........... ..........5
MinimumSystemSpecs:............. ........... ........... ........... ...................... ........... ........... ...................... ........... ............5
RecommendedSystemSpecs:................... .......... ...................... ........... ........... ...................... ........... ........... ..........5
ConnectivityRequirements:................... ........... ...................... ........... ........... ...................... ........... ........... ............5
Supported Software .............................................................................................................................................. 6
SupportedBrowsers.................. ........... ........... ...................... ........... ........... ...................... ........... .........................6
SupportedPDFReaders....... ........... ........... .......... ...................... ........... ........... ...................... ........... .....................6
SupportedDocumentPrograms.................... ........... ........... ...................... ........... ........... ...................... ........... .....6
SupportedBrowserPlugins....................... .......... ...................... ........... ........... ...................... ........... ........... ..........6
Basic Installation ......................................................................................................................................... 6
Section 2 – Enterprise End-User Deployments ....................................................................................... 7
Deploying Dell Data Protection | Protected Workspace with Software Deployment Tools .......................................... 7
ProtectedWorkspaceEXEInstallerOptions.................. ........... ...................... ........... ........... ...................... ..........7
Connectivity requirements .................................................................................................................................... 8
ProductActivation.................... ........... ...................... ........... ........... ...................... ........... ........... .........................8
ProductUpdates.................... ...................... ........... ........... ...................... ........... ...................... ................... ..........9
Section 3 – Administration ...................................................................................................................... 10
End-User Experience .......................................................................................................................................... 10
ThreatDetection.............. ........... ...................... ........... ........... ...................... ........... ...................... .................... .10
AppsTab....................... ........... ........... ...................... ........... ........... ...................... ........... ................... .................11
Administrative Preferences Override .................................................................................................................... 13
OverrideSettingsDetails.......................... ............ ..................... ........... ........... ...................... ........... ........... ........13
Administrative Trusted Sites Override .................................................................................................................. 14
RegexPatternRecommendations................... ........... ...................... ........... ........... ...................... ........... ........... .15
TrustedSitesCaution:......... .......... ...................... ........... ........... ...................... ........... ........... .............................. 15
UserTrustedSitesList........... ........... ...................... ........... ........... ..................... ........... ........... ............................16
Troubleshooting ................................................................................................................................................. 16
4
ManuallyTroubleshootingInstallationIssues.... ........... ........... ...................... ........... ........... ...................... ........16
ManuallyTroubleshootingPostInstallationIssues............................. ........... ........... ...................... ........... ........16
5
Section1OverviewandBasicInstallation
PurposeandIntendedAudience
ThisguideisintendedforITadministratorswhowillbeinstalling,deploying,andadministeringDDP|
ProtectedWorkspace.Thisguideisdesignedtohelpidentifysystemrequirements,identifypre
deploymenttasksandtosuggestdeploymentmethodologies.
WhatisDellDataProtection|ProtectedWorkspace?
DDP|ProtectedWorkspaceprovidesasecurewaytobrowsetheinternetbyleveragingtheexistingweb
browserinstalledonanenduserPCandallowingittoruninsidetheProtectedWorkspaceisolated
browsingenvironment(orbubble).DDP|PW alsoprotectscommondocumentssafelysuchasAdobePDFs,
MicrosoftWord,PowerPoint,
andExcel.Theisolatedenvironmentkeepsunexpectedmalwarefrom
executingorinstallingonthehostmachineandisdetectedbytheDDP|PWbehaviorbasedthreat
detection.Upondetection,theisolatedenvironmentisdestroyedandacleanenvironmentisrecreatedto
ensuretheendusermachineisnotcompromised.
SystemRequirements
SupportedOperatingSystems
Windows7,32and64bit
SupportedHardwarePlatforms
DellOptiPlex
DellPrecision
DellLatitude
MinimumSystemSpecs:
1GBRAM
500MBfreediskspace
IntelPentiumorbetter
RecommendedSystemSpecs:
2GBRAM
500MBfreediskspace
IntelCore2Duoorbetter
ConnectivityRequirements:
Aconnectiontohttp://delllicense.invincea.com(port80)isrequiredinordertoactivatethe
productlicense.
Aconnectiontohttps://dellupdate.invincea.com(port443)isrequiredforproductupdates
6
SupportedSoftware
DDP|ProtectedWorkspaceleveragessoftwareinstalledonanendusermachineandrunsthatsoftware
insideanisolatedenvironment.Toensureproperfunctionalitywithintheisolatedenvironment,only
certainsoftwareandversionsaresupported.Anyunsupportedsoftwareorversionwillnotbemovedinto
theisolatedenvironmentandwillcontinue
toonlyruninthenativeinterface.
SupportedBrowsers
InternetExplorer710
MozillaFirefox1021
SupportedPDFReaders
AdobeReader9,X,andXI
AdobeAcrobat9,XandXI
SupportedDocumentPrograms
MicrosoftWord,2010and2013
MicrosoftExcel,2010and2013
MicrosoftPowerPoint,2010and2013
SupportedBrowserPlugins
JavaRuntimeEnvironment1.6+
AdobeFlash11+
AppleQuickTime7+
MicrosoftSilverlight
BasicInstallation
DDP|ProtectedWorkspaceispackagedwithapredefinedsetofpreferencesandconfigurationandcan
beinstalledwithoutanycustomconfiguration.Itcanbeinstalledbyfollowingthesesteps.
1. DownloadtheDDP|ProtectedWorkspaceInstaller.
2. RuntheDellSetup_<version>.exe.
3. Selecttheinstallerdefaults.
4. Finishthe
DDP|ProtectedWorkspaceinstaller.
5. StartDDP|ProtectedWorkspacebydoubleclickingonthedesktopicon.
7
Section2EnterpriseEndUserDeployments
DeployingDellDataProtection|ProtectedWorkspacewithSoftwareDeploymentTools
DDP|ProtectedWorkspaceinstallationissupportedwithmanydifferentsoftwaredeploymenttools.
Currently,ProtectedWorkspaceistestedwithGPO,IBMTivoliEndpointManager(previouslyBigFix),
MicrosoftSCCMandSymantecAltiris,howeverdeploymentsshouldworkwithalldeploymenttools.
ProtectedWorkspaceEXEInstallerOptions
ThissectiondetailsoptionstobeusedforinstallingProtectedWorkspaceonenduserPCsdirectlyorwitha
systemmanagementtool.
Silentinstallusingdefaultoptions
DellSetup_<version>.exe /S /v/qn
Silentinstallwithchangingtheinstallfolder.ExamplechangesinstallpathtoC:\TEST:
DellSetup_<version>.exe /S /v"/qn INSTALLDIR="C:\TEST"
Silentuninstall(leaveuserfiles)
DellSetup_<version>.exe /S /x /v/qn
Silentuninstall(removesuserfiles)
DellSetup_<version>.exe /S /x /v"/qn PRESERVE=\"0\""
Silentupgrade
DellSetup_<version>.exe /S /v/qn
8
Connectivityrequirements
ProductActivation
AfterinstallingDDP|ProtectedWorkspace,theproductrequiresinternetaccessinorderreachouttothe
activationservers.Ifinternetaccessisnotavailable,theproductwillasktheusertocheckthesettingsand
tryagain.
Iftheenvironmentcontainsawebproxyorotherdevice,itis
importantthataccessto
http://delllicense.invincea.combeallowedonport80.
9
ProductUpdates
DDP|ProtectedWorkspaceisdesignedtonotifytheuserwhenanupdateisavailable.Whenanupdateis
applied,theupdatewillbedownloadedinthebackgroundwhiletheproductisrunning,andwillapply
whentheproductisresto redorexitedandrestarted. 
Duringtheupdateprocess,a
dialogboxwilldisplayoverthesystemtray,indicatingthattheupdateis
takingplace.
Inorderfortheautomaticupdatestooccur,itisimportantthattheproducthaveaconnectiontothe
internetandthatiftheenvironmentcontainsawebproxyorotherdevice,accessto
http://dellupdate.invincea.com
beallowedonport443.

10
Section3Administration
EndUserExperience
ThreatDetection
DDP|ProtectedWorkspaceoffersbuiltinthreatdetectiontohelpidentifyiftheDDP|PWenvironmenthas
beencompromisedbyanuntrustedprocess.Whensuspiciousac tivityhasbeendetected,adialogwill
displayoverthesystemtryindicatingthattheusershouldrestoretoacleansession.Itisrecommended
that
theRestorebuttonbepressedimmediatelytorestoretoacleansession,buttheuserdoeshavethe
optiontoclosethedialogboxwiththe“x”inthecornerandtocontinueusingtheproduct.Arestorecan
bedoneatalatertime.
Theusercanclickthe
“Details...”linkinthebottomleftcornerofthemessagetodisplayadditionaldetails
aboutthesuspiciousactivity.Thedialogwillidentifytheprocessthatwasflaggedassuspiciousandwill
alsogivedetailsaboutwhatthatprocessdidwithintheprotectedenvironment.Fromthisdialog,theuser
caneither
closethewindowbyclickingontheXintheupperrightcorner,orcanrestorethesessionusing
therestorebutton.

11
IftheuserchoosestorestorelaterbydismissingtheSuspiciousActivitydialogtheProtectedWorkspace
icononthesystemtraywillturnreduntiltheuserrestoresDDP|ProtectedWorkspacetoacleanstate.
DDP|ProtectedWorkspaceensuresthatanythreatiscontainedwithintheprotected
environmentand
thattheendusersystemhasbeenprotected.
AppsTab
Atabcalledthe“Apps”tabinthepreferenceGUIallowstheuserscanusetospecifywhichprograms
withintheprotectedenvironmentwillbeusediftherearemultipleoptions(suchaswithbothInternet
ExplorerandFirefox)andwhichprogramswillactasdefaulthandlersforcertainfile(such
asAdobeReader
forPDFs).
ToaccesstheAppstab,rightclickingontheDDP|PWIconinthesystemtray,andselecting“Preferences…”
BelowisascreenshotoftheAppstab.Applicationsthathavedefinedfilehandlerswithintheprotected
environmentwilllist“ProtectedFileTypes” andwillhave
acheckboxtoenablethatapplicationasthe
handlerforthatfiletype.Forexample,ifbothAdobeReaderandAdobeAcrobatareinstalledonaclient
machine,theusercanchoosewhichwillbeusedtoopenPDFfileswiththeprotectedenvironment.The
userwillnotbeableto
selectmultipleapplicationsforthesamehandler.
12

Additionally,fromtheAppstab,userswillbeabletoselectwhichbrowserwillbeusedtoopenwebpages
bydefaultwithintheprotectedenvironment.Theusercanselect“Usethisbrowsertoopenwebpages”
foreitherInternetExplorerorFirefox.

13
AdministrativePreferencesOverride
Insomeorganizations,administratorsmaywanttodisabletheabilityforDDP|ProtectedWorkspacefrom
reachingouttotheDDP|PWserversforsoftwareupdates,errorreportingandthreatdetectionreporting.
TheseoptionscanbedisabledbyaddinganoverridefileoneachPC.Itisrecommendedthattheseoptions
not
beusedunlessabsolutelynecessary.
TheoverridefileisasimpleXMLfilethatcanbecreatedinNotepadorasimilartexteditor.Createafile
withthename“preferences.xml”andcopythefollowingtextintoit:
<?xml version="1.0" encoding="UTF-8" ?>
<preferences ver="3">
<error_report enabled="false" />
<software_update enabled="false" interval="daily" user_modifiable="false" />
<send_threat_reports enabled="false" prompt="false" />
</preferences>
Oncethisfileiscreated,itneedstobeplacedontoeachPCthatneedstheoverride.Thelocationforthis
fileneedstobe:
C:\ProgramData\Invincea\Enterprise\Admin
Oncethisfileisinplace,start(orrestart)theDDP|ProtectedWorkspaceproductandtheseoverrideswill
takeeffect.
OverrideSettingsDetails
<error_reportenabled="false"/>
Theerror_reportoptiondisablestheabilityforDDP|ProtectedWorkspaceproducttosenderrorreports
whenaproducterroroccurs.Whenanerrorwindowisdisplayedthe“Submit”willbedisabled.
<software_updateenabled="false"interval="daily"user_modifiable="false"/>
Thesoftware_updateoptiondisablestheabilityforDDP|ProtectedWorkspace
producttoautomatically
applycriticalupdatestotheproduct.Thesecriticalupdatesallowforerrorstobecorrectastheyare
reportedandshouldbeallowedtoensurethatlatestcriticalupdatesarealwaysapplied.
<send_threat_reportsenabled="false"prompt="false"/>
Thesend_threat_reportsoptiondisablestheabilityforDDP|ProtectedWorkspace
producttoreport
homewhenasuspiciousactivityisdetected.Thesereportshelptoensurethattheproductdetectionis
workingcorrectlyandisnottriggeringalertswhennoactualthreatispresent.

14
AdministrativeTrustedSitesOverride
BydesigntheDDP|ProtectedWorkspaceproductrunstheusersnativewebbrowserswithinanisolated
environment.Thisisolatedenvironmentkeepstheuser’sPCsafefrommaliciouscontentbutcanalso
causesomeinteroperabilityissueswithcertainwebsites.Ifthesewebsitesarebusinesscriticaland
trusted,theusershavethe
abilitytomanuallytrustthemlocally.Bytrustingthem,thesesiteswillbe
openedwithinthenativebrowseriftheURLisbrowsedtointheprotectedenvironment.
Asanaddedconvenience,administratorshavetheabilitytoapplyanoverridefilethataddsasetoftrusted
siteswithoutany
userinteraction.
TheoverridefileisasimpleTXTfilethatcanbecreat edinNotepadorasimilartexteditor.Createafile
withthename“trustedsites.txt”
Oncethisfileiscreated,itneedstobeplacedontoeachPCthatneedstheoverride.Thelocationforthis
file
needstobe:
C:\ProgramData\Invincea\Enterprise\Admin
Oncethisfileisinplace,start(orrestart)theDDP|ProtectedWorkspaceproductandtheseoverrideswill
takeeffect.
TheformatofthetrustedURLsneeds tobeinREGEXformat.Thefollowingsectionoutlineshowtocreate
URLsinthecorrectformat.
Here
aresomeexamplesofcorrectlyformattedURLs.Thepoundsign(#)indicatesafilecomment:
#The following lines designate trusted sites/domains
^https?://([^/]*\.)*adobe\.com/.*
^https?://([^/]*\.)*acrobat\.com/.*
^https?://([^/]*\.)*webex\.com/.*
^https?://([^/]*\.)*dell\.com/.*
^https://internal\.dell\.com:8080/.*
^ftp://dell/.*
Theproductperformsalinebylineexaminationofthetrustedsites.txtfileandstopsatthefirstmatch.The
followingsectionoutlinessomepossibleentriesintothetrustedsites.txtfileandwhattheresulting
outcomewouldbe.
^ftp://dell/.*
Theaboveentrywouldmatchanythingthatstarts withftp://dell/andwouldallowanyadditionaltextafter
thelast/.
^https?://([^/]*\.)*dell\.com/.*
Theaboveentrywouldmatchanythingthatstarts with“http://”or“https://”,endswith“.dell.com/”and
allowsanysubdomainsofdell.com.[^/]*isanythingthat
doesn’tcontaina“/”so“dell.com”mustshow
upinthebaseportionoftheURL.Inotherwords,thiswillmatchhttp://anything.dell.com/*,butwillnot
matchhttp://fakedell.com/*orhttp://anything.com/?imageurl=fake.dell.com/*.
15
^https://internal\.dell\.com:8080/.*
Theaboveentrywillmatchtheexactsiteandportspecifiedandanythingthatfollows.
ToaddlocalIPsubnets,usethefollowingformat:
^https://192\.168\.1\.*(:\d{1,5})?/.*
TheaboveentrywillmatchanyURLthatuseshttporhttps,andisaccessedwitha192.168.1.xsubnetIP
address.Italsoallows
foranyporttobeusedonthisURL.
ItisimportanttonotethattrustedsitesisnotabletodoDNSlookups.Therefore,trustingaspecificsubnet
ofaddressesdoesnottrusttheirassociatedDNSnames.IfDNSnamesneedtobeusedforthetrustedsite
list,eachDNSname
mustbelistedout.
^https://([^/]*\.)*sharepoint\.*
^https://([^/]*\.)*myinternalserver\.*
RegexPatternRecommendations
Belowaresomeregexpatternsthatcanbeusedtocreatecustomentries.
“^”Beginningoftheline.
“?”Matchzeroor1ofthepreviouscharacter
“$”Endoftheline.
“\.”Periodcharacter.(A“.”matchesanycharacter.)
“.*”Matchanynumber(zeroormore)ofanycharacters.
untrusted=
Unmatchtheregexinsteadofmatch.
“[^/]*Matchanynumberofanycharactersexcept“/”.
TrustedSitesCaution:
BeawarethatthewholeURLstringispassedtoDDP|ProtectedWorkspaceandmatchedagainstthislist.
Slightvariationsinsyntaxcanmakeadifferencebetweenmatchingandmatchinginthewayyouintend.As
anexample,theURL:
http://www.dell.com$
isnotsafeandwouldnotmatch.Itwould
notmatchbecauseatrailing“/”isoftenaddedbyWindows
beforetheURLispassedtoapplications.Itisnotsafebecausethisstringcouldbepartoftheparametersof
anURLandnotthewebsiteyouintended.
.*www.dell.com.*
matchesif“www.dell.com”appearsanywhereintheURL,not
justastheaddress‐suchasmatching
http://www.fakesite.com/spoofsite=http://www.dell.com/
16
UserTrustedSitesList
FromDDP|ProtectedWorkspace,auserhastheabilitytotrustsiteslocal ly.Thesesiteswillbeaddedto
thebeginningofthelistofsitesprovidedwithinanadministrativeoverridefile.Forexample,ifanadmin
truststhefollowing:
^https://([^/]*\.)*sharepoint\.*
^https://([^/]*\.)*myinternalserver\.*
Andausertrusts:
google.com
yahoo.com
Thenthefulllist
oftrustedsitesforthisPCwillincludeallofthesitesoutlined:
^https?://([^/]*\.)*google\.com/.*
^https?://([^/]*\.)*yahoo\.com/.*
^https://([^/]*\.)*sharepoint\.*
^https://([^/]*\.)*myinternalserver\.*
Troubleshooting
ManuallyTroubleshootingInstallationIssues
TherearetwologfilesthataregeneratedduringtheinstallationofDDP|ProtectedWorkspacethatcan
offerinsightastowhyaninstallationmayhavefailed.
ThefirstfileistheMSIoutputfile.Iftheinstallerisrunmanuallyviathestandardexecutable,thisfilewill
becreated
intheC:\Windows\Tempdirectory.ThelogfilenamewillbeInvEnterpriseMSI.log.Thisfilewill
providedeta ilsonfailuresthathappenedduringprechecks,suchasdiskspace,memoryorothersystem
requirements.
ThesecondfileistheDDP|ProtectedWorkspaceinstallerfile.Itwillbelocatedinthesame
directoryas
theMSIfile,andwillbenamedInvEnterpriseInstall.log.Thislogwillprovideindicationoffailuresduring
theinstallationandconfigurationprocess.AnyerrorswillbetaggedincapitalletterswiththewordERROR
orFATALafterthedateandtimestamp.AnylinethatistaggedwithDEBUG,TRACE
orINFOcanbe
ignored.
ManuallyTroubleshootingPostInstallationIssues
Therearethreelogfilesthatareprimarilyusedtoidentifyissuespostinstallation.
ThefirstfileisthelogfilefortheDDP|ProtectedWorkspaceServiceandisnamedInvProtectSvc.log.This
isagloballogfilethatlogsinformationacrossalluseraccounts.Thefirstlocationis:
C:\Windows\Temp\Invincea\
Thislogprovidesinformationabouttheapplicationsthatwedetectduringstartup(suchastheversionifIE,
AdobeReader,Java,Flash,etc.)andwhatlocationsofthehostsystemareaccessiblebytheisolated
environmentornot.
17
Aswiththeinstallerlogfiles,errorswillbenotedatERRORorFATALafterthedateandtimestamp.
2012050208:04:33,203ERRORInv.MC.TCPConnection‐[5864]SSLHandshakeerror:Anexisting
connectionwasforciblyclosedbytheremotehost
Thesecondfileisthelogfileforthe
instanceofDDP|ProtectedWorkspacerunningunderausercontext.
Thisfileisnamedinv.logandislocatedintheusersAppDatafolder.EachuseronasinglePCwillhavean
inv.logfile.Thisfilewillhelpidentifyifthereareunsupportedversionsofanapplicationinstalled,or
communication
issueswithneededresources.
Whileloggedinastheuserhavingissues,thelogfilecanbefoundatthisaddressonallOSs:
%APPDATA%\Invincea\Enterprise\inv.log
Again,anyerrorswillbemarkedwithERRORorFATALafterthetimeanddatestamp.
2012052212:48:59,157ERRORInv.TaskMgr‐Error:Timeoutwhen
performingRestore,Wait
forGuestConnect
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17

Dell Protected Workspace User guide

Type
User guide

Dell Protected Workspace

Dell Protected Workspace is a security software designed to protect your computer from malware and other online threats. It does this by creating a secure, isolated environment in which you can browse the internet and open files without the risk of infecting your computer.

Here are some of the key features and benefits of Dell Protected Workspace:

  • Protects your computer from malware and other online threats. Dell Protected Workspace creates a secure, isolated environment in which you can browse the internet and open files without the risk of infecting your computer. This environment is protected from malware and other online threats, so you can be sure that your computer is safe.

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI