Dell Data Protection Protected Workspace Administrator's Guide User Manual Administrator En Us

User Manual: Dell dell-data-protection-protected-workspace - Dell Data Protection Protected Workspace Administrator's Guide

Open the PDF directly: View PDF PDF.
Page Count: 17

DownloadDell Dell-data-protection-protected-workspace Data Protection Protected Workspace Administrator's Guide User Manual  - Administrator En-us
Open PDF In BrowserView PDF
S

Dell Data Protection | Protected Workspace
Administrator’s Guide

Dell Data Protection | Protected Workspace

© 2013 Dell Inc.
Trademarks used in this text: Dell™, the DELL logo, Dell Precision™, OptiPlex™, Latitude™, and Vostro™ are trademarks of Dell Inc.
Intel®, Pentium®, Xeon®, Core™ and Celeron® are registered trademarks of Intel Corporation in the U.S. and other countries.
Microsoft® and Windows® are registered trademarks of Microsoft Corporation in the United States and/or other countries.
June 2013

Rev. A00

Table of Contents
Section 1 – Overview and Basic Installation ........................................................................................... 5
Purpose and Intended Audience ............................................................................................................................ 5
What is Dell Data Protection | Protected Workspace? ............................................................................................. 5
System Requirements ........................................................................................................................................... 5

Supported Operating Systems .............................................................................................................................. 5
Supported Hardware Platforms ............................................................................................................................ 5
Minimum System Specs: ....................................................................................................................................... 5
Recommended System Specs: ............................................................................................................................... 5
Connectivity Requirements: .................................................................................................................................. 5
Supported Software .............................................................................................................................................. 6

Supported Browsers .............................................................................................................................................. 6
Supported PDF Readers......................................................................................................................................... 6
Supported Document Programs ............................................................................................................................ 6
Supported Browser Plugins ................................................................................................................................... 6


Basic Installation ......................................................................................................................................... 6

Section 2 – Enterprise End-User Deployments ....................................................................................... 7
Deploying Dell Data Protection | Protected Workspace with Software Deployment Tools .......................................... 7

Protected Workspace EXE Installer Options ......................................................................................................... 7
Connectivity requirements .................................................................................................................................... 8

Product Activation ................................................................................................................................................ 8
Product Updates.................................................................................................................................................... 9

Section 3 – Administration ...................................................................................................................... 10
End-User Experience .......................................................................................................................................... 10

Threat Detection ................................................................................................................................................. 10
Apps Tab.............................................................................................................................................................. 11
Administrative Preferences Override .................................................................................................................... 13

Override Settings Details..................................................................................................................................... 13
Administrative Trusted Sites Override .................................................................................................................. 14

Regex Pattern Recommendations ....................................................................................................................... 15
Trusted Sites Caution: ......................................................................................................................................... 15
User Trusted Sites List ......................................................................................................................................... 16
Troubleshooting ................................................................................................................................................. 16

3

Manually Troubleshooting Installation Issues .................................................................................................... 16
Manually Troubleshooting Post‐Installation Issues ............................................................................................ 16

4

Section 1 – Overview and Basic Installation
Purpose and Intended Audience
This guide is intended for IT administrators who will be installing, deploying, and administering DDP |
Protected Workspace. This guide is designed to help identify system requirements, identify pre‐
deployment tasks and to suggest deployment methodologies.

What is Dell Data Protection | Protected Workspace?
DDP | Protected Workspace provides a secure way to browse the internet by leveraging the existing web
browser installed on an end user PC and allowing it to run inside the Protected Workspace isolated
browsing environment (or bubble). DDP|PW also protects common documents safely such as Adobe PDFs,
Microsoft Word, PowerPoint, and Excel. The isolated environment keeps unexpected malware from
executing or installing on the host machine and is detected by the DDP|PW behavior based threat
detection. Upon detection, the isolated environment is destroyed and a clean environment is recreated to
ensure the end user machine is not compromised.

System Requirements
Supported Operating Systems


Windows 7, 32 and 64‐bit

Supported Hardware Platforms




Dell OptiPlex
Dell Precision
Dell Latitude

Minimum System Specs:




1 GB RAM
500 MB free disk space
Intel Pentium or better

Recommended System Specs:




2 GB RAM
500 MB free disk space
Intel Core 2 Duo or better

Connectivity Requirements:



A connection to http://delllicense.invincea.com (port 80) is required in order to activate the
product license.
A connection to https://dellupdate.invincea.com (port 443) is required for product updates

5

Supported Software
DDP | Protected Workspace leverages software installed on an end user machine and runs that software
inside an isolated environment. To ensure proper functionality within the isolated environment, only
certain software and versions are supported. Any unsupported software or version will not be moved into
the isolated environment and will continue to only run in the native interface.

Supported Browsers



Internet Explorer 7‐10
Mozilla Firefox 10‐21

Supported PDF Readers



Adobe Reader 9, X, and XI
Adobe Acrobat 9, X and XI

Supported Document Programs




Microsoft Word, 2010 and 2013
Microsoft Excel, 2010 and 2013
Microsoft PowerPoint, 2010 and 2013

Supported Browser Plugins







Java Runtime Environment 1.6+
Adobe Flash 11 +
Apple QuickTime 7 +
Microsoft Silverlight

Basic Installation

DDP | Protected Workspace is packaged with a pre‐defined set of preferences and configuration and can
be installed without any custom configuration. It can be installed by following these steps.
1.
2.
3.
4.
5.

Download the DDP | Protected Workspace Installer.
Run the DellSetup_.exe.
Select the installer defaults.
Finish the DDP | Protected Workspace installer.
Start DDP | Protected Workspace by double clicking on the desktop icon.

6

Section 2 – Enterprise End‐User Deployments
Deploying Dell Data Protection | Protected Workspace with Software Deployment Tools
DDP | Protected Workspace installation is supported with many different software deployment tools.
Currently, Protected Workspace is tested with GPO, IBM Tivoli Endpoint Manager (previously BigFix),
Microsoft SCCM and Symantec Altiris, however deployments should work with all deployment tools.

Protected Workspace EXE Installer Options
This section details options to be used for installing Protected Workspace on end‐user PCs directly or with a
system management tool.


Silent install using default options
DellSetup_.exe /S /v/qn



Silent install with changing the install folder. Example changes install path to C:\TEST:
DellSetup_.exe /S /v"/qn INSTALLDIR="C:\TEST"



Silent uninstall (leave user files)
DellSetup_.exe /S /x /v/qn



Silent uninstall (removes user files)
DellSetup_.exe /S /x /v "/qn PRESERVE=\"0\""



Silent upgrade
DellSetup_.exe /S /v/qn

7

Connectivity requirements
Product Activation
After installing DDP | Protected Workspace, the product requires internet access in order reach out to the
activation servers. If internet access is not available, the product will ask the user to check the settings and
try again.

If the environment contains a web proxy or other device, it is important that access to
http://delllicense.invincea.com be allowed on port 80.

8

Product Updates
DDP | Protected Workspace is designed to notify the user when an update is available. When an update is
applied, the update will be downloaded in the background while the product is running, and will apply
when the product is restored or exited and restarted.

During the update process, a dialog box will display over the system tray, indicating that the update is
taking place.

In order for the automatic updates to occur, it is important that the product have a connection to the
internet and that if the environment contains a web proxy or other device, access to
http://dellupdate.invincea.com be allowed on port 443.

9

Section 3 – Administration
End‐User Experience
Threat Detection
DDP | Protected Workspace offers built in threat detection to help identify if the DDP|PW environment has
been compromised by an untrusted process. When suspicious activity has been detected, a dialog will
display over the system try indicating that the user should restore to a clean session. It is recommended
that the Restore button be pressed immediately to restore to a clean session, but the user does have the
option to close the dialog box with the “x” in the corner and to continue using the product. A restore can
be done at a later time.

The user can click the “Details...” link in the bottom left corner of the message to display additional details
about the suspicious activity. The dialog will identify the process that was flagged as suspicious and will
also give details about what that process did within the protected environment. From this dialog, the user
can either close the window by clicking on the X in the upper right corner, or can restore the session using
the restore button.

10

If the user chooses to restore later by dismissing the Suspicious Activity dialog the Protected Workspace
icon on the system tray will turn red until the user restores DDP | Protected Workspace to a clean state.

DDP | Protected Workspace ensures that any threat is contained within the protected environment and
that the end user system has been protected.

Apps Tab
A tab called the “Apps” tab in the preference GUI allows the users can use to specify which programs
within the protected environment will be used if there are multiple options (such as with both Internet
Explorer and Firefox) and which programs will act as default handlers for certain file (such as Adobe Reader
for PDFs).
To access the Apps tab, right clicking on the DDP|PW Icon in the system tray, and selecting “Preferences…”

Below is a screenshot of the Apps tab. Applications that have defined file handlers within the protected
environment will list “Protected File Types” and will have a checkbox to enable that application as the
handler for that file type. For example, if both Adobe Reader and Adobe Acrobat are installed on a client
machine, the user can choose which will be used to open PDF files with the protected environment. The
user will not be able to select multiple applications for the same handler.

11

Additionally, from the Apps tab, users will be able to select which browser will be used to open webpages
by default within the protected environment. The user can select “Use this browser to open web pages”
for either Internet Explorer or Firefox.

12

Administrative Preferences Override
In some organizations, administrators may want to disable the ability for DDP | Protected Workspace from
reaching out to the DDP|PW servers for software updates, error reporting and threat detection reporting.
These options can be disabled by adding an override file on each PC. It is recommended that these options
not be used unless absolutely necessary.
The override file is a simple XML file that can be created in Notepad or a similar text editor. Create a file
with the name “preferences.xml” and copy the following text into it:







Once this file is created, it needs to be placed on to each PC that needs the override. The location for this
file needs to be:
C:\ProgramData\Invincea\Enterprise\Admin
Once this file is in place, start (or restart) the DDP | Protected Workspace product and these overrides will
take effect.

Override Settings Details

The error_report option disables the ability for DDP | Protected Workspace product to send error reports
when a product error occurs. When an error window is displayed the “Submit” will be disabled.

The software_update option disables the ability for DDP | Protected Workspace product to automatically
apply critical updates to the product. These critical updates allow for errors to be correct as they are
reported and should be allowed to ensure that latest critical updates are always applied.

The send_threat_reports option disables the ability for DDP | Protected Workspace product to report
home when a suspicious activity is detected. These reports help to ensure that the product detection is
working correctly and is not triggering alerts when no actual threat is present.

13

Administrative Trusted Sites Override
By design the DDP | Protected Workspace product runs the users native web browsers within an isolated
environment. This isolated environment keeps the user’s PC safe from malicious content but can also
cause some interoperability issues with certain websites. If these websites are business critical and
trusted, the users have the ability to manually trust them locally. By trusting them, these sites will be
opened within the native browser if the URL is browsed to in the protected environment.
As an added convenience, administrators have the ability to apply an override file that adds a set of trusted
sites without any user interaction.
The override file is a simple TXT file that can be created in Notepad or a similar text editor. Create a file
with the name “trustedsites.txt”
Once this file is created, it needs to be placed on to each PC that needs the override. The location for this
file needs to be:
C:\ProgramData\Invincea\Enterprise\Admin
Once this file is in place, start (or restart) the DDP | Protected Workspace product and these overrides will
take effect.
The format of the trusted URLs needs to be in REGEX format. The following section outlines how to create
URLs in the correct format.
Here are some examples of correctly formatted URLs. The pound sign (#) indicates a file comment:
#The following lines designate trusted sites/domains
^https?://([^/]*\.)*adobe\.com/.*
^https?://([^/]*\.)*acrobat\.com/.*
^https?://([^/]*\.)*webex\.com/.*
^https?://([^/]*\.)*dell\.com/.*
^https://internal\.dell\.com:8080/.*
^ftp://dell/.*
The product performs a line by line examination of the trustedsites.txt file and stops at the first match. The
following section outlines some possible entries into the trustedsites.txt file and what the resulting
outcome would be.
^ftp://dell/.*
The above entry would match anything that starts with ftp://dell/ and would allow any additional text after
the last /.
^https?://([^/]*\.)*dell\.com/.*
The above entry would match anything that starts with “http://” or “https://”, ends with “.dell.com/” and
allows any sub domains of dell.com. [^/]* is anything that doesn’t contain a “/” so “dell.com” must show
up in the base portion of the URL. In other words, this will match http://anything.dell.com/*, but will not
match http://fakedell.com/* or http://anything.com/?imageurl=fake.dell.com/*.
14

^https://internal\.dell\.com:8080/.*
The above entry will match the exact site and port specified and anything that follows.
To add local IP subnets, use the following format:
^https://192\.168\.1\.*(:\d{1,5})?/.*
The above entry will match any URL that uses http or https, and is accessed with a 192.168.1.x subnet IP
address. It also allows for any port to be used on this URL.
It is important to note that trustedsites is not able to do DNS lookups. Therefore, trusting a specific subnet
of addresses does not trust their associated DNS names. If DNS names need to be used for the trustedsite
list, each DNS name must be listed out.
^https://([^/]*\.)*sharepoint\.*
^https://([^/]*\.)*myinternalserver\.*

Regex Pattern Recommendations
Below are some regex patterns that can be used to create custom entries.
“^” Beginning of the line.
“?” Match zero or 1 of the previous character
“$” End of the line.
“\.” Period character. (A “.” matches any character.)
“.*” Match any number (zero or more) of any characters.
untrusted= Un‐match the regex instead of match.
“[^/]*” Match any number of any characters except “/”.

Trusted Sites Caution:
Be aware that the whole URL string is passed to DDP | Protected Workspace and matched against this list.
Slight variations in syntax can make a difference between matching and matching in the way you intend. As
an example, the URL:
http://www.dell.com$
is not safe and would not match. It would not match because a trailing “/” is often added by Windows
before the URL is passed to applications. It is not safe because this string could be part of the parameters of
an URL and not the web site you intended.
.*www.dell.com.*
matches if “www.dell.com” appears anywhere in the URL, not just as the address ‐ such as matching
http://www.fakesite.com/spoofsite=http://www.dell.com/
15

User Trusted Sites List
From DDP | Protected Workspace, a user has the ability to trust sites locally. These sites will be added to
the beginning of the list of sites provided within an administrative override file. For example, if an admin
trusts the following:
^https://([^/]*\.)*sharepoint\.*
^https://([^/]*\.)*myinternalserver\.*
And a user trusts:
google.com
yahoo.com
Then the full list of trusted sites for this PC will include all of the sites outlined:
^https?://([^/]*\.)*google\.com/.*
^https?://([^/]*\.)*yahoo\.com/.*
^https://([^/]*\.)*sharepoint\.*
^https://([^/]*\.)*myinternalserver\.*

Troubleshooting
Manually Troubleshooting Installation Issues
There are two log files that are generated during the installation of DDP | Protected Workspace that can
offer insight as to why an installation may have failed.
The first file is the MSI output file. If the installer is run manually via the standard executable, this file will
be created in the C:\Windows\Temp directory. The log file name will be InvEnterpriseMSI.log. This file will
provide details on failures that happened during pre‐checks, such as disk space, memory or other system
requirements.
The second file is the DDP | Protected Workspace installer file. It will be located in the same directory as
the MSI file, and will be named InvEnterpriseInstall.log. This log will provide indication of failures during
the installation and configuration process. Any errors will be tagged in capital letters with the word ERROR
or FATAL after the date and time stamp. Any line that is tagged with DEBUG, TRACE or INFO can be
ignored.

Manually Troubleshooting Post‐Installation Issues
There are three log files that are primarily used to identify issues post‐installation.
The first file is the log file for the DDP | Protected Workspace Service and is named InvProtectSvc.log. This
is a global log file that logs information across all user accounts. The first location is:
C:\Windows\Temp\Invincea\
This log provides information about the applications that we detect during startup (such as the version if IE,
Adobe Reader, Java, Flash, etc.) and what locations of the host system are accessible by the isolated
environment or not.
16

As with the installer log files, errors will be noted at ERROR or FATAL after the date and time stamp.
2012‐05‐02 08:04:33,203 ERROR Inv.MC.TCPConnection
connection was forcibly closed by the remote host

‐ [5864] SSL Handshake error: An existing

The second file is the log file for the instance of DDP | Protected Workspace running under a user context.
This file is named inv.log and is located in the users AppData folder. Each user on a single PC will have an
inv.log file. This file will help identify if there are unsupported versions of an application installed, or
communication issues with needed resources.
While logged in as the user having issues, the log file can be found at this address on all OSs:
%APPDATA%\Invincea\Enterprise\inv.log
Again, any errors will be marked with ERROR or FATAL after the time and date stamp.
2012‐05‐22 12:48:59,157 ERROR Inv.TaskMgr
for Guest Connect

‐ Error: Timeout when performing Restore, Wait

17



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.5
Linearized                      : No
Format                          : application/pdf
Creator                         : Dell Inc.
Subject                         : Administrator Guide
Description                     : Administrator Guide
Title                           : Dell Data Protection Protected Workspace Administrator's  Guide
Producer                        : Acrobat Distiller 10.1.5 (Windows); modified using iTextSharp 5.1.3 (c) 1T3XT BVBA
Create Date                     : 2013:05:23 14:26:45-05:00
Creator Tool                    : PScript5.dll Version 5.2.2
Modify Date                     : 2013:06:04 00:01:52-05:00
Page Count                      : 17
Author                          : Dell Inc.
Keywords                        : Software, Monitors, Electronics & Peripherals#Software#dell data protection protected workspace#dell-data-protection-protected-workspace#Administrator Guide#data protection; protected workspace;
Productcode                     : dell-data-protection-protected-workspace
Typecode                        : ag
Typedescription                 : Administrator Guide
Languagecodes                   : en-us
Publishdate                     : 2013-06-04 00:00:00
Expirydate                      : 9999-09-09 00:00:00
Manualurl                       : http://ftp.dell.com/manuals/all-products/esuprt_electronics/esuprt_software/dell-data-protection-protected-workspace_Administrator Guide_en-us.pdf
Readytocopy                     : false
Isdeleted                       : False
Businesskeywords                : data protection; protected workspace;
Futureproductindication         : Yes
Categorypathforfutureproducts   : all-products/esuprt_electronics/esuprt_software
Filesize                        : 501
Creationdate                    : D:20130523142645-05'00'
Moddate                         : D:20130529105421-05'00'
EXIF Metadata provided by EXIF.tools

Navigation menu