Reference Guide

Security Management Server Virtual v10.2.11 AdminHelp
Policy Proxy
Policy Proxy serves as intermediary between Dell Server and Encryption client, delivering information
from each to the other.
Time Slotting
To prevent Dell Server traffic jams, Policy Proxies use a time slotting mechanism that allows them to
independently choose well-distributed time slots for communicating with the Dell Server.
Polling
On every poll, the endpoint authenticates, checks for policy updates, and uploads inventory. A
successful authentication is required for the process to begin.
Poll Triggers
A user must be logged in to poll. On the next user login, another poll occurs. The poll information
needed is only available per user, and when that user is logged in.
Other times a poll occurs:
Immediately upon login, after encryption keys are unlocked.
When a network status update is signaled by the operating system (cable plugged in, wireless
network connected, VPN becomes active).
When the polling period elapses, as specified by policy.
Failed Poll Attempts
Policy Proxy poll attempts are based on a timer. When a poll attempt fails, the timer is reset. The length
of time set for the next attempt is based on when the attempt failed. If the device misses a poll when
powered off, the timer is triggered when the device is next powered on.
If the poll attempt failed while making the attempt, the time is set to one tenth the policy value for the
polling interval. For example, if the polling interval is 100 minutes, then the next interval after a failed
attempt is 10 minutes. If it fails again, the next interval is still 10 minutes. The interval remains 10
minutes until a successful poll, after which it returns to 100 minute intervals.
General Information
Policy Proxy is generally installed on only a few computers.
Creates inventory information for the Dell Server.
Passes on to the Dell Server device inventory it receives when the Encryption client
successfully retrieves policies.
Securely distributes security policies and encryption keys to devices via the network when
contacted.
May be in your DMZ.
Always belongs to a group. By default, all Policy Proxies belong to the same group.
29