Users Guide
Enterprise Server, change both the broker.port value in the server_config.xml file and the activemq.port.tcp value in
Message Broker\conf\application.properties to the correct port number. [DDPSTE-654]
Resolved Technical Advisories v8.5.1
● Silverlight Console connectivity is improved when Enterprise Server is constrained. [DDPS-239]
● Enterprise Server v8.5.1 includes a security update addressing an OpenSSL vulnerability (OpenSSL CVE-2014-3566).
Customers and field teams should take v8.5.1 and all Enterprise Server updates or sustaining releases, as a best practice.
[DDPS-1541]
●
In multi-level domain environments, users can now successfully log on to the Remote Management Console. [DDPS-1559,
DDPSTE-274]
● Search results are now as expected when searching for Endpoints that include a wildcard (*) in the Hostname. [DDPS-1575,
DDPSTE-402]
● Licensing issues have been resolved. [DDPS-1584, DDPSTE-403, DDPSUS-58]
● Added 02/2016 - Client activations are now successful after migration from v6.8. [DDPS-1657]
● Pre-v8.5 DDP|E SED and HCA clients that have a PBA activated now receive policy updates as expected when settings for
Logon Authentication and In-Session Authentication policies include One-time Password as a value. [DDPSTE-439]
● The in-use license count for Mobile Edition is now properly calculated. [DDPSUS-61]
● TLS communication security is hardened. [DDPSUS-108]
● On Brazilian Portuguese operating systems, the Silverlight Console's webhelp now functions properly.
Technical Advisories v8.5.1
● Amended 04/2015 - To protect communications against the OpenSSL CVE-2014-3566 vulnerability, Dell Enterprise Server
v8.5.1 and later are set to communicate using TLS, by default. However, DDP|E SED and HCA v8.5 and earlier clients
communicate with Enterprise Server using SSL. This means that when running Enterprise Server v8.5.1 and later, DDP|E
SED or HCA v8.5 and earlier clients with Preboot Authentication activated will fail to communicate with Enterprise Server.
To work around this issue, search "SLN296006" at www.dell.com/support, to find the knowledge base article associated
with this issue. This workaround must be implemented as soon as possible, in order to prevent PBA client communication
issues with Enterprise Server v8.5.1 and later. [DDPS-1609]
New Features and Functionality v8.5
● Dell Enterprise Server now supports automated migration from DDP Personal Edition to Enterprise Edition with the DDP
Managed Migration Utility.
● Dell Enterprise Server now supports new Cloud Edition policies that offer expanded protection and management options.
When Cloud Edition is used with Dropbox for Business, the following features are now available:
○ The Dropbox for Business administrator can now remote wipe a Dropbox for Business account.
○ New policies offer multi-account support, providing the capability to distinguish between Dropbox for Business and
Dropbox personal accounts.
● Dell Compliance Reporter offers new reporting options:
○ A new Cloud Users report displays enrollment and remote wipe information about Dropbox for Business users.
○ New filtering options are available with the Cloud Edition Encrypted Files/Actions report to provide greater customization
of event and key management detail.
○ The Device Detail report now includes a field to indicate devices that have self-encrypting drives installed.
● Dell Enterprise Server v8.5 has been validated with VMware ESX/ESXi 5.5.
Resolved Technical Advisories v8.5
● If the iOS Web Clip URL policy value is specified after Enterprise Server installation and before all services are started,
services now properly start. [DDPS-162]
● In the Policy Template Editor, the following PBA Authentication policies now display in the Global Settings list instead of
under Self-Encrypting Drives: Non-Cached User Login Attempts Allowed, Cached User Login Attempts Allowed, and Self
Help Question/Answer Attempts Allowed. [DDPS-166]
Dell Security Management Server Technical Advisories
37