Users Guide

Table Of Contents
A callback beacon can be inserted into every protected Office file, when the beacon server is installed as part of the
Front End server installation.
As of v9.4.1.6,Dell Enterprise Server supports Advanced Threat Prevention on Mac computers. Advanced Threat Prevention
provides real-time threat detection by analyzing potential file executions for malware in both the operating system and
memory layers to prevent the delivery of malicious payloads. Control of execution at the endpoint allows for accurate
and effective detection of malicious threats - even those that have never been seen before. Advanced Threat Prevention
uses machine learning techniques that allow detection of new malware, viruses, bots and unknown future variants, where
signatures and sandboxes fail. Memory protection strengthens basic operating system protection features by providing an
additional layer to detect and deny certain behaviors that are commonly used by exploits.
As of v9.5, Cloud Edition is no longer supported.
Resolved Technical Advisories v9.5
When an existing certificate is imported during upgrade, the installer no longer displays an error if the certificate password
has been changed from the default password. [DDPS-2644]
Searching for endpoints in the Remote Management Console using the Shield Recovery ID now returns expected results.
[DDPS-4017]
An issue is resolved that resulted in Summary Statistics in the Remote Management Console Dashboard occasionally not
updating as expected. [DDPS-4082]
A second or subsequent notification that is added in Notification Management in the Remote Management Console no longer
retains the Type and Priority values of the previously added notification. [DDPS-4178]
After upgrade, the Compliance Reporter reports, SED Authentication Method Policy Detail and Windows Encryption Failures
and Sweep Status, are available as expected. [DDPS-4183]
After the user browses for the Service Account Run As user name, the credentials now populate in the Service Runtime
Account Information dialog in the installer. [DDPS-4234]
The Advanced Threat Prevention category is now populated in Log Analyzer in the Remote Management Console.
[DDPS-4241]
An issue that resulted in failure of Advanced Threat Prevention Agent Auto Update enrollment is resolved. [DDPS-4244]
The Add User and Add Group options are removed from Domain Detail for Members of Non-Domain Users in the Remote
Management Console. These options are not applicable for non-domain users. [DDPS-4255]
Resolved Customer Issues
The Specification field in the Remote Management Console Add Endpoint Group page is now validated for length and
displays an error if more than 4,000 characters are entered. [DDPS-2953, DDPS-4260]
The TPM Enabled field in the Compliance Reporter BitLocker Manager Detail report is now accurate. [DDPS-3394]
During new database installation, the installer now creates the database in the folder configured in Server Properties
Database Settings rather than in the master database folder specified in Database Properties Files. [DDPS-4221]
Technical Advisories v9.5
Amended 7/2017 - The Remote Management Console Login button may be disabled in Google Chrome or Internet Explorer
on Server 2012. To work around this issue, clear the browser cache and then attempt login or use Mozilla Firefox 41.x or
later. [DDPS-4558]
Advanced Threat Prevention policies are not properly validated if their values are not enclosed in double quotes (") and
contain wildcards or special characters, including commas (,), brackets ([ ]), and tildes (~). To force validation, enclose
strings in double quotes ("). Do not use wildcards and special characters, which are not allowed. [DDPS-4589]
Added 2/2017 - Policy validation beginning in v9.5 may result in an "Error Validating Policy " message in the Remote
Management Console when attempting to view policy when the value of the policy is incorrectly formatted. To work around
this issue, correct the formatting of affected policy values. To identify the affected policies, follow these steps:
1. Open <Core Server install directory> PolicyService.config.
Enterprise Server - Program Files\Dell\Enterprise Edition\Core Server
VE - /opt/dell/server/core-server
2. Change the StrictValidation property value from true to false: <property name="StrictValidation"
value="false"/>
3. Restart the services.
30
Dell Security Management Server Technical Advisories