Administrator Guide
Configure the Cloud + VDI + Local Mode................................................................................................................... 70
Chapter 10: User applications...................................................................................................... 72
Browse the Internet..........................................................................................................................................................72
Enable or disable multicontainers for Firefox........................................................................................................72
Enable or disable site isolation for Chrome........................................................................................................... 73
Enable or disable plugins for Chrome..................................................................................................................... 73
Allow or block access to websites...........................................................................................................................73
Using Dell File Explorer.....................................................................................................................................................74
Create a file...................................................................................................................................................................76
Add a folder...................................................................................................................................................................77
Save cloud files for offline use................................................................................................................................. 78
Configure a network drive.........................................................................................................................................78
Access local applications................................................................................................................................................. 79
Configure the application security...........................................................................................................................79
Using the Zoom application.............................................................................................................................................79
Installing third-party applications.................................................................................................................................. 80
Install a Dell-signed application................................................................................................................................ 80
Install a custom-signed application.......................................................................................................................... 81
Install an unsigned application...................................................................................................................................81
Chapter 11: Security configurations.............................................................................................83
Deployment models...........................................................................................................................................................83
Authentication....................................................................................................................................................................83
Login security settings............................................................................................................................................... 83
Authentication types and setup............................................................................................................................... 86
User and credential management............................................................................................................................86
Authentication to external systems........................................................................................................................ 86
Authorization...................................................................................................................................................................... 86
Network security............................................................................................................................................................... 87
Data security.......................................................................................................................................................................87
Manage USB devices..................................................................................................................................................87
Cryptography......................................................................................................................................................................88
Auditing and logging......................................................................................................................................................... 88
Code or product integrity................................................................................................................................................88
Reporting security vulnerabilities.................................................................................................................................. 88
Chapter 12: Dell Hybrid Client recovery imaging.......................................................................... 89
Chapter 13: Dell Hybrid Client troubleshooting............................................................................ 90
Using log files for troubleshooting................................................................................................................................ 90
Enable dev mode in Dell Hybrid Client....................................................................................................................90
Request log files using Wyse Management Suite................................................................................................90
Extract log files using Device Settings................................................................................................................... 91
Extract VDI log files.....................................................................................................................................................91
Device is unable to register to Wyse Management Suite........................................................................................ 91
Enrollment validation is pending.................................................................................................................................... 92
Chapter 14: Frequently Asked Questions (FAQs)......................................................................... 93
Contents
5