Administrator Guide
● Disable USB devices using Vendor ID/Product ID—If the Enable all and Disable all excluding HID options are
disabled, use the Disable USB devices using Vendor ID/Product ID feature to block certain USB devices, making
them inaccessible from the client. You must specify the Vendor ID (VID) and the Product ID (PID) of the USB devices
that you want to disable. To disable a USB device, do the following:
a. Click Add Row.
b. In the Vendor ID field, enter the vendor ID of the USB device.
c. In the Product ID field, enter the product ID of the USB device. This is an optional field.
For example, vvvv:pppp, where vvvv is the device vendor ID and pppp is the device product ID.
● Disable by USB class—If the Enable all and Disable all excluding HID options are disabled, you can disable the USB
devices by USB class. From the USB classes to be disabled drop-down list, select one or more USB classes.
7. Click Save & Publish.
8. Log in to the Dell Hybrid Client and connect a USB drive.
If you have enabled the USB drive, the operating system detects the USB drive that is connected to the client. If you have
disabled the USB drive, the operating system cannot detect the USB drive that is connected to the client.
Cryptography
● AES 256 algorithm is used for encryption.
● TLS 1.2 is used for RDP connections.
Auditing and logging
Table 17. Auditing and logging
Component Summary
Log protection To comply with the security standards, Dell Hybrid client system does not log any sensitive data in the
log file.
Logging format Log format includes <time stamp> <Type> <Service> <log message>. Type specifies
whether the log is an INFO, ERROR, or a DEBUG log.
Alerting Alert logs are displayed on the system as notifications.
For more information about how to extract log files, see Using log files for troubleshooting.
Code or product integrity
By default, Dell Hybrid Client enables you to install any Dell-signed third-party applications. All files that are distributed by Dell
are signed applications. However, you can install any unsigned or custom-signed applications on Dell Hybrid Client. For more
information about installing third-party applications, see Installing third-party applications.
Reporting security vulnerabilities
Dell takes reports of potential security vulnerabilities in our products very seriously. If you discover a security vulnerability, you
are encouraged to report it to Dell immediately.
For information on how to report a security issue to Dell, see the Dell EMC Vulnerability Response Policy on the Dell.com site.
88
Security configurations