Setup Guide
3
DellProtectedWorkspaceManagementServer–InstallandConfigure–v2.2
AdditionalAdministrativeTasks...................................................................................................................46
ModifyingthedefaultFirewall...............................................................................................................................46
InstallingLinuxUpdates.........................................................................................................................................47
Generatinganewself‐signedcertificateafterinitialconfigurationiscomplete......................................................49
InstallingaTrustedSSLcertificate..........................................................................................................................49
GeneratingaCSR.............................................................................................................................................................................49
ImportingSignedCertificateandKey..............................................................................................................................................51
ConfiguringtheDellProtectedWorkspaceManagementServerforSYSLOG........................................................... 52
TestingSYSLOGconnectionfromDPWMS......................................................................................................................................53
ConfiguringtheThreatsModulewiththeCorrectSYSLOGformat.................................................................................................54
OperationalNotesfortheDellProtectedWorkspaceManagementServer...................................................55
SecurityRestrictions/Features................................................................................................................................55
LoggingintotheApplianceRemotelyviaSSH.........................................................................................................55
ConfiguringDellProtectedWorkspacetoworkwiththeDellProtectedWorkspaceManagementServer–
ConfigurationManagementModule.............................................................................................................56
ConfiguringDellProtectedWorkspacetoworkwiththeDellProtectedWorkspaceManagementServer–
ThreatDataModule.....................................................................................................................................57
DellProtectedWorkspaceManagementServerAdministrativeTasks..........................................................58
AcquiringthetemporaryadministratorpasswordforDPWMSUI...........................................................................58
LoggingintotheDellProtectedWorkspaceManagementServerConsole ...............................................................59
EnteringtheDPWMSLicenseKey...........................................................................................................................60
DPWMSUIMethod.........................................................................................................................................................................60
DPWMSConfigurationFileMethod................................................................................................................................................62
Modules.................................................................................................................................................................63
AdminModule.................................................................................................................................................................................64
UsersTab....................................................................................................................................................................................64
AddinganewDPWMSUser...................................................................................................................................................65
DeletingauserfromtheDPWMS..........................................................................................................................................66
ActivityTab.................................................................................................................................................................................67
BackupTab..................................................................................................................................................................................67
CreateaDatabaseBackup......................................................................................................................................................68
RecoveringfromaDatabaseBackupFile...............................................................................................................................68
ErrorsTab....................................................................................................................................................................................69
UpgradesTab..............................................................................................................................................................................70
UpgradingtheDPWMS...........................................................................................................................................................70
RestartingtheDPWMSProcess..............................................................................................................................................71
PlatformTab...............................................................................................................................................................................72
DellProtectedWorkspaceHomeModule.......................................................................................................................................73
HomeTab....................................................................................................................................................................................74
ThreatDataSection................................................................................................................................................................74
ConfigurationManagementSection......................................................................................................................................75