Users Guide
3
TableofContents
Purpose and Intended Audience ............................................................................................................... 5
What is Dell Data Protection | Protected Workspace? ........................................................................... 5
Dell Data Protection | Protected Workspace Icons ................................................................................. 5
Dell Data Protection | Protected Workspace Desktop Icon ...................................................................................... 5
Dell Data Protection | Protected Workspace System Tray Icon ................................................................................ 5
Dell Data Protection | Protected Workspace Start Menu Folder ............................................................................... 5
Common End User Tasks........................................................................................................................... 6
Starting the Dell Data Protection | Protected Workspace Environment or Launching new Browser Window ............... 6
Additional ways to launch a new browser window .................................................................................................. 7
Dell Data Protection | Protected Workspace Setup ................................................................................................. 9
Changing your home page in Dell Data Protection | Protected Workspace protected browsers ................................ 10
InternetExplorer...... .................... .................... ............................ ............................. ................... .................10
MozillaFirefox ............................ ............................ .................... ............................. ................................ ......11
Downloading a File in Dell Data Protection | Protected Workspace ......................................................................... 12
FileDownloadAdditionalDialogs....................... ............................ .................... ............................. ..............14
Opening a document with Dell Data Protection | Protected Workspace .................................................................. 15
Dell Data Protection | Protected Workspace Auto Restore ..................................................................................... 18
Dell Data Protection | Protected Workspace Threat Detection ................................................................................ 18
Dell Data Protection | Protected Workspace System Tray Options .................................................... 21
Open Internet Explorer ........................................................................................................................................ 21
Open Firefox ....................................................................................................................................................... 21
Restore............................................................................................................................................................... 21
Suspect Activity Details… ..................................................................................................................................... 22
Import Bookmarks… ............................................................................................................................................ 22