Users Guide

Network security
Network exposureThe following table lists the network ports that are supported on ThinOS.
Table 1. Network exposure
Service name Port TCP or UDP Summary
VNCD 5900 TCP You can enable or disable the VNC server using Admin Policy
Tool or Wyse Management Suite. By default, the option is
disabled.
ntp 123 UDP If NTP is not configured, you cannot use the NTP service. You
can configure the NTP settings using Admin Policy Tool or Wyse
Management Suite.
syslog 514 UDP ThinOS generates service logs. You cannot disable the syslog
service.
DNS 127.0.0.1.53 TCP 4 You cannot disable the DNS service.
DNS 0::1.53 TCP 6 You cannot disable the DNS service.
WMS Not
available
Not available Listening port is not available.
Network vulnerability scanning is performed on ThinOS and there are no security issues on the networked subsystems or
interfaces. If you discover a security issue, you are encouraged to report it to Dell immediately. See, Reporting security
vulnerabilities.
Communication security settingsThinOS supports the following access methods:
Use the Wyse Management Suite server to configure and manage the device settings.
Use the VNC connection to remotely control the device.
Both access methods must be configured before use.
Firewall settingsThinOS does not support firewall settings.
Data security
System partition, data partition, and swap partition on a ThinOS device are encrypted. Trusted Platform Module (TPM) is used
to store keys for encryption or decryption, provided TPM is enabled.
ThinOS does not store any sensitive data. You can export log files from ThinOS with a valid password. All inputs are validated
before passing them as parameters to respective scripts.
Cryptography
AES-XTS 128 is used for the disk encryption. TLS 1.1 and 1.2 are used to connect to Citrix, VMware, Windows Virtual Desktop,
Amazon WorkSpaces broker agents, and Wyse Management Suite.
Auditing and logging
Log managementFollowing are the available log levels on ThinOS:
Critical
Error
Info
Debug
Verbose
Log protectionYou must enter a password to export log files.
Logging formatLog file includes <Type><timestamp><ID>.
Product and subsystem security
13