Users Guide
Table Of Contents
Chapter 1: Preface........................................................................................................................ 4
Legal disclaimer.................................................................................................................................................................... 4
Scope of document.............................................................................................................................................................4
Document references......................................................................................................................................................... 4
Security resources...............................................................................................................................................................4
Getting help.......................................................................................................................................................................... 5
Reporting security vulnerabilities.....................................................................................................................................5
Chapter 2: Security quick reference.............................................................................................. 6
Supported platforms...........................................................................................................................................................6
Security profiles................................................................................................................................................................... 6
Configure account privileges using Admin Policy Tool or Wyse Management Suite.................................... 6
Flash security........................................................................................................................................................................ 7
USB device security............................................................................................................................................................ 7
Federal Information Processing Standard (FIPS) compliance..................................................................................8
Chapter 3: Product and subsystem security.................................................................................. 9
Product overview................................................................................................................................................................ 9
Authentication.................................................................................................................................................................... 10
Login security settings................................................................................................................................................10
Authentication types and setup................................................................................................................................10
User and credential management.............................................................................................................................12
Authorization.......................................................................................................................................................................12
Network security................................................................................................................................................................13
Data security....................................................................................................................................................................... 13
Cryptography...................................................................................................................................................................... 13
Auditing and logging.......................................................................................................................................................... 13
Using log files to troubleshoot your thin client..................................................................................................... 14
Code or product integrity................................................................................................................................................ 15
Contacting Dell................................................................................................................................................................... 15
Contents
Contents 3