Dell Edge Device Manager Version R15 Administrator’s Guide
Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. Copyright © 2017 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries.
Contents 1 Introduction....................................................................................................................................................6 Getting started with EDM on public cloud......................................................................................................................6 Logging InChanging your passwordLogging out......................................................................................................
Edge Gateway 3002 BIOS settings......................................................................................................................... 25 Edge Gateway 3003 BIOS settings......................................................................................................................... 28 Configuring the Windows Edge Gateway Settings...................................................................................................... 31 System Personalization...........................
Managing Edge Gateway – Snappy Policy.................................................................................................................... 71 Managing Edge Gateway/Embedded PC Policy...........................................................................................................71 Managing File Repository ...............................................................................................................................................72 8 Managing Rules..................
1 Introduction Edge Device Manager is the next generation management solution for Edge Gateway Devices that offers advanced feature options such as Cloud versus On-premises deployment, manage-from-anywhere via a Mobile App, enhanced security such as BIOS configuration and port lockdown.
NOTE: • You will receive your credentials when you sign up for Edge Device Manager Trial on www.wysemanagementsuite.com or when you purchase your subscription. You can purchase the Edge Device Manager subscription at Dell sales or your local Dell partner. For more details, see www.wysemanagementsuite.com. It is recommended to change your password after logging in for the first time. 1 Use a supported Web browser on any machine with access to the Internet to log in to the management console.
• Minimum CPU requirements – 4 CPU Edge Device Manager Repository The software can be installed on a physical or virtual machine.
needs. You can organize and manage based on functional groups (Example: Marketing, Sales and Engineering etc.). Others may want to organize based on the locations of the devices (Example: Time zone as the first level group, State at the second level, City at the third level, Building at the fourth level, Floor at the fifth level). NOTE: You can create rules to automatically create groups or assign devices to existing groups based on device attributes such as subnet, time zone and location.
2 Key features The following are the new features in this release: Private cloud Edge Device Manager installer • New, Simple and powerful private cloud installer to install all the required components to run Edge Device Manager within 5 minutes. • Edge Device Manager Installer can be installed on Windows 2012 R2 standard and Windows 2016 Standard servers. • Private cloud installer deploys all the components required to support the Edge Device Manager functionality.
Alerts through Mobile App and Email • Administrator can configure Edge Device Manager to receive critical, warning and, informational Alerts through Mobile App and/or Email. • Admin can set the alert classification for each available alert from the Edge Device Manager console. Device-Auto grouping capabilities The administrator can create rules to automatically create groups or assign devices to existing groups, based on device attributes such as subnet, time zone, location, and custom values.
Edge Device Manager server Setup from the Portal Admin Following Server configurations can be done from the setup page: • Enabling the CA validation • Updating the SMTP details • Updating the Domain/Well known certificate Authority details.(.pem and .pfx certificates can be uploaded) • License can be imported from the Public cloud server. Show device offline/online status • Admin can filter devices by the online/offline status from the Device page.
• Record Name : _WMS_CAVALIDATION.
3 EDM Dashboard Overview The Dashboard page allows you to quickly view important status information about the system and recent events that have been performed within the system. By clicking a link in the Alerts area, you can view details about that item. Figure 1. Dashboard Links on the Dashboard page include: • Alerts This section displays the summary of all the alerts. These allow you to quickly go to functional areas of the system that require your attention.
4 Managing Group Policies Groups allow you to flexibly employ hierarchical Group Policy management for device configuration. Optionally, sub-groups of the Global Group Policy can be created to categorize devices according to corporate standards. For example, devices may be grouped based on job functions, device type, bring-your-own-device, and so on. Figure 2.
NOTE: Exception: The settings which are applicable only for a particular device. 4 When modifying lower-level policies, any policy that is an override to a higher-level policy will be indicated by a bullet symbol to the left of the policy type . For example System Personalization, Networking, Security and so on. 5 While modifying policies, an asterisk (*) will be placed to the right of the policy types to indicate that there are unsaved or unpublished changes.
4 Click Save to make the changes. Removing a Group As an administrator you can remove a group from the group hierarchy. To remove a group complete the following steps: 1 In the Groups page, click Remove Group icon under the Group Tree Hierarchy. A warning message is displayed saying this action removes the group(s) from the group tree hierarchy. NOTE: All devices include in the removing group gets moved to the selected target group. Quarantine group is intended for group based registration devices.
Configuring the Snappy Gateway Settings Use this section to configure the settings for your Snappy Gateway devices. System Personalization Use this page to configure Edge Gateway device settings such as Time zone name, log level and device owner for Edge Gateway devices. Table 1. System Personalization Parameter Description Time Zone Name Select your appropriate Time zone from the available Time Zones in the drop-down list. Log Level From the drop-down list, select your preferred log level.
Location Use this page to configure location settings such as Floor, Building, Campus and so on. Table 3. Location Parameter Description Floor Specifies the floor where your device is located. Building Specifies the Building where your device is located. Campus Specifies the campus where your device is located. Formatted Address Specifies the formatted address where your device is located. Street Address Line One Specifies the Street address where your device is located.
Parameter Description Serial Port 1 RS232 Check box to determine how the built-in serial port operates. It lets you avoid resource conflicts between devices by disabling or remapping the address of the port. This port is at 2D0h with IRQ 7. Serial Port 2 RS422 Check box to determine how the built-in serial port operates. It lets you avoid resource conflicts between devices by disabling or remapping the address of the port. This port is at 3E0h with IRQ 10.
Table 8. Security Parameter Description Admin Setup Lockout Check box to prevent users from entering Setup when Admin password is set. Chassis Intrusion Chassis Intrusion is a utility that the BIOS can use to tell you someone has opened the case. From the drop down list, you can select any of the following options: • • • UEFI Capsule Firmware Update Disable — Disable chassis intrusion feature. Enable — Report intrusions during POST.
Parameter Description Fastboot From the drop down list, select an option to speed up the boot process by bypassing some compatibility steps. The available options are: • • • Extend BIOS POST Time Minimal Thorough Auto From the drop down list, select an option to create an additional pre-boot delay which allows the user to see POST status messages. The available options are: • • • 0 seconds 5 seconds 10 seconds Table 13.
Edge Gateway 3001 BIOS settings Use this page to define Edge Gateway 3001 BIOS settings. Table 16. General settings Parameter Description Device Notes Enter the device notes such as property ownership tag. Table 17. System Configuration Parameter Description Integrated NIC From the drop-down list, select an option to control the on-board LAN controller. The available options are: • • • • Disabled — The internal LAN is off and not visible to the OS.
Table 20. Security Parameter Description Admin Setup Lockout Check box to prevent users from entering Setup when Admin password is set. Chassis Intrusion Chassis Intrusion is a utility that the BIOS can use to tell you someone has opened the case. From the drop down list, you can select any of the following options: • • • UEFI Capsule Firmware Update Disable — Disable chassis intrusion feature. Enable — Report intrusions during POST.
Parameter Description Extend BIOS POST Time From the drop down list, select an option to create an additional pre-boot delay which allows the user to see POST status messages. The available options are: • • • 0 seconds 5 seconds 10 seconds Table 25. Maintenance Settings Parameter Description BIOS Recovery (from Hard Drive) Check box to enable the user to recover from certain corrupted BIOS conditions from a recovery file on the user primary hard drive or an external USB key. Table 26.
Parameter Description • • Force Disabled — The internal LAN is off and not visible to the OS even if it has an IP address. Enabled— The internal LAN is enabled. Enable UEFI Network Stack Check box to install or make available the UEFI Networking protocols, allowing pre-OS and early OS networking features to use any enabled NICs. This may be used without switching on the PXE. Watchdog Timer Support Check box to enable the Watchdog Timer feature. Table 29.
Table 32. BIOS Admin Password Parameter Description Enable Admin Password Check box to enable BIOS administrator password. Successful changes to this password take effect immediately. Table 33. Power Management Settings Parameter Description Wake On LAN From the drop down list, select an option to allow the computer to power up from the off state when triggered by a special LAN signal or from the hibernate state when triggered by a special wireless LAN signal. Table 34.
Table 37. Reboot Schedule Parameter Description Reboot Option Some BIOS settings require system reboot. When Reboot later is selected, devices reboot when the current time matches the set time. From the drop down list, select any of the following options: • • • Reboot immediately Reboot later Do not reboot Edge Gateway 3003 BIOS settings Use this page to define Edge Gateway 3003 BIOS settings. Table 38. General Parameter Description Device Notes Enter the device notes such as property ownership tag.
Table 40. USB Configuration Parameter Description Enable USB 3.0 Ports Check box to enable the device attached to this port. The device is also made available to the OS. If USB port is disabled, OS can not see any device attached to this port. Enable Top USB Port 1 Check box to enable the device attached to this port. The device is also made available to the OS. If USB port is disabled, OS can not see any device attached to this port.
Table 44. Power Management Parameter Description Wake On LAN From the drop down list, select an option to allow the computer to power up from the off state when triggered by a special LAN signal or from the hibernate state when triggered by a special wireless LAN signal. Table 45. Auto On Parameter Description Auto On From the drop down list, set the time of day when you would like the system to turn on automatically. Table 46.
Parameter Description • Do not reboot Configuring the Windows Edge Gateway Settings Use this section to configure the settings for your Windows Edge Gateway devices. System Personalization Use this page to configure Edge Gateway device settings such as Time Servers, Time zone name, log level, and device owner. Table 49. System Personalization Parameter Description Time Servers (NTP Servers) Enter the Time Servers to synchronize local time. Use comma separated list format.
Location Use this page to configure location settings such as Floor, Building, Campus and so on. Table 50. Location Parameter Description Floor Specifies the floor where your device is located. Building Specifies the Building where your device is located. Campus Specifies the campus where your device is located. Formatted Address Specifies the formatted address where your device is located. Street Address Line One Specifies the Street address where your device is located.
Edge Gateway 5000 BIOS Settings Use this page to define Edge Gateway 5000 BIOS settings such as Wake-On-LAN, Auto-On, and Admin Password. Table 52. General Parameter Description Device Notes Enter the device notes such as property ownership tag. Table 53. System Configuration Parameter Description Integrated NIC From the drop-down list, select an option to control the on-board LAN controller.
Table 54. USB Configuration Parameter Description Enable USB 3.0 Ports Check box to enable the device attached to this port. The device is also made available to the OS. If USB port is disabled, OS can not see any device attached to this port. Enable Top USB Port 1 Check box to enable the device attached to this port. The device is also made available to the OS. If USB port is disabled, OS can not see any device attached to this port.
Table 57. BIOS Admin Password Parameter Description Enable Admin Password Check box to enable BIOS administrator password. Successful changes to this password take effect immediately. Table 58. Power Management Parameter Description AC Recovery From the drop down list, select an option to specify how the system behaves when AC power restored after an AC power loss.
Table 61. Maintenance Parameter Description BIOS Recovery (from Hard Drive) Select this option to enable the user to recover from certain corrupted BIOS conditions from a recovery file on the user primary hard drive or an external USB key. Table 62. Reboot Schedule Parameter Description Reboot Option Some BIOS settings require system reboot. When Reboot later is selected, devices reboot when the current time matches the set time.
Table 65. USB Configuration Parameter Description Enable USB 3.0 Ports Check box to enable the device attached to this port. The device is also made available to the OS. If USB port is disabled, OS can not see any device attached to this port. Enable USB Port 1 Check box to enable the device attached to this port. The device is also made available to the OS. If USB port is disabled, OS can not see any device attached to this port.
Table 69. Power Management Parameter Description Wake On LAN From the drop down list, select an option to allow the computer to power up from the off state when triggered by a special LAN signal or from the hibernate state when triggered by a special wireless LAN signal. Table 70. Auto On Parameter Description Auto On From the drop down list, set the time of day when you would like the system to turn on automatically. Table 71.
Parameter Description • Do not reboot Edge Gateway 3002 BIOS settings Use this page to define Edge Gateway 3002 BIOS settings such as Wake-On-LAN, Auto-On, and Admin Password. Table 74. General Parameter Description Device Notes Enter the device notes such as property ownership tag. Table 75. System Configuration Parameter Description Integrated NIC From the drop-down list, select an option to control the on-board LAN controller.
Parameter Description see USB Mass Storage devices irrespective of this setting, provided the port is enabled. Table 77. Wireless Parameter Description Enable WWAN Check box to enable Wireless Wide Area Network (WWAN). Enable WLAN Check box to enable Wireless Local Area Network (WLAN). Table 78. Security Parameter Description Admin Setup Lockout Check box to prevent users from entering Setup when Admin password is set.
Table 82. POST Behavior Parameter Description Numlock LED Check box to turn on the Numlock LED when the system boots. Keyboard Errors Check box to report keyboard related errors when the system boots. Fastboot From the drop down list, select an option to speed up the boot process by bypassing some compatibility steps.
Table 86. System Configuration Parameter Description Integrated NIC 1 From the drop-down list, select an option to control the on-board LAN controller. The available options are: • • • • Integrated NIC2 Disabled — The internal LAN is off and not visible to the OS. Force Disabled — The internal LAN is disabled and not visible to the OS even if it has an IP address. Enabled — The internal LAN is enabled. Enabled w/PXE — The internal LAN is enabled (with Preboot Execution Environment (PXE) boot).
Table 89. Security Settings Parameter Description Admin Setup Lockout Check box to prevent users from entering Setup when Admin password is set. Chassis Intrusion Chassis Intrusion is a utility that the BIOS can use to tell you someone has opened the case. From the drop down list, you can select any of the following options: • • • UEFI Capsule Firmware Update Disable — Disable chassis intrusion feature. Enable — Report intrusions during POST.
Parameter Description Extend BIOS POST Time From the drop down list, select an option to create an additional pre-boot delay which allows the user to see POST status messages. The available options are: • • • 0 seconds 5 seconds 10 seconds Table 94. Maintenance Settings Parameter Description BIOS Recovery (from Hard Drive) Check box to enable the user to recover from certain corrupted BIOS conditions from a recovery file on the user primary hard drive or an external USB key. Table 95.
• Owner Log Always Specifies the device owner. Login Experience OS Admin Credentials— Use this option to specify the admin username and password for the OS. Security Enable Remote Access— Check box to enable Remote access to the system. Location Use this page to configure location settings such as Floor, Building number and so on. Table 97. Location Parameter Description Floor Specifies the floor where your device is located. Building Specifies the Building where your device is located.
Other Use this page to specify additional customizations Windows/firmware auto-update for the Embedded PC — Windows. Table 98. Other Settings Parameter Description Enable Windows Auto Update Check box to enable the Windows automatic update feature. BIOS Embedded BOX PC 3000 Settings Use this page to define BIOS settings such as Wake-On-LAN, Auto-On, and Admin Password and so on. Table 99. General settings Parameter Description Device Notes Enter the device notes such as property ownership tag.
Parameter Description Audio Check-box to enable the integrated audio controller and uncheck to completely disable audio controller, including microphone. Microphone Check-box to enable the Microphone. Watchdog Timer Support Check-box to enable the Watchdog Timer feature. WLAN Region Code Select the WLAN Region code from the drop-down list. Table 101. USB Configuration Parameter Description Front USB Ports Check-box.
Table 104. Power Management Settings Parameter Description AC Recovery Select the Power state from the drop-down list. This option specifies the system’s behavior when AC power is restored after a AC loss. USB Wake Support Check-box to enable the USB devices to wake the system by standby.
Table 108. Maintenance Parameter Description BIOS Recovery (from Hard Drive) Select this option to enable the user to recover from certain corrupted BIOS conditions from a recovery file on the user primary hard drive or an external USB key. Table 109. Reboot Schedule Parameter Description Reboot Option Some BIOS settings require system reboot. When “Reboot later” is selected, devices reboot when the current time matches the set time.
Parameter Description Enable UEFI Network Stack Check-box to install or make available the UEFI Networking protocols, allowing pre-OS and early OS networking features to use any enabled NICs. This may be used without switching on the PXE. SMART Reporting Check-box to control the reporting of hard drive errors for integrated drivers during system startup. Watchdog Timer Support Check-box to enable the Watchdog Timer feature.
Table 114. Security Parameter Description Admin Setup Lockout Check-box to prevent users from entering Setup when Admin password is set. Chassis Intrusion Chassis Intrusion is a utility that the bios can use to tell you someone has opened the case. From the drop down list, you can select any of the following options: • • • UEFI Capsule Firmware Update Disable — Disable chassis intrusion feature. Enable — Report intrusions during POST.
Table 119. Power Management Settings Parameter Description AC Recovery Select the Power state from the drop-down list. This option specifies the system’s behavior when AC power is restored after a AC loss. USB Wake Support Check-box to enable the USB devices to wake the system by standby.
Table 123. Reboot Schedule Parameter Description Reboot Option Some BIOS settings require system reboot. When Reboot later is selected, devices reboot when the current time matches the set time. From the drop down list, select any of the following options: • • • Reboot immediately Reboot later Do not reboot Configuring the Embedded PC- Ubuntu System Personalization Use this page to define system personalization settings such as Time zone name, Log Level, and owner. Table 124.
Configuring the Embedded PC- Ubuntu Location Settings Use this page to configure location settings such as Floor, Building number and so on. Table 126. Location Parameter Description Floor Specifies the floor where your device is located. Building Specifies the Building where your device is located. Campus Specifies the campus where your device is located. Formatted Address Specifies the formatted address where your device is located.
Parameter Description • • • • Integrated NIC 2 Disabled — The internal LAN is off and not visible to the OS. Force Disabled — The internal LAN is off and not visible to the OS. Enabled — The internal LAN is enabled. Enabled w/PXE — The internal LAN is enabled (with Preboot Execution Environment (PXE) boot). From the drop-down list, select an option to control the on-board LAN controller. The available options are: • • • • Disabled — The internal LAN is off and not visible to the OS.
Table 132. Security Parameter Description Admin Setup Lockout Check box to prevent users from entering Setup when Admin password is set. Chassis Intrusion Chassis Intrusion is a utility that the bios can use to tell you someone has opened the case. From the drop down list, you can select any of the following options: • • • UEFI Capsule Firmware Update Disable — Disable chassis intrusion feature. Enable — Report intrusions during POST.
Table 136. POST Behavior Parameter Description Numlock LED Check box to turn on the Numlock LED when the system boots. Keyboard Errors Check box to report keyboard related errors when the system boots. Fastboot From the drop down list, select an option to speed up the boot process by bypassing some compatibility steps.
Table 140. System Configuration Parameter Description Serial Port 1 — Serial Port 4 Select the option from the drop-down list. This option determines how the built-in serial port operates. It avoids resource conflicts between devices by disabling or remapping the address of the port. Integrated NIC From the drop-down list, select an option to control the on-board LAN controller. The available options are: • • • • Integrated NIC 2 Disabled — The internal LAN is off and not visible to the OS.
Parameter Description see USB Mass Storage devices irrespective of this setting, provided the port is enabled. Table 142. Video Parameter Description Video Mode Select the video mode from the drop-down list. The platform supports video output on three of the four video connectors. Video output is always supported on Display Port1 and HDMI. This feature selects video output either on the DisplayPort2 or VGA.
Parameter Description enabled. The performance of some applications will improve with the additional cores. Hyperthread Control Check box to enable HyperThreading in the processor. Table 147. Auto On Parameter Description Auto On From the drop down list, set the time of day when you would like the system to turn on automatically. Table 148. Power Management Settings Parameter Description AC Recovery Select the Power state from the drop-down list.
Table 150. Maintenance Parameter Description BIOS Recovery (from Hard Drive) Select this option to enable the user to recover from certain corrupted BIOS conditions from a recovery file on the user primary hard drive or an external USB key. Table 151. Wireless Parameter Description Wireless Device Enable Check box to enable the internal wireless devices. Table 152. Reboot Schedule Parameter Description Reboot Option Some BIOS settings require system reboot.
5 Managing Users This section describes how to perform routine User management tasks in the management console. The following are the two types of users: • • 1 Administrators: Edge Device Manager administrator can be assigned Global Administrator, Group Administrator or a viewer role. a Global Administrator has access to all Wyse Management Suite functions. b Group Administrator has access to all assets and functions for specific groups that are assigned to administrator.
Figure 4. Unassigned admins 3 • Edit User • Activate User(s) • Deactivate User(s) • Delete User(s) Click Bulk Import option to import users from CSV file. Topics: • Adding new admin user • Editing admin user • Deactivating admin account • Deleting an Admin Adding new admin user To add a new admin user, complete the following step: 1 Enter your email ID in the provided field. 2 Enter your preferred username in the provided field.
• 5 Enter the custom password in the provided field. Check box to see the password. • Select the radio button of Generate random password option to generate any random password. Click Save to save the changes. Editing admin user To edit admin user, complete the following step: 1 Enter your email ID in the provided field. 2 Enter your preferred username in the provided field. NOTE: Updating the login name will force a log out from the console. Log into the console using the updated account login name.
6 Managing Devices This section describes how to perform routine Device management tasks in the management console. Device Management include the following: • Inventory of devices can be located by clicking Devices tab. By default, this shows a the sequence of the devices, flat list of all the devices in the system. You may choose to view a subset of the devices using a variety of filter criteria, such as Groups or subgroups, device type OS type, status, subnet, platform or time zone.
• • Recently Added Under the OS Types drop-down list, you can select the type of the operating system • Edge Gateway • • Snappy • Windows Embedded PC • Windows • Ubuntu • Under the Subnet drop-down list, you can select the subnet. • Under the OS Subnet drop-down list, you can select the OS subnet. • Under the Platfrom drop-down list, you can select the platform. • Under the Timezone drop-down list, you can select the timezone.
• Wyse Management Suite Server URL • DNS Record Type : DNS SRV • Record Name : _WMS_MGMT_tcp. • Value Returned : WMS Server URL For example : _WMS_MGMT_tcp.WDADEV.com • Group Token (optional for New Agent and required for Old Agent) • DNS Record Type : DNS Text • Record Name : _WMS_GROUPTOKEN. • Value Returned : Group Token as String For example : _WMS_GROUPTOKEN.WDADEV.com • CA Validation (Optional) • DNS Record Type : DNS Text • Record Name : _WMS_CAVALIDATION.
1 Log in to EDM server. 2 Navigate to Portal admin > Edge gateway and embedded PC registeration. 3 Download the Bootstrap file for the group to which you want to register. 4 Copy the file into: 5 • Snappy/Ubuntu Desktop Devices: \root\config\ccm-wda\ path on your device. • Windows Devices: C:\config\ccm-wda path on your device. Restart the device. Viewing and Managing Device Details On the Devices page the following device related attributes are displayed.
• Summary tab— Use the Summary tab to view and manage information on the Notes, Group Assignment, Alerts, and Device Configuration. • Change Group Assignment— Use the Change Group Assignment button in Group Assignment section to change the group to which the Thin client belongs. • Device level exceptions (Applicable to all device types) — The device configuration details such as default Policy group name and summary of current policy are displayed.
7 Apps and Data The EDM Apps and Data section describes how to perform routine device Application and File inventory management tasks and to set policies using the management console Figure 6.
• In the search results, check the box next to the application name that you want to add to the inventory and then click Add to Inventory. The selected application is added to the Mobile/Edge Gateway Snappy Inventory. If the selected application is already listed in the inventory, then an error message is displayed. • You can remove any application from the inventory by selecting the application and clicking Remove Apps tab.
d e f g 4 OS Type— The following OS are displayed: • Edge Gateway – Windows • Embedded PC – Windows • Embedded PC – Ubuntu Select the option from the drop-down list for the appropriate OS. Application— Enter the installer parameters in the text box. OS Subtype Filter— From the drop-down list, select the subtype filter. Platfom Filter— From the drop-down list, select the platform filter. Click Save to save your changes.
8 Managing Rules This section describes how to add and manage Rules in the management console.
Figure 7. a To edit a rule, click Edit Rule option and edit the following details: Figure 8. b • Notification Target • Notification Frequency • Apply rule after (1–30) days Click Save option to save the changes. Creating Unmanaged Device Auto Assignment Rules To create rules for unmanaged device auto assignment, complete the following steps: 1 Click Rules tab. 2 Select Unmanaged Device Auto Assignment option. 3 Click Add Rules option.
Figure 9. 4 Enter the Name and select the Destination group. 5 Click on Add Condition and select the conditions for the Rule. Figure 10. 6 Click Save. 7 After creating the Rule Discover the device to Unmanaged Group. 8 The Rule will be applied automatically and the device will be listed in the Destination group selected in the Rule. Steps to Edit the Unmanaged Device Auto assignment Rule 1 Click Rules tab. 2 Select Unmanaged Device Auto Assignment option.
3 Select the Rule and click Disable Rule option. 4 After Disabling the Rule select the Rule and click Delete Disabled Rule(s) option. Steps To Save the Rule Order We can change the order of the rule to be applied on the devices if multiple rules are present. 1 Click Rules tab. 2 Select Unmanaged Device Auto Assignment option. 3 Make Sure that Multiple Rules are Present. 4 Select the rule which you want to move and move it to the top. 5 Click the Save Rule Order.
Figure 12. 2 • Rule • Description • Notification Target • Notification Frequency Click Save option to save the changes.
9 Managing Jobs This page describes how to schedule and manage jobs in the management console. Figure 13. This include the following options: • Configuration Groups: From the drop-down list, select the configuration group type. • Scheduled by: From the drop-down list, select your preferred option. The available options are: a b • Admin • App Policy • Device Commands System • Publish Group Configuration • Others OS Type: From the drop-down list, select the OS type.
c 1 or more In progress d 1 or more cancelled e 1 or more successful Topics: • Schedule application policy • Schedule device command job Schedule application policy To schedule a application policy, complete the following task: 1 On jobs page, click Schedule Application Policy option. App Policy Job screen is displayed. 2 From the drop-down list, select the policy. Image or application is not a recurring job. One command per device is sent to the entire job schedule.
10 Events This section describes how to display all events and alerts in the management system with the help of management console. It also provides instructions on displaying an Audit of events and alerts for system auditing purposes. Summary of Events and Alerts is used to obtain an easy-to-read daily summary of what has happened in system. Audit page is used to format the information into a typical audit log-view, where one line is displayed for each event in the order of time. Figure 14.
4 • Today • Yesterday • This Week • Custom Event Groups: All the events are classified under particular groups. The available options in the drop-down menu are: • Access • Registration • Configuration • Remote Commands • Management • Compliance Displaying an Audit of Events The Audit window allows you to quickly format the information into a typical audit log-view, where one line is displayed for each event in the order of time.
11 Portal Administration This section contains a brief overview of your system administration tasks that are required to set up and maintain your system. Topics: • Configuring Console Settings • Configuring Account Settings • System setup Configuring Console Settings This section helps you to configure settings for Dell Console Management. Active Directory (AD) To import Active Directory Users on Edge Device Manager Private Cloud, complete the following steps: 1 Login to EDM Private Cloud.
Active Directory Federation Services (ADFS) Metadata Configuration To configure the ADFS, do the following: 1 Provide EDM details to ADFS. Hover the mouse over the information (i) icon to view the screenshot of Add Relying Party Trust Wizard. It shows you where to place the EDM xml files to ADFS server. Click the link provided on the page to download the EDM xml file on your thin client. 2 Use EDM rules in ADFS. To view the EDM rules, click the link provided on the page.
Edge Gateway and Embedded PC registration • Edge Gateway and Embedded PC Registration from USB Device: a Insert a USB drive into a PC or Laptop with which you are logged in to WMS. b Within the "config" folder, create another folder named "ccm-wda". c Create a folder named "config" at the root level of the USB drive. d Download the Bootstrap file for the group to which you want to register the Edge Gateway/Embedded PC. e Rename the file to reg.
2 From the drop down list of Concurrent File Downloads option, select the number of files. 3 You can enable or disable Wake on LAN option. 4 You can enable or disable Fast File Upload and Download (HTTP) option. • When HTTP is enabled, the file upload and download happens over HTTP. • When HTTP is not enabled, the file upload and download happens over HTTPS. The client device should have appropriate Certificate for HTTPS Communication. 5 You can add note in the provided box.
Generate Report window is displayed. 3 From the drop-down list, select the type of the report. Figure 16. • 4 Jobs • Active App Policies • All App Policies • Devices • Unmanaged (Unlicensed) Devices • Online Devices • Offline Devices • All Devices • Events/Alerts • Audit Logs • Current Alerts • Alert History • Policies • Group Policies • Application Policies • Others • Remote Connections • Remote Commands Select the preferred delimiter. 5 Click Save to save the changes.
tenant accounts will be handled from a higher level Operator account. Enabling multi-tenancy will result in certain global-level configuration to move away from this page and available on the Operator page. 1 Select the check box to enable multi-tenant option. 2 Enter the following the details: 3 • Username • Password • Confirm password • Email Click Save Settings option to save the changes.
• • SMTP server • Send from address • Username • Password • Test address Current Certificate: It provides the information about the current certificate. Select the following option and enter the details: • 88 • Key/Certificate: Upload HTTPS key/certificate file pair (only PEM format is supported). • PKCS-12: Upload HTTPS PKCS-12 (.pfx, .p12). Apache intermediate certificate is needed for IIS pfx. Click Save option to save the changes.
A Feature list • Highly scalable solution to manage Edge Gateway devices • Group based management • Multi Level Groups and Inheritance • Configuration Policy management • View effective configuration at device level after inheritance • Application policy management • Asset, Inventory and Systems management • Automatic Device discovery • Real-time commands • Smart Scheduling • Alerts, Events and Audit logs Secure communication (HTTPS) • Manage devices behind firewalls • Mobile App •
B Custom configuration If you select the Setup Type as Custom, you can choose either Embedded MongoDB or External MongoDB as the Mongo Database Server. Figure 17. Setup type • If Embedded MongoDB is selected, then provide your password and then click Next. NOTE: Username and Database server details are not required if the Embedded Mongo database is selected, and the respective fields are grayed out.
Figure 18. Mongo Database Server • If External MongoDB is selected, then provide username, password and database server details, and then click Next.
Figure 19. Mongo Database Server • 92 If Embedded MariaDB is selected, then provide username and password and then click Next.
Figure 20. MariaDB Database Server • If External MariaDB is selected, then provide username, password and database server details, and then click Next.
Figure 21. MariaDB Database Server Follow the step sin the section Installing WMS on-premise and initial setup, to complete the installation.
C Supported devices Supported devices • Edge gateway 5000 running Windows 10 LTSB 15 • Edge gateway 3001 running Windows 10 LTSB 16 • Edge gateway 3002 running Windows 10 LTSB 16 • Edge gateway 3003 running Windows 10 LTSB 16 • Edge gateway 5000 running Ubuntu 16.04 • Edge gateway 3001 running Ubuntu 16.04 • Edge gateway 3002 running Ubuntu 16.04 • Edge gateway 3003 running Ubuntu 16.
D Wireless Profiles Password Editor This tool is used to capture the Wireless profiles and allows you to edit the passwords. Captured profiles are saved to a selected XML file. The same XML file can be used to configure Edge Gateway devices through EDM. NOTE: .NET Framework 4.5 must be installed to run this tool on any Windows OS or Windows Embedded OS.
E Third party licenses The table provides the details about third party licenses. Sl No Component Name license Type 1 apache-tomcat-7.0.72 Apache License, Version 2.0 2 jdk1.8.0_112 Oracle Binary Code License 3 jre1.8.0_112 Oracle Binary Code License 4 mariadb-10.0.26-winx64 GNU GPL V2 5 mosquitto-1.3 Eclipse Public licenses- v 1.0 6 bootstrap-2.3.2 Apache License, Version 2.0 7 backbone-1.3.3 MIT 8 aopalliance-1.0.jar Public Domain 9 aspectjweaver-1.7.2.
Sl No Component Name license Type 23 Relayrides / pushy - v0.9.3 MIT 24 zlib-1.2.8 zlib license 25 yaml-cpp-0.5.1 MIT 26 wiredtiger GNU GPL V2 27 unicode-8.0.0 unicode licensesagreement 28 snappy-1.1.2 BSD 3 Clause 29 scons-2.5.0 MIT 30 S2 Apache 2.0 31 pcre-8.38 PCRE licenses 32 mozjs-38 MPL-2.0 ,GPL-2,LGPL-2.1,BSD-2-Clause,MIT,LGPL-2+, public-domain,ICU 33 asio-asio-1-11-0 Boost Software licensesVersion 1.0 34 IntelRDFPMathLib20U1 BSD 3 Clause 35 gperftools-2.
• "Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files. • "Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types.
either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License. 8 Limitation of Liability.
applets and applications intended to run on the Java Platform, Standard Edition platform on Java-enabled General Purpose Desktop Computers and Servers; and (b) JavaFX technology applications intended to run on the JavaFX Runtime on JavaFX-enabled General Purpose Desktop Computers and Servers. “Commercial Features” means those features identified in Table 1-1 (Commercial Features In Java SE Product Editions) of the Java SE documentation accessible at http://www.oracle.
B, C, D and E of these Supplemental Terms. If You want to use the Commercial Features for any purpose other than as permitted in this Agreement, You must obtain a separate licensesfrom Oracle. b SOFTWARE INTERNAL USE FOR DEVELOPMENT licensesGRANT.
g You may not include any third party software on the Media which is intended to be a replacement or substitute for the JDK; h You agree to defend and indemnify Oracle and its licensors from and against any damages, costs, liabilities, settlement amounts and/or expenses (including attorneys' fees) incurred in connection with any claim, lawsuit or action by any third party that arises or results from the use or distribution of the JDK and/or the Publication; ; and i You shall provide Oracle with a writt
"Contributor" means any person or entity that distributes the Program. "Licensed Patents " mean patent claims licensable by a Contributor which are necessarily infringed by the use or sale of its Contribution alone or when combined with the Program. "Program" means the Contributions distributed in accordance with this Agreement. "Recipient" means anyone who receives the Program under this Agreement, including all Contributors.
Commercial Contributor would have to defend claims against the other Contributors related to those performance claims and warranties, and if a court requires any other Contributor to pay any damages as a result, the Commercial Contributor must pay those damages.
The AOP Alliance project is a joint open-source project between several software engineering people who are interested in AOP and Java. LICENCE: all the source code provided by AOP Alliance is Public Domain MIT LICENSECopyright (c) 2000 - 2016 The Legion of the Bouncy Castle Inc. (https://www.bouncycastle.
Copyright (c) 2012 - 2015 HockeyApp, Bit Stadium GmbH.
This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: a The origin of this software must not be misrepresented; you must not claim that you wrote the original software.
ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public licensesfor more details. For a licensesto use the WiredTiger software under conditions other than those described by the GNU General Public License, or for technical support for this software, contact WiredTiger, Inc. at info@wiredtiger.com. For further information, see the licensing section in the documentation. unicode licensesagreement EXHIBIT 1 UNICODE, INC.
Copyright and licensesfor SCons - a software construction tool This copyright and licensesdo not apply to any other software with which this software may have been included.
• • Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. Neither the name of the University of Cambridge nor the name of Google Inc. nor the names of their contributors may be used to endorse or promote products derived from this software without specific prior written permission.
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
js/src/assembler/assembler/MacroAssemblerX86.h js/src/assembler/assembler/RepatchBuffer.h js/src/assembler/assembler/X86Assembler.h js/src/assembler/jit/ExecutableAllocator.cpp js/src/assembler/jit/ExecutableAllocator.h js/src/assembler/jit/ExecutableAllocatorOS2.cpp js/src/assembler/jit/ExecutableAllocatorPosix.cpp js/src/assembler/jit/ExecutableAllocatorWin.cpp js/src/assembler/wtf/Assertions.h js/src/assembler/wtf/SegmentedVector.h js/src/assembler/wtf/VMTags.
provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. . The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
js/src/jit-test/tests/arguments/nonstrict-noargs.js js/src/jit-test/tests/arguments/strict-nested-assign-shadow-function.js js/src/jit-test/tests/arguments/strict-assign-outer-param.js js/src/jit-test/tests/arguments/strict-nested-assign-shadowed-catch.js js/src/jit-test/tests/arguments/nonstrict-assign-parameter-get-element.js js/src/jit-test/tests/arguments/nonstrict-assign-element-get-parameter.js js/src/jit-test/tests/arguments/strict-assign-after.js js/src/jit-test/tests/arguments/strict-eval-mutation.
Copyright: not applicableLicense: public-domain The files listed have been put on the public domain by the Mozilla contributors, as stated in the licensesheaders of each file. Files: js/src/yarr/Yarr.h js/src/yarr/YarrInterpreter.cpp js/src/yarr/YarrPattern.cpp js/src/yarr/YarrPattern.h Copyright: 2010 Peter Varga , 2010 University of Szeged, 2009 Apple Inc. License: BSD-2-Clause Files: js/src/jit-test/tests/sunspider/* js/src/metrics/jint/sunspider/*Copyright: 2007 Apple Inc.
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public licensesas published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public licensesfor more details.
Copyright: 2007 Apple Inc., 1999-2002 Paul Johnston, Greg Holt, Andrew Kepert, Ydnar, Lostinet, Rich MooreLicense: BSD-2-ClauseFiles: js/src/jit-test/tests/sunspider/check-date-format-xparb.js js/src/metrics/jint/sunspider/date-format-xparb.js Copyright: 2004 Baron SchwartzLicense: LGPL-2.1 Files: js/src/python/which/*Copyright: 2002-2005 ActiveState Corp.
Copyright (c) 2011, Intel Corp. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Preamble The GNU Affero General Public licensesis a free, copyleft licensesfor software and other kinds of works, specifically designed to ensure cooperation with the community in the case of network server software. The licenses for most software and other practical works are designed to take away your freedom to share and change the works.
purpose of having them make modifications exclusively for you, or provide you with facilities for running those works, provided that you comply with the terms of this licensesin conveying all material for which you do not control copyright. Those thus making or running the covered works for you must do so exclusively on your behalf, under your direction and control, on terms that prohibit them from making any copies of your copyrighted material outside their relationship with you.
interfered with solely because modification has been made. If you convey an object code work under this section in, or with, or specifically for use in, a User Product, and the conveying occurs as part of a transaction in which the right of possession and use of the User Product is transferred to the recipient in perpetuity or for a fixed term (regardless of how the transaction is characterized), the Corresponding Source conveyed under this section must be accompanied by the Installation Information.
counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it. 11. Patents. A "contributor" is a copyright holder who authorizes use under this licensesof the Program or a work on which the Program is based. The work thus licensed is called the contributor's "contributor version".
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 16. Limitation of Liability.