Release Notes

Table Of Contents
Table 26. Supported browsers (continued)
Browsers Version
Internet Explorer 11.0 and later
New and enhanced features
Secure MQTT support in Wyse Management Suite server
The Wyse Management Suite public and private cloud MQTT supports secure port along with the current MQTT port. It enables
devices such as the Wyse Embedded Standard, Dell Hybrid Client, and the Wyse Management Suite repository to communicate
using the Secure MQTT. In public servers, the Secure MQTT communication works through the 443 port. When MQTT (1883) is
not reachable, a fallback mechanism is initiated to connect to the Secure MQTT. In public servers, the default MQTT is External
MQTT (1883) URL and you cannot select the preferred MQTT server. However, to connect to Secure MQTT on public servers,
1883 port should be blocked in clients such as the Wyse Embedded Standard, Dell Hybrid Client, and the Wyse Management
Suite repository side. In on-premise servers, Wyse Management Suite administrator can select the preferred MQTT using the
devices (Wyse Embedded Standard, Dell Hybrid Client) and Wyse Management Suite repository should communicate through
the External MQTT 1883 and External Secure MQTT 8443for a typical Wyse Management Suite Installation. Agents or devices
that do not support Secure MQTT continue to communicate through nonsecure 1883 connection when preferred MQTT is
selected as External Secure MQTT.
NOTE:
Secure MQTT is only available with Wyse Management Suite repository, Windows Embedded Standard WDA, and Dell
Hybrid Client DCA.
Other device types or agents will continue to use the external MQTT 1883 port.
While installing Wyse Management Suite on-premise on custom port, ensure to select valid port for all the components
including Secure MQTT. You cannot select zero as port for any component.
While upgrading Wyse Management Suite on-premise, ensure to select valid port for Secure MQTT. You cannot enter
zero for Secure MQTT during custom install or upgrade from previous version.
TLS selection is not available during Wyse Management Suite on-premise upgrade. To make changes in TLS, go to
Portal Administration > Setup page. TLS 1.2 is mandatory for Dell Hybrid Client 1.5.
For 10,000 devices setup, the minimum memory (RAM) should be 12 GB for Secure MQTT communications.
Wyse Management Suite 3.2 onwards, Dell Technologies recommends to use MongoDB version 4.2.12 for distributed
setups.
Displaying the End User License Agreement for ThinOS 9.x
While uploading the ThinOS 9.x signed packages the End User License Agreement (EULA) is displayed on applications, data, and
the Config UI screen. Once the administrator selects the Do not show this message again option, the EULA is not displayed
for that package of any version. To see the EULA message again for the packages, perform the following steps:
1. Go to the Portal administration.
2. Click Others.
3. Enable the Reset EULA Acceptance (ThinOS 9.x) check box.
Configuring proxy in Wyse Management Suite remote repository
server
From Wyse Management Suite 3.1, remote repositories support SOCKS5 and HTTPS proxy for all HTTPS and MQTT
communications to Wyse Management Suite. Only system-wide proxies are supported since the remote repository runs as a
Windows service. Also, only proxies with AD authentication or no authentication are supported. PAC script that is configured
using DHCP option tag 252 is also supported. You can configure the proxy servers using any method. Following are a few
examples on how to configure proxy server information:
Wyse Management Suite version 3.2
31