Reference Guide

Chapter 1: Preface........................................................................................................................ 4
Legal disclaimer.................................................................................................................................................................... 4
Scope of document.............................................................................................................................................................4
Document references......................................................................................................................................................... 4
Resources and support.................................................................................................................................................4
Security resources...............................................................................................................................................................5
Getting help.......................................................................................................................................................................... 5
Reporting security vulnerabilities.....................................................................................................................................5
Chapter 2: Security quick reference.............................................................................................. 6
Supported platforms...........................................................................................................................................................6
Security profiles................................................................................................................................................................... 6
USB device security............................................................................................................................................................ 7
GRUB password security................................................................................................................................................... 7
BIOS password security..................................................................................................................................................... 7
Application deployment security...................................................................................................................................... 8
Chapter 3: Product and subsystem security.................................................................................. 9
Product overview................................................................................................................................................................ 9
Authentication.................................................................................................................................................................... 10
Login security settings................................................................................................................................................10
User and credential management............................................................................................................................. 11
Authentication to external systems......................................................................................................................... 12
Authorization.......................................................................................................................................................................12
Network security................................................................................................................................................................12
Data security....................................................................................................................................................................... 13
Cryptography...................................................................................................................................................................... 13
Auditing and logging.......................................................................................................................................................... 13
Request log files using Wyse Management Suite.................................................................................................13
Extract log files using Device Settings................................................................................................................... 14
Extract VDI log files..................................................................................................................................................... 14
Code or product integrity.................................................................................................................................................14
Chapter 4: Contacting Dell...........................................................................................................15
Contents
Contents 3