Dell Wyse 5070 Windows 10 IoT Enterprise for Wyse Thin Clients Administrator s - Page 19

Self-extracting file, Deploying a configuration, Command-line options

Page 19 highlights

"allowUnregistration": true, "businessRuleInfo": null, "currentBiosAdminPassword": null, "mqttUrl": "tcp://10.150.38.10:1883", "wmsUrl": "https://brl-hackthon-win12R2:443/ccm-web", "heartbeatIntervalInMins": 0, "checkInIntervalInHours": 0, "groupToken": null, "personalDeviceSettings": null, "wmsVersion": "4.3.0", "maxCheckinIntervalInHours": 0 } Self-extracting file The self-extracting .exe output file consists of the policy configuration file in .json format. The self-extracting .exe file invokes the dscmgr value with import command with the configuration file as an input. The file can be used to import the configuration to multiple clients using advanced application policy in Wyse Management Suite. The file also returns success codes when you import a policy. Deploying a configuration You can deploy a configuration to multiple thin clients by using the following methods: • Dell Secure Client user interface • Wyse Management Suite Command-line options Table 2. Command-line options Command line dscmgr /help or dscmgr ? dscmgr /init [Mode] dscmgr /getappauthenticationmode dscmgr /addpolicy [Time Duration] [Policy Type] Description Use this command to view the Help menu of the Dell Secure Client. Use this command to start the Dell Secure Client in application hash or application path mode. Application mode is the default mode and if you do not enter any value, the default mode is selected. [Mode]-Enter the mode to enable or block the access. You can use the application binary hash or application path. This parameter is optional. This command displays the applied application authentication mode. Use this command to add a policy to the Dell Secure Client. This command is enabled after you restart the thin client. Path of the file, folder, or registry key-The modifications to the file, folder, or registry key is monitored by the Dell Secure Client. The path that is entered must be available in the UWF exclusion list. Local Windows Username-Enter the username of the resource to provide access to the Dell Secure Client. Application Name-Enter the application name through which the modifications are enabled to the resource. Time Duration-Enter the time duration during which the modifications are enabled. This parameter is optional. If you do not enter any value, you can modify the policy anytime. Accessible applications 19

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58

"allowUnregistration": true,
"businessRuleInfo": null,
"currentBiosAdminPassword": null,
"mqttUrl": "tcp://10.150.38.10:1883",
"wmsUrl": "https://brl-hackthon-win12R2:443/ccm-web",
"heartbeatIntervalInMins": 0,
"checkInIntervalInHours": 0,
"groupToken": null,
"personalDeviceSettings": null,
"wmsVersion": "4.3.0",
"maxCheckinIntervalInHours": 0
}
Self-extracting file
The self-extracting .exe output file consists of the policy configuration file in .json format. The self-extracting .exe file invokes the
dscmgr
value with import command with the configuration file as an input.
The file can be used to import the configuration to multiple clients using advanced application policy in Wyse Management Suite. The file
also returns success codes when you import a policy.
Deploying a configuration
You can deploy a configuration to multiple thin clients by using the following methods:
Dell Secure Client user interface
Wyse Management Suite
Command-line options
Table 2. Command-line options
Command line
Description
dscmgr /help or dscmgr ?
Use this command to view the
Help
menu of the Dell Secure
Client.
dscmgr /init [Mode]
Use this command to start the Dell Secure Client in application
hash or application path mode. Application mode is the default
mode and if you do not enter any value, the default mode is
selected.
[Mode]—Enter the mode to enable or block the access. You can
use the application binary hash or application path. This parameter
is optional.
dscmgr /getappauthenticationmode
This command displays the applied application authentication
mode.
dscmgr /addpolicy <Path of the file, folder,
or registry key> <Local Windows Username>
<Application Name> [Time Duration] [Policy
Type]
Use this command to add a policy to the Dell Secure Client. This
command is enabled after you restart the thin client.
Path of the file, folder, or registry key
—The
modifications to the file, folder, or registry key is monitored by the
Dell Secure Client. The path that is entered must be available in the
UWF exclusion list.
Local Windows Username
—Enter the username of the
resource to provide access to the Dell Secure Client.
Application Name
—Enter the application name through
which the modifications are enabled to the resource.
Time Duration
—Enter the time duration during which the
modifications are enabled. This parameter is optional. If you do not
enter any value, you can modify the policy anytime.
Accessible applications
19