Dell Wyse 5070 Windows 10 IoT Enterprise for Wyse Thin Clients Administrator s - Page 19
Self-extracting file, Deploying a configuration, Command-line options
View all Dell Wyse 5070 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 19 highlights
"allowUnregistration": true, "businessRuleInfo": null, "currentBiosAdminPassword": null, "mqttUrl": "tcp://10.150.38.10:1883", "wmsUrl": "https://brl-hackthon-win12R2:443/ccm-web", "heartbeatIntervalInMins": 0, "checkInIntervalInHours": 0, "groupToken": null, "personalDeviceSettings": null, "wmsVersion": "4.3.0", "maxCheckinIntervalInHours": 0 } Self-extracting file The self-extracting .exe output file consists of the policy configuration file in .json format. The self-extracting .exe file invokes the dscmgr value with import command with the configuration file as an input. The file can be used to import the configuration to multiple clients using advanced application policy in Wyse Management Suite. The file also returns success codes when you import a policy. Deploying a configuration You can deploy a configuration to multiple thin clients by using the following methods: • Dell Secure Client user interface • Wyse Management Suite Command-line options Table 2. Command-line options Command line dscmgr /help or dscmgr ? dscmgr /init [Mode] dscmgr /getappauthenticationmode dscmgr /addpolicy [Time Duration] [Policy Type] Description Use this command to view the Help menu of the Dell Secure Client. Use this command to start the Dell Secure Client in application hash or application path mode. Application mode is the default mode and if you do not enter any value, the default mode is selected. [Mode]-Enter the mode to enable or block the access. You can use the application binary hash or application path. This parameter is optional. This command displays the applied application authentication mode. Use this command to add a policy to the Dell Secure Client. This command is enabled after you restart the thin client. Path of the file, folder, or registry key-The modifications to the file, folder, or registry key is monitored by the Dell Secure Client. The path that is entered must be available in the UWF exclusion list. Local Windows Username-Enter the username of the resource to provide access to the Dell Secure Client. Application Name-Enter the application name through which the modifications are enabled to the resource. Time Duration-Enter the time duration during which the modifications are enabled. This parameter is optional. If you do not enter any value, you can modify the policy anytime. Accessible applications 19