Dell Endpoint Security Suite Enterprise and Threat Defense Proxy Settings

Summary: Proxy Settings for Dell Endpoint Security Suite Enterprise or Threat Defense.

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Symptoms

Note:

Affected Products:

  • Dell Endpoint Security Suite Enterprise
  • Dell Threat Defense

Affected Versions:

  • Windows - Agent 1290 or higher
  • macOS - Agent 1300 or higher
  • Linux - Agent 1430 or higher

Table of Contents

Dell Endpoint Security Suite Enterprise and Threat Defense support proxy configurations for users is configured through a registry entry. When a proxy is configured, the agent uses the IP address and port for all outbound communication to Cylance hosts.

Note: A service restart is not required but could take up to four hours before the agent performs a network connectivity test and applies the changes that are made in the registry. A computer reboot is required.

Cause

Not Applicable

Resolution

Windows

To configure the proxy in Dell Endpoint Security Suite Enterprise and Threat Defense:

  1. Access the registry. Depending on how your agent was installed (Protected Mode that is enabled or not), you must elevate your privileges or take ownership of the registry.
  2. Download psexe.exe from the Microsoft website, https://docs.microsoft.com/en-us/sysinternals/downloads/psexec This hyperlink is taking you to a website outside of Dell Technologies..
  3. Open a DOS prompt as Administrator.
  4. Run this command first:
    1. psexec -i -s cmd.exe.

Agree to License Terms
Figure 1: (English Only) Agree to License Terms

  1. Accept the EULA then run this command inside the new windows opened by psexec: regedt32.exe:

Type regedt32.exe
Figure 2: (English Only) Type regedt32.exe

Warning: The next step is a Windows Registry edit:
  1. In the Registry Editor, go to HKEY_LOCAL_MACHINE\SOFTWARE\Cylance\Desktop
  2. Create a String Value (REG_SZ):
    • Value Name = ProxyServer
    • Value Data = your Proxy settings.

Registry Editor
Figure 3: (English Only) Registry Editor

Note: This does not apply to an authenticated proxy. To configure for an authenticated proxy:
  • Configure the proxy and add a rule to allow all traffic to *.cylance.com.

Or

  • Use a different proxy policy allowing for unauthenticated proxy access to Cylance hosts (*.cylance.com).

This way, if no user is logged on, Dell Endpoint Security Suite Enterprise agent for Windows and macOS no longer must authenticate and can connect to the cloud and communicate with the console.

Back To Top

macOS

To configure the proxy in Dell Endpoint Security Suite Enterprise and Threat Defense:

Modify the values.xml file in the Cylance folder:

Option 1: To use the command line:
  1. Access the values.xml file. The default location is
/Library/Application Support/Cylance/Desktop/registry/LocalMachine/Software/Cylance/Desktop/values.xml

Open values.xml
Figure 4: (English Only) Open values.xml

  1. Edit the values.xml file and add the following between the <values> element:
    • <value name="ProxyServer" type="string">PROXY IP AND PORT HERE</value>
    • Example: <value name="ProxyServer" type="string">127.0.0.1:8080</value>

Edit values.xml
Figure 5: (English Only) Edit values.xml

Type CTRL + X and Y to save the file.

The protection status should be green:

Advanced Threat Prevention
Figure 6: (English Only) Advanced Threat Prevention

Option 2: To use a bash script:

Use a bash script to push the proxy key down to OS X / macOS devices in your organization that require a proxy for outbound communications to Cylance hosts.

  1. Create a file (CylanceMacProxy.sh) with the following contents:
#!/usr/bin/bash
ADDR=1.2.3.4:8080
FILE="/Library/Application Support/Cylance/Desktop/registry/LocalMachine/Software/Cylance/Desktop/values.xml"
sed -i '' 's/.*<values>.*/&\
<value name="ProxyServer" type="string">'$ADDR'<\/value>/' "$FILE"

Where:

ADDR represents the Proxy Server IP address and port.

  1. Use your preferred deployment mechanism (Casper, so forth) to run the bash script using sudo.
sudo bash ./CylanceMacProxy.sh
Note: This does not apply to an authenticated proxy. To configure for an authenticated proxy:
  1. Configure the proxy and add a rule to allow all traffic to *.cylance.com.

Or

  1. Use a different proxy policy allowing for unauthenticated proxy access to Cylance hosts (*.cylance.com).
This way, if no user is logged on, the Dell Endpoint Security Suite Enterprise agent for Windows and macOS no longer must authenticate and can connect to the cloud and communicate with the console.

Back To Top

Linux

To configure the proxy in Dell Endpoint Security Suite Enterprise in Linux, choose the appropriate Operating System:

Open a Terminal window and run this command in one line:

echo "env http_proxy=http://proxyaddress:port" /etc/init/cylancesvc.override && systemctl stop cylancesvc && systemctl daemon-reload && systemctl start cylancesvc

Run command in Terminal
Figure 7: (English Only) Run command in Terminal

Open a terminal window and run these commands:

echo "env https_proxy=https://proxyaddress:port" /etc/init/cylancesvc.override && systemctl stop cylancesvc && systemctl daemon-reload && systemctl start cylancesvc

Run command in Terminal
Figure 8: (English Only) Run command in Terminal

Open a Terminal window and run these commands:

  1. mkdir /etc/systemd/system/cylancesvc.service.d && echo "[Service]" /etc/systemd/system/cylancesvc.service.d/proxy.conf
  2. echo "env=http_proxy=http://proxyaddress:port" /etc/systemd/system/cylancesvc.service.d/proxy.conf
  3. systemctl stop cylancesvc && systemctl daemon-reload && systemctl start cylancesvc

Run commands in Terminal
Figure 9: (English Only) Run commands in Terminal

Open a Terminal window and run this command in one line:

  1. mkdir /etc/systemd/system/cylancesvc.service.d && echo "[Service]" /etc/systemd/system/cylancesvc.service.d/proxy.conf
  2. echo "env=https_proxy=https://proxyaddress:port" /etc/systemd/system/cylancesvc.service.d/proxy.conf
  3. systemctl stop cylancesvc && systemctl daemon-reload && systemctl start cylancesvc

Run commands in Terminal
Figure 10: (English Only) Run commands in Terminal

Back To Top


To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Affected Products

Dell Threat Defense, Dell Endpoint Security Suite Enterprise
Article Properties
Article Number: 000130932
Article Type: Solution
Last Modified: 12 Apr 2024
Version:  12
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.