Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Windows 10 IoT Enterprise for Dell Wyse Thin Clients Administrator’s Guide

Key features of Dell Secure Client

The following are the key features of the Dell Secure Client:

  • The list of files, folders, and registry exclusions in the write filter is displayed.
  • The status of the Dell Secure Client regarding the Unified Write Filter is displayed.
  • The Dell Secure Client service acts as a policy engine. It combines the policies of the nested folders and updates the same in the registry hive.
  • You can use the Dell Secure Client command-line interface to update the .csv file with the policies when the administrator makes any changes using the user interface.
  • The administrator can use the Dell Secure Client to add, view, and remove policies of the excluded files and registries in the write filter.
  • You can add, remove, view, or modify the policy based on username, application, and the time of access for each entry in the write filter exclusion list.

    NOTE: The user name and application name are mandatory.

  • You can import and export the policy configuration data in .csv or .json format.
  • You can export the policy as a Self-Contained Executable (SCE) .exe file. The SCE file encapsulates the policy configuration in .json format.
  • Multilingual support for the administrator user interface is provided.
  • Provision to retain the Dell Secure Client configurations added by the user after you restart the thin client.
  • You can configure the policies only after you disable the write filter.
  • The default policies are applied to all users when the Dell Secure Client is enabled.
  • You can add a policy to a user or a group using the Dell Secure Client user interface or command-line interface. This policy is applied along with the default policy when you log in to the respective user or a group.
  • The policies are saved in .csv format that is encrypted.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\