Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell Lasso Version 4.7.3 User's Guide

PDF

FAQ — Passwords and Security

  • Why is password mandatory?
    • Lasso executes scripts that need access to administrative level resources. This requires remote login to the systems to execute the scripts. Lasso does not save the entered passwords as it is captured from the input and deleted after the connection. Blank password can also be used. The processes (net use, putty, telnet and so on) that launch will prompt for the password . Enter the password multiple times for each device. To avoid this, create a new user dedicated to run Lasso. This user can be deleted after running Lasso. See Readme for more information.
  • How to ensure that the password is secured?
    • Search for a word or phrase used in your password in the c:\Program Files\Dell\Lasso file. Also, create a specific user for Lasso that can be disabled after running Lasso.
  • Why should administrative Windows password be used?
    • The collection script EMCReports requires system access to obtain information about the system. See the directory ftp://ftp.emc.com/pub/emcgrab/Windowsfor more information.
  • Why should UNIX Root password be used?
    • The collection script emcgrab requires root level system access to obtain information about the system. See the directory ftp://ftp.emc.com/pub/emcgrab/Unixfor more information.
  • What are the other options instead of using UNIX Root password?
    • Enter a blank password, when prompted by the SSH session, before Lasso prompts this authentication. The password may be entered several times for each UNIX host in the spawned windows. Add a new user with root access, or change the password temporarily for the Lasso run. It is not recommended to use central authentication scheme. Future versions of Lasso will allow SSH from a normal user that can then "su" or "sudo" the script.
  • How does Lasso provide security and privacy protection?
    • Lasso creates a single .zip file that is 2048-bit encrypted (unless this option is disabled, or Lasso is running in a non-exportable country). Lasso uploads the file to the Dell's ftp site and provides high level of privacy protection and security. This site has "write-only" access to Lasso and the public, and has no read access.
  • Who can view the uploaded data collection?
    • From version 2.9.0 and later, a "write-only" ftp site is used and "view" or "read" permission are not available. The data can be uploaded, but no other collections can be viewed.
  • What network ports does Lasso use?
  • What is Secure Site option?
    • The Secure Site option is used to remove the Customer Identification Information (CII) such as company name, company address, IP address, MAC address, iSCSI volume names, and Host names from the Lasso output .xml file.

      The customer sensitive data is replaced by tokens in the .XML file. Mapping between the tokens and customer sensitive data is maintained in an encrypted .XML file. This data is secured when the .XML file is uploaded to Dell's FTP site.


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\