This document will help you harden the security in Desktop Central.
To enable secure log-in, go to Admin tab and click on Security settings, and under Secure login perform the below steps,
It is recommended to configure Desktop Central with a trusted third party certificate to ensure secured connections between desktops, mobile agents and server. However, for secured communication using HTTPS, a default self-signed certificate will be provided along with the server
To enable secure agent server communication, go to Admin tab and click on Security settings, and under Secure agent server communication perform the below steps,
It is recommended to keep Desktop Central server within a corporate network protected by a firewall. To prevent Desktop Central from exposing to internet, use Forwarding Server (a reverse proxy solution). It will also help you secure communication of mobile/roaming user with Desktop Central server. Refer this document for more details.
By default, SSLV2 and SSLV3 protocols are disabled in Desktop central. If you are not managing any of the legacy operating systems (Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008 ), you can disable TLSv1 and TLSv1.1 in the security page.
Upgrade to Desktop Central build 100081 and above, as the ciphers are disabled by default. If you are managing Windows XP and Windows Server 2003 operating systems, apply the Patch for Windows XP and Patch for Windows 2003.