deviceTRUST for Windows and the deviceTRUST Client Extension for IGEL OS 12 and macOS are now available.
×

Troubleshooting for Fat Client

If your deviceTRUST deployment is not working within your local devices, then these simple troubleshooting steps will ensure your environment is up and running as expected.

We will perform the following steps:

  1. Step 1: Make sure that you have a valid license
  2. Step 2: Check that your contextual security policy has been saved and deployed
  3. Step 3: Check that the user is managed by deviceTRUST
  4. Step 4: Check that your contexts are correctly defined
  5. Step 5: Exclude specific users from the deviceTRUST policy
  6. Step 6: Check that the deviceTRUST Host service is running
  7. Step 7: Check that you are using the latest deviceTRUST version
  8. Step 8: Open a support ticket with us

Step 1: Make sure that you have a valid license

If your deviceTRUST License has not been configured, or has expired, then you may find that the deviceTRUST functionality is disabled.

To check if licensing is causing a problem, open the Windows Event Log on the local device and navigate to APPLICATION AND SERVICE LOGS\DEVICETRUST\ADMIN and look for an Event ID between 11 and 16.

  • Event ID 11 is used to report a valid license.
  • Event ID 12 and 13 are used to report a license that will soon expire.
  • Event ID 14, 15 and 16 are used to report an invalid license.
Valid deviceTRUST License
Valid deviceTRUST License

If your Windows Event Log reports a licensing event other that Event ID 11, then you should check your license. Within the deviceTRUST Console, open your policy and navigate to DEVICETRUST CONSOLE and then click on the SETTINGS tab. Select LICENSING and verify that your deviceTRUST license has been correctly entered. If a wrong or incorrect license was entered, correct the license, click OK and then save your active deviceTRUST contextual security policy before updating it on the remoting host.

Check deviceTRUST License
Check deviceTRUST License

Step 2: Check that your contextual security policy has been saved and deployed

Ensure that your deviceTRUST contextual security policy has been saved within the deviceTRUST Console and successfully deployed to the local devices.

To check which policies are effective, open the Windows Event Log on the local device and navigate to APPLICATION AND SERVICE LOGS\DEVICETRUST\ADMIN and look for Event ID 3 which details the name of each policy and the timestamp that it was last modified.

The deployed policies
The deployed policies
Note:
  • User sessions get their deviceTRUST policies during login and are active until the session is logged out. If newer contextual security policies are deployed on the local device during this time, they will not affect running user sessions, only new logins.

If the policy is not listed or does not have the expected timestamp, then firstly make sure that you have successfully saved the policy from within the deviceTRUST Console.

Save the policy
Save the policy

Next, the policy must be successfully deployed to the local device. The method used to deploy the policy depends upon the where the policy changes were saved.

Local Policy

When using local policy, no additional steps need to be taken to enable the updated contextual security policy for the deviceTRUST Host.

Group Policy Object (GPO)

When using group policy, a Group Policy update should be forced on the local device to propagate an update of the contextual security policy. Of course, it is also possible to wait for the next group policy refresh, but for testing purposes this can be forced directly with a call to GPUPDATE /TARGET:COMPUTER /FORCE. After the updated contextual security policy is successfully deployed to the local device, the deviceTRUST Host will use it immediately.

File-based

When using file-based policy, the updated contextual security policy is copied to the appropriate target directory as a file-based policy on the local device. After the updated file-based contextual security policy is copied to the target directory, the deviceTRUST Host will use it immediately.

Step 3: Check that the user is managed by deviceTRUST

The deviceTRUST contextual security policy defines the users that will be managed by deviceTRUST. By default, this does not include members of the local administrators group.

To check if an unmanaged user has signed in, open the Windows Event Log on the local device and navigate to APPLICATION AND SERVICE LOGS\DEVICETRUST\ADMIN and look for Event ID 17.

An unmanaged user signed in
An unmanaged user signed in

To change the list of managed users, open your active deviceTRUST contextual security policy and navigate to DEVICETRUST CONSOLE and click on the SETTINGS tab. Select LICENSING, navigate to the USERS tab and check that the user account is not configured in the UNMANAGED USERS directly or via a group membership.

Unmanaged Users
Unmanaged Users

If deviceTRUST policies are still not applied to the user, check if the user account is a member of the local administrators group. To do this, start COMPUTER MANAGEMENT on the local device, navigate to SYSTEM TOOLS, select LOCAL USERS AND GROUPS and check that the user is not a member of the ADMINISTRATORS group.

Administrative Users
Administrative Users

Step 4: Check that your contexts are correctly defined

The deviceTRUST Console is used to create and configure the contexts on which targeted actions are then defined. Therefore it is very important that the contexts and their logical status is correctly defined. Inaccuracies in the logic can have an undesirable impact on the user. To analyze what exactly led to the undesired action, it is necessary to check the status of the respective context for its correctness.

In the following example, the context UNAUTHORIZED USB DRIVE was defined, which gives an indication whether the USB drive used was authorized for use on the local device. Based on the logical configuration of the context UNAUTHORIZED USB DRIVE, the status values FALSE and TRUE are possible.

The Unauthorized USB Drive context
The Unauthorized USB Drive context

The context value that has been evaluated for a user session can be seen by opening the Windows Event Log on the local device and navigating to APPLICATION AND SERVICE LOGS\DEVICETRUST\ADMIN. Event ID 101 is raised during logon, and details the properties and context of the users’ local session.

Local session properties and contexts
Local session properties and contexts

In the above example, we can force a context change on the local device by plugging in an unauthorized USB drive and see how the corresponding context is updated. To check this, open the Windows Event Log on the local device and navigate to APPLICATION AND SERVICE LOGS\DEVICETRUST\ADMIN and check for Event ID 106, which is raised whenever a context changes value within the users’ local session.

Context change audit event
Context change audit event

If the context takes the correct value, the logic for the context definition is correct. If this is not the case, the individual properties used within the context definition should also be checked. Check within your context definition which properties are used for the logic and check the accuracy of the logic based on the submitted properties and adjust them if necessary. To do this, open the Windows Event Log on the local device and navigate to APPLICATION AND SERVICE LOGS\DEVICETRUST\ADMIN and check for Event ID 101, which details the properties and context of the users’ local session.

Local session properties and contexts
Local session properties and contexts

Step 5: Exclude specific users from the deviceTRUST policy

It may be necessary to exclude a user or user group from the deviceTRUST contextual security policy, for example, to quickly grant access independently of deviceTRUST on a local device.

To exclude a user, open your active deviceTRUST contextual security policy and navigate to DEVICETRUST CONSOLE and click on the SETTINGS tab. Select LICENSING, navigate to the USERS tab and add the user or the user group to the UNMANAGED USERS to exclude them completely from deviceTRUST.

Unmanaged Users
Unmanaged Users

Step 6: Check that the deviceTRUST Host service is running

The deviceTRUST Host service must be running on the local device for it to enforce the policy. If this service is not running, then no deviceTRUST contextual security policies can be applied to the users. The deviceTRUST Host service is monitored by standard operating system functions and recovered if necessary.

Open the COMPUTER MANAGEMENT on the local device, navigate to SERVICES AND APPLICATIONS, select SERVICES and check that the DEVICETRUST HOST SERVICE is running. If the service is not running, try to start it from the menu or context menu by selecting START.

deviceTRUST Host Service
deviceTRUST Host Service

If the deviceTRUST Host service does not start you can repair the deviceTRUST Host installation. To do this, please open the CONTROL PANEL, navigate to PROGRAMS and open PROGRAMS AND FEATURES. Select DEVICETRUST HOST VXX.X X64 and start the repair of the installation with the REPAIR button.

Repair deviceTRUST Host installation
Repair deviceTRUST Host installation

Step 7: Check that you are using the latest deviceTRUST version

The latest deviceTRUST releases may contain bugfixes that were present in previous releases, or compatibility fixes that have since been discovered with other third party components. Therefore, it is recommended to upgrade to the latest deviceTRUST version from time to time. This can be done very easily by transparently updating the corresponding deviceTRUST component (Host and Console) by running the newer installer.

The following points should be considered before upgrading:

  • Before you start the upgrade, read the release notes for all releases since the version you have currently deployed.
  • The deviceTRUST Host and the deviceTRUST Console must always be on the same version.

The latest deviceTRUST software can be found on our Download page.

Step 8: Open a support ticket with us

If none of the steps in the troubleshooting guide helped, or if you have any further questions, feel free to open an appropriate ticket via our support contact form.