deviceTRUST for Windows and the deviceTRUST Client Extension for IGEL OS 12 and macOS are now available.
×

Troubleshooting for Remoting and DaaS

If your deviceTRUST deployment is not working within your remoting or DaaS environment, then these simple troubleshooting steps will ensure your environment is up and running as expected.

We will perform the following steps:

  1. Step 1: Make sure that you have a valid license
  2. Step 2: Check that your contextual security policy has been saved and deployed
  3. Step 3: Check that the user is managed by deviceTRUST
  4. Step 4: Check that the deviceTRUST Client is installed on the remote device
  5. Step 5: Check that your contexts are correctly defined
  6. Step 6: Exclude specific users from the deviceTRUST policy
  7. Step 7: Check that the deviceTRUST Host service is running
  8. Step 8: Check that you are using the latest deviceTRUST version
  9. Step 9: Open a support ticket with us

Step 1: Make sure that you have a valid license

If your deviceTRUST License has not been configured, or has expired, then you may find that the deviceTRUST functionality is disabled.

To check if licensing is causing a problem, open the Windows Event Log on the remoting or DaaS host system and navigate to APPLICATION AND SERVICE LOGS\DEVICETRUST\ADMIN and look for an Event ID between 11 and 16.

  • Event ID 11 is used to report a valid license.
  • Event ID 12 and 13 are used to report a license that will soon expire.
  • Event ID 14, 15 and 16 are used to report an invalid license.
Valid deviceTRUST License
Valid deviceTRUST License

If your Windows Event Log reports a licensing event other that Event ID 11, then you should check your license. Within the deviceTRUST Console, open your policy and navigate to DEVICETRUST CONSOLE and then click on the SETTINGS tab. Select LICENSING and verify that your deviceTRUST license has been correctly entered. If a wrong or incorrect license was entered, correct the license, click OK and then save your active deviceTRUST contextual security policy before updating it on the remoting host.

Check deviceTRUST License
Check deviceTRUST License

Step 2: Check that your contextual security policy has been saved and deployed

Ensure that your deviceTRUST contextual security policy has been saved within the deviceTRUST Console and successfully deployed to the remoting or DaaS host system.

To check which policies are effective, open the Windows Event Log on the remoting or DaaS host system and navigate to APPLICATION AND SERVICE LOGS\DEVICETRUST\ADMIN and look for Event ID 3 which details the name of each policy and the timestamp that it was last modified.

The deployed policies
The deployed policies
Note:
  • User sessions get their deviceTRUST policies during login and are active until the session is logged out. If newer contextual security policies are deployed on the remoting or DaaS host during this time, they will not affect running user sessions, only new logins.

If the policy is not listed or does not have the expected timestamp, then firstly make sure that you have successfully saved the policy from within the deviceTRUST Console.

Save the policy
Save the policy

Next, the policy must be successfully deployed to the remoting or DaaS host system. The method used to deploy the policy depends upon the where the policy changes were saved.

Local Policy

When using local policy, no additional steps need to be taken to enable the updated contextual security policy for the deviceTRUST Host.

Group Policy Object (GPO)

When using group policy, a Group Policy update should be forced on the remoting or DaaS host system to propagate an update of the contextual security policy. Of course, it is also possible to wait for the next group policy refresh, but for testing purposes this can be forced directly with a call to GPUPDATE /TARGET:COMPUTER /FORCE. After the updated contextual security policy is successfully deployed to the remoting or DaaS host system, the deviceTRUST Host will use it immediately.

File-based

When using file-based policy, the updated contextual security policy is copied to the appropriate target directory as a file-based policy on the remoting or DaaS host system. After the updated file-based contextual security policy is copied to the target directory, the deviceTRUST Host will use it immediately.

Step 3: Check that the user is managed by deviceTRUST

The deviceTRUST contextual security policy defines the users that will be managed by deviceTRUST. By default, this does not include members of the local administrators group.

To check if an unmanaged user has signed in, open the Windows Event Log on the remoting or DaaS host system and navigate to APPLICATION AND SERVICE LOGS\DEVICETRUST\ADMIN and look for Event ID 17.

An unmanaged user signed in
An unmanaged user signed in

To change the list of managed users, open your active deviceTRUST contextual security policy and navigate to DEVICETRUST CONSOLE and click on the SETTINGS tab. Select LICENSING, navigate to the USERS tab and check that the user account is not configured in the UNMANAGED USERS directly or via a group membership.

Unmanaged Users
Unmanaged Users

If deviceTRUST policies are still not applied to the user, check if the user account is a member of the local administrators group. To do this, start COMPUTER MANAGEMENT on the remoting or DaaS host system, navigate to SYSTEM TOOLS, select LOCAL USERS AND GROUPS and check that the user is not a member of the ADMINISTRATORS group.

Administrative Users
Administrative Users

Step 4: Check that the deviceTRUST Client is installed on the remote device

The deviceTRUST Client is required on the remote device whenever your contextual security policies within the virtual session use properties of the remote device. Within the user session, a deviceTRUST property can be used to detect whether a deviceTRUST Client has been detected on the remote device.

To check whether a deviceTRUST Client has been identified on the remote device, open the Windows Event Log on the remoting or DaaS host system and navigate to APPLICATION AND SERVICE LOGS\DEVICETRUST\ADMIN and check for Event ID 101. This event is raised during logon, and details the properties and context of the users’ virtual session.

Virtual session properties and contexts
Virtual session properties and contexts

The HOST_DEVICETRUST_CONNECTED property can have the following states:

  • HOST_DEVICETRUST_CONNECTED = FALSE - There is no deviceTRUST Client installed on the remote device.
  • HOST_DEVICETRUST_CONNECTED = TRUE - There is a deviceTRUST Client installed on the remote device.

If there is no deviceTRUST Client installed on the remote device, install the deviceTRUST Client on the respective operating system Installation Client from the client installation page.

Step 5: Check that your contexts are correctly defined

The deviceTRUST Console is used to create and configure the contexts on which targeted actions are then defined. Therefore it is very important that the contexts and their logical status is correctly defined. Inaccuracies in the logic can have an undesirable impact on the user. To analyze what exactly led to the undesired action, it is necessary to check the status of the respective context for its correctness.

In the following example, the context SECURITY STATE was defined, which gives an indication of the security state of the remote device used by the user to access the virtual session. Based on the logical configuration of the context SECURITY STATE, the status values UNAVAILABLE, PROTECTED and UNPROTECTED are possible.

The Security State context
The Security State context

The context value that has been evaluated for a user session can be seen by opening the Windows Event Log on the remoting or DaaS host system and navigating to APPLICATION AND SERVICE LOGS\DEVICETRUST\ADMIN. Event ID 101 is raised during logon, and details the properties and context of the users’ virtual session.

Virtual session properties and contexts
Virtual session properties and contexts

In the above example, we can force a context change on the remote device by, for example disabling Microsoft Defender Firewall and looking at how the corresponding context updates. To check this, open the Windows Event Log on the remoting or DaaS host system and navigate to APPLICATION AND SERVICE LOGS\DEVICETRUST\ADMIN and check for Event ID 106, which is raised whenever a context changes value within the users’ virtual session.

Context change audit event
Context change audit event

If the context takes the correct value, the logic for the context definition is correct. If this is not the case, the individual properties used within the context definition should also be checked. Check within your context definition which properties are used for the logic and check the accuracy of the logic based on the submitted properties and adjust them if necessary. To do this, open the Windows Event Log on the remoting or DaaS host system and navigate to APPLICATION AND SERVICE LOGS\DEVICETRUST\ADMIN and check for Event ID 101, which details the properties and context of the users’ virtual session.

Virtual session properties and contexts
Virtual session properties and contexts

Step 6: Exclude specific users from the deviceTRUST policy

It may be necessary to exclude a user or user group from the deviceTRUST contextual security policy, for example, to quickly grant access independently of deviceTRUST on the remoting or DaaS host system.

To exclude a user, open your active deviceTRUST contextual security policy and navigate to DEVICETRUST CONSOLE and click on the SETTINGS tab. Select LICENSING, navigate to the USERS tab and add the user or the user group to the UNMANAGED USERS to exclude them completely from deviceTRUST.

Unmanaged Users
Unmanaged Users

Step 7: Check that the deviceTRUST Host service is running

The deviceTRUST Host service must be running on the remoting or DaaS host system for it to enforce the policy. If this service is not running, then no deviceTRUST contextual security policies can be applied to the users. The deviceTRUST Host service is monitored by standard operating system functions and recovered if necessary.

Open the COMPUTER MANAGEMENT on the remoting or DaaS host system, navigate to SERVICES AND APPLICATIONS, select SERVICES and check that the DEVICETRUST HOST SERVICE is running. If the service is not running, try to start it from the menu or context menu by selecting START.

deviceTRUST Host Service
deviceTRUST Host Service

If the deviceTRUST Host service does not start you can repair the deviceTRUST Host installation. To do this, please open the CONTROL PANEL, navigate to PROGRAMS and open PROGRAMS AND FEATURES. Select DEVICETRUST HOST VXX.X X64 and start the repair of the installation with the REPAIR button.

Repair deviceTRUST Host installation
Repair deviceTRUST Host installation

Step 8: Check that you are using the latest deviceTRUST version

The latest deviceTRUST releases may contain bugfixes that were present in previous releases, or compatibility fixes that have since been discovered with other third party components. Therefore, it is recommended to upgrade to the latest deviceTRUST version from time to time. This can be done very easily by transparently updating the corresponding deviceTRUST component (Host, Console and Client) by running the newer installer.

The following points should be considered before upgrading:

  • Before you start the upgrade, read the release notes for all releases since the version you have currently deployed.
  • The deviceTRUST Host and the deviceTRUST Console must always be on the same version.
  • The deviceTRUST Client may be on a different version to the deviceTRUST Host, whether newer or older.
    • If the deviceTRUST Client is newer than the deviceTRUST Host version, the client can only query and transmit the properties that are supported with the version of the deviceTRUST Host.
    • If the deviceTRUST Client is older than the deviceTRUST Host version, the client can only query and transmit the properties that it supports with its current version.

The latest deviceTRUST software can be found on our Download page.

Step 9: Open a support ticket with us

If none of the steps in the troubleshooting guide helped, or if you have any further questions, feel free to open an appropriate ticket via our support contact form.