Valarea
Search…
Valarea
Welcome to Valarea Knowledge Base!
Pre-requisite setup
Hardware, OS and Software Requirements
Network Requirements
System Hardening Best Practices
How to Create a Room Resource for Calendar Events
Installing Valarea Room
Installation steps overview
Valarea Room
Cloud Management & Analytics Console
FAQ
Frequently Asked Question
Using Valarea
BYOM/BYOD with Valarea Room
How to Share Your Screen Wirelessly
How to Share Your Screen via HDMI Cable
Controlling Valarea Room with Valarea App (Free)
Valarea Wireless Touch Controller (WTC)
Valarea Workspace
Valarea Continuity
Integrations
Valarea Bot for Microsoft Teams
TECH DOCS
🛡
Security White Paper
ℹ
Dec 14, 2021 | Vulnerability Statement | Log4j
📄
Privacy Policy
RELEASE NOTES
Valarea v3.8 (Feb 22, 2022)
Valarea v3.7 (Dec 15, 2021)
Valarea v3.6 (Sept 15, 2021)
Valarea v3.5 (June 06, 2021)
Valarea v3.1 (May 05, 2021)
Valarea v3.0.7769 (Apr 11, 2021)
Valarea v3.0 (Jan 15, 2021)
VIDEO TUTORIAL
What is Valarea?
Valarea Room
First Configuration
Wireless Touch Controller for iPad or Android Tablet
Cloud Drive Secure Proximity Connection
Wireless Screen Sharing
Room Workspace
AR Camera
Powered By
GitBook
System Hardening Best Practices
The following best practices are a suggested as a security baseline for production systems:
1.
Create a local (or domain) user without Admin privileges and
set auto logon
2.
Configure the system with static IP address and dedicated VLAN, separated from Guests and Employees VLAN
3.
Activate Microsoft Windows Defender
4.
Enable Valarea Kiosk Mode and set a password for the Settings Panel
5.
Disconnect Keyboard and mouse
6.
Manage and control the room from the Valarea Cloud Management Console
7.
Enable automatic Windows Updates during non working hours
Additional security hardening requirements related to Windows 10 OS
Allow log on locally to the Valarea and Administrator users only
Follow this guide for setting the appropriate security policy:
https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/allow-log-on-locally
Disable all non-essential Windows Services
Disable Internet Connection Sharing (ICS) Service
Disable the following Remote Services
Remote Desktop Configuration
Remote Desktop Services
Remote Desktop Services UserMode Port Redirector
Remote Registry
Configure manual startup
Configure manual start-up for these services:
Remote Procedure Call (RPC) Locater
Windows Error Reporting Service
Disable all non-essential privileged accounts
Disable all accounts that do not meet system or application objectives.
Deny autorun and access to removable media devices
Set the default behavior for AutoRun: Enabled
All Removable Storage classes: Deny all access: Enabled
CD and DVD: Deny read access: Enabled
CD and DVD: Deny write access: Enabled
Removable Disks: Deny read access: Enabled
Removable Disks: Deny write access: Enabled
WPD Devices: Deny read access: Enabled
WPD Devices: Deny write access: Enabled
Restrict Users to Store Data in Local Drive, Desktop, Document, Downloads etc.:
https://docs.microsoft.com/en-us/answers/questions/129425/restrict-users-to-store-data-in-local-drive-deskto.html
Valarea Advanced Settings
Set a password for accessing the Settings Panel
Enable Valarea Kiosk Mode
Create and Apply an automatic Valarea Update policy from Valarea Cloud Management Console
Previous
Fixing Miracast Issue with some Wifi Chipsets
Next - Pre-requisite setup
How to Create a Room Resource for Calendar Events
Last modified
19d ago
Copy link
Contents
Additional security hardening requirements related to Windows 10 OS