fleet/docs/Using Fleet/Fleet-desktop.md
Mo Zhu 85082d7976
Remove version support from Fleet Desktop, consolidate version support (#14093)
Single place where host OS version support is listed: 


https://fleetdm.com/docs/using-fleet/supported-host-operating-systems#supported-host-operating-systems

..

Co-authored-by: Mike McNeil <mikermcneil@users.noreply.github.com>
2023-09-23 00:27:33 -05:00

3.5 KiB
Raw Blame History

Fleet Desktop

Fleet Desktop is a menu bar icon available on macOS, Windows, and Linux.

At its core, Fleet Desktop gives your end users visibility into the security posture of their machine. This unlocks two key benefits:

  • Self-remediation: end users can see which policies they are failing and resolution steps, reducing the need for IT and security teams to intervene
  • Scope Transparency: end users can see what the Fleet agent can do on their machines, eliminating ambiguity between end users and their IT and security teams

Self-remediation is only available for users with Fleet Premium

Installing Fleet Desktop

For information on how to install Fleet Desktop, visit: Adding Hosts.

Upgrading Fleet Desktop

Once installed, Fleet Desktop will be automatically updated via Fleetd. To learn more, visit: Self-managed agent updates.

For organizations with complex security postures, they can direct end users to a resource of their choice to serve custom content.

The custom transparency link is only available for users with Fleet Premium

To turn on the custom transparency link in the Fleet GUI, click on your profile in the top right and select "Settings." On the settings page, go to "Organization Settings" and select "Fleet Desktop." Use the "Custom transparency URL" text input to specify the custom URL.

For information on how to set the custom transparency link via a YAML configuration file, see the configuration files documentation.

Securing Fleet Desktop

Requests sent by Fleet Desktop and the web page that opens when clicking on the "My Device" tray item use a Random (Version 4) UUID token to uniquely identify each host.

The server uses this token to authenticate requests that give host information. Fleet uses the following methods to secure access to this information.

Rate Limiting

To prevent brute-forcing, Fleet rate-limits the endpoints used by Fleet Desktop on a per-IP basis. If an IP requests more than 720 invalid UUIDs in a one-hour interval, Fleet will return HTTP error code 429.

Token Rotation

  In Fleet v4.22.0, token rotation for Fleet Desktop was introduced.

Starting with Fleet v4.22.0, the server will reject any token older than one hour since it was issued. This helps Fleet protect against unintentionally leaked or brute-forced tokens.

As a consequence, Fleet Desktop will issue a new token if the current token is:

  • Rejected by the server
  • Older than one hour

This change is imperceptible to users, as clicking on the "My Device" tray item always uses a valid token. If a user visits an address with an expired token, they will get a message instructing them to click on the tray item again.