Skip to content

About this guide

Welcome to the Splashtop Secure Workspace Evaluator's Handbook. This guide introduces key features of Splashtop Secure Workspace and how you can use Splashtop Secure Workspace to maximize remote access productivity and minimize the vulnerabilities of your network infrastructure.

This guide provides hands-on experience working with Splashtop Secure Workspace through a series of scenarios that illustrate how to perform common administrative tasks. Through the Evaluator's Handbook, you'll learn how to install and configure Splashtop Secure Workspace in a simple test network environment. After you prepare the test environment, you can follow the steps in this Evaluator's Handbook to learn how to manage access to your organization's resources and monitor activity on your network.

Intended audience

This guide is for decision-makers and administrators who want to evaluate Splashtop Secure Workspace as a solution for their organization. The guide assumes you are familiar with basic network operations and network infrastructure management. This guide also assumes you are familiar with basic administrative tasks for the computers and devices you plan to manage.

Using this guide

The purpose of this guide is to demonstrate how to perform tasks using the Splashtop Secure Workspace administrative portal and to provide insight into the user experience when ySplashtop Secure Workspace is deployed . The guide covers the following topics:

  • Prepare for an evaluation describes how you can prepare for the evaluation, including suggestions for setting up a basic test network for the evaluation.

  • Start the evaluation explains the first steps to get your evaluation started.

  • Deploy connectors describes how to deploy connectors on computers in your test environment.

  • Add applications demonstrates how to add applications and resources to the network infrastructure for your organization.

  • Add users, groups, and policies illustrates how you can add a new user, group, and a simple access policy for evaluation purposes.

  • Restrict access to applications demonstrates how to create a simple application access policies.

  • Manage secrets discusses how to securely store and manage secret information like passwords and keys.

  • Grant temporary privileged access demonstrates how to provide temporary privileges to a user outside of your organization.

  • Monitor and replay a session demonstrates how to capture application activity and replay a recorded session.

  • Filter website using categories demonstrates how to use website filtering to block access to specific types of websites.

After you complete your evaluation using this guide, review the Evaluation checklist spreadsheet. The Evaluation checklist highlights the Splashtop Secure Workspace features that help you secure and manage your network infrastructure. You can use the checklist to rate and score features to help you quantify your evaluation.

Documentation conventions

The Splashtop Secure Workspace Evaluator's Handbook uses the following documentation conventions:

  • The code format is used for sample code, program names, program output, file names, and commands that you type at the command line.

  • Angle brackets (< >) indicate variables.

  • Square brackets ([ ]) indicate optional command-line arguments or truncated content.

  • Bold text emphasizes commands or user interface elements you interact with. text; and new terms.

  • Italics are used for article titles.

Finding more information

The Splashtop Secure Workspace Evaluator's Handbook has limited scope. It's designed to help you learn and evaluate basic product features. You can find more comprehensive information in the Splashtop Secure Workspace knowledge base or in Splashtop Business Support

Contacting Splashtop

You can contact Splashtop by visiting the Splashtop website or Splashtop Support. You ca also follow Splashtop on LinkedIn, Instagram, Facebook, Twitter, and YouTube.