Compliance Rule Sets in MaaS360

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Compliance Rule Sets in MaaS360"

Transcription

1 Compliance Rule Sets in MaaS360 MaaS360 allows you to apply sets of compliance rules on mobile devices. These rules are conditions that are checked on devices on real-time basis. If a device is not in compliance with the defined rule or conditions, MaaS360 registers it as an out-of-compliance (OOC) event, and the enforcement actions you specified will be taken on the device. You can choose what action to take, a timeframe for the action (where applicable), and you can send a custom message to the user. For example, the following rule will be invoked when a user installs a blacklisted app on a device: In this example, the user will receive an alert saying that their device is out of compliance upon installation of the app or MaaS360. They will have 24 hours after receiving the alert to uninstall the app before all content and settings deployed by MaaS360 will be wiped from the device. You can create multiple rules and assign them to different devices, depending on the needs of your organization and the users roles. Most mobile device platforms allow users to ignore and override passcode policies and application restrictions. Rules such as Enforce Enrollment are useful, especially to track users who accidentally or willfully try to remove their organization s device management and control capabilities. It s a best practice to use rules to enforce corporate standards, even if you already publish policies to your devices. In special cases, you may want to make some devices exempt from the automated actions of the compliance rule sets. You can do this by marking the device as Important through Custom Attributes. Only devices marked as Important from the Inventory on the View All Devices screen will be exempt from the automated actions. To access the Compliance Rules screen, select Security > Compliance Rules. 1

2 The existing rules will be displayed. Rule Set Name (Actions links) Available for Default Status Precedence Name of the compliance rule. It must be unique. Click the link under the name to perform an action: Edit: review the rule set and change it Assign: apply it to group Make Default/Clear Default: make this rule set the default for newly enrolled devices Audit: view the audit history of the rule set Delete: delete the rule set Specifies which groups the rules set can be applied to. Note: This feature is not available by default. Please contact your Account Manager or Technical Support for more information. If checked, this rule set is the default. It is automatically given to all devices when they are enrolled. Specifies if the rule set is active or inactive. Click the Show All button at the top of the screen to include inactive rule sets in the list, and click Hide Inactive to only display active ones. You can have devices with multiple rule sets assigned to them, depending on how your groups are set up. In those cases, the rule set with the lower precedence is the one that will be enforced. Note: This feature is not available by default. Please contact your Account Manager or Technical Support for more information. # of Devices Specifies how many devices have been assigned this rule set. Click on the number to see a list of those devices. Last Updated By Last Updated On Username of the person who last updated the rule set. Date of the last update. 2

3 Creating Rules To create a new rule, click Add Rule Set at the top of the Compliance Rules screen. Specify the group it is available for, the rule s name and an existing rule to use as a starting point. Click Continue. If you have no existing rules, you will only be asked to click Add Rule. Update the parameters and settings to create the compliance rules you want. Click the side tabs to see additional settings and parameters, which are described below. When you are finished, click Save. 3

4 Your new rule will appear on the Compliance Rules screen. Links under the name allow you to perform different actions: Edit: display the parameters and settings so you can change the rule set Assign: assign the compliance rule set to a group of devices, or to any new devices as they are enrolled Make Default: assign the compliance rule set to all devices that do not already have a one Audit: see the changes that have been made to the rule set over time Delete: remove the rule set Editing Rules To edit a rule set, access the Compliance Rules screen by selecting Security > Compliance Rules. Enter the first few characters of the rule s name in the Search field. As you type, rules that match the text will be displayed. 4

5 When you find the rule you want to change, click the Edit link below it. Make your changes to the settings and parameters, and then click Save. Assigning Rules A device must have a rule set assigned to it in order to take effect. This can be done by group, specific device or to all devices. To assign a rule, click the Assign link under the appropriate rule. Select the group or device you want to receive the rule from the pull-down menu. Enter any comments to explain the assignment. 5

6 You can also specify if you want this rule to automatically be assigned to new devices if you have Dynamic Policies or Precedence enabled in your portal. Please contact your Account Manager for more information. Note: Clicking the Auto assign to new devices does not make this rule the default rule. It assigns the rule to devices that enroll in the future, but has no effect on previously enrolled devices. Note: Clicking the Make Default link on the Compliance Rules screen makes the rule the default rule. It is given to devices that do not have a rule. If a device is removed from a group so it no longer has a rule, it will be given the default rule. When you are finished, click Submit. Setting a Rule as the Default The default rule set will be applied to all devices unless explicitly specified during enrollment, or modified. If a device is removed from a group so it no longer has a rule, it will be given the default rule. To make a rule the default, find the rule on the Compliance Rules screen. Click the Make Default link under the rule s name. Enter your password at the prompt and click Confirm. 6

7 The rule now has a green checkmark in the Default column indicating that it is the default. If the default rule is changed to a new rule, all devices that have the old rule set will change to the new one. Viewing the Audit History of a Rule To see the history of a rule, click the Audit link under the appropriate rule. You can see the actions that were performed, when they were performed, who performed them and the source IP address. Deleting Rules When you delete a rule, you make it inactive. It still exists, but it cannot be assigned to any devices unless it is made active again. Find the rule you want to delete on the Compliance Rules screen. You can enter characters into the Search box to help you find it. 7

8 Select the Delete link of the appropriate rule. You will be asked to enter your password to confirm the deletion. Precedence Note: This feature is not enabled by default. Contact your account representative for details. In MaaS360, rules can be dynamically assigned to different device groups, so the policy in force on a device can change as circumstances change. For example, you can have a device group for a specific operating system version and assign a rule to it. When a user upgrades the device, it would then become part of the new group and would get the associated rule automatically. As a result, it is possible for a device to be automatically assigned to multiple groups which have conflicting rules. Precedence allows you to prioritize rules so MaaS360 will apply the appropriate one if more than one is applicable. Click the Precedence button to view the Change Precedence dialog box, which lists the available ios and Android MDM policies. 8

9 You can change the policy precedence by dragging a policy box to the desired precedence level. Click Save when finished. Settings and Parameters Basic Settings Select Applicable Platforms Choose the device operating systems to which the rule should apply. Enable Real-time Compliance for OS es Specify the operating systems to which this rule will apply. ios, Android, BlackBerry, Windows Phone, Symbian, Windows Mobile, Others ios, Android, BlackBerry, Windows Phone, Symbian, Windows Mobile, Others Select all that apply. 9

10 Event Notification Recipients Specify the addresses that should be notified when a device falls out of compliance, as specified by different compliance conditions. Enter addresses for event notification Enter the valid address of an administrator. A valid address Click the green plus icon to enter an additional address.. Exemptions You can make a device exempt from the rule sets by selecting Devices > Inventory, and then clicking on the appropriate device name to display detailed information about the device. Select Hardware Inventory from the pull-down menu. 10

11 The Hardware Inventory screen displays custom attributes. Click the Edit button, and then select Yes for the Important Device (Skip Enforcement Action) field. Save your change. Enforcement Rules On the Enforcement Rules tab, you can have MaaS360 enforce: Enrollment in MDM Specific operating system versions Support for remote wipe Support for block- and file-level encryption, or no encryption Compliance with corporate app policies for blacklisted, whitelisted and required apps Restrictions for jailbroken and rooted devices Note: Wipe allows you to wipe out all data on the mobile device and reset it to the original factory settings. In Android 2.2, the Wipe action will reset only the phone memory. However, in Android 2.3, the Wipe action will reset both the phone memory and the SD card. Note: The Block and Wipe enforcement actions are only available with Cloud Extender integration. Enrollment 11

12 Devices must be enrolled in MaaS360 to send data to the portal and allow administrators to take action. These settings allow you to specify what should happen depending on a device s enrollment status. Enrollment Ensure devices are enrolled in MDM and advanced management of the device has not been disabled or removed by the user. Cleared Selected, cleared Select the checkbox to expand the list of options. Trigger Action on Managed Status An event is triggered based if the device is not managed by MDM Not Enrolled, User Removed Control, Pending Control Removal, Control Removed Not Enrolled, User Removed Control, Pending Control Removal, Control Removed Select all that apply. Send Enrollment Request in Enforcement Action (Immediate) If the device is not managed, automatically send an enrollment request to it Action MaaS360 will take immediately after the out-of-compliance event Cleared Selected, cleared Sending a re-enrollment when a user removes control can help them get back in compliance. Alert Alert, Block, Wipe Wipe will restore the device to the original factory settings. Enforcement Action (Later) Specify action to be taken after the out of compliance (OOC) event a certain number of hours or days later. Send an alert one hour later. Hours, Days Alert, Block, Wipe to add one or more actions that will occur after the user has had time to remediate the noncompliance. Wipe will restore the device to the original factory settings. Notify User user of the out of compliance (OOC) event , Device Notification , Device Notification Notify Admins Administrator of the out of compliance (OOC) event, other addresses You can send an to the list of recipients defined on the Basic Settings side tab ( ) or create a custom list of recipients. Enter a custom message to be delivered to the recipients. A custom message, up to 1024 characters. <^`~$* []{}> cannot be used. 12

13 OS Versions Some versions of different operating systems have or support stricter security features than others. You can set up the rule to take action if a device doesn t have the correct version. Name Description Default Values Valid Values Comments OS Versions Ensure that your managed devices are up to date with the required OS versions. Please note that version check may be invalid on Rooted or Jailbroken devices. This rule would be enforced on enrolled devices that have the complete OS version information. Cleared Selected, cleared Select the checkbox to expand the list of options. A jailbroken or rooted device can be set up to report in to the server as any OS version, bypassing this rule. We recommend that if you use this setting, you also check for jailbroken/rooted devices. Select OS Version Mode Specify how you will validate the OS versions. Different fields will be displayed depending on the option you select here. Specify Version Range Specify Version Range, Specify Allowed Versions, Specify Disallowed Versions If you select Specify Version Range, you can select a minimum and maximum OS version for each of the operating systems. For Specify Allowed Versions and Specify Disallowed Versions, you can choose an OS and version. Click the green plus icon to add more than one. 13

14 Name Description Default Values Valid Values Comments Enforcement Action (Immediate) Define the action to be taken immediately after an OOC Alert Alert, Block, Selective Wipe, Change Policy, Wipe, Remove Control, Hide Device Alert: send a message about the OOC event Block: the device cannot access corporate resources Selective Wipe: corporate settings, apps and content distributed by MaaS360 will be deleted Change Policy: assign a different policy to the device Wipe: reset the device to factory settings Remove Control: the MaaS360 app will be deleted from the device; it cannot access corporate access Hide Device: mark the device as inactive in MaaS360 reporting, but do not remove MaaS360 s control Enforcement Action (Later) Specify action to be taken after the out of compliance (OOC) event a certain number of hours or days later. Send an alert one hour later. Hours, Days Alert, Block, Wipe to add one or more actions that will occur after the user has had time to remediate the noncompliance. Alert: send a message about the OOC event Block: the device cannot access corporate resources Wipe: restore the device to the original factory settings. Notify User user of the out-of-compliance, Other to add more addresses. Notify Admins administrator(s) of the, Other to add more addresses. A custom message to be sent to the recipients. A custom message, up to 1024 characters. <^`~$* []{}> cannot be used. 14

15 Remote Wipe Support Some older devices cannot be wiped remotely. If you want to prevent those devices from being enrolled and accessing your corporate resources, create a rule about remote wipe support. Remote Wipe Support Certain older devices cannot be wiped remotely. Some organizations choose to prevent those devices from accessing corporate resources. This setting allows you to take action if a user tries to enroll one of these devices. Cleared Selected, cleared Select the checkbox to expand the list of options. Enforcement Action (Immediate) Define the action to be taken immediately after an OOC Alert Alert, Block, Selective Wipe, Change Policy, Wipe, Remove Control, Hide Device Alert: send a message about the OOC event Block: the device cannot access corporate resources Selective Wipe: corporate settings, apps and content distributed by MaaS360 will be deleted Change Policy: assign a different policy to the device Wipe: reset the device to factory settings Remove Control: the MaaS360 app will be deleted from the device; it cannot access corporate access Hide Device: mark the device as inactive in MaaS360 reporting, but do not remove MaaS360 s control 15

16 (Enforcement Action Later) Specify action to be taken after the out of compliance (OOC) event a certain number of hours or days later. Send an alert one hour later. Hours, Days Alert, Block, Wipe to add one or more actions that will occur after the user has had time to remediate the noncompliance. Hours: perform the action after the specified number of hours Days: perform the action after the specified number of days Alert: send a message about the OOC event Block: the device cannot access corporate resources Wipe: restore the device to the original factory settings. Notify User user of the out-ofcompliance, Notify Admins administrator(s) of the, A custom message to be sent to the recipients. A custom message, up to 1024 characters. <^`~$* []{}> cannot be used. Encryption Support Some older devices cannot be encrypted. If you want to prevent those devices from being enrolled and accessing your corporate resources, create a compliance rule to notify administrators and prevent it. 16

17 Encryption Support Ensure that managed devices support the designated encryption levels. Cleared Selected, cleared Select the checkbox to expand the list of options. Trigger Action on Hardware Encryption Status Define the conditions that determine an outof-compliance Block-level, Not Supported, Filelevel, No encryption Block-level, Not Supported, Filelevel, No encryption Block-level: the device does not support blocklevel encryption Not supported: the device does not support encryption. File-level: the device does not support filelevel encryption No encryption: the device can be encrypted, but it is not currently Enforcement Action (Immediate) Define the action to be taken immediately after an OOC Alert Alert, Block, Selective Wipe, Change Policy, Wipe, Remove Control, Hide Device Alert: send a message about the OOC event Block: the device cannot access corporate resources Selective Wipe: corporate settings, apps and content distributed by MaaS360 will be deleted Change Policy: assign a different policy to the device Wipe: reset the device to factory settings Remove Control: the MaaS360 app will be deleted from the device; it cannot access corporate access Hide Device: mark the device as inactive in MaaS360 reporting, but do not remove MaaS360 s control 17

18 (Enforcement Action Later) Specify action to be taken after the out of compliance (OOC) event a certain number of hours or days later. Send an alert one hour later. Hours, Days Alert, Block, Wipe to add one or more actions that will occur after the user has had time to remediate the noncompliance. Alert: send a message about the OOC event Block: the device cannot access corporate resources Wipe: restore the device to the original factory settings. Notify User user of the out-ofcompliance, The standard address list for the rule is defined on the Basic Settings tab. Notify Admins administrator(s) of the, A custom message to be sent to the recipients. A custom message, up to 1024 characters. <^`~$* []{}> cannot be used. Application Compliance MaaS360 policies allow you to blacklist, whitelist (allow) and require specific apps. If a user who has been assigned one of those policies tries to install an app that has been restricted or is missing an app that is required, the action specified in the compliance rule will be taken. 18

19 Application Compliance Ensure that devices are in compliance with app management requirements, as defined by the policy assigned to the device. Cleared Selected, cleared Select the checkbox to expand the list of options. Enforcement Action (Immediate) Define the action to be taken immediately after an OOC Alert Alert, Block, Selective Wipe, Change Policy, Wipe, Remove Control, Hide Device Alert: send a message about the OOC event Block: the device cannot access corporate resources Selective Wipe: corporate settings, apps and content distributed by MaaS360 will be deleted Change Policy: assign a different policy to the device Wipe: reset the device to factory settings Remove Control: the MaaS360 app will be deleted from the device; it cannot access corporate access Hide Device: mark the device as inactive in MaaS360 reporting, but do not remove MaaS360 s control (Enforcement Action: Later) Specify action to be taken after the out of compliance (OOC) event a certain number of hours or days later. Send an alert one hour later. Hours, Days Alert, Block, Wipe to add one or more actions that will occur after the user has had time to remediate the noncompliance. Alert: send a message about the OOC event Block: the device cannot access corporate resources Wipe: restore the device to the original factory settings. 19

20 Notify User user of the out-ofcompliance, The standard address list for the rule is defined on the Basic Settings tab. Notify Admins administrator(s) of the, A custom message to be sent to the recipients. A custom message, up to 1024 characters. <^`~$* []{}> cannot be used. Jailbroken (ios) and Rooted (Android) Devices 20

21 MaaS360 can detect when a device is jailbroken or rooted, and perform the actions you specify. Jailbroken (ios) and Rooted (Android) Devices Define actions to be taken if a device with this Cleared Selected, cleared Select the checkbox to expand the list of options. Enforcement Action (Immediate) Define the action to be taken immediately after an OOC Alert Alert, Block, Selective Wipe, Change Policy, Wipe, Remove Control, Hide Device Alert: send a message about the OOC event Block: the device cannot access corporate resources Selective Wipe: corporate settings, apps and content distributed by MaaS360 will be deleted Change Policy: assign a different policy to the device Wipe: reset the device to factory settings Remove Control: the MaaS360 app will be deleted from the device; it cannot access corporate access Hide Device: mark the device as inactive in MaaS360 reporting, but do not remove MaaS360 s control (Enforcement Action: Later) Specify action to be taken after the out of compliance (OOC) event a certain number of hours or days later. Send an alert one hour later. Hours, Days Alert, Block, Wipe to add one or more actions that will occur after the user has had time to remediate the noncompliance. Alert: send a message about the OOC event Block: the device cannot access corporate resources Wipe: restore the device to the original factory settings Notify User user of the out-ofcompliance, The standard address list for the rule is defined on the Basic Settings tab. 21

22 Notify Admins administrator(s) of the, A custom message to be sent to the recipients. A custom message, up to 1024 characters. <^`~$* []{}> cannot be used. Corporate Resources for Blocked Devices Note: These settings are being deprecated over time, although they are still supported for customers who are currently using them. We recommend that you use policies to restrict access to corporate resources instead of compliance rules. Geo-Fencing Geo-Fencing Rules can be set up after you ve created approved locations. You can change the policy in force on the device based on its location, or specify actions that should take place if the device is removed from one of the approved locations. To set up a location, mouse over Security and select Locations. You can assign policies to certain device groups or all devices while they are in that location. 22

23 Geo-Fencing If a device falls out of compliance at a location, predefined actions can be taken. Cleared Selected, cleared Select the checkbox to expand the list of options. Enforcement Action (Immediate) Define the action to be taken immediately after an OOC Alert Alert, Block, Selective Wipe, Change Policy, Wipe Alert: send a message about the OOC event Block: the device cannot access corporate resources Selective Wipe: corporate settings, apps and content distributed by MaaS360 will be deleted Change Policy: assign a different policy to the device Wipe: reset the device to factory settings (Enforcement Action: Later) Specify action to be taken after the out of compliance (OOC) event a certain number of hours or days later. Send an alert one hour later. Hours, Days Alert, Block, Wipe to add one or more actions that will occur after the user has had time to remediate the noncompliance. Alert: send a message about the OOC event Block: the device cannot access corporate resources Wipe: restore the device to the original factory settings. Notify User user of the out-ofcompliance, Notify Admins administrator(s) of the, A custom message to be sent to the recipients. A custom message, up to 1024 characters. <^`~$* []{}> cannot be used. Monitoring Rules Use the Monitoring Rules to monitor SIM changes, when a user s device is roaming, and any operating system version changes. 23

24 SIM Changes You can send messages to the user and to the administrators if a SIM card is changed. SIM Changes Notify User Take specified actions if a device s SIM card is changed. user of the out-ofcompliance Cleared Selected, cleared Select the checkbox to expand the list of options., Notify Admins administrator(s) of the, A custom message to be sent to the recipients. A custom message, up to 1024 characters. <^`~$* []{}> cannot be used. Roaming Changes You can notify users and administrators if the user starts to roam. 24

25 Roaming Changes Notify User Notify Admins Send notifications if the user is roaming. user of the out-ofcompliance administrator(s) of the A custom message to be sent to the recipients. Cleared Selected, cleared Select the checkbox to expand the list of options.,, A custom message, up to 1024 characters. <^`~$* []{}> cannot be used. OS Version Changes You can send a message to an administrator and user if the device s operating system version changes. Roaming Changes Notify User Notify Admins Send notifications if the device s operating system version has changed. user of the out-ofcompliance administrator(s) of the A custom message to be sent to the recipients. Cleared Selected, cleared Select the checkbox to expand the list of options.,, A custom message, up to 1024 characters. <^`~$* []{}> cannot be used. 25

26 Expense Management Expense Monitoring Rules apply to mobile data usage. You can monitor both roaming and in-network data usage, and take action based on the usage thresholds. Roaming Mobile Data Usage You can send administrators or users up to three messages warning them that a device is reaching its roaming limit. Roaming Mobile Data Usage First Warning Level (%) Specify if you want MaaS360 to track mobile data usage and provide alerts. Specify the threshold at which the first warning will be sent. Cleared Selected, cleared Selecting the checkbox causes the other fields to appear. Select a value 50%, 60%, 70% This value will be incorporated in the message for the variable %limit%. 26

27 Actions Second Warning Level (%) Actions Third Warning Level (%) Actions Specify if you want to send a message to the administrator, the user or both. The message that will be sent when the threshold is met. You can use the provided message or create a custom one. Specify the threshold at which the second warning will be sent. Specify if you want to send a message to the administrator, the user or both. The message that will be sent when the threshold is met. You can use the provided message or create a custom one. Specify the threshold at which the third warning will be sent. Specify if you want to send a message to the administrator, the user or both. The message that will be sent when the threshold is met. You can use the provided message or create a custom one. First Warning Level: You have used %limit% of your monthly roaming mobile data usage limit. Alert User, Alert Administrator Default message, a custom message up to 140 characters. Select a value 70%, 80%, 90% This value will be incorporated in the message for the variable %limit%. Second Warning Level: You have used %limit% of your monthly roaming mobile data usage limit. Alert User, Alert Administrator Default message, a custom message up to 140 characters. Select a value 90%, 100%, 110%, 120%, 150%, 200% Third Warning Level: You have used %limit% of your monthly roaming mobile data usage limit. Alert User, Alert Administrator Default message, a custom message up to 140 characters. This value will be incorporated in the message for the variable %limit%. 27

28 In-Network Roaming Data Usage You can send administrators or users up to three messages warning them that a device is reaching its in-network data usage limit. In-Network Data Usage First Warning Level (%) Actions Second Warning Level (%) Actions Specify if you want MaaS360 to track innetwork data usage and provide alerts. Specify the threshold at which the first warning will be sent. Specify if you want to send a message to the administrator, the user or both. The message that will be sent when the threshold is met. You can use the provided message or create a custom one. Specify the threshold at which the second warning will be sent. Specify if you want to send a message to the administrator, the user or both. Cleared Selected, cleared Selecting the checkbox causes the other fields to appear. Select a value 50%, 60%, 70% The value will be incorporated in the message for the variable %limit%. First Warning Level: You have used %limit% of your monthly innetwork mobile data usage limit. Alert User, Alert Administrator Default message, a custom message up to 140 characters. Select a value 70%, 80%, 90% The value will be incorporated in the message for the variable %limit%. Alert User, Alert Administrator 28

29 The message that will be sent when the threshold is met. You can use the provided message or create a custom one. Second Warning Level: You have used %limit% of your monthly innetwork mobile data usage limit. Default message, a custom message up to 140 characters. Third Warning Level (%) Specify the threshold at which the third warning will be sent. Select a value 90%, 100%, 110%, 120%, 150%, 200% The value will be incorporated in the message for the variable %limit%. Actions Specify if you want to send a message to the administrator, the user or both. Alert User, Alert Administrator The message that will be sent when the threshold is met. You can use the provided message or create a custom one. Third Warning Level: You have used %limit% of your monthly roaming mobile data usage limit. Default message, a custom message up to 140 characters. Group Based Rules Note: This feature must be turned on by Customer Engineering. You can also create advanced rules for groups that will perform actions at certain intervals. Click the Add a New Rule button. 29

30 Enter the rule details. to create another rule. Enter Rule Name Create a name for the rule. Name of the rule Group Name Select the group from the pull-down list. No Group Selected Any existing user or device group. Enforcement Action (Immediate) Define the action to be taken immediately after the specified period. Alert Alert, Block, Selective Wipe, Change Policy, Wipe, Remove Control, Hide Device Alert: send a message about the OOC event Block: the device cannot access corporate resources Selective Wipe: corporate settings, apps and content distributed by MaaS360 will be deleted Change Policy: assign a different policy to the device Wipe: reset the device to factory settings Remove Control: the MaaS360 app will be deleted from the device; it cannot access corporate access Hide Device: mark the device as inactive in MaaS360 reporting, but do not remove MaaS360 s control 30

31 (Enforcement Action: Later) Specify action to be taken a certain number of hours or days later. Send an alert one hour later. Hours, Days Alert, Block, Wipe to add one or more actions that will occur after the user has had time to remediate the noncompliance. Alert: send a message about the OOC event Block: the device cannot access corporate resources Wipe: restore the device to the original factory settings. Notify User user of the out-ofcompliance , Device Notification , Device Notification The standard address list for the rule is defined on the Basic Settings tab. Notify Admins administrator(s) of the, A custom message to be sent to the recipients. A custom message, up to 1024 characters. <^`~$* []{}> cannot be used. Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license agreement or nondisclosure agreement. The software may be used or copied only in accordance with the terms of those agreements. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or any means electronic or mechanical, including photocopying and recording for any purpose other than the purchaser s personal use without the written permission of Fiberlink Communications Corporation. All brands and their products are trademarks or registered trademarks of their respective holders and should be noted as such. Fiberlink Communications Corporation 1787 Sentry Parkway West Blue Bell, PA November

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

MaaS360 Mobile Device Management (MDM) Administrators Guide

MaaS360 Mobile Device Management (MDM) Administrators Guide MaaS360 Mobile Device Management (MDM) Administrators Guide Copyright 2014 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

MaaS360 Quick Start Guide

MaaS360 Quick Start Guide MaaS360 Quick Start Guide MaaS360 provides you with an easy-to-use interface for managing personally and corporately owned mobile devices. There are a few steps you must follow as part of set up and device

More information

IBM MobileFirst Protect (MaaS360) Mobile Enterprise Gateway Migration Guide

IBM MobileFirst Protect (MaaS360) Mobile Enterprise Gateway Migration Guide IBM MobileFirst Protect (MaaS360) Mobile Enterprise Gateway Migration Guide Version 2.3.0 Copyright 2015 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change

More information

Using the Apple Configurator and MaaS3360

Using the Apple Configurator and MaaS3360 Using the Apple Configurator and MaaS3360 Overview Apple Configurator Utility (ACU) is a free Apple tool that enables a Mac to configure up to 30 ios devices simultaneously via a USB. There are two modes

More information

USER GUIDE: MaaS360 Services

USER GUIDE: MaaS360 Services USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document

More information

Enroll a Windows Phone 8 Device

Enroll a Windows Phone 8 Device Enroll a Windows Phone 8 Device Download Process Enrolling your Windows 8 device is a quick and easy process that takes around 2 minutes to complete. Your IT administrator will send you a MaaS360 enrollment

More information

Using the MaaS360 Corporate App Catalog for ios

Using the MaaS360 Corporate App Catalog for ios Using the MaaS360 Corporate App Catalog for ios Overview MaaS360 simplifies enterprise mobile application management by providing an easy-to-use enterprise app catalog, which allows management of apps

More information

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...

More information

MaaS360 Secure Productivity Suite (SPS): Secure Container User Guide

MaaS360 Secure Productivity Suite (SPS): Secure Container User Guide MaaS360 Secure Productivity Suite (SPS): Secure Container User Guide Overview MaaS360 keeps your corporate apps, documents, emails, and contacts, etc., separate from your personal content. Corporate content

More information

MaaS360 Secure Productivity Suite (SPS): Secure Mail User Guide

MaaS360 Secure Productivity Suite (SPS): Secure Mail User Guide MaaS360 Secure Productivity Suite (SPS): Secure Mail User Guide MaaS360 Secure Mail protects the content of your corporate email, your contacts and your calendar. Depending on your organization s security

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Cloud Extender Installation Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Sophos Mobile Control Administrator guide. Product version: 3

Sophos Mobile Control Administrator guide. Product version: 3 Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing

More information

Kaseya 2. User Guide. Version 1.0

Kaseya 2. User Guide. Version 1.0 Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

MaaS360 On-Premises Cloud Extender

MaaS360 On-Premises Cloud Extender MaaS360 On-Premises Cloud Extender Installation Guide Copyright 2014 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

Sophos Mobile Control Startup guide. Product version: 3

Sophos Mobile Control Startup guide. Product version: 3 Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos

More information

Mobile Device Management (MDM) Policies

Mobile Device Management (MDM) Policies Mobile Device Management (MDM) Policies Best Practices Guide Copyright 2012 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice.

More information

Sophos Mobile Control Startup guide. Product version: 3.5

Sophos Mobile Control Startup guide. Product version: 3.5 Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

USER GUIDE: MaaS360 Financial IT Reg Enforcement Service

USER GUIDE: MaaS360 Financial IT Reg Enforcement Service USER GUIDE: MaaS360 Financial IT Reg Enforcement Service 3.2011 Copyright 2011 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

Product Manual. Mobile Device Managment Version 8.1. Last Updated: 06/07/15

Product Manual. Mobile Device Managment Version 8.1. Last Updated: 06/07/15 Product Manual Mobile Device Managment Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com

More information

Learn More MaaS360 Cloud Extender Checklist (MDM for Blackberry)

Learn More MaaS360 Cloud Extender Checklist (MDM for Blackberry) Learn More MaaS360 Cloud Extender Checklist (MDM for Blackberry) June 2011 Copyright 2011 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without

More information

Mobile Device Management Version 8. Last updated: 16-09-14

Mobile Device Management Version 8. Last updated: 16-09-14 Mobile Device Management Version 8 Last updated: 16-09-14 Copyright 2013, 2X Ltd. http://www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Sophos Mobile Control user help. Product version: 6.1

Sophos Mobile Control user help. Product version: 6.1 Sophos Mobile Control user help Product version: 6.1 Document date: May 2016 Contents 1 About this help...4 2 About Sophos Mobile Control...5 3 Login to the Self Service Portal...6 3.1 First login...6

More information

Sophos Mobile Control Administrator guide. Product version: 3.6

Sophos Mobile Control Administrator guide. Product version: 3.6 Sophos Mobile Control Administrator guide Product version: 3.6 Document date: November 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE

COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE Mobile Device Management, User Guide Copyright 2013, CommuniTake Technologies Ltd., Yokneam, Israel. All rights reserved. For a hard-copy

More information

Getting Started - MDM Setup

Getting Started - MDM Setup Mobile App Getting Started - MDM Setup Thank you for acquiring the Talon Mobile app. The Talon Mobile app allows you to request sensitive justice information. To use the Talon Mobile app, your agency s

More information

Managing policies. Chapter 7

Managing policies. Chapter 7 Chapter 7 Managing policies You use the Policies tab in Admin Portal to create policy sets for roles. A policy set lets you configure the following categories of policies: Mobile Device Policies Use to

More information

Mobile Device Management (MDM) Policies. Best Practices Guide. www.maas360.com

Mobile Device Management (MDM) Policies. Best Practices Guide. www.maas360.com Mobile Device Management (MDM) Policies Best Practices Guide www.maas360.com Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

Cloud Services MDM. Email Management Admin Guide

Cloud Services MDM. Email Management Admin Guide Cloud Services MDM Email Management Admin Guide 10/27/2014 CONTENTS Email Management... 2 Email Compliance Policies... 3 Email Policies... 4 Attachment Security Policies... 8 Attachment Security Policies

More information

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management

More information

SysAid MDM User Guide for ios

SysAid MDM User Guide for ios SysAid MDM User Guide for ios Table of Contents Introduction Enrolling Your ios Mobile Device in SysAid MDM Unenrolling Your ios Mobile Device from SysAid MDM Have Any Questions? Introduction SysAid Mobile

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Mobile Device Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Quick Start Guide. Version R9. English

Quick Start Guide. Version R9. English Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Sophos Mobile Control User guide for Apple ios. Product version: 4

Sophos Mobile Control User guide for Apple ios. Product version: 4 Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set

More information

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Learn More Cloud Extender Requirements Cheat Sheet

Learn More Cloud Extender Requirements Cheat Sheet Learn More Cloud Extender Requirements Cheat Sheet Overview This document defines all requirements to ensure a successful installation of the MaaS360 Cloud Extender to enable use of ActiveSync Manager

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere

More information

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Sophos Mobile Control as a Service Startup guide. Product version: 3.5

Sophos Mobile Control as a Service Startup guide. Product version: 3.5 Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator

More information

Bell Mobile Device Management (MDM)

Bell Mobile Device Management (MDM) Bell MDM Technical FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool

More information

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

Introduction to Google Apps for Business Integration

Introduction to Google Apps for Business Integration Introduction to Google Apps for Business Integration Overview Providing employees with mobile email access can introduce a number of security concerns not addressed by most standard email security infrastructures.

More information

Managing Mobility. 10 top tips for Enterprise Mobility Management

Managing Mobility. 10 top tips for Enterprise Mobility Management Managing Mobility 10 top tips for Enterprise Mobility Management About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation leave behind

More information

Cloud Services MDM. Telecom Management Admin Guide

Cloud Services MDM. Telecom Management Admin Guide Cloud Services MDM Telecom Management Admin Guide 10/24/2014 CONTENTS Telecom Management... 2 Enabling Telecom Setting... 2 Creating and Managing Telecom Plans... 3 Dynamic Assignment... 4 Dashboard Usage...

More information

Zenprise Device Manager 6.1.5

Zenprise Device Manager 6.1.5 Zenprise Device Manager 6.1.5 CLIENT GUIDE Rev 6.1.50 Introduction 2 ZENPRISE DEVICE MANAGER 6.1 CLIENT GUIDE 2011 Zenprise, Inc. All rights reserved. This manual, as well as the software described in

More information

IBM MaaS360 Mobile Document Editor User Guide

IBM MaaS360 Mobile Document Editor User Guide IBM MaaS360 Mobile Document Editor User Guide Introduction MaaS360 Mobile Document Editor allows you to edit files directly in IBM MaaS360 Secure Mobile Mail or in your IBM MaaS360 Docs Repository. MaaS360

More information

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources. G DATA Software 1. Introduction G DATA INTERNET SECURITY FOR ANDROID offers comprehensive protection against malware, intrusive apps and phishing attacks. Locate lost devices or wipe their content remotely

More information

Mobile Device Management Solution Hexnode MDM

Mobile Device Management Solution Hexnode MDM Mobile Device Management Solution Hexnode MDM Frequently Asked Questions www.hexnode.com Frequently Asked Questions How is Hexnode MDM license calculated?...4 Which ports do I need to open for Hexnode

More information

Administration Guide BES12. Version 12.3

Administration Guide BES12. Version 12.3 Administration Guide BES12 Version 12.3 Published: 2015-10-30 SWD-20151028105551254 Contents Introduction... 11 About this guide...12 How to use this guide... 13 Steps to administer BES12... 13 Examples

More information

Feature List for Kaspersky Security for Mobile

Feature List for Kaspersky Security for Mobile Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance

More information

Release 2.0. Cox Business Online Backup Quick Start Guide

Release 2.0. Cox Business Online Backup Quick Start Guide Cox Business Online Backup Quick Start Guide Release 2.0 Cox Business Online Backup Quick Start Guide i IMPORTANT: You must notify Cox in advance if you would like to move or relocate your telephone Service.

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

Sophos Mobile Control User guide for Windows Phone 8. Product version: 3.5

Sophos Mobile Control User guide for Windows Phone 8. Product version: 3.5 Sophos Mobile Control User guide for Windows Phone 8 Product version: 3.5 Document date: July 2013 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Bell Mobile Device Management (MDM)

Bell Mobile Device Management (MDM) Bell MDM Business FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool to

More information

DocuSign for Salesforce Administrator Guide v6.1.1 Rev A Published: July 16, 2015

DocuSign for Salesforce Administrator Guide v6.1.1 Rev A Published: July 16, 2015 DocuSign for Salesforce Administrator Guide v6.1.1 Rev A Published: July 16, 2015 Copyright Copyright 2003-2015 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights

More information

Sophos Mobile Control User guide for Apple ios

Sophos Mobile Control User guide for Apple ios Sophos Mobile Control User guide for Apple ios Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control

More information

Introduction to the AirWatch Browser Guide

Introduction to the AirWatch Browser Guide Introduction to the AirWatch Browser Guide The AirWatch Browser application provides a safe, accessible and manageable alternative to Internet browsing using native device browsers. The AirWatch Browser

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

System Configuration and Deployment Guide

System Configuration and Deployment Guide System Configuration and Deployment Guide This guide provides information on...... Configuring an Organization using the Organization Wizard... Setting a default Policy Suite using the Organization Wizard...

More information

Apple Push Notification Service (APNS) Creation Guide

Apple Push Notification Service (APNS) Creation Guide Apple Push Notification Service (APNS) TERMS AppleID The account used to log in to Apple Certificates Portal, purchase VPP codes, etc. Fiberlink recommends using an AppleID associated with a publically-facing

More information

Mobile Device Manager. Windows User Guide (Windows Phone 8/RT)

Mobile Device Manager. Windows User Guide (Windows Phone 8/RT) Mobile Device Manager Windows User Guide (Windows Phone 8/RT) Document Revision Date: Oct. 22, 2014 Mobile Device Manager Windows Phone 8 User Guide i Contents Windows Phone 8 Features Matrix... 1 Overview...

More information

Mobile Connect for USA Mobility Pagers for iphone

Mobile Connect for USA Mobility Pagers for iphone User Guide for Mobile Connect for USA Mobility Pagers for iphone Amcom Software, Inc. Copyright Mobile Connect 3.5 Document Version 1.0 Last Saved Date: September 19, 2013 Copyright 2003-2013 Amcom Software,

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

SysAid MDM User Guide for Android

SysAid MDM User Guide for Android SysAid MDM User Guide for Android Table of Contents Introduction Enrolling Your Android Mobile Device in SysAid MDM Unenrolling Your Android Mobile Device from SysAid MDM Have Any Questions? Introduction

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15 Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com

More information

CTERA Agent for Linux

CTERA Agent for Linux User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5

1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5 User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation

More information

Telstra Mobile Device Management (T MDM) Getting Started Guide

Telstra Mobile Device Management (T MDM) Getting Started Guide Telstra Mobile Device Management (T MDM) Getting Started Guide Welcome Thank you for your interest in T MDM and Welcome! In this guide we will take you through the steps to enrolling your first device

More information

SAM Server Utility User s Guide

SAM Server Utility User s Guide SAM Server Utility User s Guide Updated May 2012 Copyright 2010, 2012 by Scholastic Inc. All rights reserved. Published by Scholastic Inc. PDF0157 (PDF) SCHOLASTIC, READ 180, SYSTEM 44, SCHOLASTIC EXPERT

More information

Automated Actions. Table of Contents

Automated Actions. Table of Contents Automated Actions With Automated Actions, you can configure ZDM to execute actions based on user or device properties, events, or the existence of applications on devices. For example, you can configure

More information

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Management Website User Guide SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Copyright Management Website User Guide July, 2013 2012-2013 Webroot Software, Inc.

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

User Self-Service Configuration Overview

User Self-Service Configuration Overview User Self-Service Configuration Overview Version 8.2 Mobile Service Manager Legal Notice This document, as well as all accompanying documents for this product, is published by Good Technology Corporation

More information

Cloud Services MDM. Application Management Admin Guide

Cloud Services MDM. Application Management Admin Guide Cloud Services MDM Application Management Admin Guide 10/24/2014 CONTENTS Application Management... 2 Using the Applications Page... 2 Enabling the Book Catalog... 9 Application Wrapping Android Apps...

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 3.0.x February 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use

More information

SafeNet MobilePASS Version 8.2.0, Revision B

SafeNet MobilePASS Version 8.2.0, Revision B SafeNet MobilePASS Version 8.2.0, Revision B User Guide Software Version 8.2.0 Documentation Version: 20101118 2012 SafeNet, Inc. All rights reserved Preface All intellectual property is protected by copyright.

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Version 4.11.x GO!Enterprise MDM for BlackBerry 1 Table of Contents GO!Enterprise MDM for

More information

11 Best Practices for Mobile Device Management (MDM)

11 Best Practices for Mobile Device Management (MDM) MaaS360.com > White Paper 11 Best Practices for Mobile Device Management (MDM) 11 Best Practices for Mobile Device Management (MDM) www.maas360.com Copyright 2014 Fiberlink Communications Corporation.

More information

ESET Mobile Security Windows Mobile

ESET Mobile Security Windows Mobile ESET Mobile Security Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3

More information

LinkPoint Connect for Microsoft CRM Synchronization Tutorial Lotus Notes Edition

LinkPoint Connect for Microsoft CRM Synchronization Tutorial Lotus Notes Edition LinkPoint Connect for Microsoft CRM Synchronization Tutorial Lotus Notes Edition Lotus Notes Synchronization Capabilities Synchronize Calendars, Contacts and Tasks Synchronization can run either manually

More information

Android App Release Notes

Android App Release Notes www.novell.com/documentation Android App Release Notes ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use

More information

Introduction to the Windows Phone 8 Guide

Introduction to the Windows Phone 8 Guide Introduction to the Windows Phone 8 Guide Overview Windows Phone 8 is Microsoft's operating system designed for smartphones and shares the Modern UI with other Windows 8 devices. Windows Phone 8 offers

More information

8.6. NET SatisFAXtion Email Gateway Installation Guide. For NET SatisFAXtion 8.6. Contents

8.6. NET SatisFAXtion Email Gateway Installation Guide. For NET SatisFAXtion 8.6. Contents NET SatisFAXtion Email Gateway Installation Guide For NET SatisFAXtion 8.6 Contents 1.0 - Install Microsoft Virtual SMTP Server 2 XP and 2003 2 2008 and 2008 R2 2 Windows 7 2 Upgrade Path 2 Configure Microsoft

More information

Sophos Mobile Control User guide for Android, Apple ios, Windows Phone. Product version: 5

Sophos Mobile Control User guide for Android, Apple ios, Windows Phone. Product version: 5 Sophos Mobile Control User guide for Android, Apple ios, Windows Phone Product version: 5 Document date: April 2015 Contents 1 About Sophos Mobile Control...4 2 About this guide...5 3 Login to the Self

More information

DataWipe Mobile Erasure User Guide

DataWipe Mobile Erasure User Guide 1 DataWipe Mobile Erasure User Guide Version 1.0 2 CONTENTS COPYRIGHT... 3 CHAPTER 1 - PC INTERFACE... 4 TOOLBAR... 4 DEVICE HELP PANEL... 5 CONNECTED... 5 DISCONNECTED... 5 COMPLETED... 5 CHAPTER 2 -

More information

Sophos Mobile Control Super administrator guide. Product version: 3

Sophos Mobile Control Super administrator guide. Product version: 3 Sophos Mobile Control Super administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...3 2 Super administrator accounts...4 3 The super administrator customer...5

More information