Manage Your Mac with Active Directory Group Policies

Size: px
Start display at page:

Download "Manage Your Mac with Active Directory Group Policies"

Transcription

1 Manage Your Mac with Active Directory Group Policies How to secure Mac OS X systems with your Active Directory infrastructure

2 Manage your Mac with Active Directory Group Policies Contents Overview 3 Active Directory Policy List 4 Conclusion 16 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, addresses, logos, people, places and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Centrify Corporation. Centrify may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Centrify, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. Centrify, DirectControl and DirectAudit are registered trademarks and Centrify Suite, DirectAuthorize, DirectSecure and DirectManage are trademarks of Centrify Corporation in the United States and/or other countries. Microsoft, Active Directory, Windows, Windows NT, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. RightScale is a registered trademark of RightScale, Inc.; ServerTemplates and RightScripts are trademarks of RightScale, Inc. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Front cover photo: Stefano Tinti / Shutterstock.com CENTRIFY CORPORATION ALL RIGHTS RESERVED

3 Overview With Centrify Identity Service Mac Edition ( Centrify for Mac ), you can use Active Directory to centrally manage authentication, policy enforcement, single sign-on (SSO) and user self-service for popular endpoint devices running Mac OS X, ios and Android. By leveraging your existing identity infrastructure, processes and trained IT staff, you can reduce costs and improve operational efficiency. The following Group Policies are a representative list of what is available to manage Mac OS X systems as of the Centrify for Mac product release that came out in February Active Directory-based Group Policy enforcement of centrally defined security policies enables IT to meet compliance requirements. Policies are enforced using a combination of approaches to update plist files and standard config files, to enforce MCX settings and even to create profiles for local enforcement. Additionally, the Centrify Identity Service can enforce several security policies and configure access to company resources through delivery of profiles to remote Mac OS X and mobile devices, empowering IT to embrace bring-your-own-device initiatives. Centrify provides a complete set of policy and configuration settings to enable Windows-centric admin staff to manage all aspects of the Mac as well as mobile devices leveraging the processes and skills of a familiar infrastructure, Group Policy CENTRIFY CORPORATION ALL RIGHTS RESERVED

4 Manage your Mac with Active Directory Group Policies Active Directory Policy List Mac On-Prem Policies Centrify Computer Policies 802.1x Settings Enable Machine Ethernet Profile Enable Machine Wi-Fi Profile Enable User Ethernet Profile Enable User Wi-Fi Profile Specify Login Window Profiles Specify System Profile Mac On-Prem Policies Centrify Computer Policies Accounts Map zone groups to local admin group Map zone groups to local group Set login window settings Mac On-Prem Policies Centrify Computer Policies App Store Settings Prohibit access to App Store Mac On-Prem Policies Centrify Computer Policies Custom Settings Enable profile custom settings Install MobileConfig Profiles Mac On-Prem Policies Centrify Computer Policies Energy Saver On AC Power Allow power button to sleep the computer Enable Power Nap while plugged into a power adapter Put the hard disk(s) to sleep when possible Restart automatically after a power failure Set computer sleep time Set display sleep time Wake for Ethernet network administrator access Wake when the modem detects a ring Mac On-Prem Policies Centrify Computer Policies Energy Saver On Battery Allow power button to sleep the computer Enable Power Nap while on battery power Put the hard disk(s) to sleep when possible Restart automatically after a power failure Set computer sleep time Set display sleep time Slightly dim the display while on battery power Wake for Ethernet network administrator access Wake when the modem detects a ring CENTRIFY CORPORATION ALL RIGHTS RESERVED

5 Mac On-Prem Policies Centrify Computer Policies Energy Saver Scheduled Events Set machine sleep/shutdown time Set machine startup time Mac On-Prem Policies Centrify Computer Policies Firewall Block UDP traffic Enable firewall Enable firewall logging Enable ichat Enable iphoto sharing Enable itunes music sharing Enable network time Enable stealth mode Mac On-Prem Policies Centrify Computer Policies Internet Sharing Disallow all Internet sharing Mac On-Prem Policies Centrify Computer Policies Network Adjust multicast DNS timeout for.local domain Mac On-Prem Policies Centrify Computer Policies Network Legacy Location Settings Adjust list of DNS servers Adjust list of searched domains Mac On-Prem Policies Centrify Computer Policies Network Legacy Location Settings Configure Proxies Bypass proxy settings for these hosts & domains Exclude simple hostnames Use passive FTP mode (PASV) Mac On-Prem Policies Centrify Computer Policies Network Legacy Location Settings Configure Proxies Enable Proxies Configure proxies using a PAC file Enable auto proxy discovery Enable FTP proxy Enable Gopher proxy Enable secure Web proxy (HTTPS) Enable SOCKS proxy Enable streaming proxy (RTSP) Enable Web proxy (HTTP) CENTRIFY CORPORATION ALL RIGHTS RESERVED

6 Manage your Mac with Active Directory Group Policies Mac On-Prem Policies Centrify Computer Policies Network Location 1 Adjust list of DNS servers Adjust list of searched domains Enable network location Mac On-Prem Policies Centrify Computer Policies Network Location 1 Configure Proxies Bypass proxy settings for these hosts & domains Exclude simple hostnames Use passive FTP mode (PASV) Mac On-Prem Policies Centrify Computer Policies Network Location 1 Configure Proxies Enable Proxies Configure proxies using a PAC file Enable auto proxy discovery Enable FTP proxy Enable Gopher proxy Enable secure Web proxy (HTTPS) Enable SOCKS proxy Enable streaming proxy (RTSP) Enable Web proxy (HTTP) Mac On-Prem Policies Centrify Computer Policies Network Location 2 Adjust list of DNS servers Adjust list of searched domains Enable network location Mac On-Prem Policies Centrify Computer Policies Network Location 2 Configure Proxies Bypass proxy settings for these hosts & domains Exclude simple hostnames Use passive FTP mode (PASV) Mac On-Prem Policies Centrify Computer Policies Network Location 2 Configure Proxies Enable Proxies Configure proxies using a PAC file Enable auto proxy discovery Enable FTP proxy Enable Gopher proxy Enable secure Web proxy (HTTPS) Enable SOCKS proxy Enable streaming proxy (RTSP) Enable Web proxy (HTTP) CENTRIFY CORPORATION ALL RIGHTS RESERVED

7 Mac On-Prem Policies Centrify Computer Policies Remote Management Enable administrator access group Mac On-Prem Policies Centrify Computer Policies Scripts (Login / Logout) Specify multiple login scripts Mac On-Prem Policies Centrify Computer Policies Security and Privacy Certificate validation method Disable automatic login Disable Location Services Enable Gatekeeper Enable smart card support Log out after number of minutes of inactivity Require password to unlock each secure system preference Require smart card login Use secure virtual memory Mac On-Prem Policies Centrify Computer Policies Security and Privacy FileVault 2 Disable automatic login Enable FileVault 2 Mac On-Prem Policies Centrify Computer Policies Security and Privacy Public Key Policies Do not allow private key to be extractable Store private and public key in Keychain only Mac On-Prem Policies Centrify Computer Policies Services Enable Apple Remote Desktop Enable FTP access Enable personal file sharing Enable personal Web sharing Enable printer sharing Enable remote Apple events Enable remote login Enable Windows sharing Enable Xgrid Mac On-Prem Policies Centrify Computer Policies Software Update Settings Automatically check for software updates Mac On-Prem Policies Centrify Computer Policies Software Update Settings SW update Server Settings Use version specific settings CENTRIFY CORPORATION ALL RIGHTS RESERVED

8 Manage your Mac with Active Directory Group Policies Mac OS X 10.5 Settings Specify software update server Mac OS X 10.6 Settings Specify software update server Mac OS X 10.7 Settings Specify software update server Mac OS X 10.8 Settings Specify software update server Mac OS X 10.9 Settings Specify software update server Mac OS X Settings Specify software update server Centrify Mac On-Prem Policies Centrify User Policies 802.1x Settings Specify User Profiles Centrify Mac On-Prem Policies Centrify User Policies Application Access Settings Permit/prohibit access to application list: AppleScript Permit/prohibit access to application list: Applications Permit/prohibit access to application list: Server Permit/prohibit access to application list: Utilities Permit/prohibit access to applications Permit/prohibit access to the user-specific applications Centrify Mac On-Prem Policies Centrify User Policies Automount Settings Automount network shares Automount user s Windows home Create alias instead of symbolic link (for agent and below) Centrify Mac On-Prem Policies Centrify User Policies Desktop Settings Set computer idle time for starting screen saver Centrify Mac On-Prem Policies Centrify User Policies Dock Settings Add other folders to Dock Adjust the Dock s icon size Adjust the Dock s magnified icon size Adjust the Dock s position on the screen Adjust the effect shown when minimizing the Dock Animate opening applications Automatically hide and show the Dock Lock the Dock Merge with user s Dock Place Applications in Dock Place Documents and Folders in Dock CENTRIFY CORPORATION ALL RIGHTS RESERVED WP-US EN

9 Centrify Mac On-Prem Policies Centrify User Policies Finder Settings Configure Finder commands Configure Finder preferences Configure Finder views Centrify Mac On-Prem Policies Centrify User Policies Folder Redirection Actions at Login time Delete path Delete symbolic link, and restore Delete, and create symbolic link Rename, and create symbolic link Centrify Mac On-Prem Policies Centrify User Policies Folder Redirection Actions at Logout time Delete path Delete symbolic link, and restore Delete, and create symbolic link Rename, and create symbolic link Centrify Mac On-Prem Policies Centrify User Policies Import Settings Import MCX setting plist files Import plist files Centrify Mac On-Prem Policies Centrify User Policies Login Settings Enable Login times Centrify Mac On-Prem Policies Centrify User Policies Media Access Settings Eject all removable media at logout Permit/prohibit access: CDs & CD-ROMs Permit/prohibit access: DVDs Permit/prohibit access: External Disks Permit/prohibit access: Internal Disks Permit/prohibit access: Recordable Discs Centrify Mac On-Prem Policies Centrify User Policies Custom Settings Install MobileConfig Profiles Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Use version specific settings Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Legacy Settings Enable/disable synchronization CENTRIFY CORPORATION ALL RIGHTS RESERVED

10 Manage your Mac with Active Directory Group Policies Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Legacy Settings Synchronization Rules: Background Sync Adjust list of items synchronized in the background Enable/disable background synchronization rules Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Legacy Settings Synchronization Rules: Background Sync Skip these items Skip items that end with Skip items that start with Skip items whose full path is Skip items whose name contains Skip items whose name is Skip items whose partial path matches Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Legacy Settings Synchronization Rules: Login & Logout Sync Adjust list of items synchronized at login and logout Enable/disable login & logout synchronization rules Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Legacy Settings Synchronization Rules: Login & Logout Sync Skip these items Skip items that end with Skip items that start with Skip items whose full path is Skip items whose name contains Skip items whose name is Skip items whose partial path matches Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Legacy Settings Synchronization Rules: Options Manually/automatically synchronize background folders Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.5 /6 /7 /8 or above Settings Configure mobile account creation Configure mobile account options Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.5 /6 /7 /8 or above Settings Account Expiry Delete mobile accounts automatically CENTRIFY CORPORATION ALL RIGHTS RESERVED

11 Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.5 Settings Synchronization Rules Background Sync Enable background sync rules Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.5 Settings Synchronization Rules Background Sync Skip items Skip items that end with Skip items that start with Skip items whose full path matches Skip items whose name contains Skip items whose name is Skip items whose partial path matches Skip items whose RegEx name is Skip items whose RegEx path is Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.5 Settings Synchronization Rules Background Sync Synchronize items Sync in the background Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.5 Settings Synchronization Rules Login & Logout Sync Enable login & logout sync rules Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.5 Settings Synchronization Rules Login & Logout Sync Skip items Skip items that end with Skip items that start with Skip items whose full path matches Skip items whose name contains Skip items whose name is Skip items whose partial path matches Skip items whose RegEx name is Skip items whose RegEx path is Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.5 Settings Synchronization Rules Login & Logout Sync Synchronize items Sync at login and logout CENTRIFY CORPORATION ALL RIGHTS RESERVED

12 Manage your Mac with Active Directory Group Policies Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.5 Settings Synchronization Rules Options Manually/automatically sync in the background Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.6 /7 /8 or above Settings Synchronization Rules Home Sync Enable home sync rules Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.6 /7 /8 or above Settings Synchronization Rules Home Sync Skip Items Skip items that end with Skip items that start with Skip items whose full path matches Skip items whose name contains Skip items whose name is Skip items whose partial path matches Skip items whose RegEx name is Skip items whose RegEx path is Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.6 /7 /8 or above Settings Synchronization Rules Home Sync Synchronize items Synchronize home sync items Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.6 /7 /8 or above Settings Synchronization Rules Options Manually/automatically sync in the background Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.6 /7 /8 or above Settings Synchronization Rules Preference Sync Enable preference sync rules Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.6 /7 /8 or above Settings Synchronization Rules Preference Sync Skip Items Skip items that end with Skip items that start with Skip items whose full path matches Skip items whose name contains Skip items whose name is Skip items whose partial path matches Skip items whose RegEx name is Skip items whose RegEx path is CENTRIFY CORPORATION ALL RIGHTS RESERVED

13 Centrify Mac On-Prem Policies Centrify User Policies Mobility Settings Mac OS X 10.6 /7 /8 /9 Settings Synchronization Rules Preference Sync Synchronize Items Synchronize preference sync items Centrify Mac On-Prem Policies Centrify User Policies Printing Settings Specify printer list Specify printer list (with Model) Centrify Mac On-Prem Policies Centrify User Policies Scripts (Login/Logout) Specify login script Specify logout script Specify multiple login scripts Centrify Mac On-Prem Policies Centrify User Policies Security & Privacy Allow DoD Encryption Wizard to use smart card Allow NSSDB based applications to use smart card Disable Dictation Lock Smart Card screen NSSDB based applications allowed to use smart card Prohibit authentication with expired password Require password to wake this computer from sleep or screen saver Centrify Mac On-Prem Policies Centrify User Policies Security & Privacy Public Key Policies Do not allow private key to be extractable Centrify Mac On-Prem Policies Centrify User Policies System Preferences Settings Use version specific settings Centrify Mac On-Prem Policies Centrify User Policies System Preferences Settings Legacy Settings Limit items shown in System Preferences Centrify Mac On-Prem Policies Centrify User Policies System Preferences Settings Legacy Settings Enable System Preferences Pane: Hardware Enable Bluetooth Enable CDs & DVDs Enable Displays Enable Energy Saver Enable Ink Enable Keyboard & Mouse (Keyboard) Enable Mouse Enable Print & FAX Enable Sound Enable Trackpad CENTRIFY CORPORATION ALL RIGHTS RESERVED

14 Manage your Mac with Active Directory Group Policies Centrify Mac On-Prem Policies Centrify User Policies System Preferences Settings Legacy Settings Enable System Preferences Pane: Internet & Network Enable Fibre Channel Enable MobileMe Enable Network Enable QuickTime Enable Sharing Centrify Mac On-Prem Policies Centrify User Policies System Preferences Settings Legacy Settings Enable System Preferences Pane: Other Preferences Panes Enable other preferences panes Centrify Mac On-Prem Policies Centrify User Policies System Preferences Settings Legacy Settings Enable System Preferences Pane: Personal Enable Appearance Enable Dashboard & Exposé Enable Desktop & Screen Saver Enable Dock Enable International (Language & Text) Enable Security Enable Spotlight Centrify Mac On-Prem Policies Centrify User Policies System Preferences Settings Legacy Settings Enable System Preferences Pane: System Enable Accounts Enable Classic Enable Date & Time Enable Parental Controls Enable Software Update Enable Speech Enable Startup Disk Enable Time Machine Enable Universal Access Centrify Mac On-Prem Policies Centrify User Policies System Preferences Settings Mac OS X 10.5/6/7/8/9 /10 Settings Limit items shown in System Preferences Centrify Mac On-Prem Policies Centrify User Policies System Preferences Settings Mac OS X 10.5/6/7/8/9 /10 Settings Enable System Preferences Panes Enable built-in System Preferences panes Enable other System Preferences panes CENTRIFY CORPORATION ALL RIGHTS RESERVED

15 Centrify Mac On-Prem Policies Centrify User Policies Adclient Settings (Mac) Auto Zone remote file service (Mac OS X) Enable Auto Zone user home directory (Mac OS X) Generate new uid/gid using Apple scheme in Auto Zone Map /home to /Users (Mac OS X) Set user s primary gid in Auto Zone Centrify Mac On-Prem Policies Centrify User Policies Computer Configuration Administrative Templates System Group Policy Turn off background refresh of Group Policy Group Policy refresh interval for computers User Group Policy loopback processing mode Centrify Mac On-Prem Policies Centrify User Policies Computer Configuration Administrative Templates System Windows Time Service Time Providers Global Configuration Settings - MaxPollinterval Enable Windows NTP Client Centrify Mac On-Prem Policies Centrify User Policies Windows Settings Security Settings Local Policies Security Options Interactive logon: Prompt user to change password before expiration Centrify Mac On-Prem Policies Centrify User Policies Windows Settings Security Settings Account Polices Password Policy Enforce password history Maximum password age Minimum password age Minimum password length Password must meet complexity requirements Store passwords using reversible encryption Centrify Mac On-Prem Policies Centrify User Policies Windows Settings Security Settings Account Polices Account Lockout Policy Account lockout duration Account lockout threshold Reset account lockout counter after Centrify Mac On-Prem Policies Centrify User Policies Windows Settings Security Settings Account Polices Kerberos Policy Enforce user logon restrictions Maximum lifetime for service ticket Maximum lifetime for user ticket Maximum lifetime for user ticket renewal Maximum tolerance for computer clock synchronization CENTRIFY CORPORATION ALL RIGHTS RESERVED

16 Manage your Mac with Active Directory Group Policies Centrify Mac On-Prem Policies Centrify User Policies Windows Settings Security Settings Public Key Polices Certificate Services Client - Auto-Enrollment Settings Trusted Root Certification Authorities Centrify Mac On-Prem Policies Centrify User Policies User Configuration Administrative Template System Group Policy Group Policy refresh interval for users Centrify Mac On-Prem Policies Centrify User Policies Windows Settings Security Settings Public Key Policy Certificate Services Client - Auto-Enrollment Settings Centrify Cloud Management Settings Common Mobile Settings Wi-Fi Settings Centrify Cloud Management Settings Common Mobile Settings Passcode Settings Auto-Lock (minutes) Grace period for device lock Maximum number of failed attempts Maximum passcode age (days) Minimum number of complex characters Minimum passcode length Passcode history Permit simple value Require alphanumeric value Require passcode on device Centrify Cloud Management Settings Common Mobile Settings OS X and ios Settings Calendar Settings Contacts Settings LDAP Settings Mail Settings Security and privacy settings VPN Settings Centrify Cloud Management Settings Common Mobile Settings OS X Settings Custom settings Open application when user logs in Open authenticated network mounts when user logs in Open files, folders and items when user logs in Open network mounts when user logs in Permit shift key to skip opening items when user log in Security and privacy settings CENTRIFY CORPORATION ALL RIGHTS RESERVED WHP000103en

17 Centrify Cloud Management Settings Common Mobile Settings OS X Settings Restrictions Settings Restrict applications Restrict preferences Centrify Cloud Management Settings Common Mobile Settings OS X Settings Restrictions Settings Applications Allow folders Disallow folders Centrify Cloud Management Settings Common Mobile Settings OS X Settings Restrictions Settings Media Allow access to AirDrop Allow access to CDs & CD-ROMs Allow access to disk images Allow access to DVD-RAM Allow access to DVDs Allow access to external disks Allow access to internal disks Allow access to Recordable Discs Eject all removable media at logout Centrify Cloud Management Settings Common Mobile Settings OS X Settings Restrictions Settings Preferences Allow built-in System Preferences Allow other System Preferences CENTRIFY CORPORATION ALL RIGHTS RESERVED

18 Conclusion Centrify Identity Service Mac Edition, enables Active Directory-based authentication and access control for both Mac OS X systems providing the industry s most comprehensive set of policy-based controls for configuring and securing Mac systems, whether they are managed locally on-premises or remotely via the Centrify Identity Service. By leveraging your existing identity infrastructure, processes and trained IT staff, you can reduce costs and improve operational efficiency. Comprehensive Group Policy-based management automates computer and user configuration and policy enforcement. Automated certificate management provides strong authentication to wired and wireless networks. Automated FileVault 2 configuration protects data at rest through full-disk encryption supporting institution recovery. Comprehensive enterprise system configuration controls: Services Firewall Internet sharing Network configuration for DNS, proxies Login scripts Automount configuration to simplify user access to network shares Robust classroom configuration and policy enforcement Desktop lockdown with controls for Finder, storage media, preferences and applications Network home directories on AFP, SMB or NFS shares Seamless enterprise access to file servers, printers and applications Centrify Cloud Service extends management for updating of security policies as well as lock or wipe Macs and mobile devices Use familiar Windows tools such as Group Policy to centrally manage access to services and enforce security policies Mac OS X systems transparently connect to network file shares hosted on Microsoft Distributed File System (DFS) volumes Instead of configuring endpoint devices one by one, you can centrally enforce the industry s broadest set of policies across workstations, laptops and mobile devices Non-intrusive solution deploys without installing software on domain controllers or requiring any changes to the Active Directory schema Automate device configuration for remote access, including Wi-Fi and VPN access PKI auto-issuance and auto-renewal Enable authorized user accounts to unlock and access encrypted disks through Apple s FileVault 2 Full Disk Encryption Inventory devices and applications across your entire enterprise, organized by user, group or device, to easily track and enforce the status of both company-owned and user-owned devices Centrify provides unified identity management across data center, cloud and mobile environments that result in single sign-on (SSO) for users and a simplified identity infrastructure for IT. Centrify s unified identity management software and cloud-based Identity-as-a-Service (IDaaS) solutions leverage an organization s existing identity infrastructure to enable single sign-on, multi-factor authentication, privileged identity management, auditing for compliance and enterprise mobility management. SANTA CLARA, CALIFORNIA +1 (669) EMEA +44 (0) ASIA PACIFIC BRAZIL LATIN AMERICA sales@centrify.com WEB CENTRIFY CORPORATION. ALL RIGHTS RESERVED (669)

The Centrify Vision: Unified Access Management

The Centrify Vision: Unified Access Management The Centrify Vision: Unified Access Management Control, Secure and Audit Access To Your On-Premise and Cloud-based Infrastructure On-premise Centrify the Enterprise Cloud Personal Devices Mobile Devices

More information

Using Centrify s DirectControl with Mac OS X

Using Centrify s DirectControl with Mac OS X WHITE PAPER CENTRIFY CORP. OCTOBER 2008 Using Centrify s DirectControl with Mac OS X Centralized, Active Directory-based authentication, access control and policy enforcement for Mac OS X systems in Windows

More information

An Overview of Samsung KNOX Active Directory and Group Policy Features

An Overview of Samsung KNOX Active Directory and Group Policy Features C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

Google Apps Deployment Guide

Google Apps Deployment Guide CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate

More information

Direct Control for Mobile & Supporting Mac OS X in Windows Environments

Direct Control for Mobile & Supporting Mac OS X in Windows Environments Direct Control for Mobile & Supporting Mac OS X in Windows Environments Leveraging Existing IT Staff Knowledge, Processes and Infrastructure to Support Mac OS X Systems and Their Users Ed Frola Senior

More information

Best Practices for Adding Macs to Microsoft Networks

Best Practices for Adding Macs to Microsoft Networks WHITE PAPER Best Practices for Adding Macs to Microsoft Networks WWW.CENTRIFY.COM Best Practices for Adding Macs to Microsoft Networks Contents Abstract 3 Introduction 4 Requirements for Solving the Challenge

More information

An Overview of Samsung KNOX Active Directory-based Single Sign-On

An Overview of Samsung KNOX Active Directory-based Single Sign-On C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

Office 365 Single Sign-On: High Availability Without High Complexity

Office 365 Single Sign-On: High Availability Without High Complexity WHITE PAPER Office 365 Single Sign-On: High Availability Without High Complexity WWW.CENTRIFY.COM Office 365 Single Sign-On: High Availability without High Complexity Contents Abstract 3 Introduction 4

More information

Centrify Identity Service and Mac - Online Training

Centrify Identity Service and Mac - Online Training C E N T R I F Y D A T A S H E E T M A R C H 2015 Centrify Identity Service and Mac - Online Training Overview This course is designed for administrators of the Centrify User Suite and mobile devices. At

More information

Centrify Identity and Access Management for Cloudera

Centrify Identity and Access Management for Cloudera Centrify Identity and Access Management for Cloudera Integration Guide Abstract Centrify Server Suite is an enterprise-class solution that secures Cloudera Enterprise Data Hub leveraging an organization

More information

What s New in Centrify Privilege Service Centrify Identity Platform 15.4

What s New in Centrify Privilege Service Centrify Identity Platform 15.4 CENTRIFY PRIVILEGE SERVICE WHAT S NEW What s New in Centrify Privilege Service Centrify Identity Platform 15.4 Centrify Privilege Service Centrify Privilege Service is a cloud-based password and access

More information

Centrify Cloud Connector Deployment Guide

Centrify Cloud Connector Deployment Guide C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as

More information

Macintosh Printer Management using Centrify DirectControl Group Policies

Macintosh Printer Management using Centrify DirectControl Group Policies WHITE PAPER CENTRIFY CORP. MARCH 2010 Macintosh Printer Management using Centrify DirectControl Group Policies ABSTRACT This white paper examines various approaches to managing printer configuration files

More information

Using Apple Remote Desktop to Deploy Centrify DirectControl

Using Apple Remote Desktop to Deploy Centrify DirectControl APPLICATION NOTE Using Apple Remote Desktop to Deploy Centrify DirectControl Published: June 2007 Abstract Apple Remote Desktop is commonly used by administrators to perform various administrative management

More information

Mac OS X Security Checklist:

Mac OS X Security Checklist: Mac OS X Security Checklist: Implementing the Center for Internet Security Benchmark for OS X Recommendations for securing Mac OS X The Center for Internet Security (CIS) benchmark for OS X is widely regarded

More information

Automating Cloud Security with Centrify Express and RightScale

Automating Cloud Security with Centrify Express and RightScale QUICK START GUIDE. MAY 2011 Automating Cloud Security with Centrify Express and RightScale How to secure cloud systems by joining them to your Active Directory infrastructure Abstract This Quick Start

More information

Managing UNIX Generic and Service Accounts with Active Directory

Managing UNIX Generic and Service Accounts with Active Directory APPLICATION NOTE Managing UNIX Generic and Service Accounts with Active Directory Published: June 2007 Abstract Generic accounts are commonly used to enable UNIX administrative staff to log on to a computer

More information

Improving Mobile Device Security and Management with Active Directory

Improving Mobile Device Security and Management with Active Directory CENTRIFY WHITE PAPER, FEBUARY 2012 Improving Mobile Device Security and Management with Active Directory An overview of mobile device market trends, challenges and approaches to securing and managing smart

More information

Active Directory and DirectControl

Active Directory and DirectControl WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now

More information

Centralized Mac Home Directories with ExtremeZ-IP

Centralized Mac Home Directories with ExtremeZ-IP APPLICATION NOTE Centralized Mac Home Directories with ExtremeZ-IP Published: July 2009 Abstract Organizations wanting to integrate Mac OS X systems into their Windows-based enterprise network will most

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Top Six Things to Consider with an Identity-as-a-Service (IDaaS) Solution

Top Six Things to Consider with an Identity-as-a-Service (IDaaS) Solution WHITE PAPER Top Six Things to Consider with an Identity-as-a-Service (IDaaS) Solution WWW.CENTRIFY.COM Top Six Things to Consider with an Identity as a Service (IDaaS) Solution Contents Executive Summary

More information

Deploying iphone and ipad Mobile Device Management

Deploying iphone and ipad Mobile Device Management Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Samsung KNOX: An Overview for Business Customers

Samsung KNOX: An Overview for Business Customers CENTRIFY WHITE PAPER. SEPTEMBER 2013 Samsung KNOX: An Overview for Business Customers Abstract Samsung, the mobile device market leader, has introduced Samsung KNOX for its Android-based mobile platforms

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

DeployStudio Server Quick Install

DeployStudio Server Quick Install DeployStudio Server Quick Install v1.7.0 The DeployStudio Team info@deploystudio.com Requirements OS X 10.7.5 to 10.11.1 DeployStudioServer_v1.7.x.pkg and later NetBoot based deployment 100 Mb/s switched

More information

Windows Least Privilege Management and Beyond

Windows Least Privilege Management and Beyond CENTRIFY WHITE PAPER Windows Least Privilege Management and Beyond Abstract Devising an enterprise-wide privilege access scheme for Windows systems is complex (for example, each Window system object has

More information

What s New in Centrify Server Suite 2014

What s New in Centrify Server Suite 2014 CENTRIFY SERVER SUITE 2014 WHAT S NEW What s New in Centrify Server Suite 2014 The new Centrify Server Suite 2014 introduces major new features that simplify risk management and make regulatory compliance

More information

A Practical Path to Unified Identity Across Data Center, Cloud and Mobile

A Practical Path to Unified Identity Across Data Center, Cloud and Mobile C E N T R I F Y W H I T E P A P E R A Practical Path to Unified Identity Across Data Center, Cloud and Mobile Abstract The major trends challenging IT organizations today are the increasing heterogeneity

More information

Windows Server 2008/2012 Server Hardening

Windows Server 2008/2012 Server Hardening Account Policies Enforce password history 24 Maximum Password Age - 42 days Minimum Password Age 2 days Minimum password length - 8 characters Password Complexity - Enable Store Password using Reversible

More information

Centralizing Mac Home. Live Webinar David McNeely Centrify Geordie Korper Group Logic

Centralizing Mac Home. Live Webinar David McNeely Centrify Geordie Korper Group Logic Centralizing Mac Home Directories on Windows Servers Live Webinar David McNeely Centrify Geordie Korper Group Logic Agenda EDA Overview Centrify DirectControl Group Logic ExtremeZ-IP Centralizing Home

More information

Centrify Mobile Authentication Services for Samsung KNOX

Centrify Mobile Authentication Services for Samsung KNOX Centrify Mobile Authentication Services for Samsung KNOX SDK Quick Start Guide 3 October 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under

More information

ipad in Business Mobile Device Management

ipad in Business Mobile Device Management ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management

More information

iphone in Business Mobile Device Management

iphone in Business Mobile Device Management 19 iphone in Business Mobile Device Management iphone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iphone across their organizations. These Mobile Device

More information

Centrify Cloud Management Suite

Centrify Cloud Management Suite Centrify Cloud Management Suite Installation and Configuration Guide April 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject

More information

When enterprise mobility strategies are discussed, security is usually one of the first topics

When enterprise mobility strategies are discussed, security is usually one of the first topics Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced

More information

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7 Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3

More information

Centrify Mobile Authentication Services

Centrify Mobile Authentication Services Centrify Mobile Authentication Services SDK Quick Start Guide 7 November 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject

More information

Apple Technical White Paper Best Practices for Integrating OS X with Active Directory

Apple Technical White Paper Best Practices for Integrating OS X with Active Directory Best Practices for Integrating OS X with Active Directory OS X Mavericks v10.9 Contents Introduction... 4 How to Integrate OS X with Active Directory... 5 Enterprise Integration Challenges... 8 Deployment

More information

Configure thin client settings locally

Configure thin client settings locally This chapter contains information to help you set up your thin client hardware, look and feel, and system settings using the Control Center. Tip While it is not recommended to use dialog boxes for configuring

More information

Best Practices: Integrating Mac OS X with Active Directory. Technical White Paper April 2009

Best Practices: Integrating Mac OS X with Active Directory. Technical White Paper April 2009 Best Practices: Integrating Mac OS X Technical White Paper April 2009 2 Contents Page 3 Page 5 Page 9 Page 10 Page 11 Page 12 Apple s Built-In Solution How to Integrate Mac OS X Getting Started dsconfigad

More information

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment. Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac 2011 ENTERPRISE DEVICE

More information

Charles Firth charles@firthconsulting.com. Managing Macs in a Windows World

Charles Firth charles@firthconsulting.com. Managing Macs in a Windows World Charles Firth charles@firthconsulting.com Managing Macs in a Windows World Prerequisites Familiarity with Windows Active Directory networks Interest in Macintosh OSX integration and support Basic understanding

More information

Apple Technical White Paper Best Practices for Integrating OS X with Active Directory

Apple Technical White Paper Best Practices for Integrating OS X with Active Directory Best Practices for Integrating OS X with Active Directory OS X Mountain Lion v10.8 Contents Introduction... 3 How to Integrate OS X with Active Directory... 4 Enterprise Integration Challenges... 7 Deployment

More information

Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper

Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper Active Directory Compatibility with ExtremeZ-IP A Technical Best Practices Whitepaper About this Document The purpose of this technical paper is to discuss how ExtremeZ-IP supports Microsoft Active Directory.

More information

Centrify OS X Basic Jump Start

Centrify OS X Basic Jump Start CENTRIFY DATASHEET Centrify OS X Basic Jump Start The Centrify OS X Jump Start gives organizations the training and hands-on experience to rapidly deploy Centrify's solution for Identity, Policy and Device

More information

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Windows Server 2008 Domain Controllers Version: 3.0.0 Symantec Enterprise Security Manager Baseline Policy Manual for

More information

Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper

Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper About this Document The purpose of this technical paper is to discuss how ExtremeZ-IP supports Microsoft Active Directory.

More information

You're reading an excerpt. Click here to read official APPLE REMOTE DESKTOP 1.2 user guide http://yourpdfguides.com/dref/1168427

You're reading an excerpt. Click here to read official APPLE REMOTE DESKTOP 1.2 user guide http://yourpdfguides.com/dref/1168427 You can read the recommendations in the user guide, the technical guide or the installation guide for APPLE REMOTE DESKTOP 1.2. You'll find the answers to all your questions on the APPLE REMOTE DESKTOP

More information

Administrator s Guide

Administrator s Guide Apple Remote Desktop Administrator s Guide Includes setup instructions and solutions for managing client computers remotely K Apple Computer, Inc. 2003 Apple Computer, Inc. All rights reserved. Under the

More information

Managing OS X with Configuration Profiles

Managing OS X with Configuration Profiles Apple Technical White Paper Managing OS X with Configuration Profiles OS X Lion v 10.7.3 1 Table of Contents About Configuration Profiles... 3 Creating Configuration Profiles... 8 Deploying Configuration

More information

Back to My Mac User s Guide

Back to My Mac User s Guide Back to My Mac User s Guide This guide will show you how to access a remote Leopard or Snow Leopard based Mac, Time Capsule, or external hard disk connected to an AirPort Extreme Base Station over the

More information

Mac OS X Server User Management Version 10.6 Snow Leopard

Mac OS X Server User Management Version 10.6 Snow Leopard Mac OS X Server User Management Version 10.6 Snow Leopard KKApple Inc. 2009 Apple Inc. All rights reserved. The owner or authorized user of a valid copy of Mac OS X Server software may reproduce this publication

More information

Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory

Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory W H I T E P A P E R C E N T R I F Y C O R P. M A Y 2008 Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory The Active Directory-Based Single Sign-On Solution

More information

How to Secure a Groove Manager Web Site

How to Secure a Groove Manager Web Site How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,

More information

Quick Start and Trial Guide (Mail) Version 3 For ios Devices

Quick Start and Trial Guide (Mail) Version 3 For ios Devices Quick Start and Trial Guide (Mail) Version 3 For ios Devices Information in this document is subject to change without notice. Complying with all applicable copyright laws is the responsibility of the

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

Sophos Mobile Control Startup guide. Product version: 3.5

Sophos Mobile Control Startup guide. Product version: 3.5 Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

How To Use Directcontrol With Netapp Filers And Directcontrol Together

How To Use Directcontrol With Netapp Filers And Directcontrol Together Application Note Using DirectControl with Network Appliance Filers Published: June 2006 Abstract This Application Note describes the integration between Network Appliance servers and Centrify DirectControl

More information

Likewise Security Benefits

Likewise Security Benefits Likewise Enterprise Likewise Security Benefits AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise improves the security of Linux and UNIX computers

More information

What s New in Centrify Server Suite 2013 Update 2

What s New in Centrify Server Suite 2013 Update 2 CENTRIFY SERVER SUITE 2013.2 DATA SHEET What s New in Centrify Server Suite 2013 Update 2 The new Centrify Server Suite 2013 Update 2 (2013.2) builds on the core enhancements Centrify introduced in Server

More information

Lync for Mac 2011 Deployment Guide

Lync for Mac 2011 Deployment Guide 2011 Deployment Guide Getting Started Information in this document, including URL and other Internet Web site references, is subject to change without notice. Content in this document represents the current

More information

Step By Step Guide: Demonstrate DirectAccess in a Test Lab

Step By Step Guide: Demonstrate DirectAccess in a Test Lab Step By Step Guide: Demonstrate DirectAccess in a Test Lab Microsoft Corporation Published: May 2009 Updated: October 2009 Abstract DirectAccess is a new feature in the Windows 7 and Windows Server 2008

More information

Stop Password Sprawl with SaaS Single Sign-On via Active Directory

Stop Password Sprawl with SaaS Single Sign-On via Active Directory CENTRIFY WHITE PAPER Stop Password Sprawl with SaaS Single Sign-On via Active Directory Abstract Organizations are rushing to SaaS in an effort to move business initiatives along faster than the traditional

More information

Oracle Mobile Security

Oracle Mobile Security Oracle Mobile Security What s New in OMSS 11gR2 Patch Set 3 ORACLE WHITE PAPER MAY 2015 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes

More information

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Microsoft Corporation Published: May, 2005 Author: Microsoft Corporation Abstract This guide describes how to create

More information

Apple Client Management with JAMF. Andrew D Huston Client Infrastructure Group Informa8on Services Kent State University

Apple Client Management with JAMF. Andrew D Huston Client Infrastructure Group Informa8on Services Kent State University Apple Client Management with JAMF Andrew D Huston Client Infrastructure Group Informa8on Services Kent State University Intro Intro 2011 Kent State University President s Excellence in Action Award Winner

More information

Windows Security and Directory Services for UNIX using Centrify DirectControl

Windows Security and Directory Services for UNIX using Centrify DirectControl SOLUTION GUIDE CENTRIFY CORP. SEPTEMBER 2005 Windows Security and Directory Services for UNIX using Centrify DirectControl With Centrify, you can now fully leverage your investment in Active Directory

More information

Windows Server Update Services 3.0 SP2 Step By Step Guide

Windows Server Update Services 3.0 SP2 Step By Step Guide Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server

More information

Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the

Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names,

More information

Centrify-Enabled Samba

Centrify-Enabled Samba CENTRIFY CORP. Centrify-Enabled Samba DECEMBER 2009 The easy-to-manage enterprise solution for Active Directory-enabled Samba file sharing ABSTRACT Samba is one of the most popular open source technologies

More information

DriveLock and Windows 7

DriveLock and Windows 7 Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Sophos Mobile Control Startup guide. Product version: 3

Sophos Mobile Control Startup guide. Product version: 3 Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos

More information

Best Practices: Integrating Mac OS X with Active Directory. Technical White Paper September 2007

Best Practices: Integrating Mac OS X with Active Directory. Technical White Paper September 2007 Best Practices: with Active Directory Technical White Paper September 2007 Contents Page 3 Page 4 Page 8 Page 10 Page 11 Page 13 Apple s Built-In Solution How to Integrate Mac OS X with Active Directory

More information

Active Directory Compatibility with ExtremeZ-IP

Active Directory Compatibility with ExtremeZ-IP Active Directory Compatibility with ExtremeZ-IP A Technical Best Practices White Paper Group Logic White Paper October 2010 About This Document The purpose of this technical paper is to discuss how ExtremeZ-IP

More information

ManageEngine Desktop Central Training

ManageEngine Desktop Central Training ManageEngine Desktop Central Training Course Objectives Who Should Attend Course Agenda Course Objectives Desktop Central training helps you IT staff learn the features offered by Desktop Central and to

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

Default Domain Policy Data collected on: 10/12/2012 5:28:08 PM General

Default Domain Policy Data collected on: 10/12/2012 5:28:08 PM General Default Domain Default Domain Data collected on: 10/12/2012 5:28:08 PM General Details Domain Owner Created Modified User Revisions Computer Revisions Unique ID GPO Status webrecon.local WEBRECON\Domain

More information

File Services. File Services at a Glance

File Services. File Services at a Glance File Services High-performance workgroup and Internet file sharing for Mac, Windows, and Linux clients. Features Native file services for Mac, Windows, and Linux clients Comprehensive file services using

More information

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

Windows Azure Pack Installation and Initial Configuration

Windows Azure Pack Installation and Initial Configuration Windows Azure Pack Installation and Initial Configuration Windows Server 2012 R2 Hands-on lab In this lab, you will learn how to install and configure the components of the Windows Azure Pack. To complete

More information

QuickStart Guide for Client Management. Version 8.7

QuickStart Guide for Client Management. Version 8.7 QuickStart Guide for Client Management Version 8.7 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software

More information

Centrify Suite 2012 Express

Centrify Suite 2012 Express Centrify Suite 2012 Express Administrator s Guide November 2011 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject to the terms

More information

Smart Card Setup Guide

Smart Card Setup Guide Smart Card Setup Guide K Apple Computer, Inc. 2006 Apple Computer, Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written consent of

More information

MBAM Self-Help Portals

MBAM Self-Help Portals MBAM Self-Help Portals Authoring a self-help portal workflow for BitLocker Recovery Using Microsoft BitLocker Administration and Monitoring (MBAM) Technical White Paper Published: September 2011 Priyaa

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Technical Brief for Windows Home Server Remote Access

Technical Brief for Windows Home Server Remote Access Technical Brief for Windows Home Server Remote Access Microsoft Corporation Published: October, 2008 Version: 1.1 Abstract This Technical Brief provides an in-depth look at the features and functionality

More information

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

Using Mac OS X 10.7 Filevault with Centrify DirectControl

Using Mac OS X 10.7 Filevault with Centrify DirectControl Using Mac OS X 10.7 Filevault with Centrify DirectControl August 2011, Revision 2 OS X 10.7's Filevault has the ability to encrypt the entire disk. Full Disk Encryption is compatible with Centrify Active

More information

Endpoint Security Client for Mac

Endpoint Security Client for Mac Endpoint Security Client for Mac E80.60 User Guide 23 December 2014 Classification: [Protected] 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are

More information

Centrify Server Suite Management Tools

Centrify Server Suite Management Tools SERVER SUITE TECHNICAL BRIEF Centrify Server Suite Management Tools Centrify Server Suite includes - at no extra charge - a powerful set of management tools in all editions: Centrify Identity Risk Assessor

More information

Active Directory Self-Service FAQ

Active Directory Self-Service FAQ Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

NETASQ SSO Agent Installation and deployment

NETASQ SSO Agent Installation and deployment NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user

More information

What s New in Centrify Server Suite 2015

What s New in Centrify Server Suite 2015 C E N T R I F Y S E R V E R S U I T E 2 0 1 5 W H A T S N E W What s New in Centrify Server Suite 2015 Centrify Server Suite Standard Edition Hadoop support Big Data adoption by industry is around 25%

More information