CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

Size: px
Start display at page:

Download "CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile"

Transcription

1 CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version ForeScout Mobile

2 Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation... 3 About this Plugin... 3 How it Works... 4 Continuous Query Refresh... 4 Supported Devices... 5 Supported Network Infrastructures... 5 What to Do... 5 Accessing Fixes Made after this Release... 6 Requirements... 6 Version Requirements... 6 CounterACT / Hotfix Requirements... 6 Additional Plugin Requirements... 6 Registration and Activation Requirements... 7 Registration and Activation... 7 Networking Requirements... 7 Endpoint Requirements... 7 Installation and Configuration... 7 Test Plugin Communication with the MaaS Service Displaying Inventory Data Policy Templates Device Manageability Policy Template Using the Device Manageability Template Device Compliance Policy Template Using the Device Compliance Template Creating Unauthorized Application Lists Working with CounterACT Policies Version 1.0.1

3 Detecting Devices - Policy Properties Core Attributes Security and Compliance Hardware Inventory Network Information Additional Information Open Property Search Tag Devices - Policy Actions Custom Attribute Value Action Refresh Device Information Action Version ii

4 About the Integration ForeScout MDM helps IT administrators streamline the process to provision, manage and secure today s expanding suite of smartphones and tablets, all from a single portal. ForeScout MDM for mobile devices is an easy to use platform that includes all of the essential functionality for end-to-end management of ios and Android devices. This means with a single unified security management and reporting system, you can ensure that your network is secured, regardless of the type of device a user may be carrying. Instead of implementing new security silos that are limited to mobile devices, you can extend your PC and network security systems to encompass mobile devices. ForeScout MDM ForeScout MDM is a cloud-based solution, enabling quick and easy deployment; enrollment, monitoring, management and support. Together with ForeScout CounterACT, ForeScout MDM provides a whole new level of centralized visibility and control for actionable insights into your entire computing landscape. Secure all Mobile Devices: ForeScout MDM supports all major smartphone and tablet platforms including ios and Android - in both Exchange and Lotus Notes environments. Embrace BYOD: ForeScout MDM provides workflows to discover, enroll, manage and report on personally owned devices as part of your mobile device operations. Experience simple device enrollment and approval: ForeScout MDM provides auto-quarantine for Exchange, and alerts IT personnel to approve all new devices. Additionally it provides for easy user self-enrollment, via web, or SMS. Additional Documentation Refer to the documents at the following location for more technical information about the ForeScout MDM solution. About this Plugin Integration with CounterACT lets you deliver a comprehensive MDM solution that provides powerful monitoring and enforcement capabilities not available when working solely with the solution. Use the Integration Plugin to complete the cycle of security by obtaining valuable capabilities: Automated real-time, continuous detection and compliance of mobile devices the moment they try to connect to your network, including unmanaged and unknown devices. Version

5 Unified network access control policy enforcement options. Allow compliant and managed devices on the network. Limit network access based on device type, device ownership, time of day, and device compliance. The limited access network can allow access to a subset of applications and data, blocking access to more sensitive corporate resources. Block noncompliant devices or specific types of devices from your network completely. Tag devices at the console, based on CounterACT detections. Enhance CounterACT inventory by populating it with information. How it Works The Integration Plugin queries the service for device attributes, for example core attributes, security and compliance information, hardware inventory and network information. All queries are performed by a single CounterACT Appliance that is designated for this purpose. This designated CounterACT Appliance, herein called the Connected Appliance, retrieves information from other CounterACT Appliances and the CounterACT Enterprise Manager and forwards the information to the service. Similarly, the Connected Appliance retrieves information from the MaaaS360 service and forwards it to other CounterACT Appliances and the CounterACT Enterprise Manager Port 5223/TCP must be open for outbound traffic. Continuous Query Refresh query mechanisms recheck endpoint attributes at a static frequency approximately once a day. However, after plugin installation, querying of endpoint properties is based on Version

6 CounterACT policy recheck definitions. The conditions under which to recheck hosts that match the policy. Specifically, you can define: How often hosts are rechecked once they match a policy Under what conditions to carry out the recheck This ensures continuous, real-time endpoint evaluation that can be customized for each CounterACT policy. Queries for device core attributes are initiated on the basis of the endpoint MAC address. Core attribute results return the device ID, which is used for further queries. As such, it is required that CounterACT learn endpoint MAC addresses in order to initiate the query process. You can use the Manageability Policy template to detect hosts at which MAC addresses are not learned. See Device Manageability Policy Template for details. Supported Devices The following devices are supported by ForeScout MDM: ios Android BlackBerry Windows Mobile Symbian The following devices are supported by the Integration Plugin: ios Android For exact OS version support, refer to the documentation: Supported Network Infrastructures Devices connected to the network via a WiFi connection. What to Do To use the Integration Plugin, perform the following tasks: 1. Verify that you have met software and networking requirements. See Requirements. 2. Install, configure and test the plugin. See Installation and Configuration. 3. Create CounterACT policies that detect, manage and remediate devices. See Policy Templates and Working with CounterACT Policies. Version

7 4. Connect to the ForeScout Console to configure device policies: Refer to the documents at the following location for more technical information about the ForeScout MDM solution. Accessing Fixes Made after this Release New issues may be discovered and fixed after this release. These fixes will be made available as Beta fixes to the upcoming plugin version until the final version is posted on the ForeScout customer support page. You can access information about Beta fixes for the upcoming version at: In addition, you can contact the ForeScout Beta Manager at to request the Beta plugin update with the fixes. Requirements This section lists version, registration and networking requirements. Version Requirements This section lists version requirements. CounterACT / Hotfix Requirements CounterACT version , Hotfix 6.0 or above. CounterACT version , Hotfix 1.0 or above. Additional Plugin Requirements HPS Inspection Engine Plugin version or above. User Directory Plugin version or above. Version

8 Registration and Activation Requirements This section lists registration and activation requirements. Registration and Activation 1. Register for access to the service at: The service is available as 30-day free trial. 2. Activate the registration by sending an activation request to: You will receive an response with information required for configuring the plugin, as well as other information. Networking Requirements Mobile devices managed by the service cannot establish a connection to the cloud service via a proxy. If a proxy is setup at the enterprise network, you must open port TCP/5223 to /8 on the enterprise firewall. By doing this, the proxy is bypassed when the mobile device accesses the service. Endpoint Requirements Queries for device core attributes are initiated on the basis of the endpoint MAC address. Core attribute results return the device ID, which is used for further queries. As such, it is required that CounterACT learn endpoint MAC addresses in order to initiate the query process. You can use the Manageability Policy template to detect hosts at which MAC addresses are not learned. See Device Manageability Policy Template for details. Installation and Configuration This section describes how to install, configure and test the Integration Plugin. The configuration is used to ensure that the plugin can communicate with the service. To install: 1. After registering for the trail at you will receive an that provides a download link. 2. Download and save the plugin installation file to the machine where the CounterACT Console is installed. 3. Log in to CounterACT and select Options from the Tools menu. 4. Select Plugins. The Plugins pane opens. Version

9 5. Select the Install button. The Open dialog box opens. 6. Navigate to the location where you saved the plugin installation file. 7. Select Install. Once installed, the Integration Plugin automatically adds a HTTP Redirect exception to the CounterACT NAC Redirect Exception list. CounterACT NAC HTTP redirect exceptions are designed to ensure users can access business essential Internet sites or important files on the Internet while allowing required HTTP blocking and redirection. In this case, incorporating an m.dm exception and a fiberlink exception ensures that devices can enroll with the service and still receive required HTTP notifications. See Device Manageability Policy Template for more information about this exception. 8. Start the plugin: Select Mobile Integration from the Plugins pane. Select the Start button. To configure the plugin: 1. Select Mobile Integration - from the Options window. The configuration is used to ensure that the plugin can communicate with the service. Version

10 2. Enter the following details about the service. Web Service Billing ID*. (This information is used in the Manageability template, HTTP notification actions when redirecting endpoint Web sessions to the MDM enrollment site. See the Device Manageability Policy Template for details. ) Application ID* Access Key* Authentication Username Authentication Password This information is provided by after you activate your registration. See Registration and Activation Requirements for details. 3. In the Connected Appliance drop-down list, select the name of an Appliance that will service as a proxy between the MaaS service and the Enterprise Manager and enterprise Appliances. The CounterACT device listed here is the only device that will communicate directly with the service. An Enterprise Manager may not be selected here. 4. Select the Advanced tab. Version

11 5. The Web Service URL Name field displays default values. 6. The Application Version field Name field displays default values. 7. The Platform ID field displays default values. 8. In the Query Threshold field, define the maximum number of query requests to the service per threshold interval (defined in the following field). 9. In the Query Threshold Interval (Seconds) field, define the frequency that the plugin should query the service. 10. Select the Use a Proxy Server checkbox if there is a proxy between the Connected Appliance and the service in the cloud. 11. Enter the IP address of the proxy server in the DNS Name or IP Address of the Proxy Server field. 12. Enter the required proxy server port in the Port Number field. Test Plugin Communication with the MaaS Service Test the plugin communication with the MaaS service. To test communication: 1. Select the Test tab. 2. In the Device MAC Address filed, enter the MAC address of device in order to test plugin communication with the MaaS service. Do not enter colons. Use lower case. Version

12 Displaying Inventory Data Use the CounterACT Inventory to view a real-time display of device network activity at multiple levels, for example, software installed, core attributes or hardware information. The inventory lets you: Broaden your view of the organizational network from device-specific to activity-specific. View devices that have been detected with specific attributes. Easily track device activity. Incorporate inventory detections into policies. To access the inventory: 1. Select the Inventory icon from the Console toolbar. 2. Navigate to the entries. Version

13 The following information is available: Core Attributes: Device Type, Platform Name Hardware Inventory: Manufacturer, Model Operating System. Software Installed Refer to the CounterACT Console User s Manual or the Console, Online Help for information about how to work with the CounterACT Inventory. Policy Templates Two templates are available for detecting, managing and remediating devices: Device Manageability Policy Template Device Compliance Policy Template Device Manageability Policy Template Use this policy to detect Maas360 unmanageable devices. Devices that are unmanageable: Have not been detected with a MAC address Queries for device core attributes are initiated on the basis of the endpoint MAC address. Core attribute results return the device ID, which is used for further queries. Cannot be accessed via CounterACT at the Cloud Are not listed with the service Have not enrolled with the service Version

14 Remediation options, disabled by default, let you block unmanageable devices from the corporate network and redirect device user web sessions to a page where they can register for the purpose of becoming manageable. Prerequisites Consider which hosts you want to inspect. The policy does not handle hosts outside of the Internal Network. You should run the Asset Classification template first. The Hand Held group generated when running the Asset Classification template is included in Device Manageability template Scope. The template was most likely run during initial CounterACT setup. Verify that you have configured the Integration Plugin. Using the Device Manageability Template This section describes how to use the Device Manageability template. To use the Device Manageability template: 1. Select Add from the Policy Manager. 2. Navigate to the Mobile> folder and select the Device Manageability template. 3. Select Next. The Name page opens. Version

15 4. Accept the default name or change it as required and enter a description. 5. Select Next. The Scope dialog box opens. Use the dialog box to define which hosts should be inspected. Version

16 6. Select one of the following from the IP Address Range dialog box. Your selection appears in the IP Ranges section of the Scope page. Select the All button to include all IP addresses. Insert an IP address range. Select a network segment. The Hand Held group, generated from the Asset Classification policy, is automatically included in the Filter by Group section of the Scope. This ensures that only mobile devices are inspected. 7. Select Next. The Enrollment Address page opens. 8. The address listed here is retrieved from the billing ID that you defined in the plugin configuration, Web Service Billing ID field and is used for the purpose of redirecting the endpoint user to enroll with the service. After enrollment, devices can be managed. 9. Select Next. The Sub-Rules page opens. This page displays policy condition and actions. Version

17 10. Policy conditions tell CounterACT how to detect hosts. Unmanageable hosts are detected according to the following criteria: Hosts without a MAC address. Hosts not listed with the service Hosts not enrolled with the service The policy condition also verifies that CounterACT has access to the Cloud service. Hosts are inspected by each sub-rule in the order shown, until a match is found. 11. Policy actions instruct CounterACT how to respond to endpoints that are not enrolled or listed. Add to Group: Endpoints are automatically added to the CounterACT groups Not Listed and Not Enrolled. You can add these groups to other policy scopes for further handling. Virtual Firewall: Blocks all endpoint traffic, with the exception of traffic transmitted at port 80/TCP. This action is disabled by default. HTTP Notification: Endpoint web sessions are redirected to a page where users can register for the purpose of becoming manageable. See About HTTP Notification Actions. This action is disabled by default. About Enrollment This section describes how the device enrollment process works. When working with the template HTTP redirection actions, unmanageable endpoint web sessions are redirected to a enrollment site where users can register for the purpose of becoming manageable, i.e. they are enrolled and listed with the MaaS 360 service. This action is disabled by default. The device user is redirected to the following location: https://services.fiberlink.com/dp/a.htm?c= Version

18 Version

19 The user will be required to authenticate using Active Directory. To ensure the enrollment process, verify that you have reviewed System Requirements for the Cloud Extender for User Authentication and User Visibility Modules ( for Mobile Devices). A link to this information can be found at (ForeScout MDM Technical Documentation and Support Contacts). Follow the link to Installation Guide for Cloud Extender. About HTTP Notification Actions This section describes automated processes that occur when using HTTP notification actions, available when working with the Not Listed and Not Enrolled sub-rules. CounterACT HTTP Redirect Exceptions Billing ID CounterACT HTTP Redirect Exceptions To avoid blocking access to the MDM enrollment site when working with the HTTP Notification actions, the MDM enrollment link is automatically added to the CounterACT NAC Redirect exception list. This list is designed to ensure that users can access business essential Internet sites or important files on the Internet while allowing required HTTP blocking and redirection. In this case, incorporating an m.dm exception and a fiberlink exception ensures that devices can enroll with the service and still receive required HTTP notifications. This redirect exception is automatically created when the plugin is installed. Web Service Billing ID The Web Service Billing ID URL entered in the plugin configuration, Web Service Configuration tab is automatically placed in the HTTP notification sent when working with the Not Listed and Not Enrolled sub-rules. This sight navigates to the enrollment site. Version

20 The URL is originally received after activating your registration. See Registration and Activation Requirements for details. Device Compliance Policy Template Use this policy to detect Maas360 compliant devices. Devices that are compliant: Are not running unauthorized applications Are not jailbroken or rooted Are compliant based on criteria Have installed the Fiberlink App Remediation options, disabled by default, let you block non-compliant devices from the corporate network and redirect device user web sessions to a remediation notification page. Version

21 Prerequisites In order to detect unauthorized applications you must create an unauthorized application list in CounterACT. See Creating Unauthorized Application Lists. Verify that you can detect the MAC address of devices that you are inspecting. Consider which hosts you want to inspect. The policy does not handle hosts outside of the Internal Network. You should run the Device Manageability template before running this template. The Devices Enrolled group generated when running the Device Manageability template is included in the Device Compliance template scope. Using the Device Compliance Template This section describes how to use the Device Compliance template. To use the Device Compliance template: 1. Select Add from the Policy Manager. 2. Navigate to the Mobile> folder and select the Device Compliance template. 3. Select Next. The Name page opens. Version

22 4. Accept the default name or change it as required and enter a description. 5. Select Next. The Scope dialog box opens. Version

23 6. Select one of the following from the IP Address Range dialog box. Your selection appears in the IP Ranges section of the Scope page. Select the All button to include all IP addresses. Insert an IP address range. Select a network segment. The Devices Enrolled group, generated from the Device Manageability policy, is automatically included in the Filter by Group section of the Scope. This ensures that only enrolled (manageable) devices are inspected. 7. Select Next. 8. The Sub-Rules page opens. This page displays policy condition and actions. 9. Policy conditions tell CounterACT how to detect hosts. Devices that are not compliant are detected according to the following criteria: Devices that are running unauthorized applications Devices that are jailbroken (ios) or rooted (Android) Devices that are not compliant based on criteria Devices that have not installed the Fiberlink App 10. Policy actions instruct CounterACT how to respond to endpoints that are not compliant. Add to Group: Endpoints are automatically added to the - Non Compliance Devices group. You can add this group to other policy scopes for further handling. Virtual Firewall: Blocks all endpoint traffic, with the exception of traffic transmitted at port 80/TCP. This action is disabled by default. HTTP Notification: Endpoint web sessions are redirected. A notification page is displayed indicating the non-compliant issue detected; warning the user that access to the corporate network is blocked and instructing the user to contact IT to remediate the issue. This action is disabled by default. Version

24 Creating Unauthorized Application Lists In order to work with the Compliance Policy template, you will need to compile a list of applications that you want to prohibit on your network. An unauthorized applications list is automatically created using the CounterACT Lists feature when the plugin is installed. You will need to add the applications you want to prohibit to the predefined List. The list is automatically incorporated into the Unauthorized Applications Installed sub-rule. Version

25 To add an application to the list: 1. Select the Options icon from the Console toolbar and then select Lists. Version

26 2. Select the Edit button. The Edit List dialog box opens. 3. Select the Add button. The Add Value dialog box opens. 4. Enter the name of the application you want to prohibit, and select OK. Version

27 5. Enter a description of the application in the Description field of the Edit List dialog box, and select OK. The application appears in the Lists Manager. 6. The following options are available for creating lists of unauthorized applications: Working with CounterACT Policies This section describes how to use CounterACT policies to detect and control devices. Create or edit a policy and use policy conditions to detect these devices with specific properties. To create a policy: 1. Log in to the CounterACT Console. 2. Select the Policy icon from the Console toolbar. 3. Create or edit a policy. For information about working with policies, select the Help button on the policy wizard. Detecting Devices - Policy Properties CounterACT policy conditions and properties let you instruct CounterACT which devices to detect, for example devices with specific restrictions. Expand the folder from a policy that you have created properties to be included in the policy condition. An extensive range of properties can be detected. The categories include: Core Attributes Security and Compliance Hardware Inventory Network Information Additional Information Open Property Search Version

28 Core Attributes Device ID Device Name Device Online Device Status Last Reported Managed Status Platform Name Indicates the device ID. Indicates the device name. Indicates if the device is online. Indicates the device active status, including: Device Active Device Not Active Indicates the date/time of the last reported event on a host. Indicates the managed status of the device including: Enrolled Not Active Not Enrolled Pending Control Removal User Removed Control Indicates the platform on which the device is running Android ios Version

29 User Name Indicates the user name associated with the device. Security and Compliance Android Device Rooted Android Settings Failed to Configure Compliance State Device Passcode Status Device Restrictions Hardware Encryption MDM Policy ios Mailbox Approval State Indicates if an enrolled Android device is rooted. Indicates if certain settings were not configured on an Android host. Indicates the Compliance state of the host, including: In Compliance Not Available Out of Compliance Indicates the device passcode status including: Compliant Not Available Not Compliant per Profiles Not Compliant Not Compliant per all Requirements Not Enabled Passcode Policy Configured Passcode Policy Not Configured Pending Compliance Confirmation Indicates restrictions configured on the device including: Allow Installing of Applications Allow Screen Capture Allow Use of Camera Allow Use of YouTube Allow User of itunes Music Store Allow User of Safari Indicates if certain hardware encryption values were detected on the host. Indicates an MDM policy applied to the device. Indicates the mailbox approval status of the device including: Approved Blocked Version

30 Out of Compliance Reasons ios Device JailBroken Hardware Inventory Custom Attributes Address Manufacturer Model Operating System Ownership Network Information ICCID Phone Number Additional Information Maas360 Software Installed Connectivity to Maas360 Cloud Listed in Service Device Discovery Not Available Quarantined Indicates if certain compliance out of compliance reasons were detected on the host. Indicates if the device is jailbroken. Indicates devices that were detected with specific device attributes, including an attribute or value. Indicates the Address of the device. Indicates the manufacturer of the device. Indicates the model of the device. Indicates the Operating System running on the device. Indicates the ownership of the device. Indicates an ICCID value detected on the device. Indicates the phone number associated with the device. Indicates if specific software is installed on the device. Indicates if CounterACT is connected to the cloud Indicates if the device is listed in service. Version

31 Open Property Search If the attributes you are looking for do not appear in any of the folders, you can use the Open Property search options to discover if a certain attribute exists or does not exist on a host, and fine-tune the search by looking for attributes that were detected at a certain date/time, with a certain integer or string. To work with Open Property tools: 1. Select the Plugin from the Plugin pane, and then select the Test button. The test results generate a list of attributes that can be used when working with open properties. 2. Copy an attribute name and paste it into the Attribute name section of a Open Properties property and enter the remaining property information. Version

32 Open Property Boolean Open Property Date Open Property Integer Open Property String Indicates if a specific attribute exists on the device or not. Indicates if a specific attribute exists on the device or not and if the attribute was detected at a certain date and time. Indicates if a specific attribute exists on the device or not and if the attribute included a certain integer. Indicates if a specific attribute exists on the device or not, and if the attribute included a certain string. Tag Devices - Policy Actions Custom Attribute Value Action Detect devices using a CounterACT policy and tag the devices with a user-defined Attribute Name and Attribute Value. This information is sent to the service cloud. For example, use CounterACT to detect devices that were resolved as guests and tag them as: Attribute Name: East Coast Office Attribute Value: Guest Devices will appear as East Coast Office Guests at the Console. Version

33 Refresh Device Information Action The Refresh Device Information action triggers the service to refresh attributes on the device. Version

34 Legal Notice Copyright ForeScout Technologies, All rights reserved. The copyright and proprietary rights in the guide belong to ForeScout Technologies. It is strictly forbidden to copy, duplicate, sell, lend or otherwise use this guide in any way, shape or form without the prior consent of ForeScout Technologies. This product is based on software developed by ForeScout Technologies. The products described in this document are protected by U.S. patent # 6,363,489 issued March 2002 and may be protected by other U.S. Patents and foreign patents. Redistribution and use in source and binary forms are permitted, provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials and other materials related to such distribution and use, acknowledge that the software was developed by ForeScout Technologies. THIS SOFTWARE IS PROVIDED AS IS AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. All other trademarks used in this document are the property of their respective owners. Send comments and questions regarding documentation to: 6/5/12 Version

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Integrating Cisco ISE with GO!Enterprise MDM Quick Start Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise

More information

Compliance Rule Sets in MaaS360

Compliance Rule Sets in MaaS360 Compliance Rule Sets in MaaS360 MaaS360 allows you to apply sets of compliance rules on mobile devices. These rules are conditions that are checked on devices on real-time basis. If a device is not in

More information

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout Embracing BYOD with MDM and NAC Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout 1 Today s Agenda The BYOD Landscape Network Access Control (NAC) 101 Embracing BYOD with MDM and NAC Use Cases 2 The BYOD

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) 10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3

More information

Embracing Complete BYOD Security with MDM and NAC

Embracing Complete BYOD Security with MDM and NAC Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

Getting Started - MDM Setup

Getting Started - MDM Setup Mobile App Getting Started - MDM Setup Thank you for acquiring the Talon Mobile app. The Talon Mobile app allows you to request sensitive justice information. To use the Talon Mobile app, your agency s

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

USER GUIDE: MaaS360 Services

USER GUIDE: MaaS360 Services USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document

More information

MaaS360 Mobile Device Management (MDM) Administrators Guide

MaaS360 Mobile Device Management (MDM) Administrators Guide MaaS360 Mobile Device Management (MDM) Administrators Guide Copyright 2014 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Cloud Extender Installation Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Dell Mobile Management. Apple Device Enrollment Program

Dell Mobile Management. Apple Device Enrollment Program Dell Mobile Management Contents Dell Mobile Management 3 Setting up the 3 DMM Device Deployment Program Prerequisites 4 Configure Apple VPP Token in DMM 5 Download Apple VPP Token 5 Assign VPP App Licenses

More information

MaaS360 On-Premises Cloud Extender

MaaS360 On-Premises Cloud Extender MaaS360 On-Premises Cloud Extender Installation Guide Copyright 2014 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software

More information

Sophos Mobile Control Startup guide. Product version: 3

Sophos Mobile Control Startup guide. Product version: 3 Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Sophos Mobile Control Startup guide. Product version: 3.5

Sophos Mobile Control Startup guide. Product version: 3.5 Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

GRAVITYZONE HERE. Deployment Guide VLE Environment

GRAVITYZONE HERE. Deployment Guide VLE Environment GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including

More information

Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal

Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal This Application Note provides instructions for configuring Apps settings on the Cisco OnPlus Portal and Autotask application settings

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Cloud Services MDM. Email Management Admin Guide

Cloud Services MDM. Email Management Admin Guide Cloud Services MDM Email Management Admin Guide 10/27/2014 CONTENTS Email Management... 2 Email Compliance Policies... 3 Email Policies... 4 Attachment Security Policies... 8 Attachment Security Policies

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction.... 3 What Is the Cisco TrustSec System?...

More information

Introduction to Directory Services

Introduction to Directory Services Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory

More information

Radia Cloud. User Guide. For the Windows operating systems Software Version: 9.10. Document Release Date: June 2014

Radia Cloud. User Guide. For the Windows operating systems Software Version: 9.10. Document Release Date: June 2014 Radia Cloud For the Windows operating systems Software Version: 9.10 User Guide Document Release Date: June 2014 Software Release Date: June 2014 Legal Notices Warranty The only warranties for products

More information

Mobility Manager 9.5. Users Guide

Mobility Manager 9.5. Users Guide Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks

More information

Kaspersky Lab Mobile Device Management Deployment Guide

Kaspersky Lab Mobile Device Management Deployment Guide Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile

More information

OneLogin Integration User Guide

OneLogin Integration User Guide OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5

1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5 User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Mobile Device Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Velocity Web Services Client 1.0 Installation Guide and Release Notes

Velocity Web Services Client 1.0 Installation Guide and Release Notes Velocity Web Services Client 1.0 Installation Guide and Release Notes Copyright 2014-2015, Identiv. Last updated June 24, 2015. Overview This document provides the only information about version 1.0 of

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

Addressing BYOD Challenges with ForeScout and Motorola Solutions

Addressing BYOD Challenges with ForeScout and Motorola Solutions Solution Brief Addressing BYOD Challenges with ForeScout and Motorola Solutions Highlights Automated onboarding Full automation for discovering, profiling, and onboarding devices onto both wired and wireless

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal

Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal This Application Note explains how to configure ConnectWise PSA (Professional Service Automation) application settings and Cisco

More information

Quick Start Guide. Version R9. English

Quick Start Guide. Version R9. English Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Introduction to Cloud-Based Mobile Device Management with Intune

Introduction to Cloud-Based Mobile Device Management with Intune Introduction to Cloud-Based Mobile Device Management with Intune Information in this document, including URLs and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Citrix Systems, Inc.

Citrix Systems, Inc. Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change

More information

Kaseya 2. User Guide. Version 1.0

Kaseya 2. User Guide. Version 1.0 Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01 Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,

More information

Sophos Mobile Control Administrator guide. Product version: 3

Sophos Mobile Control Administrator guide. Product version: 3 Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing

More information

Sophos Mobile Control Installation guide. Product version: 3

Sophos Mobile Control Installation guide. Product version: 3 Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External

More information

SOLARWINDS ORION. Patch Manager Evaluation Guide for ConfigMgr 2012

SOLARWINDS ORION. Patch Manager Evaluation Guide for ConfigMgr 2012 SOLARWINDS ORION Patch Manager Evaluation Guide for ConfigMgr 2012 About SolarWinds SolarWinds, Inc. develops and markets an array of network management, monitoring, and discovery tools to meet the diverse

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide

ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide Notice Altiris Software Delivery Solution for Windows 6.1 SP3 Product Guide 2007 Altiris, Inc. All rights reserved. Document Date: February

More information

Getting Started Guide: Getting the most out of your Windows Intune cloud

Getting Started Guide: Getting the most out of your Windows Intune cloud Getting Started Guide: Getting the most out of your Windows Intune cloud service Contents Overview... 3 Which Configuration is Right for You?... 3 To Sign up or Sign in?... 4 Getting Started with the Windows

More information

Managing Software Updates with System Center 2012 R2 Configuration Manager

Managing Software Updates with System Center 2012 R2 Configuration Manager Managing Software Updates with System Center 2012 R2 Configuration Manager Managing Microsoft Updates with Configuration Manager 2012 R2 This document is for informational purposes only. MICROSOFT MAKES

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

QuickStart Guide for Mobile Device Management

QuickStart Guide for Mobile Device Management QuickStart Guide for Mobile Device Management Version 8.5 Inventory Configuration Security Management Distribution JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made

More information

MaaS360 Quick Start Guide

MaaS360 Quick Start Guide MaaS360 Quick Start Guide MaaS360 provides you with an easy-to-use interface for managing personally and corporately owned mobile devices. There are a few steps you must follow as part of set up and device

More information

Sophos Mobile Control Technical guide

Sophos Mobile Control Technical guide Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory

More information

Using the Apple Configurator and MaaS3360

Using the Apple Configurator and MaaS3360 Using the Apple Configurator and MaaS3360 Overview Apple Configurator Utility (ACU) is a free Apple tool that enables a Mac to configure up to 30 ios devices simultaneously via a USB. There are two modes

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Use Host Information in Policy Enforcement

Use Host Information in Policy Enforcement Use Host Information in Policy Enforcement Although you may have stringent security at your corporate network border, your network is really only as secure as the end devices that are accessing it. With

More information

Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series Good MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Imran Bashir Date: December 2012 Table of Contents Mobile Device Management (MDM)... 3 Overview... 3

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

Securing Healthcare Data on Mobile Devices

Securing Healthcare Data on Mobile Devices Securing Healthcare Data on Mobile Devices Michelle Cook, Healthcare Mobility Specialist Keith Glynn, CISSP, Sr. Technical Solutions Engineer October 31, 2013 Poll Question #1 Has your organization deployed

More information

5nine Security for Hyper-V Datacenter Edition. Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager

5nine Security for Hyper-V Datacenter Edition. Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager 5nine Security for Hyper-V Datacenter Edition Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager November 2013 11 Table of Contents Summary... 5 System requirements... 5 Permissions...

More information

Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6

Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6 Integration Guide Manager for use with epolicy Orchestrator 4.6 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

USER GUIDE: MaaS360 Financial IT Reg Enforcement Service

USER GUIDE: MaaS360 Financial IT Reg Enforcement Service USER GUIDE: MaaS360 Financial IT Reg Enforcement Service 3.2011 Copyright 2011 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software

More information

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series XenMobile Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction... 3 What Is the Cisco TrustSec System?...

More information

QuickStart Guide for Mobile Device Management. Version 8.6

QuickStart Guide for Mobile Device Management. Version 8.6 QuickStart Guide for Mobile Device Management Version 8.6 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

LogLogic Trend Micro OfficeScan Log Configuration Guide

LogLogic Trend Micro OfficeScan Log Configuration Guide LogLogic Trend Micro OfficeScan Log Configuration Guide Document Release: September 2011 Part Number: LL600065-00ELS090000 This manual supports LogLogic Trend Micro OfficeScan Release 1.0 and later, and

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Learn More MaaS360 Cloud Extender Checklist (MDM for Blackberry)

Learn More MaaS360 Cloud Extender Checklist (MDM for Blackberry) Learn More MaaS360 Cloud Extender Checklist (MDM for Blackberry) June 2011 Copyright 2011 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without

More information

ManageEngine Desktop Central. Mobile Device Management User Guide

ManageEngine Desktop Central. Mobile Device Management User Guide ManageEngine Desktop Central Mobile Device Management User Guide Contents 1 Mobile Device Management... 2 1.1 Supported Devices... 2 1.2 What Management Operations you can Perform?... 2 2 Setting Up MDM...

More information

EMC Smarts Network Configuration Manager

EMC Smarts Network Configuration Manager EMC Smarts Network Configuration Manager Version 9.4.1 Advisors User Guide P/N 302-002-279 REV 01 Copyright 2013-2015 EMC Corporation. All rights reserved. Published in the USA. Published October, 2015

More information

Sophos Mobile Control Installation guide. Product version: 3.5

Sophos Mobile Control Installation guide. Product version: 3.5 Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External

More information

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide

Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide August 22, 2013 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered

More information

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management

More information

HDA Integration Guide. Help Desk Authority 9.0

HDA Integration Guide. Help Desk Authority 9.0 HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

Zenprise Device Manager 6.1.5

Zenprise Device Manager 6.1.5 Zenprise Device Manager 6.1.5 CLIENT GUIDE Rev 6.1.50 Introduction 2 ZENPRISE DEVICE MANAGER 6.1 CLIENT GUIDE 2011 Zenprise, Inc. All rights reserved. This manual, as well as the software described in

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

When enterprise mobility strategies are discussed, security is usually one of the first topics

When enterprise mobility strategies are discussed, security is usually one of the first topics Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced

More information

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication

More information

Deploying System Center 2012 R2 Configuration Manager

Deploying System Center 2012 R2 Configuration Manager Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

Introduction to the Mobile Access Gateway

Introduction to the Mobile Access Gateway Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch

More information

CA Mobile Device Management 2014 Q1 Getting Started

CA Mobile Device Management 2014 Q1 Getting Started CA Mobile Device Management 2014 Q1 Getting Started This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

Mobility Manager 9.0. Installation Guide

Mobility Manager 9.0. Installation Guide Mobility Manager 9.0 Installation Guide LANDESK MOBILITY MANAGER Copyright 2002-2012, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

2X Cloud Portal v10.5

2X Cloud Portal v10.5 2X Cloud Portal v10.5 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Agent Configuration Guide

Agent Configuration Guide SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright

More information

Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide

Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide Live Maps for System Center Operations Manager 2007 R2 v6.2.1 Installation Guide CONTENTS Contents... 2 Introduction... 4 About This Guide... 4 Supported Products... 4 Understanding Live Maps... 4 Live

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Administration Guide for the System Center Cloud Services Process Pack

Administration Guide for the System Center Cloud Services Process Pack Administration Guide for the System Center Cloud Services Process Pack Microsoft Corporation Published: May 7, 2012 Author Kathy Vinatieri Applies To System Center Cloud Services Process Pack This document

More information

Mobile Configuration Profiles for ios Devices Technical Note

Mobile Configuration Profiles for ios Devices Technical Note Mobile Configuration Profiles for ios Devices Technical Note Mobile Configuration Profiles for ios Devices Technical Note December 10, 2013 04-502-197517-20131210 Copyright 2013 Fortinet, Inc. All rights

More information