User Guide. Version R92. English
|
|
|
- Agatha Byrd
- 10 years ago
- Views:
Transcription
1 Enterprise Mobility Management User Guide Version R92 English October 23, 2015
2 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from time to time by Kaseya at If Customer does not agree with the Agreement, please do not install, use or purchase any Software and Services from Kaseya as continued use of the Software or Services indicates Customer s acceptance of the Agreement Kaseya. All rights reserved.
3 Contents Overview... 1 Enterprise Mobility Management Module Requirements... 2 User Interface... 3 Onboarding Customers... 3 Onboarding Users... 5 Managing Users Manually... 6 Importing Users Using CSV... 6 Importing Active Directory Users... 7 Configuring Active Directory Integration... 8 Inviting Users Managing Devices Command Status Audit Actions Tracking Actions Messaging Actions Lost / Found Actions Devices Actions Alerts Actions Viewing Device Details Configuring Policies MDM Profiles Configuring the MDM Security Profile Configuring the ios Profile Configuring a Web Clip Profile Configuring a WiFi Profile Configuring a Mail Profile Configuring an Apps Profile BYOD Profiles Managing Apps on Devices Configuring the App Catalog Viewing App Inventory WorkBrowser and WorkDocs Using WorkBrowser Using WorkDocs Logging Module Activity Reports Index i
4
5 Overview Overview Enterprise Mobility Management is a new module that provides an enterprise-class, integrated solution for managing mobile devices, apps and secure access to company data by policy. This includes the fastest deployment in the industry for onboarding customer organizations and their users. Mobile devices can be company-owned or employee-owned. Enterprise assets are always isolate from personal data. Data is secured using AES-256 enctyption at rest and in flight. A single easy-to-use, integrated user interface enables you to quickly: Onboard new and existing customer organizations into Enterprise Mobility Management using a wizard setup. Apply high, medium, and low security policies that you can customize. Use preset configuration profiles for each level of security. Launch invitations to users to register their devices. Registering installs a Kaseya agent app on their device called MobileManage. Manage multiple devices for each user. Require or disallow the installation of apps on mobile devices. Identify installed apps on mobile devices. Audit each mobile device, providing a detailed inventory of operating system, device information, platform and network properties. Enable or disable tracking the location of mobile devices in real time and maintain a location history. Force an alarm to sound on devices to help users locate their lost devices. Lock, wipe and reset lost or stolen devices. Be alerted if a lost device checks in or is out of compliance. Send text messages from Enterprise Mobility Management to mobile devices. Provide mobile device users safe, secure access to their company s internal websites and documents using two container apps. The website browser app is called WorkBrowser. You can optionally control access to linked internal websites with WorkBrowser using proxy URLs. The document browser app is called WorkDocs. WorkDocs allows a user to edit and save documents locally or upload changed documents to their company s internal networks. Licensing Licensing is by the number of users managed by Enterprise Mobility Management. Each licensed user can have an unlimited number of devices managed by Enterprise Mobility Management. Simplified User Interface The user interface comprises a single page with four tabs. Each tab features drill-down menus for: Users Devices Apps Policies User Management Active Directory Integration - Optionally use a customer organization's Active Directory instance to identify the users invited to register their mobile devices. Security policies in Enterprise Mobility Management are applied to a device based on its association with an Active Directory user. 1
6 Enterprise Mobility Management Module Requirements Enterprise Mobility Management does not store any user credentials but only acts as a relay for Active Directory authentication. Active Directory is required to use BYOD profiles. CSV file - Optionally import user records using a CSV data file. Manual - You can manually add, edit and delete user data records. Mobile Devices Supported Enterprise Mobility Management supports the following mobile devices: ios version 7.0 and above Android version and above Upgrading Enterprise Mobility Management is only supported in on premise environments. When upgrading to R9 or later in an on premise environment from a version earlier than R9, Mobile Device Management is removed and Enterprise Mobility Management is added. Migration of data from Mobile Device Management to Enterprise Mobility Management is not supported. Enterprise Mobility Management Module Requirements Kaseya Server The Enterprise Mobility Management R92 module requires on premise VSA R92. Mobile Device Management, if installed, is uninstalled on upgrade. Note: SaaS VSA environments continue to use Mobile Device Management on upgrade to R92. This module requires the VSA have internet access. Requirements for Each Managed Mobile Device ios version 7.0 and above Android version and above Requirements for Active Directory Servers Customer organizations can optionally use Active Directory to add users to Enterprise Mobility Management or import a CSV file. Active Directory is required to use BYOD profiles. If using Active Directory, the Active Directory instance must allow access from the VSA. Only the TLS protocol is supported at this time. If the VSA does not share the same intranet as an Active Directory instance, the Active Directory instance must be available on a public IP. For security reasons this IP should only be reachable from the MSP's VSA IP address. Mobile devices relay their authentication requests through the VSA to reach an Active Directory instance. Customer organizations should whitelist the VSA IP address for servers hosting customer Active Directory instances. Requirements for WebDAV Servers NTLM enabled if authentication is required. Allow access from the VSA. If the VSA does not share the same intranet as a WebDAV server, the WebDAV server must be available on a public IP. For security reasons this IP should only be reachable from the VSA IP address. Mobile devices relay their requests through the VSA to reach these WebDAV servers. Customer organizations should whitelist the VSA IP address for the servers hosting WebDAV servers. 2
7 User Interface User Interface Enterprise Mobility Management is identified as the Mobility module in the navigation pane of the VSA. The module is organized around a single, integrated user interface. The same four main functions run along the top of every page or along the side in the navigation pane: Users Devices Apps Policies The first time you display the Mobility module it shows you a tile view of existing customer organizations, similar to the image below. Every task performed in the Mobility module starts with this same user interface. Onboarding Customers Customer organizations must be added to Enterprise Mobility Management before inviting users to register their devices. Creating a New Organization in the VSA Follow this procedure if the customer organization you want to add is new to the entire VSA. 1. Navigate to the System > Orgs/Groups/Depts/Staff > Manage page. 2. Click New to display the Add Organization dialog. 3. Enter an ID and Org Name to identify the new customer organization. 4. Click Save. Your new customer organization has been created. Now return to the Mobility module to add the customer organization to Enterprise Mobility Management. Adding a Customer Organization in the Mobility Module 1. Click the New tile to start the New Customer Setup Wizard. 3
8 Onboarding Customers Click the trashcan icon in the upper right corner of a tile to remove an organization after adding it to Mobility. Removing it does not delete the organization from the VSA. The tile view can be re-displayed from an existing user page by clicking the Create New Customer link. 2. Select the customer organization you want to add to the Mobility module. 3. Optionally include a customer logo. 4. Select MDM only, BYOD only or MDM & BYOD both. You selection determines the policy profiles and options that are displayed to you in the user interface when this customer organization is selected. Active Directory is required to use BYOD profiles. 5. Click Create. 6. The last page prompts you with two choices: Click Later to accept default pre-defined policies for this newly onboarded customer organization. This option bypasses setting customizable properties that are specific to that customer organisation. Click Yes to configure new customer-specific policies that include both pre-defined and customizable properties. 4
9 Onboarding Users Note: See Configuring Policies (page 18) for details about selecting this option. Onboarding Users Actions You onboard users from the Users page for a selected customer organization (page 3). There are three ways to create device user records in Enterprise Mobility Management. Add user records manually (page 6) Import from Active Directory (page 7) - Active Directory is required to use BYOD profiles. Import from a CSV file (page 6) Importing user records overwrites any user records that already exist. Active Directory integration never automatically imports user records. Status - Users default to an activated state. Activate - Clicking the activate button for a user 'unblocks' a blocked user, or 'unlocks' a locked user. A user is blocked by a VSA administrator. A user is locked by exceeding the number of invalid attempts allowed by policy while attempting to log into BYOD apps (page 22). Block - Blocks a user from using BYOD apps (page 22). Invite Users (page 11) Manage Users (page 6) Add Users - Adds a single user. Edit User - Edits a selected user. Delete User - Deletes a user. Bulk Import Import from AD (page 7) Import from CSV (page 6) 5
10 Onboarding Users Export Users - Exports user data to a CSV file. Managing Users Manually You can add, edit and delete users manually. Adding or editing a user record requires the following: Name - A friendly name for the user that displays in the VSA. - The address for the user. UserId - A unique identifier formatted as an address. Policy - One of three security policies assigned to this user. The default policies are: High Security Policy Medium Security Policy Low Security Policy Note: Customer-specific security policies can be assigned if they have been defined for a customer organization. Importing Users Using CSV You can optionally bulk import user records using a CSV file. 1. Prepare a CSV file of user data records. Use the following CSV file format. 6
11 Onboarding Users Full Name,Policy Name, ,User Principal Name Low Security Medium Security High Security Note: You can create a starter CSV file by adding a single user record manually on the Users page, then exporting it. 2. Select the Users page for an onboarded customer organization (page 3). 3. Select the Bulk Import > Import from CSV. 4. Browse for the CSV you have prepared and select it for importing. Importing Active Directory Users You can optionally import user records from Active Directory. Active Directory is required to use BYOD profiles. 1. Select the Users page for an onboarded customer organization (page 3). 2. Select the Bulk Import > Import from AD. 3. Specify the Active Directory parameters Enterprise Mobility Management will use to identify users in the customer organization. Enterprise Mobility Management. See Configuring Active Directory for Integration (page 8). Directory Type - Active Directory is the only option. Directory URL (with port) - Enter an LDAP URL. The default LDAP port to use is 389. Example: ldap:// :389 Username - Enter an Active Directory username that provides access to the distinguished name specified in the Search Base field. Password - Enter the password. Search Base - Enter the distinguished name used to search for the three groups of users in this instance of Active Directory that are eligible to register their devices with Enterprise Mobility Management. Do not include spaces beween commas. Example: OU=Kaseya EMM Groups,DC=company,DC=com 4. Click the Test Connection button to verify your Active Directory connection. If successful, click Next to populate Enterprise Mobility Management with the three groups of users eligible to register their devices with Enterprise Mobility Management. 7
12 Onboarding Users If the test fails, check the values entered on this wizard page match your Active Directory configuration. The test must be successful to continue onboarding this customer organization. 5. Assign Enterprise Mobility Management mobile device policies to the new customer organization. You can assign one High policy, one Medium policy and one Low policy to each customer organization you register in Enterprise Mobility Management. Select the default High, Medium and Low policies if you have not created customer-specific policies yet. Configuring Active Directory Integration Enterprise Mobility Management can optionally use a customer organization's Active Directory instance to identify the users invited to register their mobile devices. Active Directory is required to use BYOD profiles. Security policies in Enterprise Mobility Management are applied to a device based on its association with an Active Directory user. Note: User records can also be managed by importing a CSV file (page 6) of user data records or manually adding new user records. Key Integration Concepts User records are imported into Enterprise Mobility Management from Active Directory. See Enterprise Mobility Management Module Requirements (page 2) for additional Active Directory requirements. The security group a user belongs to in Active Directory determines the policy profile they are assigned in Enterprise Mobility Management. Switching a user to a different security group in Active Directory reassigns that user to a different policy profile in Enterprise Mobility Management. Devices are mapped to the users once they install and register the Kaseya Agent on their devices using the unique activation code ed to them. The user's mobile devices do not need access to Active Directory for authentication. An app request is sent from the device to Enterprise Mobility Management which relays the request to Active Directory. The AD authentication component within Enterprise Mobility Management does not store any user credentials but only acts as a relay for AD authentication. Creating Three Active Directory Security Groups Enterprise Mobility Management requires three security groups be created in Active Directory. These map to three security policies in Enterprise Mobility Management: 8
13 Onboarding Users High Security Policy Medium Security Policy Low Security Policy All Active Directory user records intended for import into Enterprise Mobility Management must be included in one of these three security groups. 1. Open the Active Directory console and create a new organizational unit called Kaseya EMM Groups under the main domain. 2. Create three security groups under Kaseya EMM Groups. Name them High Security Group, Medium Security Group and Low Security Group. 9
14 Onboarding Users Note:You may name these security groups differently. But for ease of mapping with Enterprise Mobility Management, we recommend using these names. 10
15 Onboarding Users 3. Right click each of the three Kaseya EMM Groups, then click the Properties option. Open the Members tab, then click the Add button. 4. Search for users in Active Directory to add to each of the three Kaseya EMM Groups. Now you have created the three EMM security groups (High Medium and Low) and mapped appropriate users to them. 5. Once the configuration is complete, make note of the following. This information is required to connect to any instance of Active Directory you intend to associate with an organization within Enterprise Mobility Management. The domain name or IP address of the Active Directory server. Ensure the Active Directory instance can be accesssed from the VSA. Only the TLS protocol and port 389 are supported at this time. The base DN (distinguished name) to search for: Example: OU=Kaseya EMM Groups,DC=company,DC=com Do not include spaces beween commas. The credential to use to authenticate read access to this distinguished name. A dedicated credential is recommended. Inviting Users Users are automatically invited to install a Kaseya agent on their mobile devices as soon as the user recorded is 11
16 Managing Devices created within Enterprise Mobility Management. User status will already display Invited when you first see users listed on this page. You may wish to invite a user again if he or she failed to receive their original invitation. 1. Navigate to the Users page. 2. Select one or more users. 3. Click the Invite > Invite Users option. The Status column shows Invited when an invitation has been sent to a user. The Status column shows Active when the user has installed the Enterprise Mobility Management agent on at least one or more devices. The number of the devices managed by Enterprise Mobility Management for that user is indicated by the device icons in the Devices column. Note: See Managing Devices (page 12) for details about mobile device management. Managing Devices Once users have registered devices with Enterprise Mobility Management you can manage their devices. 1. Navigate to the Devices page. 2. Select a customer organization. 3. Select one of the tiles. Tiles are organized: by Status by Policy 12
17 Managing Devices by Category A list of devices for the selected filtering displays. 4. Select one or more rows in the list of devices to enable all the tabs at the top of the table. Note: Clicking the hyperlink for a device name on the Devices page displays device details in a series of tabs. See Device Details (page 15) for more information. 5. Clicking the Command icon for a device in the device list displays the Command Status (page 14) window. 6. The actions you can perform on devices are organized into the following tabs. See any of the following topics for details. Audit (page 14) Tracking (page 14) Messaging (page 14) Lost / Found (page 15) Device (page 15) Alerts (page 15) 13
18 Managing Devices Command Status Clicking the Command icon for a device in the device list displays the Command Status window. This window shows the status of commands sent to a device. - The command is pending. The agent has not checked-in to retrieve it. - The agent is processing the command. - The operation is complete. - Command failed. Use the Mark Complete option to manually set one or more commands to complete. Audit Actions Audits are performed as soon as the user installs a Kaseya agent on his or her mobile device. Audits are run daily by default after that. Schedule Audit - Schedules an audit for a specified time for selected devices. Schedule once or periodically. Each type of recurrence Daily, Weekly, Monthly displays additional options appropriate for that type of recurrence. Periodic scheduling includes setting start and end dates for the recurrence. Run Audit Now - Runs an audit of a selected device immediately. Get Logs - The device log is for Kaseya support purposes only. The device log shows the actual messages sent back and forth between the VSA and a selected device. Tracking Actions You can perform any of following Tracking actions on a device. Enable Tracking - Starts location tracking of selected devices. Once started, you can view the tracking of the device on a map using the Location tab of a device. See Viewing Device Details (page 15). Disable Tracking - Stops location tracking of selected devices. Get Current Location - Returns the current location of a selected device, on demand, without continuously tracking its location. Location History - Displays the location history of a device. The default start date for the location history is yesterday. The end date is always the current date. Change the start date of the location history, then click Refresh. Messaging Actions You can perform any of following Messaging actions on a device. View - Displays the history of messages sent to the user. Send - Displays a dialog you can use to enter and send a text message to the user. 14
19 Managing Devices Lost / Found Actions You can perform any of following Lost / Found actions on a device. Sound Stolen Alarm - If clicked selected devices repeatedly say, "This phone is stolen." whenever they are turned on. See Silence Alarm below. Wipe Data - If clicked, selected devices are reset back to their default settings. Wiping a device deletes all user data, including the MobileManage app. The MobileManage app can no longer check-in after wiping the device. Clear Passcode - Resets device-level passcodes on selected ios devices. A reset unlocks the device, allowing the user to either use the device with no passcode or to set a new passcode. Clearing the passcode does not change the underlying security profile. If the device is configured to require a device-level passcode, the user is immediately prompted to enter a new one. Request Checkin - Users of selected devices are instructed to tap the icon on the MobileManage app to open it. Opening the MobileManage app causes the app to check in immediately. Mark as Lost - Marks selected devices as lost. Mark as Found - Marks selected devices as found. Silence Alarm - Stops alarms set using the Sound Stolen Alarm actions on selected devices. Devices Actions You can perform any of following Devices actions on a device. Lock Device - If clicked, selected devices are locked, preventing user access. Delete - Deletes selected device accounts in Enterprise Mobility Management. Alerts Actions You can perform any of following Alerts actions on a device. Details - Displays an Alert Details window for selected devices: Alert Name - The alert type: Lost Device Checked In Alert or App Compliance Check. Enabled - Alerts are always enabled. Status - alert or ok Details - For an App Compliance Alert, displays the counts for required apps or disallowed apps. Action - Resolves the alert, resetting it to an ok status. Resolved - Resolves alerts, by alert type, for selected devices. Resolving an alert notifies the users of selected mobile devices. Viewing Device Details Clicking the hyperlink beneath a device name on the Devices page displays the details of that device in a series of tabs. General Application App Compliance Logs Messages 15
20 Managing Devices Location General tab Operating System Type - The type of operating system on the device. OS Version - The version of operating system used by the device. Build - The build number of the operating system. Device Information Location Platform Name - The name the device uses to identify itself. Agent ID - The Kaseya agent GUID. Device Identifier - A unique identifier assigned to the device by the manufacturer. Serial - The serial number of the device. IMEI - The unique identifier of the device's main assembly, independent of the SIM card plugged into the device. The IMEI number applies to GSM, WCDMA and iden mobile phones. ICC - The unique identifier of the SIM card plugged into a device. KMDM Version - The version of the MobileManage app on the device. Phone Number - The phone number of the device. Some mobile devices do not have phone numbers. Data Roaming - True or False. WiFi MAC - The MAC ID of the device. Timezone - The timezone used by the device. Last Latitude - The last latitude returned by the device. Last Longitude - The last longitude returned by the device. Manufacturer - The manufacturer of the device hardware. Model Name - The model name of the device hardware. 16
21 Managing Devices Model - The model number of the device hardware. Radio Version - The version of modem firmware used by the device. Also called the "baseband" version. Internal Total - The total memory available and built into the hardware. Internal Free - Free memory available and built into the hardware. External Total - The total memory available externally. External Free - Free memory available externally. Home network Home Carrier - The main service provider of the device. Home MCC - The home mobile country code of the device. Large countries can have more than one mobile country code. Home MNC - The mobile network code for the home operator/carrier of the device. Current network Current Carrier - The carrier currently being used by the device. Current MCC - The mobile country code currently being used by the device. Current MNC - The mobile network code of the operator/carrier currently being used by the device. Applications tab The Applications tab displays a list of the apps installed on the selected managed mobile device. App Compliance tab Logs tab The App Compliance tab shows Required Apps Missing from Device. Package Name - The full name of the app in reverse-domain format. Example: com.kaseya.enterprise.agent. App Name - The friendly name of the app. Example: Agent. The Logs tab displays device log entries. The device log is for Kaseya support purposes only. The device log shows the actual messages sent back and forth between the VSA and a selected device. Messages Location The Messages tab displays a history of messages sent to and from the device. Direction - Sent from the device. - Sent from the VSA administrator. Date - Date/time of the message. From - Applies to device messages only. The device identifier and machine group. Message - Text of the message. The Location tab displays location tracking data for a selected device. Each numbered marker on the map references a numbered list on the right side of the map. The numbered list identifies the date and time the device was at that location. Note: If you don't see a location marker for a device you're tracking, try resetting the filter to display an earlier date range. 17
22 Configuring Policies Date and Time - The location history start date and time. The default start date for the location history is yesterday. The end date is always the current date. Refresh - Refresh the map after resetting the Date and Time filter. Configuring Policies The Policies page assigns Enterprise Mobility Management policies by customer organization and high, medium and low security groups. You can drill into any policy to: Review predefined policies settings. You can edit the options controlled by all preset security profiles. Create a new policy and configure customizable settings for that customer organization. Creating and Configuring a New Policy 1. On the Policies page, select the customer organization you want to view. 2. Click the hyperlink of any of the listed policies. 3. Enter a new name in the Policy Name field. For example, for the company Acme, you might enter Acme High Security Policy. 4. Confirm that the correct policy type is selected: High, Medium or Low in the drop-down list. Change to the correct policy type, if necessary. 5. Click the Save Policy Name button. You have now created and assigned a new policy to the selected customer organization. 18
23 Configuring Policies 6. Set any of the profiles for the policy you have created. MDM Profiles Configuring the MDM Security Profile The MDM Security Profile configures policies related to the creation of device-level PINs (also called a passcode or access code). PINs are used by users to unlock their mobile devices. Note: Android only supports the following settings: allow simple, force pin, minimum length, require alpha, max inactivity and max failed attempts. Allow Simple - If checked, permits users to use sequential or repeated characters in their PINs (passcodes). For example, this would allow the passcodes 3333 or DEFG. Force Password - If checked, the user must supply a PIN (also called a passcode or access code) to access the entire mobile device. If not checked, no PIN is required. Note: BYOD Profiles may enforce an app-level PIN as well. The two PINs are independent of each other. Maximum Failed Attempts - Determines how many failed PIN attempts can be made before the device is wiped. The default behavior is device manufacturer dependent. Maximum Inactivity - The number of seconds to wait while a user does not use the device before locking the device. Maximum Pin Age (In Days) - The maximum number of days to use the same PIN. Minimum Complex Characters - The minimum number of complex characters required in a PIN. Minimum Length - The minimum length required for a PIN. Require Alphanumeric - If check, requires both alphabetic and numeric characters. Pin History - If checked, maintains a PIN history. Maximum Grace Period - Specifies how soon the device can be unlocked again after use, without prompting again for the PIN. Configuring the ios Profile Allow App Installation - If checked, applications can be installed. Allow Camera - If checked, the camera on the device is enabled. Maximum Failed Attempts - If the user exceeds the number of passcode attempts allowed, typically 10, the phone becomes locked. The only way to use it again is to restore the phone to the factory settings, which wipes all data from the phone in the process. After restoring the phone, the phone can be restored to the last backup made. Allow Screen Shot - If checked, the device can create snapshots of its own screen. Allow YouTube - If checked, YouTube is enabled. Allow itunes - If checked itunes is enabled. Allow Safari - If checked, the Safari web-browser is enabled. Allow Face Time - If checked, users can place or receive FaceTime video calls. Allow automatic sync while roaming - If checked, devices sync while roaming. If unchecked, devices sync only when an account is accessed by the user. Allow Siri - If checked, users can use Siri, voice commands, or dictation. Allow voice dialing - If checked, users can dial their phone using voice commands. Allow In-App Purchase - If checked, users can make in-app purchases. 19
24 Configuring Policies Force user to enter itunes Store password for all purchases - If checked, users are required to enter their Apple ID password before making any purchase. Normally, there s a brief grace period after a purchase is made before users have to authenticate for subsequent purchases. Allow multiplayer gaming - If checked, users can play multiplayer games in the Game Center. Allow adding Game Center friends - If checked, users can add friends in the Game Center. Force fraud warning - If checked, Safari warns users when visiting websites identified as being fraudulent or compromised. Enable JavaScript - If checked, Safari executes javascript on websites. Block pop-ups - If checked, Safari s pop-up blocking feature is enabled. Accept cookies - Choose when to accept all cookies: Never, From visited sites, Always. Allow backup - If checked, users can back up their device to icloud. Allow document sync - If checked, users can store documents in icloud. Allow Photo Stream (disallowing can cause data loss) - If checked, users can enable Photo Stream. Allow diagnostic data to be sent to Apple - If checked, ios diagnostic information is sent to Apple. Allow user to accept untrusted TLS certificates - If checked, users will be asked if they want to trust certifications that cannot be verified. This setting applies to Safari and to Mail, Contacts, and Calendar accounts. Force encrypted backups - If unchecked, then in itunes the user can choose to encrypt or not encrypt a backup from the device to a local machine. If checked, then in itunes the user is forced to encrypt the backup. When a backup is encrypted, a message box on the device prompts the user to enter an encryption password. Allow explicit music and podcasts - If checked, explicit music or video content in the itunes Store is displayed instead of hidden. Explicit content is flagged by content providers, such as record labels, when listed on the itunes Store. Configuring a Web Clip Profile This profile type is supported on ios devices. For ios devices, the URL must begin with HTTP or HTTPS. This profile is not supported on Android. The Web Clip Profile specifies a web application "shortcut" to a URL that the device can access. An organization may want to install shortcuts on devices pointing to its web pages or support documents. Name - The name of the profile. URL - The URL of the web application shortcut. Description - The description of the profile. Icon - Upload a png file to serve as the icon for the shortcut. Is Removable - If checked, the user can remove the web application shortcut. Configuring a WiFi Profile This profile type is supported on ios and Android devices. The WiFi Profile sets WiFi options on devices. Name - The name of the profile. SSID - A unique identifier of a wireless network. Hidden Network - If checked, the wireless network does not broadcast its SSID. Encryption Type - The type of encryption used by the wireless network. Make sure that these values exactly match the capabilities of the network access point. If you're unsure about the encryption type, or would prefer that it applies to all encryption types, use the value Any. WEP - Wired Equivalent Privacy WPA - WiFi Protected Access. Includes both WPA and WPA2. Open - Any other type of WiFi protocol. No password it required to connect. 20
25 Configuring Policies Password - The WiFi password. Configuring a Mail Profile This profile type is supported on ios devices. The Profile configures the client on a managed mobile device. Account Type - IMAP, POP, Gmail or Exchange. Incoming Server IP or Hostname - The IMAP or POP3 incoming server. For example, pop.your .com or imap.your server.com. Incoming Server Port - The port number used by the incoming service. For POP3, typically 110, or if SSL is enabled, 995. If IMAP is enabled, typically 143 or if SSL is enabled, 993. Incoming Server Requires Password - If checked, the incoming server requires a password. Use SSL for Incoming - If Yes, communication with the incoming server is encrypted using SSL. Your incoming server must support SSL to use this feature. Leave Messages on the Server - If Yes, remains stored on the incoming server after it is delivered to the device. Outgoing Server IP or Hostname - The SMTP outgoing server. For example, smtp.your server.com. Outgoing Server Port - The port number using the outgoing server. Typically 25, or if SSL is enabled, 465. Use Same Password as Incoming Server - If checked, both incoming and outgoing use the same incoming password. If blank, specify a password. Outgoing Server Requires Password - If checked, the outgoing server requires a password. Use SSL for Outgoing - If Yes, communication with the outgoing server is encrypted using SSL. Your outgoing server must support SSL to use this feature. Configuring an Apps Profile Custom app profiles can be assigned to a policy. A custom app profile determines the apps that are either required or disallowed on the managed devices of a customer organization. Before performing this step the following steps should be completed: Managing Apps on Devices (page 22) Configuring the App Catalog (page 23) Configuring an App Profile in a Policy 1. On the Policies page, select the customer organization you want to view. 2. Click the hyperlink of any of the listed policies. 3. Expand the App Profiles to add one or more apps to the custom app profile for this customer organization. 4. Click the Add button. 5. Select one or more apps to add to the custom app profile. 6. Click the Add Apps button. 7. Set the Status of the app to either Disallowed or Required. If an app is Disallowed, Enterprise Mobility Management does not automatically uninstall the app. The user is asked to perform the uninstall manually. If an app is Required and the app is a store app, Enterprise Mobility Management sends an invitation with a link to install the app to device users. 8. Optionally delete a selected app from the custom app profile using the Delete Row option. 9. Click Save to complete the configuration. 21
26 Managing Apps on Devices BYOD Profiles Note: BYOD Profiles require Active Directory integration (page 7). You can configure BYOD profiles for a selected customer organization and Active Directory security group. Whitelisting the VSA If the VSA does not share the same intranet as a WebDAV server, the WebDAV server must be available on a public IP. For security reasons this IP should only be reachable from the VSA IP address. Mobile devices relay their requests through the VSA to reach these WebDAV servers. Customer organizations should whitelist the VSA IP address for the servers hosting WebDAV servers. Access Profile User's device locks out after n failed attempts - Number of attempts. Security Profile URL Profile Users may item content to others - Yes / No. Users may open item content with non suite apps - Yes / No. Users may save images to device's photo library - Yes / No. Users may print non-suite content - Yes / No. Users may copy/paste to non-suite apps - Yes / No. If no, a paste blocked by policy message displays when a user attempts to copy from a secure container app into an external app. Copying from an external app into a secure container app is never blocked. Add the URLs that are directly accessible to a device's network connection. Users will use WorkBrowser (page 24) to access these URLs. Name - Enter a name for this menu item. URL - Enter a URL. Proxy required - Recommended for securing access to an internal resource or website. Document Profile Add WebDAV documents you want to make available to mobile users using WorkDocs (page 25). Name - A description of the document. URL - The URL of the WebDAV document source. Proxy required - Recommended for securing access to an internal resource or website. The WorkDocs container app supports: The display and editing of shared and local Microsoft Office and PDF documents. The creation and storage of local secure documents on the user's mobile device. Documents stored locally are encrypted and remain isolated from the rest of the user's environment on the mobile device. Managing Apps on Devices Enterprise Mobility Management can either require or disallow selected apps on mobile devices. 1. Navigate to the Apps page. 22
27 Managing Apps on Devices 2. Select a customer organization. 3. Click the App Catalog (page 23) tile to maintain a catalog of app items for the organization you have selected. Note: The App Inventory page generates a list of candidate app items based on an audit of all mobile devices managed by Enterprise Mobility Management. Use it to determine the format of app records you want to add to the App Catalog. 4. Use the Apps Profile (page 21) for each organization and security group to to require or disallow apps on user devices. These apps must have previously been added to the App Catalog for that organization. Configuring the App Catalog The App Catalog maintains a catalog of app items. Each app item uniquely identifies a single app that can be required or disallowed on a mobile device. Once added to the catalog, app items can then be added to the app profile (page 21) of a policy assigned to a customer organization. Note: An App Catalog is maintained for each customer organization individually. Adding a New App Item 1. Select the correct customer organization, if necessary. 2. Click New. Store App - If selected, a URL must be specified. 3. If you select a Store App, a New Store App dialog displays. Select the Android or ios radio option. Optionally enter a search term to filter the list of apps returned from the selected store. Select an app in the list. Click either the Add or Add & New button. Your app has been added to the App Catalog. Working with Existing App Items The Actions menu provides the following options for existing apps in the App Catalog. Edit - Edits a selected app item in the App Catalog. 23
28 WorkBrowser and WorkDocs Delete - Deletes a selected app item from the App Catalog. Viewing App Inventory Enterprise Mobility Management > Apps > App Inventory The App Inventory page generates a list of app items based on the apps discovered on managed mobile devices, for the selected customer organization and policy profile. Use it to determine the format of app records you want to add to the App Catalog (page 23). Table Columns OS - Android or ios. Package Name - The full name of the app in reverse-domain format. Example: com.kaseya.enterprise.agent. App Name - The friendly name of the app. Example: Agent. Version - The application version number. Example: WorkBrowser and WorkDocs Enterprise Mobility Management provides mobile device users safe, secure access to their company s internal websites and documents using two container apps. WorkBrowser (page 24) - Provides secure access to internal websites. WorkDocs (page 25) - Enables secure viewing and editing of documents on internal networks or stored locally on mobile devices. Using WorkBrowser The WorkBrowser is ideal for anyone who s mobile and needs to stay connected to the office. WorkBrowser provides secure access in flight and at rest to internal intranets, files and directories. Selected files can by edited using WorkDocs (page 24). Downloading WorkBrowser Apple devices ( - Download using the link provided in your invitation. Android devices ( - Download using the link provided in your invitation. Requirements for Each Managed Mobile Device Passcodes Sites ios version 7.0 and above Android version and above You may be prompted to create an app-level PIN (also called a passcode or access code) to use WorkBrowser. Thereafter, you will need to enter this PIN each time you access the WorkBrowser app. The Sites list shows all the websites you have access to via Enterprise Mobility Management. 24
29 WorkBrowser and WorkDocs Viewing and Editing Files When browsing web sites in WorkBrowser you can view files. Viewed files can be edited using WorkDocs (page 25). Using WorkDocs WorkDocs enables you to view or edit documents stored on an internal network or stored locally in Secure Storage on your mobile device. You can also move, copy or delete documents. Documents stored locally are encrypted and remain isolated from the rest of the environment on the mobile device. Downloading WorkDocs Apple devices ( - Download using the link provided in your invitation. Android devices ( - Download using the link provided in your invitation. Requirements for Each Managed Mobile Device Passcodes Sites ios version 7.0 and above Android version and above You may be prompted to create an app-level PIN (also called a passcode or access code) to use WorkDocs. Thereafter, you will need to enter this PIN each time you access the WorkDocs app. The Sites list shows all the WorkDocs sites you have access to via Enterprise Mobility Management. Each WorkDocs site provides access to a navigation tree of folders and documents. These documents are not stored on your device unless they are in Secure Storage. Secure Storage The WorkDocs site also displays a Secure Storage folder of local documents stored on your device. The same Secure Storage folder is shared across all the WorkDocs sites you have access to. Authorization Depending on the authorization assigned to the document you may be prompted to enter credentials. Editing Documents Selecting a file allows you to preview the file. Select the Edit button over the previewed file to launch the file editor. When the editor first loads you can select the File icon and use the Save as option to save the current file to a new name and/or location. Once you start making edits to the file the File icon can be used to save the current file to the same name and location of the original file. If a save fails, verify you have write access to the document location. Move, Copy and Delete Files You can move, copy, and delete files from any location. Select Edit from above the document source file list to see these options. Select the file(s) you want to perform the move, copy or delete action on. For Copy and Move actions you will be prompted to provide the name and location for the new file. To save a local copy of the file, copy or move to your Secure Storage. To delete a file, select the Delete button. You will be prompted to confirm file deletions. 25
30 Logging Module Activity Favorites Any folder beneath the root directory can be saved as a Favorite. To mark a folder as a Favorite select the 'star' icon at the bottom of the file list. The 'star' icon will darken to show this folder is now a Favorite. Folders marked as a Favorite are displayed along with your document sources. Selecting the Favorite provides a shortcut to go directly to that location. Logging Module Activity You can review application activity in the Mobility module using the Application Logs page. If information has changed or been removed unexpectedly, check this page to determine what events and administrators may have been involved. Entries include: Event ID Event Name Message Admin Event Date Logged events include: Clear Passcode Created Device Deleted Device Found Device Invitation Resent Lock Device Lost Device Mark Commands Complete Process Alert Request Checkin Request Logs Run Audit Scheduled Audit Sound Alarm on Device Start Tracking Device Stop Tracking Device Updated Device Wipe Device Reports The Reports page displays the user count and device count registered for each customer. 26
31 Index Index A Alerts Actions 15 Audit Actions 14 B BYOD Profiles 22 C Command Status 14 Configuring a Mail Profile 21 Configuring a Web Clip Profile 20 Configuring a WiFi Profile 20 Configuring Active Directory Integration 8 Configuring an Apps Profile 21 Configuring Policies 18 Configuring the App Catalog 23 Configuring the ios Profile 19 Configuring the MDM Security Profile 19 D Devices Actions 15 E Enterprise Mobility Management Module Requirements 2 I Importing Active Directory Users 7 Importing Users Using CSV 6 Inviting Users 11 L Logging Module Activity 26 Lost / Found Actions 15 M Managing Apps on Devices 22 Managing Devices 12 Managing Users Manually 6 MDM Profiles 19 Messaging Actions 14 O Onboarding Customers 3 Onboarding Users 5 Overview 1 R Reports 26 T Tracking Actions 14 U User Interface 3 Using WorkBrowser 24 Using WorkDocs 25 V Viewing App Inventory 24 Viewing Device Details 15 W WorkBrowser and WorkDocs 24 27
User Guide. Version R9. English
Enterprise Mobility Management User Guide Version R9 English June 24, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS
Kaseya 2. User Guide. Version 1.0
Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
Kaseya 2. User Guide. Version 7.0. English
Kaseya 2 Mobile Device Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
Quick Start Guide. Version R9. English
Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
Deploying iphone and ipad Mobile Device Management
Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.
PMDP is simple to set up, start using, and maintain
Product Datasheet IBELEM, SA ITS Group - 5, boulevard des Bouvets 92741 Nanterre Cedex - FRANCE Tel: +33(0)1.55.17.45.75 Fax: +33(0)1.73.72.34.08 - www.ibelem.com - [email protected] PMDP is simple to set
User Guide. Version R91. English
AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
Mobile Device Management Solution Hexnode MDM
Mobile Device Management Solution Hexnode MDM Frequently Asked Questions www.hexnode.com Frequently Asked Questions How is Hexnode MDM license calculated?...4 Which ports do I need to open for Hexnode
Introduction to AirWatch and Configurator
Introduction to AirWatch and Configurator Overview AirWatch integrates seamlessly with Apple Configurator to enable IT administrators to effectively deploy and manage Apple ios devices. Deploying a large
Mobile Device Management ios Policies
Mobile Device Management ios Policies Introduction ios policies allow administrators to use mobile device management features of CentraStage and push them, over the air (OTA), to ios devices (in other
Cloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
System Configuration and Deployment Guide
System Configuration and Deployment Guide This guide provides information on...... Configuring an Organization using the Organization Wizard... Setting a default Policy Suite using the Organization Wizard...
Vodafone Secure Device Manager Administration User Guide
Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of September 2014. Do business better Contents Introduction 3 Help 4 How to find help in the Vodafone Secure
Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
iphone in Business Mobile Device Management
19 iphone in Business Mobile Device Management iphone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iphone across their organizations. These Mobile Device
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
McAfee Enterprise Mobility Management 11.0 Software
Product Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
iphone in Business How-To Setup Guide for Users
iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over
User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011
User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started
Mobility Manager 9.5. Users Guide
Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks
Mobile Device Management Version 8. Last updated: 16-09-14
Mobile Device Management Version 8 Last updated: 16-09-14 Copyright 2013, 2X Ltd. http://www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names
SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.
SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support
Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014
Building a BYOD Program Using the Casper Suite Technical Paper Casper Suite v9.4 or Later 17 September 2014 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts
WatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Managing Identities and Admin Access
CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of
Sophos Mobile Control Administrator guide. Product version: 3
Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing
BlackBerry Business Cloud Services. Administration Guide
BlackBerry Business Cloud Services Administration Guide Published: 2012-07-25 SWD-20120725193410416 Contents 1 About BlackBerry Business Cloud Services... 8 BlackBerry Business Cloud Services feature overview...
BOTTOM UP THINKING EMAIL SETUP INSTRUCTIONS. Unique businesses require unique solutions CLIENT GUIDE
BOTTOM UP THINKING Unique businesses require unique solutions EMAIL SETUP INSTRUCTIONS CLIENT GUIDE INDEX How to connect a. Deciding on best method (POP or IMAP) Setting up email on devices Webmail a.
MaaS360 Mobile Device Management (MDM) Administrators Guide
MaaS360 Mobile Device Management (MDM) Administrators Guide Copyright 2014 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described
Administrator's Guide
Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere
ipad in Business Mobile Device Management
ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management
Administration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
ManageEngine Desktop Central. Mobile Device Management User Guide
ManageEngine Desktop Central Mobile Device Management User Guide Contents 1 Mobile Device Management... 2 1.1 Supported Devices... 2 1.2 What Management Operations you can Perform?... 2 2 Setting Up MDM...
Sophos Mobile Control SaaS startup guide. Product version: 6
Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
AVG Business SSO Partner Getting Started Guide
AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in
Deploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide
Live Maps for System Center Operations Manager 2007 R2 v6.2.1 Installation Guide CONTENTS Contents... 2 Introduction... 4 About This Guide... 4 Supported Products... 4 Understanding Live Maps... 4 Live
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios Devices 1 Table of Contents GO!Enterprise
Mobile Configuration Profiles for ios Devices Technical Note
Mobile Configuration Profiles for ios Devices Technical Note Mobile Configuration Profiles for ios Devices Technical Note December 10, 2013 04-502-197517-20131210 Copyright 2013 Fortinet, Inc. All rights
Product Manual. Mobile Device Managment Version 8.1. Last Updated: 06/07/15
Product Manual Mobile Device Managment Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE
COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE Mobile Device Management, User Guide Copyright 2013, CommuniTake Technologies Ltd., Yokneam, Israel. All rights reserved. For a hard-copy
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Novell ZENworks Asset Management 7.5
Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...
Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15
Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
Policy and Profile Reference Guide. BES10 Cloud Market Preview
Policy and Profile Reference Guide BES10 Cloud Market Preview Published: 2014-02-04 SWD-20140204170848330 Contents About this guide... 13 What is BES10 Cloud?... 13 Key features of BES10 Cloud...14 IT
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
EM L18 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab
EM L18 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab Description The Symantec Mobile Management platform continues to expand it s offering with new support for native
Live@edu User Guide. Please visit the Helpdesk website for more information: http://www.smu.edu.sg/iits/helpdesk_support/index.asp
IITS Main Office SINGAPORE MANAGEMENT UNIVERSITY Administration Building, Level 11 81, Victoria Street Singapore 188065 Phone: 65-6828 1930 Email: [email protected] Please visit the Helpdesk website for
Systems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app
Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly
Sophos Mobile Control Administrator guide. Product version: 3.6
Sophos Mobile Control Administrator guide Product version: 3.6 Document date: November 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for
http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
McAfee Enterprise Mobility Management
Technical FAQ McAfee Enterprise Mobility Management Frequently Asked Questions Device Management Q: Which devices do you currently support? A: McAfee Enterprise Mobility Management (McAfee EMM ) offers
1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
Kaseya 2. Installation guide. Version 7.0. English
Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
Mobile Device Manager. Windows User Guide (Windows Phone 8/RT)
Mobile Device Manager Windows User Guide (Windows Phone 8/RT) Document Revision Date: Oct. 22, 2014 Mobile Device Manager Windows Phone 8 User Guide i Contents Windows Phone 8 Features Matrix... 1 Overview...
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
qliqdirect Active Directory Guide
qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect
Administration Guide. WatchDox Server. Version 4.8.0
Administration Guide WatchDox Server Version 4.8.0 Published: 2015-11-01 SWD-20151101091846278 Contents Introduction... 7 Getting started... 11 Signing in to WatchDox... 11 Signing in with username and
MadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
Installation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
Kaseya 2. User Guide. Version 1.1
Kaseya 2 Directory Services User Guide Version 1.1 September 10, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
User Guide. Time Warner Cable Business Class Cloud Solutions Control Panel. Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007
Chapter Title Time Warner Cable Business Class Cloud Solutions Control Panel User Guide Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007 Version 1.1 Table of Contents Table of Contents...
Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide
Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile
RoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry
GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Version 4.11.x GO!Enterprise MDM for BlackBerry 1 Table of Contents GO!Enterprise MDM for
Mobile Iron User Guide
2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4
1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5
User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation
DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL
DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL Version 2.0 Updated: March 2011 Contents 1. Mac Email Clients... 3 1.1 Configuring Microsoft Outlook 2011... 3 1.2 Configuring Entourage 2008... 4 1.3.
Booth Gmail Configuration
Student email is accessed via a Booth branded Gmail service. Student mailboxes will be accessed via Gmail. Configure Gmail Settings Before you connect Gmail to send and receive Booth Gmail on your mobile
QuickStart Guide for Mobile Device Management. Version 8.6
QuickStart Guide for Mobile Device Management Version 8.6 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF
FINAL DRAFT. APPLE ios 9 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) CONFIGURATION TABLE. Version 1, Release 0.1.
FINAL DRAFT APPLE ios 9 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) CONFIGURATION TABLE Version 1, Release 0.1 18 September 2015 Developed by Apple and for the DoD LIST OF TABLES Page Table 1: Non-Supervised
AT&T Toggle. 4/23/2014 Page i
Page i Go Ahead Bring Your Own Device to Work... 1 Requirements... 1 1: AT&T Toggle Overview... 1 Personal Icon... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Data Usage App... 3 Media...
Compliance Rule Sets in MaaS360
Compliance Rule Sets in MaaS360 MaaS360 allows you to apply sets of compliance rules on mobile devices. These rules are conditions that are checked on devices on real-time basis. If a device is not in
QuickStart Guide for Mobile Device Management
QuickStart Guide for Mobile Device Management Version 8.5 Inventory Configuration Security Management Distribution JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made
Quadro Configuration Console User's Guide. Table of Contents. Table of Contents
Epygi Technologies Table of Contents Table of Contents About This User s Guide... 3 Introducing the Quadro Configuration Console... 4 Technical Specification... 6 Requirements... 6 System Requirements...
Introduction to the Secure Email Gateway (SEG)
Introduction to the Secure Email Gateway (SEG) Overview The Secure Email Gateway (SEG) Proxy server is a separate server installed in-line with your existing email server to proxy all email traffic going
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices
NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices End-of-Life Notice Please note that GO!Enterprise MDM server version 3.6.3 is the last to officially
http://www.trendmicro.com/download
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
HomeNet. Gateway User Guide
HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do
ShoreTel 13 Conferencing User Guide. Part Number 850-1234-01
ShoreTel 13 Part Number 850-1234-01 Document and Software Copyrights Copyright 1998-2012 by ShoreTel Inc., Sunnyvale, California, USA. All rights reserved. Printed in the United States of America. Contents
Kaseya 2. User Guide. Version R8. English
Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as
Android App User Guide
www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11
Managing ios Devices Andrew Wellington Division of Information The Australian National University About Me Mac OS X Systems Administrator Division of Information (Central IT) Mostly manage servers (about
