CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile
|
|
|
- Buck Wilkins
- 10 years ago
- Views:
Transcription
1 CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version ForeScout Mobile
2 Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation... 3 About this Plugin... 3 How it Works... 4 Continuous Query Refresh... 4 Supported Devices... 5 Supported Network Infrastructures... 5 What to Do... 5 Accessing Fixes Made after this Release... 6 Requirements... 6 Version Requirements... 6 CounterACT / Hotfix Requirements... 6 Additional Plugin Requirements... 6 Registration and Activation Requirements... 7 Registration and Activation... 7 Networking Requirements... 7 Endpoint Requirements... 7 Installation and Configuration... 7 Test Plugin Communication with the MaaS Service Displaying Inventory Data Policy Templates Device Manageability Policy Template Using the Device Manageability Template Device Compliance Policy Template Using the Device Compliance Template Creating Unauthorized Application Lists Working with CounterACT Policies Version 1.0.1
3 Detecting Devices - Policy Properties Core Attributes Security and Compliance Hardware Inventory Network Information Additional Information Open Property Search Tag Devices - Policy Actions Custom Attribute Value Action Refresh Device Information Action Version ii
4 About the Integration ForeScout MDM helps IT administrators streamline the process to provision, manage and secure today s expanding suite of smartphones and tablets, all from a single portal. ForeScout MDM for mobile devices is an easy to use platform that includes all of the essential functionality for end-to-end management of ios and Android devices. This means with a single unified security management and reporting system, you can ensure that your network is secured, regardless of the type of device a user may be carrying. Instead of implementing new security silos that are limited to mobile devices, you can extend your PC and network security systems to encompass mobile devices. ForeScout MDM ForeScout MDM is a cloud-based solution, enabling quick and easy deployment; enrollment, monitoring, management and support. Together with ForeScout CounterACT, ForeScout MDM provides a whole new level of centralized visibility and control for actionable insights into your entire computing landscape. Secure all Mobile Devices: ForeScout MDM supports all major smartphone and tablet platforms including ios and Android - in both Exchange and Lotus Notes environments. Embrace BYOD: ForeScout MDM provides workflows to discover, enroll, manage and report on personally owned devices as part of your mobile device operations. Experience simple device enrollment and approval: ForeScout MDM provides auto-quarantine for Exchange, and alerts IT personnel to approve all new devices. Additionally it provides for easy user self-enrollment, via web, or SMS. Additional Documentation Refer to the documents at the following location for more technical information about the ForeScout MDM solution. About this Plugin Integration with CounterACT lets you deliver a comprehensive MDM solution that provides powerful monitoring and enforcement capabilities not available when working solely with the solution. Use the Integration Plugin to complete the cycle of security by obtaining valuable capabilities: Automated real-time, continuous detection and compliance of mobile devices the moment they try to connect to your network, including unmanaged and unknown devices. Version
5 Unified network access control policy enforcement options. Allow compliant and managed devices on the network. Limit network access based on device type, device ownership, time of day, and device compliance. The limited access network can allow access to a subset of applications and data, blocking access to more sensitive corporate resources. Block noncompliant devices or specific types of devices from your network completely. Tag devices at the console, based on CounterACT detections. Enhance CounterACT inventory by populating it with information. How it Works The Integration Plugin queries the service for device attributes, for example core attributes, security and compliance information, hardware inventory and network information. All queries are performed by a single CounterACT Appliance that is designated for this purpose. This designated CounterACT Appliance, herein called the Connected Appliance, retrieves information from other CounterACT Appliances and the CounterACT Enterprise Manager and forwards the information to the service. Similarly, the Connected Appliance retrieves information from the MaaaS360 service and forwards it to other CounterACT Appliances and the CounterACT Enterprise Manager Port 5223/TCP must be open for outbound traffic. Continuous Query Refresh query mechanisms recheck endpoint attributes at a static frequency approximately once a day. However, after plugin installation, querying of endpoint properties is based on Version
6 CounterACT policy recheck definitions. The conditions under which to recheck hosts that match the policy. Specifically, you can define: How often hosts are rechecked once they match a policy Under what conditions to carry out the recheck This ensures continuous, real-time endpoint evaluation that can be customized for each CounterACT policy. Queries for device core attributes are initiated on the basis of the endpoint MAC address. Core attribute results return the device ID, which is used for further queries. As such, it is required that CounterACT learn endpoint MAC addresses in order to initiate the query process. You can use the Manageability Policy template to detect hosts at which MAC addresses are not learned. See Device Manageability Policy Template for details. Supported Devices The following devices are supported by ForeScout MDM: ios Android BlackBerry Windows Mobile Symbian The following devices are supported by the Integration Plugin: ios Android For exact OS version support, refer to the documentation: Supported Network Infrastructures Devices connected to the network via a WiFi connection. What to Do To use the Integration Plugin, perform the following tasks: 1. Verify that you have met software and networking requirements. See Requirements. 2. Install, configure and test the plugin. See Installation and Configuration. 3. Create CounterACT policies that detect, manage and remediate devices. See Policy Templates and Working with CounterACT Policies. Version
7 4. Connect to the ForeScout Console to configure device policies: Refer to the documents at the following location for more technical information about the ForeScout MDM solution. Accessing Fixes Made after this Release New issues may be discovered and fixed after this release. These fixes will be made available as Beta fixes to the upcoming plugin version until the final version is posted on the ForeScout customer support page. You can access information about Beta fixes for the upcoming version at: In addition, you can contact the ForeScout Beta Manager at to request the Beta plugin update with the fixes. Requirements This section lists version, registration and networking requirements. Version Requirements This section lists version requirements. CounterACT / Hotfix Requirements CounterACT version , Hotfix 6.0 or above. CounterACT version , Hotfix 1.0 or above. Additional Plugin Requirements HPS Inspection Engine Plugin version or above. User Directory Plugin version or above. Version
8 Registration and Activation Requirements This section lists registration and activation requirements. Registration and Activation 1. Register for access to the service at: The service is available as 30-day free trial. 2. Activate the registration by sending an activation request to: You will receive an response with information required for configuring the plugin, as well as other information. Networking Requirements Mobile devices managed by the service cannot establish a connection to the cloud service via a proxy. If a proxy is setup at the enterprise network, you must open port TCP/5223 to /8 on the enterprise firewall. By doing this, the proxy is bypassed when the mobile device accesses the service. Endpoint Requirements Queries for device core attributes are initiated on the basis of the endpoint MAC address. Core attribute results return the device ID, which is used for further queries. As such, it is required that CounterACT learn endpoint MAC addresses in order to initiate the query process. You can use the Manageability Policy template to detect hosts at which MAC addresses are not learned. See Device Manageability Policy Template for details. Installation and Configuration This section describes how to install, configure and test the Integration Plugin. The configuration is used to ensure that the plugin can communicate with the service. To install: 1. After registering for the trail at you will receive an that provides a download link. 2. Download and save the plugin installation file to the machine where the CounterACT Console is installed. 3. Log in to CounterACT and select Options from the Tools menu. 4. Select Plugins. The Plugins pane opens. Version
9 5. Select the Install button. The Open dialog box opens. 6. Navigate to the location where you saved the plugin installation file. 7. Select Install. Once installed, the Integration Plugin automatically adds a HTTP Redirect exception to the CounterACT NAC Redirect Exception list. CounterACT NAC HTTP redirect exceptions are designed to ensure users can access business essential Internet sites or important files on the Internet while allowing required HTTP blocking and redirection. In this case, incorporating an m.dm exception and a fiberlink exception ensures that devices can enroll with the service and still receive required HTTP notifications. See Device Manageability Policy Template for more information about this exception. 8. Start the plugin: Select Mobile Integration from the Plugins pane. Select the Start button. To configure the plugin: 1. Select Mobile Integration - from the Options window. The configuration is used to ensure that the plugin can communicate with the service. Version
10 2. Enter the following details about the service. Web Service Billing ID*. (This information is used in the Manageability template, HTTP notification actions when redirecting endpoint Web sessions to the MDM enrollment site. See the Device Manageability Policy Template for details. ) Application ID* Access Key* Authentication Username Authentication Password This information is provided by after you activate your registration. See Registration and Activation Requirements for details. 3. In the Connected Appliance drop-down list, select the name of an Appliance that will service as a proxy between the MaaS service and the Enterprise Manager and enterprise Appliances. The CounterACT device listed here is the only device that will communicate directly with the service. An Enterprise Manager may not be selected here. 4. Select the Advanced tab. Version
11 5. The Web Service URL Name field displays default values. 6. The Application Version field Name field displays default values. 7. The Platform ID field displays default values. 8. In the Query Threshold field, define the maximum number of query requests to the service per threshold interval (defined in the following field). 9. In the Query Threshold Interval (Seconds) field, define the frequency that the plugin should query the service. 10. Select the Use a Proxy Server checkbox if there is a proxy between the Connected Appliance and the service in the cloud. 11. Enter the IP address of the proxy server in the DNS Name or IP Address of the Proxy Server field. 12. Enter the required proxy server port in the Port Number field. Test Plugin Communication with the MaaS Service Test the plugin communication with the MaaS service. To test communication: 1. Select the Test tab. 2. In the Device MAC Address filed, enter the MAC address of device in order to test plugin communication with the MaaS service. Do not enter colons. Use lower case. Version
12 Displaying Inventory Data Use the CounterACT Inventory to view a real-time display of device network activity at multiple levels, for example, software installed, core attributes or hardware information. The inventory lets you: Broaden your view of the organizational network from device-specific to activity-specific. View devices that have been detected with specific attributes. Easily track device activity. Incorporate inventory detections into policies. To access the inventory: 1. Select the Inventory icon from the Console toolbar. 2. Navigate to the entries. Version
13 The following information is available: Core Attributes: Device Type, Platform Name Hardware Inventory: Manufacturer, Model Operating System. Software Installed Refer to the CounterACT Console User s Manual or the Console, Online Help for information about how to work with the CounterACT Inventory. Policy Templates Two templates are available for detecting, managing and remediating devices: Device Manageability Policy Template Device Compliance Policy Template Device Manageability Policy Template Use this policy to detect Maas360 unmanageable devices. Devices that are unmanageable: Have not been detected with a MAC address Queries for device core attributes are initiated on the basis of the endpoint MAC address. Core attribute results return the device ID, which is used for further queries. Cannot be accessed via CounterACT at the Cloud Are not listed with the service Have not enrolled with the service Version
14 Remediation options, disabled by default, let you block unmanageable devices from the corporate network and redirect device user web sessions to a page where they can register for the purpose of becoming manageable. Prerequisites Consider which hosts you want to inspect. The policy does not handle hosts outside of the Internal Network. You should run the Asset Classification template first. The Hand Held group generated when running the Asset Classification template is included in Device Manageability template Scope. The template was most likely run during initial CounterACT setup. Verify that you have configured the Integration Plugin. Using the Device Manageability Template This section describes how to use the Device Manageability template. To use the Device Manageability template: 1. Select Add from the Policy Manager. 2. Navigate to the Mobile> folder and select the Device Manageability template. 3. Select Next. The Name page opens. Version
15 4. Accept the default name or change it as required and enter a description. 5. Select Next. The Scope dialog box opens. Use the dialog box to define which hosts should be inspected. Version
16 6. Select one of the following from the IP Address Range dialog box. Your selection appears in the IP Ranges section of the Scope page. Select the All button to include all IP addresses. Insert an IP address range. Select a network segment. The Hand Held group, generated from the Asset Classification policy, is automatically included in the Filter by Group section of the Scope. This ensures that only mobile devices are inspected. 7. Select Next. The Enrollment Address page opens. 8. The address listed here is retrieved from the billing ID that you defined in the plugin configuration, Web Service Billing ID field and is used for the purpose of redirecting the endpoint user to enroll with the service. After enrollment, devices can be managed. 9. Select Next. The Sub-Rules page opens. This page displays policy condition and actions. Version
17 10. Policy conditions tell CounterACT how to detect hosts. Unmanageable hosts are detected according to the following criteria: Hosts without a MAC address. Hosts not listed with the service Hosts not enrolled with the service The policy condition also verifies that CounterACT has access to the Cloud service. Hosts are inspected by each sub-rule in the order shown, until a match is found. 11. Policy actions instruct CounterACT how to respond to endpoints that are not enrolled or listed. Add to Group: Endpoints are automatically added to the CounterACT groups Not Listed and Not Enrolled. You can add these groups to other policy scopes for further handling. Virtual Firewall: Blocks all endpoint traffic, with the exception of traffic transmitted at port 80/TCP. This action is disabled by default. HTTP Notification: Endpoint web sessions are redirected to a page where users can register for the purpose of becoming manageable. See About HTTP Notification Actions. This action is disabled by default. About Enrollment This section describes how the device enrollment process works. When working with the template HTTP redirection actions, unmanageable endpoint web sessions are redirected to a enrollment site where users can register for the purpose of becoming manageable, i.e. they are enrolled and listed with the MaaS 360 service. This action is disabled by default. The device user is redirected to the following location: Version
18 Version
19 The user will be required to authenticate using Active Directory. To ensure the enrollment process, verify that you have reviewed System Requirements for the Cloud Extender for User Authentication and User Visibility Modules ( for Mobile Devices). A link to this information can be found at (ForeScout MDM Technical Documentation and Support Contacts). Follow the link to Installation Guide for Cloud Extender. About HTTP Notification Actions This section describes automated processes that occur when using HTTP notification actions, available when working with the Not Listed and Not Enrolled sub-rules. CounterACT HTTP Redirect Exceptions Billing ID CounterACT HTTP Redirect Exceptions To avoid blocking access to the MDM enrollment site when working with the HTTP Notification actions, the MDM enrollment link is automatically added to the CounterACT NAC Redirect exception list. This list is designed to ensure that users can access business essential Internet sites or important files on the Internet while allowing required HTTP blocking and redirection. In this case, incorporating an m.dm exception and a fiberlink exception ensures that devices can enroll with the service and still receive required HTTP notifications. This redirect exception is automatically created when the plugin is installed. Web Service Billing ID The Web Service Billing ID URL entered in the plugin configuration, Web Service Configuration tab is automatically placed in the HTTP notification sent when working with the Not Listed and Not Enrolled sub-rules. This sight navigates to the enrollment site. Version
20 The URL is originally received after activating your registration. See Registration and Activation Requirements for details. Device Compliance Policy Template Use this policy to detect Maas360 compliant devices. Devices that are compliant: Are not running unauthorized applications Are not jailbroken or rooted Are compliant based on criteria Have installed the Fiberlink App Remediation options, disabled by default, let you block non-compliant devices from the corporate network and redirect device user web sessions to a remediation notification page. Version
21 Prerequisites In order to detect unauthorized applications you must create an unauthorized application list in CounterACT. See Creating Unauthorized Application Lists. Verify that you can detect the MAC address of devices that you are inspecting. Consider which hosts you want to inspect. The policy does not handle hosts outside of the Internal Network. You should run the Device Manageability template before running this template. The Devices Enrolled group generated when running the Device Manageability template is included in the Device Compliance template scope. Using the Device Compliance Template This section describes how to use the Device Compliance template. To use the Device Compliance template: 1. Select Add from the Policy Manager. 2. Navigate to the Mobile> folder and select the Device Compliance template. 3. Select Next. The Name page opens. Version
22 4. Accept the default name or change it as required and enter a description. 5. Select Next. The Scope dialog box opens. Version
23 6. Select one of the following from the IP Address Range dialog box. Your selection appears in the IP Ranges section of the Scope page. Select the All button to include all IP addresses. Insert an IP address range. Select a network segment. The Devices Enrolled group, generated from the Device Manageability policy, is automatically included in the Filter by Group section of the Scope. This ensures that only enrolled (manageable) devices are inspected. 7. Select Next. 8. The Sub-Rules page opens. This page displays policy condition and actions. 9. Policy conditions tell CounterACT how to detect hosts. Devices that are not compliant are detected according to the following criteria: Devices that are running unauthorized applications Devices that are jailbroken (ios) or rooted (Android) Devices that are not compliant based on criteria Devices that have not installed the Fiberlink App 10. Policy actions instruct CounterACT how to respond to endpoints that are not compliant. Add to Group: Endpoints are automatically added to the - Non Compliance Devices group. You can add this group to other policy scopes for further handling. Virtual Firewall: Blocks all endpoint traffic, with the exception of traffic transmitted at port 80/TCP. This action is disabled by default. HTTP Notification: Endpoint web sessions are redirected. A notification page is displayed indicating the non-compliant issue detected; warning the user that access to the corporate network is blocked and instructing the user to contact IT to remediate the issue. This action is disabled by default. Version
24 Creating Unauthorized Application Lists In order to work with the Compliance Policy template, you will need to compile a list of applications that you want to prohibit on your network. An unauthorized applications list is automatically created using the CounterACT Lists feature when the plugin is installed. You will need to add the applications you want to prohibit to the predefined List. The list is automatically incorporated into the Unauthorized Applications Installed sub-rule. Version
25 To add an application to the list: 1. Select the Options icon from the Console toolbar and then select Lists. Version
26 2. Select the Edit button. The Edit List dialog box opens. 3. Select the Add button. The Add Value dialog box opens. 4. Enter the name of the application you want to prohibit, and select OK. Version
27 5. Enter a description of the application in the Description field of the Edit List dialog box, and select OK. The application appears in the Lists Manager. 6. The following options are available for creating lists of unauthorized applications: Working with CounterACT Policies This section describes how to use CounterACT policies to detect and control devices. Create or edit a policy and use policy conditions to detect these devices with specific properties. To create a policy: 1. Log in to the CounterACT Console. 2. Select the Policy icon from the Console toolbar. 3. Create or edit a policy. For information about working with policies, select the Help button on the policy wizard. Detecting Devices - Policy Properties CounterACT policy conditions and properties let you instruct CounterACT which devices to detect, for example devices with specific restrictions. Expand the folder from a policy that you have created properties to be included in the policy condition. An extensive range of properties can be detected. The categories include: Core Attributes Security and Compliance Hardware Inventory Network Information Additional Information Open Property Search Version
28 Core Attributes Device ID Device Name Device Online Device Status Last Reported Managed Status Platform Name Indicates the device ID. Indicates the device name. Indicates if the device is online. Indicates the device active status, including: Device Active Device Not Active Indicates the date/time of the last reported event on a host. Indicates the managed status of the device including: Enrolled Not Active Not Enrolled Pending Control Removal User Removed Control Indicates the platform on which the device is running Android ios Version
29 User Name Indicates the user name associated with the device. Security and Compliance Android Device Rooted Android Settings Failed to Configure Compliance State Device Passcode Status Device Restrictions Hardware Encryption MDM Policy ios Mailbox Approval State Indicates if an enrolled Android device is rooted. Indicates if certain settings were not configured on an Android host. Indicates the Compliance state of the host, including: In Compliance Not Available Out of Compliance Indicates the device passcode status including: Compliant Not Available Not Compliant per Profiles Not Compliant Not Compliant per all Requirements Not Enabled Passcode Policy Configured Passcode Policy Not Configured Pending Compliance Confirmation Indicates restrictions configured on the device including: Allow Installing of Applications Allow Screen Capture Allow Use of Camera Allow Use of YouTube Allow User of itunes Music Store Allow User of Safari Indicates if certain hardware encryption values were detected on the host. Indicates an MDM policy applied to the device. Indicates the mailbox approval status of the device including: Approved Blocked Version
30 Out of Compliance Reasons ios Device JailBroken Hardware Inventory Custom Attributes Address Manufacturer Model Operating System Ownership Network Information ICCID Phone Number Additional Information Maas360 Software Installed Connectivity to Maas360 Cloud Listed in Service Device Discovery Not Available Quarantined Indicates if certain compliance out of compliance reasons were detected on the host. Indicates if the device is jailbroken. Indicates devices that were detected with specific device attributes, including an attribute or value. Indicates the Address of the device. Indicates the manufacturer of the device. Indicates the model of the device. Indicates the Operating System running on the device. Indicates the ownership of the device. Indicates an ICCID value detected on the device. Indicates the phone number associated with the device. Indicates if specific software is installed on the device. Indicates if CounterACT is connected to the cloud Indicates if the device is listed in service. Version
31 Open Property Search If the attributes you are looking for do not appear in any of the folders, you can use the Open Property search options to discover if a certain attribute exists or does not exist on a host, and fine-tune the search by looking for attributes that were detected at a certain date/time, with a certain integer or string. To work with Open Property tools: 1. Select the Plugin from the Plugin pane, and then select the Test button. The test results generate a list of attributes that can be used when working with open properties. 2. Copy an attribute name and paste it into the Attribute name section of a Open Properties property and enter the remaining property information. Version
32 Open Property Boolean Open Property Date Open Property Integer Open Property String Indicates if a specific attribute exists on the device or not. Indicates if a specific attribute exists on the device or not and if the attribute was detected at a certain date and time. Indicates if a specific attribute exists on the device or not and if the attribute included a certain integer. Indicates if a specific attribute exists on the device or not, and if the attribute included a certain string. Tag Devices - Policy Actions Custom Attribute Value Action Detect devices using a CounterACT policy and tag the devices with a user-defined Attribute Name and Attribute Value. This information is sent to the service cloud. For example, use CounterACT to detect devices that were resolved as guests and tag them as: Attribute Name: East Coast Office Attribute Value: Guest Devices will appear as East Coast Office Guests at the Console. Version
33 Refresh Device Information Action The Refresh Device Information action triggers the service to refresh attributes on the device. Version
34 Legal Notice Copyright ForeScout Technologies, All rights reserved. The copyright and proprietary rights in the guide belong to ForeScout Technologies. It is strictly forbidden to copy, duplicate, sell, lend or otherwise use this guide in any way, shape or form without the prior consent of ForeScout Technologies. This product is based on software developed by ForeScout Technologies. The products described in this document are protected by U.S. patent # 6,363,489 issued March 2002 and may be protected by other U.S. Patents and foreign patents. Redistribution and use in source and binary forms are permitted, provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials and other materials related to such distribution and use, acknowledge that the software was developed by ForeScout Technologies. THIS SOFTWARE IS PROVIDED AS IS AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. All other trademarks used in this document are the property of their respective owners. Send comments and questions regarding documentation to: [email protected] 6/5/12 Version
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
Integrating Cisco ISE with GO!Enterprise MDM Quick Start
Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise
Compliance Rule Sets in MaaS360
Compliance Rule Sets in MaaS360 MaaS360 allows you to apply sets of compliance rules on mobile devices. These rules are conditions that are checked on devices on real-time basis. If a device is not in
10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)
10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3
1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout
Embracing BYOD with MDM and NAC Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout 1 Today s Agenda The BYOD Landscape Network Access Control (NAC) 101 Embracing BYOD with MDM and NAC Use Cases 2 The BYOD
Embracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
Getting Started - MDM Setup
Mobile App Getting Started - MDM Setup Thank you for acquiring the Talon Mobile app. The Talon Mobile app allows you to request sensitive justice information. To use the Talon Mobile app, your agency s
MaaS360 Mobile Device Management (MDM) Administrators Guide
MaaS360 Mobile Device Management (MDM) Administrators Guide Copyright 2014 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described
USER GUIDE: MaaS360 Services
USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
Sophos Mobile Control Startup guide. Product version: 3
Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos
Sophos Mobile Control Startup guide. Product version: 3.5
Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile
WatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Introduction to Directory Services
Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
GRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide
ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide Notice Altiris Software Delivery Solution for Windows 6.1 SP3 Product Guide 2007 Altiris, Inc. All rights reserved. Document Date: February
Mobility Manager 9.5. Users Guide
Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5
User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation
Dell Mobile Management. Apple Device Enrollment Program
Dell Mobile Management Contents Dell Mobile Management 3 Setting up the 3 DMM Device Deployment Program Prerequisites 4 Configure Apple VPP Token in DMM 5 Download Apple VPP Token 5 Assign VPP App Licenses
MaaS360 Cloud Extender
MaaS360 Cloud Extender Installation Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software described
Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal
Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal This Application Note provides instructions for configuring Apps settings on the Cisco OnPlus Portal and Autotask application settings
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
MaaS360 On-Premises Cloud Extender
MaaS360 On-Premises Cloud Extender Installation Guide Copyright 2014 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software
OneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
Citrix Systems, Inc.
Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Sophos Mobile Control SaaS startup guide. Product version: 6
Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8
How To Configure A Windows 8.1 On A Windows 7.1.1 (Windows) With A Powerpoint (Windows 8) On A Blackberry) On An Ipad Or Ipad (Windows 7) On Your Blackberry Or Black
Introduction to Cloud-Based Mobile Device Management with Intune Information in this document, including URLs and other Internet Web site references, is subject to change without notice. Unless otherwise
Cloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
Kaseya 2. User Guide. Version 1.0
Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
Use Host Information in Policy Enforcement
Use Host Information in Policy Enforcement Although you may have stringent security at your corporate network border, your network is really only as secure as the end devices that are accessing it. With
Android App User Guide
www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction.... 3 What Is the Cisco TrustSec System?...
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
Kaseya 2. User Guide. Version 7.0. English
Kaseya 2 Mobile Device Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
Quick Start Guide. Version R9. English
Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
Using the Apple Configurator and MaaS3360
Using the Apple Configurator and MaaS3360 Overview Apple Configurator Utility (ACU) is a free Apple tool that enables a Mac to configure up to 30 ios devices simultaneously via a USB. There are two modes
Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal
Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal This Application Note explains how to configure ConnectWise PSA (Professional Service Automation) application settings and Cisco
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
Installing and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Cloud Services MDM. Email Management Admin Guide
Cloud Services MDM Email Management Admin Guide 10/27/2014 CONTENTS Email Management... 2 Email Compliance Policies... 3 Email Policies... 4 Attachment Security Policies... 8 Attachment Security Policies
Radia Cloud. User Guide. For the Windows operating systems Software Version: 9.10. Document Release Date: June 2014
Radia Cloud For the Windows operating systems Software Version: 9.10 User Guide Document Release Date: June 2014 Software Release Date: June 2014 Legal Notices Warranty The only warranties for products
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
QuickStart Guide for Mobile Device Management
QuickStart Guide for Mobile Device Management Version 8.5 Inventory Configuration Security Management Distribution JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made
Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01
Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,
Managing Software Updates with System Center 2012 R2 Configuration Manager
Managing Software Updates with System Center 2012 R2 Configuration Manager Managing Microsoft Updates with Configuration Manager 2012 R2 This document is for informational purposes only. MICROSOFT MAKES
Getting Started Guide: Getting the most out of your Windows Intune cloud
Getting Started Guide: Getting the most out of your Windows Intune cloud service Contents Overview... 3 Which Configuration is Right for You?... 3 To Sign up or Sign in?... 4 Getting Started with the Windows
Sophos Mobile Control Administrator guide. Product version: 3
Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing
Mobility Manager 9.0. Installation Guide
Mobility Manager 9.0 Installation Guide LANDESK MOBILITY MANAGER Copyright 2002-2012, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or
Addressing BYOD Challenges with ForeScout and Motorola Solutions
Solution Brief Addressing BYOD Challenges with ForeScout and Motorola Solutions Highlights Automated onboarding Full automation for discovering, profiling, and onboarding devices onto both wired and wireless
Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide
August 22, 2013 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered
Velocity Web Services Client 1.0 Installation Guide and Release Notes
Velocity Web Services Client 1.0 Installation Guide and Release Notes Copyright 2014-2015, Identiv. Last updated June 24, 2015. Overview This document provides the only information about version 1.0 of
QuickStart Guide for Mobile Device Management. Version 8.6
QuickStart Guide for Mobile Device Management Version 8.6 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF
LogLogic Trend Micro OfficeScan Log Configuration Guide
LogLogic Trend Micro OfficeScan Log Configuration Guide Document Release: September 2011 Part Number: LL600065-00ELS090000 This manual supports LogLogic Trend Micro OfficeScan Release 1.0 and later, and
VMware Mirage Web Manager Guide
Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
Setting up VMware ESXi for 2X VirtualDesktopServer Manual
Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples
HDA Integration Guide. Help Desk Authority 9.0
HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
User Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual
User Manual for Version 4.4.0.5 Mobile Device Management (MDM) User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?...
Omniquad Exchange Archiving
Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith
Licensing Guide BES12. Version 12.1
Licensing Guide BES12 Version 12.1 Published: 2015-04-02 SWD-20150402115554403 Contents Introduction... 5 About this guide...5 What is BES12?...5 Key features of BES12... 5 About licensing...7 Steps to
CA Mobile Device Management 2014 Q1 Getting Started
CA Mobile Device Management 2014 Q1 Getting Started This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
USER GUIDE: MaaS360 Financial IT Reg Enforcement Service
USER GUIDE: MaaS360 Financial IT Reg Enforcement Service 3.2011 Copyright 2011 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software
Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
Good MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Imran Bashir Date: December 2012 Table of Contents Mobile Device Management (MDM)... 3 Overview... 3
5nine Security for Hyper-V Datacenter Edition. Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager
5nine Security for Hyper-V Datacenter Edition Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager November 2013 11 Table of Contents Summary... 5 System requirements... 5 Permissions...
2X Cloud Portal v10.5
2X Cloud Portal v10.5 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
Sophos Mobile Control Installation guide. Product version: 3.5
Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
Zenprise Device Manager 6.1.5
Zenprise Device Manager 6.1.5 CLIENT GUIDE Rev 6.1.50 Introduction 2 ZENPRISE DEVICE MANAGER 6.1 CLIENT GUIDE 2011 Zenprise, Inc. All rights reserved. This manual, as well as the software described in
Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide
January 24, 2015 Spambrella SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Spambrella and/or other noted Spambrella related products contained herein are registered
Sophos Mobile Control Installation guide. Product version: 3
Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External
XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
XenMobile Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction... 3 What Is the Cisco TrustSec System?...
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
Sophos Mobile Control Administrator guide. Product version: 3.6
Sophos Mobile Control Administrator guide Product version: 3.6 Document date: November 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for
CTERA Agent for Mac OS-X
User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
Email Archiving User Guide Outlook Plugin. Manual version 3.1
Email Archiving User Guide Outlook Plugin Manual version 3.1 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith Road Hammersmith London W14 8TH United Kingdom Omniquad
Defender 5.7 - Token Deployment System Quick Start Guide
Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management
Learn More MaaS360 Cloud Extender Checklist (MDM for Blackberry)
Learn More MaaS360 Cloud Extender Checklist (MDM for Blackberry) June 2011 Copyright 2011 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without
Sophos Mobile Control as a Service Startup guide. Product version: 3.5
Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Sophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
SOLARWINDS ORION. Patch Manager Evaluation Guide for ConfigMgr 2012
SOLARWINDS ORION Patch Manager Evaluation Guide for ConfigMgr 2012 About SolarWinds SolarWinds, Inc. develops and markets an array of network management, monitoring, and discovery tools to meet the diverse
WNMS Mobile Application
WNMS Mobile Application User s Guide Revision 1.0 18 October 2013 Copyright 2013 Deliberant www.deliberant.com Copyright 2013 Deliberant This user s guide and the software described in it are copyrighted
Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6
Integration Guide Manager for use with epolicy Orchestrator 4.6 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
Network and Device Level Mobile Security Controls IT Considera-ons in the BYOD Era
Network and Device Level Mobile Security Controls IT Considera-ons in the BYOD Era Sco$ Gordon CISSP- ISSMP Vice President, ForeScout June 14, 2012 2012 ForeScout, Page 1 Bring Your Own Device BYOD Many
Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide
Live Maps for System Center Operations Manager 2007 R2 v6.2.1 Installation Guide CONTENTS Contents... 2 Introduction... 4 About This Guide... 4 Supported Products... 4 Understanding Live Maps... 4 Live
