Cloud Services MDM. Management Admin Guide

Save this PDF as:
Size: px
Start display at page:

Download "Cloud Services MDM. Email Management Admin Guide"

Transcription

1 Cloud Services MDM Management Admin Guide 10/27/2014

2 CONTENTS Management Compliance Policies Policies... 4 Attachment Security Policies... 8 Attachment Security Policies ios Devices... 8 Attachment Security Policies Other Devices Unmanaged Devices Attachment Control Management Dashboard Keep in Mind

3 Management is one of nine sections of the overall Admin Guide for Mobile Device Manager. The following is the complete list of MDM Admin Guide components: MDM Overview and Setup Device Management Profile Management Geofencing Application Management Content Management Management Telecom Management Reports and Alerts MANAGEMENT MDM provides administrators with several options for configuring secure integration with corporate services. The most robust and extensible solution is through the Secure Gateway, which allows the administrator to secure, monitor, and manage both the smart device fleet and corporate access, all from the Admin Console. MDM simplifies and secures management by allowing the administrator to perform the following tasks: Quickly monitor and troubleshoot server requests through the Secure Gateway Dashboard. Gain visibility and control on top of the existing corporate structure to ensure that corporate actions are secure and compliant. Create and edit compliance rules, including Blacklist and Whitelist policies. 2

4 Control access for both managed devices and unmanaged devices. o For devices under MDM, the data collected from the Secure Gateway can be correlated to the device s existing record to show you how the managed devices are interacting with your server. o For devices not under MDM, the data can be viewed on the dashboard to help the administrator track rogue devices and gain a more complete picture of the mobile deployment. Configure integration with a number of corporate services, including (but not limited to): o o Microsoft Exchange o Google Apps for Business o Microsoft BPOS o Microsoft Office365 o Lotus o Novell Groupwise versions COMPLIANCE POLICIES compliance policies allow the administrator to block access to corporate servers for enhanced security based on pre- defined compliance policies. You can configure compliance policies in either of the two following ways: Navigate to Dashboards Management and then select Policies on the left. Navigate to Profiles & Policies Compliance and then select Policies from the Compliance view on the left. 3

5 POLICIES Depending upon your Mobile Management (MEM) deployment, the Policies screen provides three categories of compliance policies: General Policies, Managed Device Policies, and Attachment Security Policies. Within each category, there is a list of current compliance policies (shown below). NOTE: Policies can be configured only at the Location Group at which MEM is configured. By default, all child Location Groups inherit the created policies. The circles under the Active column indicate whether the policy is active (green) or inactive (red). Checking the Disable Compliance option forces Mobile Management (MEM) to function in Bypass mode. This option is applicable for all the MEM configuration models (i.e., for Proxy, PowerShell, and Google). NOTE: In Bypass mode, no compliance policy will be applied against the devices. To make changes to a policy, hover over the pencil icon under the Actions column and click Edit Policy. If a window is open, click [Save] to finish editing the policy, or [Cancel] to return the values to the last saved state. General Policies General Policies are applicable to MEM deployments involving the Secure Gateway (SEG) and the PowerShell Integration. 4

6 Managed Device This policy allows you to determine the outcome if an unmanaged device attempts to contact the corporate server. 1. Open the policy and specify whether to Allow or Block an unmanaged device. 2. Click [Save]. Mail Client This policy allows you to control access to a list of mail clients. 1. Open the policy and click [Add Rule]. 2. Select an option from the Client Type drop- down menu: Pre- Defined The known mail clients stored in the MDM database. Discovered The mail clients that connect through the gateway, but are not currently stored in the MDM database. Custom Specified mail clients (i.e., Apple or Android). 3. Select the Mail Client from the drop- down menu; if you selected Custom, enter the mail client in the field. 4. Choose to either Allow or Block the specified mail client and type. 5. Specify the default policy (Allow or Block) for all other mail clients not currently listed. This applies to all known mail clients that are not currently listed in the policy. 6. Specify the default policy (Allow or Block) for all new or discovered mail clients not currently listed. This applies to all mail clients that are not currently stored in the MDM database. 7. Click [Save]. 5

7 User This policy allows you to list specific users who are allowed or denied access to the server and receive corporate on their mobile device. 1. Select a User Type from the drop- down menu: o User Account Select a registered device user from the Admin Console database. o Discovered Choose the users that are connecting through the gateway and are not currently stored in the database. o Custom Choose the specific users. 2. Select a User Name from the drop- down menu. 3. Make a selection to Allow, Block, or Whitelist the specified user. 4. Specify a default policy (Allow or Block) the default action for all other usernames not currently listed. This applies to all known usernames that are not currently listed in the policy. 5. Specify the default policy (Allow or Block) for all new or discovered usernames not currently listed. This applies to all usernames that are not currently stored in the MDM database. 6. Click [Save]. Managed Device Policies Managed Device Policies are only enforced on devices currently enrolled in MDM. Inactivity This policy allows you to specify if you allow or deny inactive devices to access the server, as well as the policy for the number of days a device has not been managed before it is considered inactive. 1. Open the policy and specify whether to Allow or Block inactive devices from connecting to the server. 2. Enter the number of days of inactivity before a device is considered inactive. 3. Click [Save]. 6

8 Device Compromised Compliance This policy allows you to determine the outcome if a compromised device attempts to contact the corporate server. 1. Open the policy and select whether to Allow or Block compromised devices to access their server. 2. Click [Save]. Encryption Compliance This policy allows you to determine the outcome if a device does not have data protection turned On while attempting to access the corporate server. 1. Open the policy and select whether to Allow or Block devices that do not data protection enabled. 2. Click [Save]. Platform/Model Compliance This policy allows you to define which platforms and models you want to either access or be blocked from the corporate server. 1. Open the policy and click [Add Rule]. 2. Select an option from the Platform and Model drop- down menus. 3. Make a selection to Allow or Block the specified platform and model. 4. Specify the default policy (Allow or Block) for all platforms and models not currently listed. 5. Click [Save]. 7

9 Operating System Compliance Administrators might want to block a version of an OS used by a particular mobile device for many different reasons. For example, an admin might decide to temporarily block an OS (until the admin can resolve the problem) because it is stressing an server due to a bug or other technical issue. Another scenario might be to only allow specific platforms and OS(s) ranges that you want to access the corporate server, and block all others from receiving their Open the policy and click [Add Rule]. 2. Select the type of device from the Platform drop- down menu. 3. Select the minimum and the maximum operating system for the device from the Min OS and Max OS drop- downs. 4. Specify the default policy (Allow or Block) for all OS versions not currently listed. 5. Click [Save]. ATTACHMENT SECURITY POLICIES Attachment Security Policies are used to secure attachments being downloaded onto mobile devices. Attachment Security is available for deployments involving the SEG proxy server. In order to prevent misuse of corporate attachments, MDM s SEG has been enhanced to encrypt and secure individual attachment files. These security policies ensure that only compliant devices enabled with the Secure Content Locker (SCL) application can decrypt and view the attachment. Managed Devices Managed Device policies are enforced only on devices that are enrolled in MDM. You can configure the file attachments that need to be encrypted and secured via SCL and set policies that can be enforced on files that cannot be viewed on the SCL via the console. Select ios Devices to configure attachment settings for ios devices. OR Select Other Devices to configure attachment settings for Android devices. ATTACHMENT SECURITY POLICIES IOS DEVICES 8

10 The following screen illustrates the features available for configuring the attachment security policy for managed ios devices. Use Recommended Settings Enabling this option defaults the policy to the recommended settings, where pre- defined settings are enforced on devices. You may choose to customize the policy based on your corporate requirements. Actions on Specific file types Selecting the radio buttons facilitates MDM to communicate with the SEG the actions to be performed on attachments of specific file types. o Encrypt & Allow Attachments Implies that the SEG will encrypt attachments of specific file type(s), and these can be decrypted and read only via the SCL application on the device. o Block Attachments Implies that the SEG will block attachments of the specific file type(s). o Allow Attachments without Encryption Implies that the SEG will allow attachments of the specific file type without encryption. The attachments can be opened/saved/edited on the device through the native readers. Enabling/disabling the Allow Attachments to be saved in Secure Content Locker check box allows you to decide whether or not to allow the device user to save the attachment locally in the SCL. 9

11 Select the radio button actions under the Other Files area to update settings for the file types other than the standard file categories that are currently supported. o You can exclude specific file types from MDM's attachment setup under the Exclusion section. For example, you can block all other file types while excluding AUTOCAD files of type.dwg. o You can also set a message to be displayed in s on devices for the blocked attachments file types under the Custom Message for Blocked section. For example, "One or more attachments have been blocked per Acme's corporate policy." ATTACHMENT SECURITY POLICIES OTHER DEVICES The below screen describes the features available for the configuring attachment security policy for other managed devices. NOTE: With the Encrypt & Allow Attachments option, attachments downloaded on other managed devices will be encrypted, but cannot be viewed on the device. However, the device users will be able to forward these s with the encrypted attachment from their devices. 10

12 UNMANAGED DEVICES Unmanaged Device policies are enforced only on devices that are not enrolled and managed in MDM. Use Recommended Settings Enabling this option defaults the policy to MDM recommended settings, where pre- defined settings are enforced on devices. You may choose to customize the policy based on your corporate requirements. Actions on Specific file types Selecting the radio buttons facilitates MDM to communicate with the SEG the actions needed on attachments of specific file types. o Encrypt & Allow Attachments Implies that the SEG will encrypt attachments of specific file type(s), and these can be decrypted and read only via the SCL application on the device. o Block Attachments Implies that the SEG will block attachments of the specific file type(s). o Allow Attachments without Encryption Implies that the SEG will allow attachments of the specific file type without encryption. The attachments can be opened/saved/edited on the device through the native readers. You can exclude specific file types from MDM's attachment setup under the Exclusion section. You can also set a message to be displayed in s on devices for the blocked attachments file types under the Custom Message for Blocked section. Apply Compliance Policies After you create or edit compliance policies, the policies will be automatically applied when SEG is refreshed (configure the refresh interval in System Settings Advanced). To instantly apply the policy, click the [Provision Policy Changes] button at the bottom of the Compliance Policies page. 11

13 ATTACHMENT CONTROL MDM offers complete control as an option for all devices accessing corporate . This aspect of mobile access allows organizations advanced security settings otherwise unavailable through native clients. More than simply denying access to send and receive attachments, you can manage attachment settings with flexible encryption and access policies based on file type, including the option to decrypt and open securely in the Content Locker. Manage all of these attachment settings from the Admin Console. Prerequisites MDM's attachment control features leverage two aspects of MDM. The following prerequisites must be in place: Secure Gateway (SEG) v6.3 or higher: The SEG allows a secure connection from internal mail servers and each mobile device. Content Locker v1.6 or higher: The Content Locker serves as the secure area for viewing and managing attachments. Upon receiving an , the Content Locker detects attachment presence and immediately sends the content to the secure viewing area. o To begin, purchase the MDM Mobile Content Management module. o Then deploy the Content Locker as a public managed application. Accessing Attachment Settings Once the SEG and Content Locker infrastructure is properly established, manage attachments settings alongside all other MDM features and settings in the Admin Console. Create customized attachment settings for both managed and unmanaged devices by navigating to Profiles & Policies Compliance Policies. Select the Edit Policy option to the right of each device type in the Attachment Security Policies area. For more details on configuring attachment settings, refer to Compliance Policies. Accessing Protected Attachments Once Attachment Protection has been enabled, end- users are able to access attachments as established in the Admin Console. These options include the following: Allowed & Unencrypted Attachments Attachments display normally within the mailbox. Blocked Attachments Attachments are removed and replaced with a message notifying the user that the attachments have been blocked. Encrypted Attachments Attachments display in the mailbox as an encrypted *.awsec file type that can only be decrypted and read from within the Content Locker. 12

14 Opening Encrypted Attachments To open encrypted attachments in the Content Locker: 1. Select the attachment. 2. Select Open in Content Locker. 3. Authenticate with corporate credentials. The attachment automatically decrypts and opens. NOTE: The file cannot be opened or transferred outside of the Content Locker. MANAGEMENT DASHBOARD Each time a device attempts to connect to your mobile server through the Secure Gateway (SEG), the gateway gathers statistics about the request. This information is presented on a dashboard in the MDM console and can be used to assess the health of your mobile deployment. To access the Management Dashboard, do the following: 1. Navigate to Dashboards Management. 2. Click the Location Group drop- down and select the group that connects to the SEG in your corporate environment. 3. Click All under Request Time. NOTE: The basic Management Dashboard is available as a view under the main Dashboard, but it does not contain time interval view options or editing capabilities. 13

15 Graphs and Grid The Management Dashboard view is controlled by the three graphs at the top of the screen and a grid below the graphs, which display the data from the selected graph or data group. Device Activity The total number of devices communicating through the gateway and the number of blocked and allowed devices. Devices The total number of devices communicating through the gateway and the number of managed and unmanaged devices. Non- Compliant Devices The number of noncompliant devices communicating through the gateway according to the compliance criteria, as specified in Compliance Policies. Grid The devices that have accessed the SEG. Request Time Views The Request Time views allow the administrator to adjust the dashboard view for all time periods, or for time intervals throughout the last 24 hours. Click All or select a time interval to update the charts and grids with the time selection. Compliance in the Dashboard To edit compliance policies, click Policies. For more information about creating compliance policies, see Compliance Policies. 14

16 Override an Compliance Policy After compliance policies are in place for the Secure Gateway, the administrator may find the need to make Blacklist or Whitelist exceptions, or to remove a device from the list of exceptions. To override a compliance policy: 1. Select Policy Override List to view the current override status for all of the devices that are communicating through the gateway. This page also provides the ability to add, remove, or change an override to any of the devices listed in the grid. 2. Select a device from the grid to perform a policy override on that device by checking the box on the left. The device selected in the screen is a Whitelisted device. 3. Click any one of the following to override the current policy: Whitelist Allow the device to override compliance policies. Blacklist Block the device, even if there are policies that allow (or whitelist) the device. Default Remove the device from the override list and apply the configured compliance policies to that device. Dashboard Test Mode Test mode allows mobile devices to communicate through the gateway even when restrictive compliance policies are currently enabled. The Dashboard displays the noncompliant reason code(s) for a device to indicate all applicable restrictions if the test mode was not enabled. To enable test mode, check the Test Mode checkbox in the upper right corner of the dashboard. To disable test mode, uncheck the Test Mode checkbox and the compliance policies are applied again to each device that communicates through the gateway. The Dashboard displays the noncompliant reason code(s) for a device to indicate all applicable restrictions that are now being applied. 15

17 KEEP IN MIND... Use filter views and searches to view devices in the Secure Gateway dashboard grid according to compliance criteria. The administrator can filter the devices displayed on the grid based upon override status. Select a filter to view Blacklisted, Whitelisted, or All devices. The filter functionality provides the ability to search the grid within the displayed results. o Enter the full or partial search term in the Search box. 16

Cloud Services MDM. Overview & Setup Admin Guide

Cloud Services MDM. Overview & Setup Admin Guide Cloud Services MDM Overview & Setup Admin Guide 10/27/2014 CONTENTS Systems Overview... 2 Solution Overview... 2 System Requirements... 3 Admin Console Overview... 4 Logging into the Admin Console... 4

More information

Introduction to Google Apps for Business Integration

Introduction to Google Apps for Business Integration Introduction to Google Apps for Business Integration Overview Providing employees with mobile email access can introduce a number of security concerns not addressed by most standard email security infrastructures.

More information

Introduction to the Secure Email Gateway (SEG)

Introduction to the Secure Email Gateway (SEG) Introduction to the Secure Email Gateway (SEG) Overview The Secure Email Gateway (SEG) Proxy server is a separate server installed in-line with your existing email server to proxy all email traffic going

More information

Introduction to Mobile Email Management (MEM)

Introduction to Mobile Email Management (MEM) Introduction to Mobile Email Management (MEM) Overview To the users of most organizations, one of the most valued benefits of a managed device is the ability to access corporate mail on the go. Having

More information

Vodafone Secure Device Manager Administration User Guide

Vodafone Secure Device Manager Administration User Guide Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of September 2014. Do business better Contents Introduction 3 Help 4 How to find help in the Vodafone Secure

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

Cloud Services MDM. Application Management Admin Guide

Cloud Services MDM. Application Management Admin Guide Cloud Services MDM Application Management Admin Guide 10/24/2014 CONTENTS Application Management... 2 Using the Applications Page... 2 Enabling the Book Catalog... 9 Application Wrapping Android Apps...

More information

Telstra Mobile Device Management (T MDM) Getting Started Guide

Telstra Mobile Device Management (T MDM) Getting Started Guide Telstra Mobile Device Management (T MDM) Getting Started Guide Welcome Thank you for your interest in T MDM and Welcome! In this guide we will take you through the steps to enrolling your first device

More information

Introduction to PowerShell Integration

Introduction to PowerShell Integration Introduction to PowerShell Integration Overview The PowerShell integrated deployment is a direct model of integration that requires a simple setup with less infrastructure. In the PowerShell model, AirWatch

More information

PowerShell Configuration Guide

PowerShell Configuration Guide PowerShell Configuration Guide Table of Contents Windows PowerShell 2 Prerequisites... 3 IIS Settings... 3 ActiveSync Server PowerShell Connection Settings... 8 NotifyMDM Version 3.x Windows PowerShell

More information

Cloud Services MDM. Telecom Management Admin Guide

Cloud Services MDM. Telecom Management Admin Guide Cloud Services MDM Telecom Management Admin Guide 10/24/2014 CONTENTS Telecom Management... 2 Enabling Telecom Setting... 2 Creating and Managing Telecom Plans... 3 Dynamic Assignment... 4 Dashboard Usage...

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Introduction to the AirWatch Browser Guide

Introduction to the AirWatch Browser Guide Introduction to the AirWatch Browser Guide The AirWatch Browser application provides a safe, accessible and manageable alternative to Internet browsing using native device browsers. The AirWatch Browser

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

Compliance Rule Sets in MaaS360

Compliance Rule Sets in MaaS360 Compliance Rule Sets in MaaS360 MaaS360 allows you to apply sets of compliance rules on mobile devices. These rules are conditions that are checked on devices on real-time basis. If a device is not in

More information

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management

More information

Introduction to Directory Services

Introduction to Directory Services Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory

More information

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...

More information

MaaS360 Mobile Device Management (MDM) Administrators Guide

MaaS360 Mobile Device Management (MDM) Administrators Guide MaaS360 Mobile Device Management (MDM) Administrators Guide Copyright 2014 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described

More information

COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE

COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE Mobile Device Management, User Guide Copyright 2013, CommuniTake Technologies Ltd., Yokneam, Israel. All rights reserved. For a hard-copy

More information

GETS AIRWATCH MDM HANDBOOK

GETS AIRWATCH MDM HANDBOOK GETS AIRWATCH MDM HANDBOOK October 2014 Abstract Using AirWatch, a mobile device management tool, within the public sector. GTA Product and Services Group EXECUTIVE SUMMARY.. 2 INTRODUCTION TO THE GETS

More information

Introduction to Mobile Application Management (MAM)

Introduction to Mobile Application Management (MAM) Introduction to Mobile Application Management (MAM) Overview This guide details how your organization can manage mobile applications using AirWatch's Mobile Application Management (MAM) functionality.

More information

Sophos Mobile Control Administrator guide. Product version: 3

Sophos Mobile Control Administrator guide. Product version: 3 Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing

More information

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Integrating Cisco ISE with GO!Enterprise MDM Quick Start Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise

More information

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

Getting Started with the iscan Online Data Breach Risk Intelligence Platform Getting Started with the iscan Online Data Breach Risk Intelligence Platform 2 Table of Contents Overview... 3 Data Breach Risk Intelligence... 3 Data Breach Prevention Lifecycle Defined... 3 Choosing

More information

Sophos Mobile Control Administrator guide. Product version: 3.6

Sophos Mobile Control Administrator guide. Product version: 3.6 Sophos Mobile Control Administrator guide Product version: 3.6 Document date: November 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for

More information

Booth Gmail Configuration

Booth Gmail Configuration Student email is accessed via a Booth branded Gmail service. Student mailboxes will be accessed via Gmail. Configure Gmail Settings Before you connect Gmail to send and receive Booth Gmail on your mobile

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Manage Mobile Devices

Manage Mobile Devices Manage Mobile Devices After your mobile device users enroll with the GlobalProtect Mobile Security Manager, you can monitor the devices and ensure that they are maintained to your standards for protecting

More information

Sophos Cloud Help Document date: January 2016

Sophos Cloud Help Document date: January 2016 Sophos Cloud Help Document date: January 2016 Contents 1 About Sophos Cloud Help...4 2 Activate Your License...5 3 The Sophos Cloud User Interface...6 4 Dashboard...7 4.1 Action Center...7 4.2 Email Alerts...14

More information

Quick Start and Trial Guide (Mail) Version 3 For ios Devices

Quick Start and Trial Guide (Mail) Version 3 For ios Devices Quick Start and Trial Guide (Mail) Version 3 For ios Devices Information in this document is subject to change without notice. Complying with all applicable copyright laws is the responsibility of the

More information

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15 Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com

More information

GCM for Android Setup Guide

GCM for Android Setup Guide GCM for Android Setup Guide This guide provides information on...... Prerequisites for using Google Cloud Messaging service... Instructions for setting up GCM service via the Google API console... Configuring

More information

EM L05 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab

EM L05 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab EM L05 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab Description The Symantec Mobile Management platform continues to expand it s offering with new support for native

More information

Certificate Management

Certificate Management Certificate Management This guide provides information on...... Configuring the GO!Enterprise MDM server to use a Microsoft Active Directory Certificate Authority... Using Certificates from Outside Sources...

More information

Cloud Services MDM. Control Panel Provisioning Guide

Cloud Services MDM. Control Panel Provisioning Guide Cloud Services MDM Control Panel Provisioning Guide 10/24/2014 CONTENTS Overview... 2 Accessing MDM in the Control Panel... 3 Create the MDM Instance in the Control Panel... 3 Adding a New MDM User...

More information

EM L18 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab

EM L18 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab EM L18 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab Description The Symantec Mobile Management platform continues to expand it s offering with new support for native

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM)

MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) Microsoft BitLocker Administration and Monitoring (MBAM) provides a simplified administrative

More information

F5 Networks, Inc. F5 Recommended Practices for BIG-IP and AirWatch MDM Integration

F5 Networks, Inc. F5 Recommended Practices for BIG-IP and AirWatch MDM Integration F5 Networks, Inc. F5 Recommended Practices for BIG-IP and AirWatch MDM Integration Contents Introduction 4 Purpose 5 Requirements 6 Prerequisites 6 AirWatch 6 F5 BIG-IP 6 Network Topology 7 Big-IP Configuration

More information

AVG Business SSO Partner Getting Started Guide

AVG Business SSO Partner Getting Started Guide AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in

More information

Exchange 2003 Mailboxes

Exchange 2003 Mailboxes Exchange 2003 Mailboxes Microsoft will stop supporting Exchange 2003 mailboxes in 2014 as it comes to the end of it s life. To maintain our levels of support and performance of all our customers, we will

More information

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions HOSTING Administrator Control Panel / Quick Reference Guide Page 1 of 9 Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions Exchange 2010 Outlook Profile Setup Page 2 of 9 Exchange

More information

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work. OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android

More information

Sophos Mobile Control Super administrator guide. Product version: 3

Sophos Mobile Control Super administrator guide. Product version: 3 Sophos Mobile Control Super administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...3 2 Super administrator accounts...4 3 The super administrator customer...5

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18

Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18 Contents Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18 Automatic Setup 1. Click on the Wireless icon in your system tray that looks like. 2. You will see a list of available

More information

Initial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion

Initial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion Initial Setup of Microsoft Outlook Concept This document describes the procedures for setting up the Microsoft Outlook email client to download messages from Google Mail using Internet Message Access Protocol

More information

DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL

DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL Version 2.0 Updated: March 2011 Contents 1. Mac Email Clients... 3 1.1 Configuring Microsoft Outlook 2011... 3 1.2 Configuring Entourage 2008... 4 1.3.

More information

Secure Outgoing Mail (SMTP) Setup Guide

Secure Outgoing Mail (SMTP) Setup Guide Secure Outgoing Mail (SMTP) Setup Guide Mozilla Thunderbird Windows* 1. Load Mozilla Thunderbird. 2. In the Tools pull-down menu select Account Settings 3. In the left hand panel select Outgoing Server

More information

Release 2.0. Cox Business Online Backup Quick Start Guide

Release 2.0. Cox Business Online Backup Quick Start Guide Cox Business Online Backup Quick Start Guide Release 2.0 Cox Business Online Backup Quick Start Guide i IMPORTANT: You must notify Cox in advance if you would like to move or relocate your telephone Service.

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Cloud Extender Installation Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software described

More information

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011 User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

Dashboard Builder TM for Microsoft Access

Dashboard Builder TM for Microsoft Access Dashboard Builder TM for Microsoft Access Web Edition Application Guide Version 5.3 5.12.2014 This document is copyright 2007-2014 OpenGate Software. The information contained in this document is subject

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

MaaS360 On-Premises Cloud Extender

MaaS360 On-Premises Cloud Extender MaaS360 On-Premises Cloud Extender Installation Guide Copyright 2014 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software

More information

Certificate Management

Certificate Management www.novell.com/documentation Certificate Management ZENworks Mobile Management 3.1.x August 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Recommended Browser Setting for MySBU Portal

Recommended Browser Setting for MySBU Portal The MySBU portal is built using Microsoft s SharePoint technology framework, therefore, for the best viewing experience, Southwest Baptist University recommends the use of Microsoft s Internet Explorer,

More information

8.6. NET SatisFAXtion Email Gateway Installation Guide. For NET SatisFAXtion 8.6. Contents

8.6. NET SatisFAXtion Email Gateway Installation Guide. For NET SatisFAXtion 8.6. Contents NET SatisFAXtion Email Gateway Installation Guide For NET SatisFAXtion 8.6 Contents 1.0 - Install Microsoft Virtual SMTP Server 2 XP and 2003 2 2008 and 2008 R2 2 Windows 7 2 Upgrade Path 2 Configure Microsoft

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

Mobile Device Management Version 8. Last updated: 16-09-14

Mobile Device Management Version 8. Last updated: 16-09-14 Mobile Device Management Version 8 Last updated: 16-09-14 Copyright 2013, 2X Ltd. http://www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0 Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...

More information

NetSpective Global Proxy Configuration Guide

NetSpective Global Proxy Configuration Guide NetSpective Global Proxy Configuration Guide Table of Contents NetSpective Global Proxy Deployment... 3 Configuring NetSpective for Global Proxy... 5 Restrict Admin Access... 5 Networking... 6 Apply a

More information

GlobalProtect Configuration for IPsec Client on Apple ios Devices

GlobalProtect Configuration for IPsec Client on Apple ios Devices GlobalProtect Configuration for IPsec Client on Apple ios Devices Tech Note PAN-OS 4.1 Revision D 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com CONTENTS OVERVIEW... 3 PREREQUISITES... 3 GLOBALPROTECT

More information

Kaspersky Lab Mobile Device Management Deployment Guide

Kaspersky Lab Mobile Device Management Deployment Guide Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile

More information

Email client configuration guide. Business Email

Email client configuration guide. Business Email Email client configuration guide Business Email August 2013 Contents 1. Mac Email Clients 1.1 Downloading Microsoft Outlook (Professional Plan Users) 1.2 Configuring Microsoft Outlook (Full Exchange Server

More information

Introduction to Mobile Access Gateway Installation

Introduction to Mobile Access Gateway Installation Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure

More information

Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014

Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014 Building a BYOD Program Using the Casper Suite Technical Paper Casper Suite v9.4 or Later 17 September 2014 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information

RESCO MOBILE CRM USER GUIDE. Access your CRM data on any mobile platform ipad, iphone, Android, Windows Phone or Win XP/Vista/7/8

RESCO MOBILE CRM USER GUIDE. Access your CRM data on any mobile platform ipad, iphone, Android, Windows Phone or Win XP/Vista/7/8 RESCO MOBILE CRM USER GUIDE Access your CRM data on any mobile platform ipad, iphone, Android, Windows Phone or Win XP/Vista/7/8 Contents Synchronization... 1 1.1. How to synchronize your device... 1 1.2.

More information

Velocity Web Services Client 1.0 Installation Guide and Release Notes

Velocity Web Services Client 1.0 Installation Guide and Release Notes Velocity Web Services Client 1.0 Installation Guide and Release Notes Copyright 2014-2015, Identiv. Last updated June 24, 2015. Overview This document provides the only information about version 1.0 of

More information

Web Portal User Guide

Web Portal User Guide Web Portal User Guide Fusion Hosted Voice Web Portal User Guide, Revision 2, September 2013 NCTC North Central 872 Highway 52 Bypass E Lafayette, TN 37083 615-666-2151 www.nctc.com Fusion Hosted Voice

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

B&SC Office 365 Email

B&SC Office 365 Email B&SC Office 365 Email Microsoft Office 365 In its continuous efforts to provide the highest quality student experience, Bryant & Stratton College is giving students access to a new tool for accessing email.

More information

User Guide for eduroam

User Guide for eduroam User Guide for eduroam 獲 以 下 認 證 : Certificado pela: Certified by: 澳 門 望 廈 山 Colina de Mong-Há, Macau 電 話 : (853) 8598 3120 Tel: (853) 8598 3120 傳 真 : (853) 8598 3151 Fax: (853) 8598 3151 www.ift.edu.mo

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of

More information

IsItUp Quick Start Manual

IsItUp Quick Start Manual IsItUp - When you need to know the status of your network Taro Software Inc. Website: www.tarosoft.com Telephone: 703-405-4697 Postal address: 8829 110th Lane, Seminole Fl, 33772 Electronic mail: Contact1@tarosoft.com

More information

Mobility Manager 9.5. Users Guide

Mobility Manager 9.5. Users Guide Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks

More information

FOR WINDOWS FILE SERVERS

FOR WINDOWS FILE SERVERS Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

HelpSystems Web Server User Guide

HelpSystems Web Server User Guide HelpSystems Web Server User Guide Copyright Copyright HelpSystems, LLC. Robot is a division of HelpSystems. HelpSystems Web Server, OPAL, OPerator Assistance Language, Robot ALERT, Robot AUTOTUNE, Robot

More information

Delegated Administration Quick Start

Delegated Administration Quick Start Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,

More information

How to Set Up Outlook 2007 and Outlook 2010 for Hosted Microsoft Exchange if the Program is Already Installed

How to Set Up Outlook 2007 and Outlook 2010 for Hosted Microsoft Exchange if the Program is Already Installed How to Set Up Outlook 2007 and Outlook 2010 for Hosted Microsoft Exchange if the Program is Already Installed 1. If you received your copy of Outlook from Cbeyond (via a CD or by downloading it from CbeyondOnline)

More information

Resource Online User Guide JUNE 2013

Resource Online User Guide JUNE 2013 Resource Online User Guide JUNE 2013 CHASE PAYMENTECH SOLUTIONS MAKES NO WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES

More information

GPS Tracking Software Training and User Manual

GPS Tracking Software Training and User Manual GPS Tracking Software Training and User Manual Table of Contents Introduction... 4 Login Page... 4 Dashboard... 4 Create Group... 5 Edit Group... 6 Group Editor... 6 Add New Vehicle... 7 Configure Tracking...

More information

Hosted Exchange Setup Instructions

Hosted Exchange Setup Instructions 1Earthlink Business Hosted Exchange Instructions Hosted Exchange Setup Instructions Rev. 5.5, November 4, 2011 Hosted Exchange Basic and ActiveSync..pgs 2-8 Blackberry Hosted Exchange...pgs 8-11 Hosted

More information

User Manual for Web. Help Desk Authority 9.0

User Manual for Web. Help Desk Authority 9.0 User Manual for Web Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

Outlook 2011 Setup For ITS Exchange 2010 Server Using A SOM Domain Login

Outlook 2011 Setup For ITS Exchange 2010 Server Using A SOM Domain Login 1 WHAT These instructions are for the setup of Outlook 2011 to connect to the UCSF ITS Exchange 2010 Email Server WHY SOM ISU is migrating all SOM email accounts from the Exchange 2003 email server to

More information

Axis 360 Administrator User Manual. May 2015

Axis 360 Administrator User Manual. May 2015 Axis 360 Administrator User Manual May 2015 Table of Contents 1 Introduction... 4 1.1 Site Access and Home Page... 4 2 Settings... 5 2.1 Library Settings... 5 2.1.1 Library Site Settings...5 2.1.2 Lending

More information

Professional Mailbox Email Software Setup Guide

Professional Mailbox Email Software Setup Guide Professional Mailbox Email Software Setup Guide Table of contents Download and Install Microsoft Outlook 2010 or 2011... 2 Enabling access from email software... 4 Setting up Outlook 2010... 6 Before you

More information

Office of Information Technology Connecting to Microsoft Exchange User Guide

Office of Information Technology Connecting to Microsoft Exchange User Guide OVERVIEW The Office of Information Technology is migrating its messaging infrastructure from Microsoft Exchange 2003 to Microsoft Exchange 2010. Moving to the latest technology will provide many enhancements

More information

Background Deployment 3.1 (1003) Installation and Administration Guide

Background Deployment 3.1 (1003) Installation and Administration Guide Background Deployment 3.1 (1003) Installation and Administration Guide 2010 VoIP Integration March 14, 2011 Table of Contents Product Overview... 3 Personalization... 3 Key Press... 3 Requirements... 4

More information

ProactiveWatch 2.0 Patch Management and Reporting

ProactiveWatch 2.0 Patch Management and Reporting ProactiveWatch 2.0 Patch Management and Reporting V090908 2009 ProactiveWatch, Inc. All Rights Reserved. Purpose of this Guide... 1 II. Patching View... 1 Main Patching Screen... 2 Filtering by Patch Attribute...

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents

Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents Goals... 3 High- Level Steps... 4 Basic FTP to File with Compression... 4 Steps in Detail... 4 MFT Console: Login and

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information