How Microsoft IT manages mobile device management
|
|
|
- Molly Wilkinson
- 10 years ago
- Views:
Transcription
1 IT Insights A service of Microsoft IT Showcase How Microsoft IT manages mobile device management July 2015 Bring Your Own Device (BYOD) is no longer just a trend. It is arguably the dominant culture in the workplace; a majority of employees now use personal devices for work. This has implications for both users and IT departments, particularly in the search for balance between convenience and security. This case study provides an update about how Microsoft IT is evolving to deliver mobile device management in a large organization. Situation As the use of personal devices in the workplace expands, IT is challenged with managing a data environment where devices contain a mix of work-related and personal data. In addition, it must grant the right level of access per device, user, and user activity, and handle the use of multiple accounts and identities on a device. Although employees will take some steps to remain secure and compliant, they also expect an experience that is easy, consistent, and satisfying. Therefore, what IT needs is a way to embrace consumerization without increasing risk, cost, or complexity. Solution Microsoft IT approaches mobile device management as just one of a set of issues that are related to a mobile workforce. To address these, it is developing solutions in Microsoft Intune and other Microsoft Azure services. The first step is to make IT cloud-based and enable a mobile workforce. Benefits Low-cost, scalable solution Compliance and increased security Central location for users to access IT services Flexibility to meet user needs Simplified administration via a single console Products and technologies Microsoft Intune Microsoft Azure Active Directory Microsoft Enterprise Mobility Suite Active Directory Domain Services Microsoft System Center Configuration Manager 2012 Technical Case Study
2 2 IT Insights: How Microsoft IT manages mobile device management Situation In a BYOD work environment, users expect to be able to work from any location at any time, on the device of their choice. Moreover, users now typically have hybrid identities, meaning that they use their devices in both work-related and non-work-related contexts. For example, they might bring a personal tablet to a business meeting and expect to access files on a team s Microsoft SharePoint site, or they might present a Microsoft PowerPoint presentation over Microsoft Skype for Business. They re likely to check both work and personal accounts on their phone, and may use their phone camera to take photos of whiteboard sessions to help them remember what a work group collaborated on during a meeting. On both types of device, they re likely to have a mix of apps, some for personal use and some for work. But as the traditional boundaries between work and personal life blur through the use of these devices, it s critical that devices be managed in a way that is acceptable to the entire business. Data policies, such as encryption, password length, password complexity, and password duration, must provide corporate data security on all devices while maintaining the privacy of workers personal information. IT must be able to identify, with certainty, who a user is and whether a device should have access to corporate resources. Current trends suggest that workers change jobs and companies several times over the course of a career, so IT needs a way to account for this flux of people and their devices. What should IT do if a device is lost or an employee leaves the company? What is the best way to ensure that corporate resources are wiped from a personal device that should no longer have access to them? In short, the situation for IT is about managing data, managing access to that data, and handling the use of multiple accounts and identities on a device. Solution Microsoft IT has been involved in mobile device management (MDM) for several years and is evolving strategies and best practices to ensure the proper balance between convenience and security as BYOD becomes the norm in organizations of all sizes. Microsoft IT approaches MDM a bit differently today than it did in the past. Even as recently as 2013, the focus was much more on providing access to applications. Now, however, the focus is on access as defined by certificate and profile provisioning. In the future, the focus will be on conditional access that is based on the state of the device as interpreted through the MDM system and Microsoft Azure Active Directory. The Microsoft Intune and Microsoft Azure teams are working together to provide solutions so that IT can address a range of related issues: identity and access management, mobile device and app management, and information protection. The first step is to make IT cloud-based and enable a mobile workforce. Identity and access management For employees who use multiple devices for work, a key convenience a requirement, even is to have single sign-on (SSO) and a common identity, so that they can get their work done on whatever device suits them at the moment. A common identity enables application access management, regardless of whether those applications are on the device or in the cloud. This ensures that the user can have a consistent experience across devices and remain as productive as possible. Microsoft IT is delivering identity and access management by providing that SSO experience, using federation to manage access to external resources, and consistently managing identities across onpremises and cloud-based identity domains. This helps IT address the matter of managing access.
3 3 IT Insights: How Microsoft IT manages mobile device management The following are some specific features: IT provides users with a common identity across on-premises and cloud-based services through Microsoft Windows Server Active Directory and by connecting to Azure Active Directory. IT uses Active Directory Federation Services (AD FS) to connect with Azure for a consistent, cloudbased identity. Through their accounts in Azure Active Directory, users have a common identity across Azure, Microsoft Office 365, and third-party applications. Developers can build applications that use the common identity model, integrating applications either with Active Directory Domain Services for on-premises applications or with Azure for cloudbased applications. Azure Active Directory syncs with on-premises Active Directory Domain Services through Microsoft Online Directory Sync (DirSync). Azure Active Directory enables self-service password changes and resets, and self-service group management for internal users. It also supports multifactor authentication, so that internal users don t have to carry around their smart cards. Multifactor authentication provides an additional layer of security in case a device falls into the wrong hands or is used improperly. When a user attempts to log on or perform an action that is subject to multifactor authentication, the application or service confirms the user s identity by sending a text, making a phone call, or using a mobile app. Typically, this additional authentication factor is a numeric code, such as a personal identification number (PIN), and may only be intended for a single use. The user must respond (usually within a limited period, such as 10 minutes) before the application or service allows him or her to proceed. Credential caching enables enterprises to determine how long credentials can be cached on a device. This allows the enterprises to customize the user experience when users access applications and resources on devices. For example, enterprises can specify how long credentials pass through during logon or device registration, so that users do not have to enter their credentials so many times. Mobile device management Users prefer a consistent user experience when they access and work with their line-of-business (LOB) apps, no matter what device they use, how often they use it, and what platform it runs. Device enrollment should be simple, and the process for finding and working with apps and other internal resources should be familiar. In addition, policies should help users feel secure that their personal data is protected on devices that they also use for work, and it should be possible to remove devices that users no longer want included in a managed environment. Device enrollment Users can enroll a device relatively quickly in Intune. Notably, the process is opt-in rather than optout. This sets a friendlier tone for the experience, because it doesn t feel like a mandate from IT. Users recognize the value of being able to use personal devices for work, and voluntarily enroll them. Similarly, when users no longer want to use a device for work, they can easily remove it by using the Intune console (the web portal for information workers). For example, if a device has been lost or stolen, the user can either remove it for himself or herself, or request that IT do so. When a device is removed, corporate assets are automatically removed from it. Note: Devices can be completely wiped or just selectively wiped. See the Device retirement/wiping section later in this document.
4 4 IT Insights: How Microsoft IT manages mobile device management Intune provides IT with a single administrative console that it can use to manage all enrolled devices. One administrative advantage of this solution is the ability to create reports, such as security and audit reports. Provisioning of the Company Portal For users who connect to corporate resources on mobile devices, Microsoft IT now relies on its Company Portal to provide a kind of one-stop shopping experience for installing and using the Microsoft Windows or LOB apps that they need. Currently, users on ios or Android platforms install the Company Portal from a separate site. For users on Windows or Windows Phone platforms, the Intune service pushes the Company Portal out to the device. The Company Portal includes approximately 350 apps and the number is growing at a rate of 10 to 15 new apps per month. Provisioning also includes updates of existing apps as many as 35 to 40 are updated per month. Each month, there are approximately 30,000 application installations, and availability of the service has been more than 99 percent. One goal that Microsoft IT has for the Company Portal is to create apps that package streams of content and functionality for specific roles and use cases. For example, for users in field sales and marketing, the GearUp app provides a quick reference to every product that Microsoft sells, including value propositions and competitive differentiation. For users who do a lot of business travel, an app is available to instantly track expenses while they are on the go, helping users complete expense reports more quickly for improved compliance. Policies across mobile devices Whether they are related to encryption, passwords, security, management, or another fundamental issue, policies are in some ways the cornerstones of MDM in an organization. In Intune, users see a dialog box that informs them about policies. They can then select to allow apps and services from IT, or they can cancel device enrollment. Although users do not always fully appreciate this fact, policies are a form of protection for them too. Their own personal data on the devices that they use for work is more secure when other users and devices in the same environment are managed by IT policies. For more information about compliance settings for mobile devices, see the Policy and security configuration section. Mobile application management From an application standpoint, user and device provisioning is an important piece of the mobility landscape in organizations. For example, after app deployment, the app owner can use tools such as Operations Manager in Microsoft System Center Configuration Manager 2012 to discover issues such as application dependencies, monitor application components, and isolate the cause of issues that are found during monitoring. They can even triage and remediate in Microsoft Visual Studio to fix any issues in the code. From an IT perspective, apps must be managed securely within the overall MDM service. LOB apps should be signed and should be accessed only by managed users. Information protection Microsoft IT has several goals for information protection, such as keeping corporate data secure, managing data rather than the user, and providing access to data on any trusted device. Techniques for achieving these goals include encryption and policies, as mentioned earlier. Additionally, Intune enables access to company resources through certificate profiles. When certificate profiles are used to configure managed devices with the certificates that they need, device users can connect to on-premises company resources by using connections such as Wi-Fi or a virtual private network (VPN). When IT deploys certificate profiles, it provisions devices with a trusted root certificate
5 5 IT Insights: How Microsoft IT manages mobile device management for the company s public key infrastructure (PKI) and configures them to request device-specific certificates. Microsoft IT will be offering conditional access features to help improve the precision of access and protection. For example, users who require just read-only access to a file or resource will be restricted from editing, printing, or forwarding it. One of the most significant scenarios for conditional access is provisioning, but other scenarios include certificate provisioning and profile provisioning. Taken together, these techniques help IT address data management. Deployment Although Microsoft IT is evolving its approach to MDM, it s important to consider, from a tactical perspective, how exactly it performs MDM. The information in this section describes, in detail, a deployment solution for a hybrid environment that includes both System Center Configuration Manager and Intune. Although smaller organizations might need only Intune (a stand-alone rather than hybrid environment), most medium to large organizations, including Microsoft, already have Configuration Manager and use it in combination with Intune. Architecture MDM consists of a series of components that work in concert: Configuration Manager provides the central administration console for administering both onpremises and cloud-based devices. The Intune subscription establishes the connection between Configuration Manager and Intune. It specifies the configuration settings for the Intune service, such as which users can enroll their devices and which mobile device platforms should be managed. Microsoft Intune Connector site system role, which is a Configuration Manager site role, acts as a gateway between Intune and on-premises Configuration Manager, sending settings and software deployment information to Intune, and retrieving status and inventory messages from mobile devices. Figure 1. Microsoft IT MDM infrastructure The following sections describe the various activities that are involved in the Microsoft IT MDM deployment.
6 6 IT Insights: How Microsoft IT manages mobile device management Deployment process Microsoft IT took a five-step approach to deploying MDM in its existing Configuration Manager environment. Step 1: Build a Configuration Manager SP1 environment Microsoft IT added a Configuration Manager Service Pack 1 (SP1) primary site that is specifically for MDM to the corporate domain hierarchy. Server hardware consisted of the following: A primary site server that uses a virtual machine with 12 gigabytes (GB) of RAM and four core processors A Microsoft SQL Server with 64 GB of RAM and six core processors Note that a separate site for MDM is not required. Because MDM can scale to large volumes of devices, most small and medium organizations will not need a separate site and can incorporate MDM into their existing site hierarchy. Step 2: Provision users Microsoft IT performed user discovery for the entire Microsoft corporate Active Directory forest by using the existing production Configuration Manager environment. This process took a few hours because of the large user base in Microsoft, but it ensured that all users were added to a user collection before MDM was enabled. Organizations must consider the extent of their BYOD environment to determine if they need to perform a full user discovery, or whether the users who are allowed to enroll their mobile devices should be added manually to Configuration Manager. Step 3: Provision Intune services Microsoft IT worked with the Microsoft Online Directory Services (MSODS) team to provision Intune services for the Microsoft IT organizational user (tenant) account and set up the MDM services Admin (the account that is used for authentication when the Intune subscription is created in Configuration Manager). Microsoft IT also worked with the Active Directory team to configure Online Directory Sync (DirSync) and AD FS 2.0. DirSync ensured that all users were synchronized into the cloud, and AD FS enabled users to use SSO to access all cloud services. Microsoft had an existing tenant account because it already used Microsoft Office 365 and other cloud services; it also had DirSync and AD FS in place to synchronize data into the cloud. Companies that do not have these services in place will need to complete these tasks: Sign up for an Intune organizational (tenant) account. Deploy and configure DirSync to synchronize on-premises Active Directory users with the MSODS, creating the user ID that is used for cloud-based applications. Deploy AD FS to allow for a single identity for each user across both on-premises and cloud-based applications. Step 4: Set up DNS redirection Most companies will benefit from creating a Domain Name System (DNS) alias (CNAME record type) to redirect enterprise enrollment to <yourcompany>.com to allow for server auto discovery. This means that users will not need to know the actual server name when they enroll their device. Step 5: Acquire device-specific certificates Each device platform has different requirements for loading applications. Microsoft IT worked with the Microsoft App team to acquire the certificates that are required for the supported mobile devices.
7 7 IT Insights: How Microsoft IT manages mobile device management MDM configuration Enabling MDM requires creating an Intune subscription and defining an Intune Connector role in Configuration Manager. MDM is now equipped to work with any device platform, including ios, Android, and Windows Phone. To set up and configure MDM, Microsoft IT completed these steps: 1. Create a new Intune subscription. In the Subscription Wizard, Microsoft IT selected Allow the Configuration Manager console to manage this subscription. This enabled Configuration Manager to become the authoritative source for managing all mobile devices, providing a single administration console for on-premises systems, cloud-connected devices, and application life cycle management. 2. Define a user collection. Microsoft IT created a custom user collection for all Microsoft employees, based on the users who were discovered during user discovery for the entire Microsoft corporate Active Directory forest. This ensured that members of this collection were licensed for enrollment in MDM. 3. Configure the platform, certificates, and keys. For each platform, Microsoft IT applied the required certificates. 4. Assign a connector role. Microsoft IT added the Intune Connector site server role to the Central Administration Site (CAS) server. The Intune Connector server role communicates directly with Intune and provides the communication gateway between Configuration Manager and Intune for all incoming and outgoing communication. Cloud User Sync monitoring After MDM is configured, a Configuration Manager component named Cloud User Sync provides communication between Configuration Manager and Intune. It monitors the collection of users for additions, synchronizes changes with Intune to license users, and enables users to enroll their devices. Microsoft IT makes the following recommendations for Cloud User Sync monitoring: Use delta user discovery and incremental update settings. When delta discovery is enabled in Active Directory User Discovery settings and incremental updates are selected in the collection settings, updates are synchronized more frequently. This ensures that licensing new users and removing licenses for disabled users occur quickly. Use default Cloud User Sync settings. Cloud User Sync synchronizes changes, such as when new users who have been added to the collection are licensed and enabled for enrollment or when the Intune license is revoked for users who have been removed from the collection. By default, synchronization occurs every five minutes and is a minimal burden on the Configuration Manager hierarchy and network. Monitor the following Intune Connector log files: o Dmpdownloader.log to monitor policy changes that are downloaded from Intune to Configuration Manager o Dmpuploader.log to monitor policy changes that are uploaded to Intune from Configuration Manager o Cloudusersync.log to monitor user licensing in Intune Use the CloudUserID field in the User_Disc table in Configuration Manager to identify whether users are licensed: o Null indicates that a user is not licensed to enroll devices. o All zero GUID indicates that a user was previously licensed but is no longer a member of the user licensing collection. o Non-zero GUID indicates that a user is licensed to enroll devices.
8 8 IT Insights: How Microsoft IT manages mobile device management Note: Users do not have to be licensed separately for each device. When a user is licensed, he or she is licensed for up to 20 devices. Device enrollment In addition to configuring the MDM architecture, Microsoft IT had to plan the user experience as part of its deployment. It wanted to ensure that the process for enrolling devices had these characteristics: It provides a good user experience, where users can enroll their devices, gain access to the Company Portal, and install LOB applications with minimal user intervention. It enables users to become productive quickly with LOB apps by providing a seamless SSO installation. AD FS enables Microsoft users to use the same credentials (their corporate user ID, account, and network password), regardless of device. When a user enrolls a device, Microsoft IT collects general information about the device, such as the manufacturer and any LOB apps that are installed from the Company Portal (but not from the Microsoft Store). Note that the Company Portal is a required app for every newly enrolled device. Troubleshooting enrollment Microsoft IT experienced enrollment failures because some users had a non-standard User Principle Name (UPN). The enrollment process is based on a user s UPN, but the UPN of some Microsoft users deviated from the standard naming convention and also differed from their user alias. To resolve this issue, Microsoft IT created a DNS redirection. Because there are no client logs for enrollment troubleshooting, Microsoft IT needed to take a systematic approach to troubleshooting. Microsoft IT recommends that the following issues be verified when troubleshooting general device enrollment issues: o The Admin has configured MDM. o The Admin has enabled enrollment for specific device types. o The Admin has provisioned the user for mobile device enrollment. o The user is not trying to enroll several devices at the same time and has not enrolled more than 20 mobile devices in the system. o For Windows Phone 8.1 devices, the code signing certificate is configured properly. o For ios devices, the Apple Push Notification Service certificate is configured and hasn t expired, and the device is running ios v5.0 or later. Enrollment lessons learned Microsoft IT learned lessons from a few issues that occurred during the enrollment process, particularly regarding user education requirements: Users were concerned about the type of information that Microsoft IT could see and collect about their personal devices. Microsoft IT needed to reassure users that it collects only general information about the device itself (such as the manufacturer) and any LOB apps that are installed from the Company Portal and that it collects no personal information, such as phone numbers, personal apps, or apps that are installed from the Microsoft Store. Users were sometimes confused about differences in the enrollment process for the various mobile devices platforms (for example, one platform might have additional screens for adding management profiles on the device). To address this issue, Microsoft IT documented the enrollment process for each device and made this documentation available through the company support website, ITWeb.
9 9 IT Insights: How Microsoft IT manages mobile device management Policy and security configuration To help ensure that corporate security was maintained while also providing a good end-user experience, Microsoft IT had to coordinate with the following Microsoft teams: The Microsoft Security team, to define the policies that would enforce Microsoft corporate compliance settings on mobile devices, such as password policy and encryption settings. The Exchange team, to align policy settings between Exchange ActiveSync (EAS) and MDM. Microsoft IT took advantage of default compliance rules for mobile devices that are built into Configuration Manager. It created new configuration items (CIs) for mobile devices (different CIs for each device type, to make troubleshooting easier) and added built-in compliance rules whose values are based on Microsoft IT security requirements (see Table 1). It then created a configuration baseline for those CIs and targeted the configuration baseline to the collection of mobile devices. Table 1. Microsoft IT compliance settings for mobile devices Corporate policy Windows Phone Android ios Minimum password length Password expiration 70 days Not set Not set Allow simple password Not set Not set False Number of failed logon attempts before device is wiped File encryption on mobile device True True Not set Idle time before mobile device is locked 15 minutes 5 minutes 15 minutes Microsoft IT makes the following recommendations for configuring mobile device policies: Align policies, such as password/pin policies, across EAS and MDM to ensure the best end-user experience. Note: Although the most restrictive policy will apply, different user experiences have the potential to increase support calls. If a policy does not apply to a particular device platform, the policy will report which platforms do not support it. Use common policies to simplify administration. For example, set the same password requirements across all mobile device platforms so that multiple CIs and different device collections are not required to support various password policies. Create custom device collections when policies cannot be aligned across platforms. The Configuration Manager console shows enrolled devices by device type. Use the Agent Edition attribute to create custom device collections and then target policy baselines to each collection. In both CIs and configuration baselines, to enforce compliance settings on the device, enable Remediate noncompliant settings. Otherwise, reports will reflect the current compliance state of enrolled devices but will not enforce compliance rules/settings on those devices. Device retirement/wiping Like other organizations, Microsoft needs a way to enforce security if users leave the company or lose a device. To help secure a lost device or retire a device from active use, Microsoft IT issues a wipe command to the device. There are two types of wipe commands:
10 10 IT Insights: How Microsoft IT manages mobile device management A full wipe restores the device to its factory defaults. This removes all company and user data and settings. A full wipe can be performed on Windows Phone, ios, and Android devices. A selective wipe removes only company data. The specific data that a selective wipe removes and the effect on data that remains on the device vary by device platform. To limit which administrators can wipe or retire a device, Microsoft IT used role-based access control (RBAC) in Configuration Manager to restrict the view in the console for some administrators. Note: After an MDM pilot has been conducted in a test hierarchy, it is important to retire all devices from the Configuration Manager console before the move to a production hierarchy. Reporting Configuration Manager includes many ready-to-use, built-in reports for MDM, including reports for apps, hardware inventory, and settings management, so it is not necessary to create custom reports. It is also not necessary to create separate reports for desktop device and mobile device management: the same report can be used to report on both types of environment. Microsoft IT used built-in Configuration Manager reports to report on its MDM environment. In particular, two built-in reports provided Microsoft IT with insight into the application installation status and policy compliance status for MDM: Security policy compliance report (Home > ConfigMgr_<sitecode> > Compliance and Settings Management > Summary compliance by configuration baseline) Application compliance report (Home > ConfigMgr_<sitecode> > Software Distribution Application Monitoring > Application compliance) Microsoft IT also used Configuration Manager console monitoring to easily view and drill down to the asset level for the status of app deployment and security policy compliance. Although custom reports were not needed because of the built-in reporting capabilities of Configuration Manager, Microsoft IT did create a custom Unified Device Management (UDM) dashboard for Microsoft executive management by using Microsoft SQL Server 2012 Reporting Services. This dashboard provides executive management with visibility into enrollment count trends through graphs, and also has a look and feel that are similar to other Microsoft IT dashboards. Results By creating a solution that streamlined the administration and deployment of devices and applications, Microsoft IT was able to increase the scope of its centrally managed devices by 10 percent at initial implementation, without having to add resources or administrative overhead. Microsoft IT expects this number to continue to increase at a rapid pace and sees potential for centrally managing more than 125,000 mobile devices. As of June 2015, Microsoft IT reports a total device enrollment of 41,642. Most devices (26,521) run Windows Phone 8.1, 2,438 run ios, and 2,068 run Android. Other supported platforms include Windows 10 and Windows 8.1 on non-domain-joined devices, Windows RT on tablets, Windows Phone 8, and Windows Phone 10. Benefits The benefits of mobile device management include: Low-cost, scalable solution. Intune integrates into the existing Configuration Manager environment without requiring new infrastructure, hardware, or network complexity in the Microsoft IT environment. It provides enterprise-level scalability, extending the reach of Configuration Manager to support management across device platforms.
11 11 IT Insights: How Microsoft IT manages mobile device management Simplified administration. The Configuration Manager console unifies device management, providing Microsoft IT administrators with a single console for administration, application management, and reporting across multiple device types. Empowered users. MDM provides a consistent end-user experience across device platforms. Microsoft users can enroll their personal devices, install internal business applications, and manage their mobile devices through the Company Portal, allowing them to be more productive from almost anywhere on almost any device. Maintained compliance. Compliance policies are maintained across multiple device platforms to meet Microsoft compliance and security requirements while providing a good end-user experience for Microsoft users. Security risks for lost, stolen, or retired devices are reduced, because Microsoft IT administrators can remove corporate data and applications from a device through Configuration Manager. Microsoft users can also remove data and applications for themselves, through the Company Portal. Best practices Microsoft IT recommends the following best practices for implementing MDM: Plan the deployment. Proper planning before deployment will increase deployment efficiency. Review the Configuration Manager hierarchy to determine how best to integrate MDM. Remember, MDM does not require a separate site in the Configuration Manager hierarchy. Understand which platforms the organization will support. This will help determine what types of certificates are required for app deployment. Acquire and deploy certificates and sideloading keys before user enrollment is enabled. Coordinate with other teams to streamline the app certification process. Identify and license specific users by using user discovery in Configuration Manager, and then add users to a custom collection that will synchronize these user accounts with Intune. Enable AD FS to allow users to use the same user name and password to access corporate resources. Work with the security and Exchange teams to align passwords and policies across device platforms to ensure a good user experience without compromising corporate security. Promote collaboration among all teams involved. Several different teams in the organization might need to be involved including security, compliance, application developers, services, and infrastructure providers. It is important to ensure that all stakeholders can provide input at an early stage and that they can work together to ensure a smooth deployment. Develop a detailed communication and readiness plan. A well-developed support plan and documentation for user and helpdesk readiness can reduce support costs. Train help desk technicians before deployment. Have training and support content ready for modern device support, especially for any differences in the user experience across device platforms. Educate users. Provide users with documentation about the enrollment steps for each supported device platform to reduce support calls. Set expectations for any delays between enrollment and when Company Portal apps are available for installation. To reduce user concerns, make sure that users understand what is being inventoried on their devices. Create frequently asked questions (FAQs) for common questions, and document any known issues. Plan the enrollment process. To ensure a good user experience and reduce support costs, consider how the Company Portal and LOB apps will be deployed. Use categories to organize applications on the Company Portal and make them easier to find. Use security groups to limit what apps users can see, based on their role in the company. Determine which apps to publish on the Company Portal, based on business needs. Determine how long apps will be maintained on the Company Portal before they are retired.
12 12 IT Insights: How Microsoft IT manages mobile device management Evaluate which apps might change frequently, and consider using a deep link instead of deploying the full app. Use the Windows Phone emulator in the Windows Phone software development kit (SDK) to test the Windows Phone enrollment experience. Resources Manage Mobile Devices with Configuration Manager and Microsoft Intune Microsoft Intune overview Documentation Library for System Center 2012 Configuration Manager System Center Technical Documentation Directory synchronization roadmap Related case studies How Microsoft IT Deployed System Center 2012 Configuration Manager Microsoft IT Discusses Deployment of Unified Device Management Unified-Device-Management Building Reusable APIs in a Mobile First, Cloud First Business Environment Transforming IT into an Innovation Engine For more information For more information about Microsoft products or services, call the Microsoft Sales Information Center at (800) In Canada, call the Microsoft Canada Order Centre at (800) Outside the 50 United States and Canada, please contact your local Microsoft subsidiary. To access information via the World Wide Web, go to: Microsoft Corporation. All rights reserved. Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.
Unified Device Management Allows Centralized Governance of Corporate Network Devices
Unified Device Management Allows Centralized Governance of Corporate Network Devices Published July 2013 The recent bring your own device trend that allows employees to use devices they own for business
New Features: What s new in Windows Intune?
New Features: What s new in Windows Intune? Contents Release Overview... 2 Unified Enterprise Management Solution... 2 User-based Licensing... 5 Extending Client Support... 5 Understanding Mobile Device
Windows Phone 8 Device Management
Windows Phone 8 Device Management with Windows Intune and System Center Configuration Manager SP1 This white paper is part of a series of technical papers designed to help IT professionals evaluate Windows
How To Make Your Computer System More Secure And Secure
Unified Device Management with Windows Intune Andras Khan Microsoft Western Europe HQ Agenda What are the challenges we are seeing cross vertical Unified Device Management Strategy How Unified Device Management
Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University
Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University www.infrontconsulting.com Global #1 on System Center Trusted for over a decade Microsoft Partner of the year 2012, 2013 & 2014 #1
Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.
Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources. The explosion of devices is eroding the standards-based approach to corporate IT. Deploying
Microsoft Enterprise Mobility Suite
Microsoft Enterprise Mobility Suite Standalone - overview Peter Daalmans http://configmgrblog.com, [email protected] IT-Concern John Marcum Enterprise Client Management Architect / [email protected]
Microsoft Enterprise Mobility Suite
Microsoft Enterprise Mobility Suite March 25, 2015 Colm Whelan VP of Cloud Solutions [email protected] @colmw https://www.linkedin.com/in/colmwhelan Lighthouse Computer Services, All rights reserved
Mobile device and application management. Speaker Name Date
Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more
Windows Phone 8.1 Mobile Device Management Overview
Windows Phone 8.1 Mobile Device Management Overview Published April 2014 Executive summary Most organizations are aware that they need to secure corporate data and minimize risks if mobile devices are
Getting Started Guide: Getting the most out of your Windows Intune cloud
Getting Started Guide: Getting the most out of your Windows Intune cloud service Contents Overview... 3 Which Configuration is Right for You?... 3 To Sign up or Sign in?... 4 Getting Started with the Windows
Ondřej Výšek Sales Lead, Microsoft MVP. [email protected]
Ondřej Výšek Sales Lead, Microsoft MVP [email protected] Azure Active Directory Features Free edition Basic edition Premium edition Directory as a service User and group management using UI or Windows PowerShell
Enterprise Mobility Suite Overview. Joe Kuster Catapult Systems
Enterprise Mobility Suite Overview Joe Kuster Catapult Systems 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two
How To Configure A Windows 8.1 On A Windows 7.1.1 (Windows) With A Powerpoint (Windows 8) On A Blackberry) On An Ipad Or Ipad (Windows 7) On Your Blackberry Or Black
Introduction to Cloud-Based Mobile Device Management with Intune Information in this document, including URLs and other Internet Web site references, is subject to change without notice. Unless otherwise
Dell World Software User Forum 2013
Dell World Software User Forum 2013 December 9-12 Austin, TX SaaS Mobile Management Overview of Cloud Client Manager and integration with KACE K1000 Introducing Dell Enterprise Mobility Management Your
Infrastructure Deployment for Mobile Device Management with Microsoft System Center Configuration Manager and Windows Intune
Infrastructure Deployment for Mobile Device Management with Microsoft System Center Configuration Manager and Windows Intune Enrollment and Management of Mobile Devices with Microsoft System Center Configuration
Centrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
Cisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
An Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
Enterprise Mobility Services
Learn. Connect. Explore. Enterprise Mobility Services MS Anand Technical Architect Evangelist Anirudh Singh Rautela Enterprise Mobility Business lead - India The challenges we face today in keeping users
Office 365 Windows Intune Administration Guide
Chapter 7 Office 365 Windows Intune Administration Guide Office 365 is a suite of technologies delivered as a Software as a Service (SaaS) offering. Office 365 reduces the IT costs for businesses of any
AVG Business SSO Connecting to Active Directory
AVG Business SSO Connecting to Active Directory Contents AVG Business SSO Connecting to Active Directory... 1 Selecting an identity repository and using Active Directory... 3 Installing Business SSO cloud
ios Enterprise Deployment Overview
ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
Microsoft Enterprise Client Management Report. Windows Intune* and System Center Configuration Manager*
Executive Summary The bring your own device (BOD) workplace presents a number of challenges to IT management. Mobile devices come in a wider variety of devices and operating systems in the mobile realm
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Windows Phone 8.1 in the Enterprise
Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 [email protected] Introduction 3 Why Windows
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details
Agenda Enterprise challenges Hybrid identity Mobile device management Data protection Offering details 2 The time to address enterprise mobility is now 29% of today s global workforce use 3+ devices, work
Secure, Centralized, Simple
Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,
Manage all your Office365 users and licenses
Manage all your Office365 users and licenses Delegate 365 White Paper Authors: Toni Pohl, Martina Grom Version: 1.2 of December 2014 atwork information technology gmbh. All rights reserved. For information
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led
Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led Course Description Get expert instruction and hands-on practice configuring and managing clients
1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity
Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity Agenda INTRODUCTION (5 slides) WINDOWS 10 (10 slides) OFFICE 2016 (11 slides) Enterprise Mobility
An Overview of Samsung KNOX Active Directory-based Single Sign-On
C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android
WINDOWS SERVER SMALL BUSINESS SOLUTIONS. Name: Marko Drev
WINDOWS SERVER SMALL BUSINESS SOLUTIONS Name: Marko Drev SMB Windows Server Family SOLUTION SERVERS TRADITIONAL SERVERS Complete server platform, integrated and optimized Customizable Server platform for
Speeding Office 365 Implementation Using Identity-as-a-Service
August 2015 www.sarrelgroup.com [email protected] Speeding Office 365 Implementation Using Identity-as-a-Service White paper August 2015 This white paper is sponsored by Centrify. August 2015 www.sarrelgroup.com
Ben Hall Technical Pre-Sales Manager
Ben Hall Technical Pre-Sales Manager LANDESK MDM Solutions Mobility Manager (MDM in the Cloud) Secure User Management Suite with CSA LetMobile (Secure Mobile Email) Core MDM Functionality MDM Functionality
Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led
Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led About this Course Get expert instruction and hands-on practice configuring and managing
Get started with cloud hybrid search for SharePoint
Get started with cloud hybrid search for SharePoint This document supports a preliminary release of the cloud hybrid search feature for SharePoint 2013 with August 2015 PU and for SharePoint 2016 Preview,
20696B: Administering System Center Configuration Manager and Intune
20696B: Administering System Center Configuration Manager and Intune Course Details Course Code: Duration: Notes: 20696B 5 days This course syllabus should be used to determine whether the course is appropriate
etoken TMS (Token Management System) Frequently Asked Questions
etoken TMS (Token Management System) Frequently Asked Questions Make your strong authentication solution a reality with etoken TMS (Token Management System). etoken TMS provides you with full solution
ADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
Employee Active Directory Self-Service Quick Setup Guide
Employee Active Directory Self-Service Quick Setup Guide (V2.0) Last update: 11/5/2014 Copyright 2014 InfraDog Inc. All rights reserved Corporate Phone: +1 (416) 473-4096, Fax: +1 (888) 863-3936, Email:
Symantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
A Technical White Paper
A Technical White Paper An Introduction for Technical Audiences Abstract This white paper provides an overview of Microsoft System Center Mobile Device Manager 2008, an end-to-end solution for provisioning,
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
Bill Fiddes Learning and Development Specialist Rob Latino Program Manager in Office 365 Support
Bill Fiddes Learning and Development Specialist Rob Latino Program Manager in Office 365 Support Learning & Development Specialist Customer Support Services Been with Microsoft for 7 years Professionally
Administration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
Managing Office 365 Identities and Services 20346C; 5 Days, Instructor-led
Managing Office 365 Identities and Services 20346C; 5 Days, Instructor-led Course Description This is a 5-day Instructor Led Training (ILT) course that targets the needs of IT professionals who take part
Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist
Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist Industry trends driving IT pressures Devices Apps Big data Cloud 52% of information workers across 17 countries report
Microsoft 70-696 Exam
Volume: 86 Questions Topic 1: Proseware, Inc. 8 Topic 2: Litware, Inc. 14 Topic 3: Contoso, Ltd. 7 Topic 4: Fabrikam, Inc. 13 Topic 5: Mix Questions 44 Topic 1, Proseware, Inc. Case Study Overview General
Course 20346: Managing Office 365 Identities and Services
Course 20346: Managing Office 365 Identities and Services Overview About this course This is a 5-day Instructor Led Training (ILT) course that targets the needs of IT professionals who take part in evaluating,
Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
McAfee Enterprise Mobility Management
Technical FAQ McAfee Enterprise Mobility Management Frequently Asked Questions Device Management Q: Which devices do you currently support? A: McAfee Enterprise Mobility Management (McAfee EMM ) offers
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
Microsoft SharePoint Architectural Models
Microsoft SharePoint This topic is 1 of 5 in a series Introduction to Fundamental SharePoint This series is intended to raise awareness of the different fundamental architectural models through which SharePoint
Microsoft Windows Intune: Cloud-based solution
Microsoft Windows Intune: Cloud-based solution So what exactly is Windows Intune? Windows Intune simplifies and helps businesses manage and secure PCs using Windows cloud services and Windows 7. Windows
Mobile Device Management Solution Hexnode MDM
Mobile Device Management Solution Hexnode MDM Frequently Asked Questions www.hexnode.com Frequently Asked Questions How is Hexnode MDM license calculated?...4 Which ports do I need to open for Hexnode
Samsung KNOX EMM Authentication Services. SDK Quick Start Guide
Samsung KNOX EMM Authentication Services SDK Quick Start Guide June 2014 Legal notice This document and the software described in this document are furnished under and are subject to the terms of a license
Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS
Mobilize Any Business Application. Rapidly. Securely. The Challenge Today's enterprises are increasingly leveraging mobility solutions to improve productivity, decrease response times and streamline operational
AVG Business Secure Sign On Active Directory Quick Start Guide
AVG Business Secure Sign On Active Directory Quick Start Guide The steps below will allow for download and registration of the AVG Business SSO Cloud Connector to integrate SaaS application access and
Test Lab Guide: Creating a Windows Azure AD and Windows Server AD Environment using Azure AD Sync
Test Lab Guide: Creating a Windows Azure AD and Windows Server AD Environment using Azure AD Sync Microsoft Corporation Published: December 2014 Author: Mark Grimes Acknowledgements Special thanks to the
Introduction to Unified Device Management with Intune and System Center Configuration Manager
Introduction to Unified Device Management with Intune and System Center Configuration Manager Most IT pros and the IT organizations they work for have the challenge of supporting a wide diversity of apps,
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
Mobility Manager 9.5. Users Guide
Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
Managing Enterprise Devices and Apps using System Center Configuration Manager
Course 20696B: Managing Enterprise Devices and Apps using System Center Configuration Manager Course Details Course Outline Module 1: Managing Desktops and Devices in the Enterprise This module explains
Identity. Provide. ...to Office 365 & Beyond
Provide Identity...to Office 365 & Beyond Sponsored by shops around the world are increasingly turning to Office 365 Microsoft s cloud-based offering for email, instant messaging, and collaboration. A
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
Kony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
Empowering People-Centric IT. October 2013
Empowering People-Centric IT October 2013 Table of Contents Empowering People-Centric IT... 3 Overview... 4 Enable Users... 7 Overview... 8 Simplify BYOD Registration and Enrollment... 9 Enable Consistent
RFI Template for Enterprise MDM Solutions
RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile
Systems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
Symantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
Managing Office 365 Identities and Services
Course 20346B: Managing Office 365 Identities and Services Page 1 of 7 Managing Office 365 Identities and Services Course 20346B: 4 days; Instructor-Led Introduction This is a 4-day Instructor Led Training
Athena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
Google Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
Managing Office 365 Identities and Services
Course 20346B: Managing Office 365 Identities and Services Course Details Course Outline Module 1: Preparing for Office 365 This module reviews the features of Office 365 and identifies recent improvements
IBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
Deploying System Center 2012 R2 Configuration Manager
Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
When enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
MDM and beyond: Rethinking mobile security in a BYOD world
MDM and beyond: Rethinking mobile security in a BYOD world 2013 Citrix and TechTarget Table of Contents Summary.... 3 Introduction... 3 Current business challenges with BYOD... 4 Securing mobile devices
Symantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
Office 365 deployment checklists
Chapter 128 Office 365 deployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of issues.
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
Certificate Management
Certificate Management This guide provides information on...... Configuring the GO!Enterprise MDM server to use a Microsoft Active Directory Certificate Authority... Using Certificates from Outside Sources...
McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
How To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
Identity & Access Management in the Cloud: Fewer passwords, more productivity
WHITE PAPER Strategic Marketing Services Identity & Access Management in the Cloud: Fewer passwords, more productivity Cloud services are a natural for small and midsize businesses, with their ability
Special thanks to the following people for reviewing and providing invaluable feedback for this document: Joe Davies, Bill Mathers, Andreas Kjellman
Test Lab Guide: Creating a Microsoft Azure Active Directory and Windows Server Active Directory Environment using Microsoft Azure Active Directory Sync Services Microsoft Corporation Published: December
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
