Introduction to PowerShell Integration

Size: px
Start display at page:

Download "Introduction to PowerShell Integration"

Transcription

1 Introduction to PowerShell Integration Overview The PowerShell integrated deployment is a direct model of integration that requires a simple setup with less infrastructure. In the PowerShell model, AirWatch adopts a PowerShell administrator role and issues commands to the Exchange ActiveSync (EAS) infrastructure to permit or deny access based on the policies defined in the AirWatch Admin Console. PowerShell deployments do not require a separate proxy server and the installation process is simple. In This Guide Before you Begin - This section covers the basic requirements and other topics that would help you to get started with the solution. Configuring PowerShell - Describes how to set up PowerShell for Microsoft Exchange 2010/2013 and Microsoft Office 365. Implementing PowerShell - Explains the steps required for implementing PowerShell. Managing through PowerShell - This section covers the features available in AirWatch to manage your device fleet effectively with this integration type. PowerShell Appendix A - Explains how to setup a server side connection from your local computer. PowerShell Appendix B - Lists out the commands to set up a remote PowerShell session. 1

2 Before You Begin Overview The Before you Begin topic provides the information that helps you with the initial setup, configuration, and understanding of the requirements essential for a smooth user experience. In This Section Requirements - Lists the basic requirements required to get started with PowerShell Integration. Recommended Reading - This section provides helpful background and supporting information available from other AirWatch guides. PowerShell and System Requirements AirWatch uses a service account that has Remote Shell access to Exchange Server and has an associated mailbox on the Exchange Server. AirWatch requires the following minimum roles to integrate with PowerShell: o Organization Client Access Role o Mail Recipients Role o Recipient Policies Role (only needed when managing Windows Phone 7 and BlackBerry devices) Note: Selecting the roles enables all required resources/permissions needed for AirWatch to operate. AirWatch recommends creating a custom role group with these roles. AirWatch requires access to the server-side session in order to execute Exchange commands. AirWatch communicates using port 443 or 80. Create Exchange Active Sync profiles to associate in the MEM Configuration Wizard. Deploy this model from both cloud-based or on-premise solutions provided that the AirWatch server can communicate with the respective infrastructure. 2

3 Recommended Reading AirWatch Mobile Management Administration Guide - A comprehensive guide to the AirWatch's mobile management functionality. AirWatch Mobile Device Management Guide - A comprehensive guide to the AirWatch's device management functionality. 3

4 Architecture Overview In the PowerShell model of deployment, AirWatch adopts a PowerShell administrator role and issues commands to the Exchange ActiveSync (EAS) infrastructure to permit or deny access based on the settings defined in the AirWatch Admin Console. PowerShell deployments do not require a separate proxy server, and the installation process is simple. Once installed, AirWatch sends commands to PowerShell in accordance with the established policies, and PowerShell executes the actions. Note:The PowerShell model is for organizations using Microsoft Exchange 2010/2013 or Office 365 environments. In This Section Cloud-Based Deployment of Exchange Provides a schematic representation of the deployment model. On-Premise Deployments of Exchange Provides a schematic representation of the deployment model. Office 365 deployment - Provides a schematic representation of the deployment model. Deploy this model from both cloud-based or on-premise solutions provided that the AirWatch server can communicate with the respective infrastructure. 4

5 Configuring Exchange 2010/2013 for AirWatch Cloud-Based Deployments The following diagram highlights the communications flow for a cloud-based implementation with hosted Exchange 2010/2013 deployments. Configuring Exchange 2010/2013 for AirWatch On-Premise Deployments The following diagram highlights the communications flow for an on-premise implementation with hosted Exchange 2010/2013 deployments. Configuring Office 365 The following diagram highlights the communications flow for an implementation with Office

6 Note: If you want to enable PowerShell with an outbound proxy, then you need to configure WinHTTP on the AirWatch server to use the proxy. AirWatch automatically uses WinHTTP proxy configuration to establish a PowerShell session. 6

7 PowerShell Integration Overview The AirWatch Admin Console Server issues PowerShell commands to Office 365 and Exchange Server 2010/2013 environments. Set up PowerShell integration according to the steps mentioned in the below sections. In This Section Setting up the PowerShell Admin User - Explains the steps for setting up the powershell admin user. Configuring the PowerShell Endpoint in IIS - Explains how to configure the PowerShell Endpoint in IIS. Installing and Configuring Windows PowerShell - Explains the steps to install and configure PowerShell on the servers. Enable PowerShell Integration in AirWatch - Enabling+ PowerShell integration in AirWatch. Starting PowerShell Integration - Explains how to begin integrating from the AirWatch Admin Console. Enabling Exchange to Block New Devices - Enable Exchange to block new devices. Step 1: Setting up the PowerShell Admin User Set up the PowerShell Admin User in the Exchange Console on the Administration tab. Prerequisites Use permissions that can set up the PowerShell Admin user roles. Typically, an Exchange Administrator has these permissions. On Exchange 2010/2013 Note: For Microsoft Exchange 2013, use the Exchange Admin Center to create a custom role. 1. In the Exchange Management Console, navigate to Toolbox and access the Role Based Access Control User Editor. 2. Once the Internet browser opens, enter in the credentials (domain\user and password) of the Exchange Administrator with relevant permissions. Signing in as the Exchange Administrator creates a test role group, along with the roles associated to this group: 7

8 3. Select the New button to create New Role Groups. 4. Addthe relevant roles; Mail Recipients, Organization Client Access, and Recipient Policies. Then, selectsave to create a new role group specific to AirWatch PowerShell Integration. Step 2: Configuring the PowerShell Endpoint in IIS Ensure that the PowerShell endpoint in IIS on the Exchange Server is configured to accept either Basic Authentication or Windows Authentication credentials. 8

9 Enter the following command on the Exchange Management Shell on the Exchange Server and on the Remote Shell on the AirWatch Console Server: PS C:\Windows\system32> Set-ExecutionPolicy RemoteSigned Step 3: Installing and Configuring Windows PowerShell On Your AirWatch Servers Note: For additional help with configuration, see In order for the commands to be issued from the AirWatch Console server, the Windows environment needs to be capable of issuing remote Shell commands. By default the execution policy on Windows 2008 is set to Restricted script execution. Change the script execution mode to RemoteSigned. To change the script execution mode, use the Set- ExecutionPolicy command from the Shell to change the mode. The following command changes the execution policy to RemoteSigned mode: PS C:\Windows\system32> Set-ExecutionPolicy RemoteSigned See Appendix A: Testing Client-side Connection on page 17 to test that you have enabled this correctly. Step 4: Enabling PowerShell Integration in AirWatch 1. Navigate to Settings in the AirWatch Admin Console and click Configure.The MEM Configuration wizard form displays. 9

10 2. Here, select Microsoft version as Exchange 2010/2013 or Office 365 and Exchange PowerShell as the Mobile Management deployment type. Click Next. 3. The MEM deployment wizard form displays. Enter a friendly name for the PowerShell deployment. This name gets displayed on the MEM dashboard screen for devices managed by PowerShell. PowerShell Settings: o Enter the PowerShell URL which is the PowerShell instance on the server in relation to the AirWatch Server. Typically, the PowerShell URL is in the form of o Optionally, you may choose to Ignore SSL Errors to allow devices to ignore Secure Socket Layer (SSL) certificate errors between AirWatch and Exchange server. Note: AirWatch recommends that a valid SSL trust should always be established between AirWatch and Exchange server using valid certificates. o (Multi MEM scenario) If you have enabled the Support Multiple ACC option available on Groups & Settings Settings System Advanced Other, you can choose with which ACC server the PowerShell deployment should integrate using the ACC Configuration for PowerShell Integration field. PowerShell Authentication: 10

11 o Use Service Account Credentials - Optionally, enable this option to extract the PowerShell Service Account credentials from the App pool of the server on which the ACC is installed. o Authentication Type - Select the authentication type based on the Exchange Server settings. The options available are: Basic AirWatch connects to the remote PowerShell endpoint using the basic authentication type. NTLM (Negotiate) AirWatch connects to the remote PowerShell endpoint using the negotiate authentication type. Kerberos The server uses Kerberos to authenticate a domain account and NTLM for a local computer account o Admin Username and Admin Password - Enter the Username and Password of the PowerShell Service Account if the Use Service Account Credentials option is not enabled. Domain users should specify the username in the form of domain\username. Local users on a server computer should specify the username in the form of servername\username PowerShell Sync o One time sync after configuration - Enable this option to sync with PowerShell soon after configuration. o Limit sync results - You may choose to restrict this to certain filtered groups only. You can choose the User Group Configuration option and then select the user group DN. You may also choose to add Custom groups. Only the user groups belonging to the specific DN can sync. Click Next. 4. The MEM Profile Deployment wizard form displays. This is highly recommended for new installs and upgrades. o Select a device platform from the available list. o Select a Client from the available list. o Create a new profile or associate an existing profile of the above chosen platform and client. o Assign a profile from the displayed list. 5. Click Next. The Summary form provides a quick overview of the basic configuration you have just created for the PowerShell deployment. Save the settings. 11

12 Step 5: Starting the PowerShell Integration Begin managing for mobile devices connecting to your Exchange environment by following the process outlined below: 1. Sync all mailboxes (from the AirWatch Dashboard) with Exchange to pull in all devices having an EAS partnership. 2. Allow devices to begin enrollments and continue to sync on a daily basis to check for devices that convert from Unmanaged to Managed status. 3. At any point, choose to create and apply an AirWatch Policy (refer Managing through PowerShell Integration section for details) to block unmanaged devices. Note: For migration from SEG deployments to PowerShell deployments, please work with your AirWatch contact to identify an optimum solution for your enterprise. Step 6: Enabling Exchange to Block New Devices For AirWatch to manage the new devices trying to connect to for the first time, configure Exchange to either Block or Quarantine devices from an organizational level. Set this up in either an Exchange PowerShell session or through the web interface. For Office 365 and Microsoft Exchange 2010/2013 users, access the web UI through an Administrator s Outlook Web Access (OWA) portal. The first step to configure Exchange through PowerShell is to configure your organizational settings so that they Block or Quarantine devices. Blocking devices blocks the device outright while quarantining provides you more visibility to unknown devices. AirWatch recommends using quarantining, however, this also uses more processing power. Open the Exchange PowerShell command window from the Exchange Server and enter the following command: PS C:\Windows\system32> Set-ActiveSyncOrganizationSettings DefaultAccessLevel quarantine Alternatively, you can use the following command: PS C:\Windows\system32> Set-ActiveSyncOrganizationSettings DefaultAccessLevel Block Warning: The above instructions block or quarantine new devices until they enroll in the AirWatch Console, at which point, AirWatch issues relevant PowerShell cmdlets to allow access for the newly enrolled devices. Use caution while enforcing device block or quarantine at the Global level on the Exchange server. While using this setting in a production environment, please ensure that all your devices are enrolled. Typically, this setting is not used during a trial or evaluation. The cmdlet might also temporarily block or quarantine enrolled devices until they check into AirWatch. Quarantining or Blocking devices from accessing over ActiveSync allows organizations to ensure that only approved (i.e. AirWatch managed) devices are allowed for access. Without this enforcement, there is the possibility that un-managed devices may gain temporary access to corporate until the next PowerShell sync process discovers and blocks them. AirWatch recommends defining a custom message for users with blocked devices. Microsoft Exchange can then automatically send users a notification to enroll, when their blocked device attempts to access . For further information, see here. 12

13 Management through PowerShell Overview After you complete PowerShell integration and setup, you can manage the connected devices traffic, set policies, and take appropriate actions on the devices from the AirWatch Admin console. In This Section Dashboard - This section covers the features available on the Dashboard to help you manage and monitor devices effectively. List View - This section covers the features available from the List View screen that help you perform administrative actions on devices. Securing with Policies Enable the below policies from Compliance Policies.You can activate or deactivate the policies using the colored buttons under the Active column. Use the edit policy icon under the Actions column to allow or block a policy. Managed Device Policies Inactivity Allows you to prevent inactive, managed devices from accessing . You can specify the number of days a device shows up as inactive (i.e. does not check-in to AirWatch), before access is cut off. Device Compromised Allows you to prevent compromised devices from accessing . Note that this policy does not block access for devices that have not reported compromised status to AirWatch. Encryption Allows you to prevent access for unencrypted devices. Note that this policy is applicable only to devices that have reported data protection status to AirWatch. Model Allows you to restrict access based on the Platform and Model of the device. Operating System Allows you to restrict access to a set of operating systems for specific platforms. Managing Through Dashboard Gain visibility into the traffic and monitor the devices through the AirWatch Dashboard. This dashboard gives you a real-time summary of the status of the devices connected to the traffic. You can access the dashboard from Dashboard. The dashboard enables you to: Whitelist or blacklist a device to allow or deny access to respectively. View the devices which are managed, unmanaged, compliant, non- compliant, blocked, or allowed. View the device details such as OS, Model, Platform, Phone Number, IMEI, and IP address. 13

14 From the Dashboard, you can also use the available graphs to filter your search. For example, if you want to view all the managed devices of that organization group, select the Managed Devices graph. This displays the results in the List View screen. Managing Through List View View all the real-time updates of your end user devices that you are managing with AirWatch MEM. You can access the List View from List View. You can view the device or user specific information by switching between the two tabs: Device and User. You can change the Layout to either view the summary or the detailed list of the information based on your requirement. The List View screen provides detailed information that include: Last Request - In PowerShell integration, this column displays the last state change of the device either from AirWatch or from Exchange. User - The user account name. Friendly Name - The friendly name of the device. MEM Config - The configured MEM deployment that is managing the device. Address - The address of the user account. Identifier - The unique alpha-numeric identification code associated with the device. Mail Client - The client syncing the s on the device. Last Command - The last command sent to server to manage the device. This populates the Last Request column. Status - The real time status of the device and whether is blocked or allowed on it as per the defined policy. Reason - The reason code for allowing or blocking on a device. Please note that the reason code displays 'Global' and 'Individual' only when the access state of the is changed by an entity other than AirWatch (for example, an external administrator). 14

15 Platform, Model, OS, IMEI, EAS Device Type, IP Address - The device information displays in these fields. Mailbox Identity - The location of the user mailbox in the Active Directory. Filters for Quick Search From here, using the Filter option,you can narrow-down your device search based on: Last Seen: All, less than 24 hours, 12 hours, 6 hours, 2 hours. Managed: All, Managed, Unmanaged. Allowed: All, Allowed, Blocked. Policy Override: All, Blacklisted, Whitelisted, Default. Policy Violation: Compromised, Device Inactive, Not data Protected/Enrolled/MDM Compliant, Unapproved EAS Device Type/ Account/Mail Client/Model/OS. MEM Config - Filter devices based on the configured MEM deployments. Performing Actions The Override, Actions and Administration dropdown menu provides a single location to perform multiple actions on the device. Override Select the check box corresponding to a device to perform actions on it. Whitelist - Allows a device to receive s. Blacklist - Blocks a device from receiving s. Default - Allows or blocks a device based on whether the device is compliant or non compliant. 15

16 Actions Sync mailboxes - Syncs mailboxes of PowerShell integrated deployments. Note: AirWatch offers the Sync option within the Self Service Portal so that end users can sync their devices with the mail server and also run preconfigured compliance policies for all their devices. This process is typically much faster than the bulk sync performed on all the devices. Run Compliance - Triggers the compliance engine to run for the selected MEM configuration. Note: When the Direct PowerShell Model is configured, AirWatch communicates directly to the CAS array via remote signed PowerShell sessions established from the console server or AirWatch Cloud Connector (ACC) (depending on the deployment architecture). Using remote signed sessions, commands are sent to blacklist (block) and whitelist (allow) device ID s on a given users CAS mailbox in Exchange 2010/2013 based on the device s compliance status in AirWatch. The DefaultAccessLevel on the Exchange server does not change on running compliance. This setting applies only to known devices and overrides the access controls defined by DefaultAccessLevel. New unmanaged devices can access if DefaultAccessLevel is set to allow. Devices can be manually blocked through the AirWatch Admin Console. It is a best practice to test expected PowerShell integration behavior without enforcing device blocking across the enterprise. Administration Enrollment - Sends an to the user with all the details required for enrollment. Delete Unmanaged Devices - Deletes the selected unmanaged device record from the dashboard. Please note that this record may reappear after the next sync. Remote Wipe - Resets the device to factory settings. Migrate Devices - Migrates selected devices to other chosen MEM configurations by deleting the installed EAS profile and pushing the EAS profile of the chosen configuration on the device. Note: Please note that these actions once performed cannot be undone. 16

17 Appendix A: Testing Client-side Connection Connecting to Server-Side Session The Windows PowerShell session on your local computer is referred to as the client-side session and only has the basic Windows PowerShell commands available to it. In order to execute commands on Exchange 2010/2013 or in the cloudbased Office 365 service, you ll need to connect to the server environment, referred to as the server-side session. This session contains the commands used to control the Exchange mailbox properties. This following example shows how to connect to the server-side session and establish a new session: PS C:\Windows\system32> $cred = Get-Credential PS C:\Windows\system32> $session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri " $cred -Authentication Basic -AllowRedirection Note:Press enter after authentication to execute the $session command. To import the server-side session, issue the following command after successfully connecting to the server. PS C:\Windows\system32> Import-PSSession $session PS C:\Windows\system32> MailBox Queries During device enrollment in AirWatch, devices can be configured for exchange through profile distribution. When properly configured, the AirWatch Console will issue commands to enable Exchange ActiveSync for a user s mailbox on Exchange. The AirWatch console also issues a command to whitelist the device ID being enrolled. To see what devices are whitelisted for a mailbox, use the command Get-CASMailbox to select the allowed devices. The following example shows the device IDs that have been granted access to a specific user's mailbox. Command: PS C:\Windows\system32> get-casmailbox -Identity "user.name@mail.com" select {$_.ActiveSyncAllowedDeviceIDs} Result: $_.ActiveSyncAllowedDeviceIDs {ApplDLXGL5FGDJHF, B058C150E57CC4004DA6B2E1BE4EE572} Likewise, query a user s mailbox to view the blacklisted or blocked device IDs as shown in the following example. Command: PS C:\Windows\system32> get-casmailbox -Identity "user.name@mail.com" select {$_.ActiveSyncBlockedDeviceIDs} Result: $_.ActiveSyncBlockedDeviceIDs 17

18 {Appl A4S, DT095F898778SDF2E1B DG56} Closing the Server-Side Session Always close the console-server session when troubleshooting is complete. To remove the server-side session, use the remove-pssession command. PS C:\Windows\system32> remove-pssession $session PS C:\Windows\system32> 18

19 Appendix B: Cmdlets Executed by AirWatch The Exchange Management Shell includes a number of cmdlets commends to configure everything from mailbox quotas to SMTP relay settings. Cmdlets are typically named with a <verb> - <noun> convention, such as in Get-CASMailbox. At their core, cmdlets are simply Microsoft.NET classes, making them easy to implement in.net applications such as AirWatch. AirWatch leverages the following PowerShell cmdlets to establish the remote PowerShell session: New-PSSession Creates a persistent PowerShell connection to a local or remote host. Once the session is open, the client can perform any number of PowerShell commands. Performs Set-CASMailbox and updates three distinct parameters for a mailbox when AirWatch uses this connection: ActiveSyncAllowedDeviceIDs, ActiveSyncBlockedDeviceIDs, and ActiveSyncEnabled. For Example: o New-PSSessionOption -SkipRevocationCheck -SkipCACheck -SkipCNCheck ProxyAccessType WinHttpConfig o New-PSSession ConfigurationName $configurationname -ConnectionUri $connectionuri -Credential $cred - Authentication $authentication-allowredirection -SessionOption $proxyoption Import-PSSession Provides the ability to import PowerShell commands from one PowerShell session to another. For example: o Import-PSSession AllowClobber -CommandName $commandtoimport -FormatTypeName Set-ExecutionPolicy Allows the client to modify its preferences for the PowerShell execution policy. Set-ExecutionPolicy also helps to determine if the client has the permissions necessary to perform certain PowerShell commands. Set-CASMailbox Provides the ability to block or allow client access to specific user s mailboxes over a number of different client applications, including ActiveSync. Using this cmdlet, AirWatch can block particular devices or users from accessing ActiveSync based on the device compliance and user compliance to MDM policies. AirWatch specifically leverages the following arguments to this cmdlet. For example: o Set-CASMailbox "acmeuser" - ActiveSyncAllowedDeviceIDs{Appl123456ABCD78} - ActiveSyncBlockedDeviceIDs $null - ActiveSyncEnabled $true Note: The Set-CASMailbox cmdlet operates on one mailbox at a time and can configure properties for Exchange ActiveSync. You can configure a single property or multiple properties by using one statement. o ActiveSyncAllowedDeviceIDs - Provides the ability to whitelist particular device IDs that can access the mailbox through ActiveSync. The ActiveSyncAllowedDeviceIDs parameter accepts a list of device IDs that are allowed to synchronize with the mailbox. 19

20 o ActiveSyncBlockedDeviceIDs - Provides the ability to blacklist particular device IDs that cannot access the mailbox via ActiveSync. The ActiveSyncBlockedDeviceIDs parameter accepts a list of device IDs that aren't allowed to synchronize with the mailbox. o ActiveSyncEnabled - Provides the ability to completely enable or disable ActiveSync access for a particular mailbox. TheActiveSyncEnabled parameter specifies whether to enable Exchange ActiveSync. Get-CASMailbox Returns a complete list of attributes of a mailbox. This is also used for performing one time sync of mailbox. For example: o Get-CASMailbox "acmeuser" Select ActiveSyncAllowedDeviceIDs,ActiveSyncBlockedDeviceIDs o Get-CASMailbox Filter $filter $ ResultSize Unlimited o Get-CasMailbox Identity $identity Set-ADServer Settings For example: o Set-AdServerSettings ViewEntireForest $true/$false Get-ActiveSyncDevice Retrieves a list of devices in your organization that have active Microsoft Exchange ActiveSync partnerships. This is also used for performing one time sync of mailbox. For example: o Get - ActiveSyncDevice - Mailbox "acmeuser" o Get-ActiveSyncDevice ResultSize Unlimited o Get-ActiveSyncDevice Mailbox $mailbox AW-Get-ADGroups The Get-ADGroup cmdlet gets a group or performs a search to retrieve multiple groups from an Active Directory. For example: o Get-OrganizationalUnit Clear-ActiveSyncDevice Deletes all user data from a mobile phone the next time that the device receives data from the server (for example, syncs with Microsoft Exchange Server 2010). Sets the DeviceWipeStatus parameter to $true in Exchange. For example: o Clear-ActiveSyncDevice Identity $identity Confirm $true/$false Remove-PSSession Closes or ends Windows PowerShell session(s). 20

Introduction to Google Apps for Business Integration

Introduction to Google Apps for Business Integration Introduction to Google Apps for Business Integration Overview Providing employees with mobile email access can introduce a number of security concerns not addressed by most standard email security infrastructures.

More information

Introduction to the Secure Email Gateway (SEG)

Introduction to the Secure Email Gateway (SEG) Introduction to the Secure Email Gateway (SEG) Overview The Secure Email Gateway (SEG) Proxy server is a separate server installed in-line with your existing email server to proxy all email traffic going

More information

Cloud Services MDM. Email Management Admin Guide

Cloud Services MDM. Email Management Admin Guide Cloud Services MDM Email Management Admin Guide 10/27/2014 CONTENTS Email Management... 2 Email Compliance Policies... 3 Email Policies... 4 Attachment Security Policies... 8 Attachment Security Policies

More information

Introduction to Directory Services

Introduction to Directory Services Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory

More information

Introduction to Mobile Email Management (MEM)

Introduction to Mobile Email Management (MEM) Introduction to Mobile Email Management (MEM) Overview To the users of most organizations, one of the most valued benefits of a managed device is the ability to access corporate mail on the go. Having

More information

Vodafone Secure Device Manager Administration User Guide

Vodafone Secure Device Manager Administration User Guide Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of September 2014. Do business better Contents Introduction 3 Help 4 How to find help in the Vodafone Secure

More information

PowerShell Configuration Guide

PowerShell Configuration Guide PowerShell Configuration Guide Table of Contents Windows PowerShell 2 Prerequisites... 3 IIS Settings... 3 ActiveSync Server PowerShell Connection Settings... 8 NotifyMDM Version 3.x Windows PowerShell

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Kaspersky Lab Mobile Device Management Deployment Guide

Kaspersky Lab Mobile Device Management Deployment Guide Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

GFI Product Guide. GFI Archiver and Office 365 Deployment Guide

GFI Product Guide. GFI Archiver and Office 365 Deployment Guide GFI Product Guide GFI Archiver and Office 365 Deployment Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind,

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

How To Set Up A Journaling Mailbox In Microsoft Office 365 And Gfi Mailarchiver

How To Set Up A Journaling Mailbox In Microsoft Office 365 And Gfi Mailarchiver GFI Product Guide GFI MailArchiver and Office 365 Deployment Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

How To Integrate An Ipm With Airwatch With Big Ip On A Server With A Network (F5) On A Network With A Pb (Fiv) On An Ip Server On A Cloud (Fv) On Your Computer Or Ip

How To Integrate An Ipm With Airwatch With Big Ip On A Server With A Network (F5) On A Network With A Pb (Fiv) On An Ip Server On A Cloud (Fv) On Your Computer Or Ip F5 Networks, Inc. F5 Recommended Practices for BIG-IP and AirWatch MDM Integration Contents Introduction 4 Purpose 5 Requirements 6 Prerequisites 6 AirWatch 6 F5 BIG-IP 6 Network Topology 7 Big-IP Configuration

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

MaaS360 On-Premises Cloud Extender

MaaS360 On-Premises Cloud Extender MaaS360 On-Premises Cloud Extender Installation Guide Copyright 2014 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

Sophos Mobile Control Administrator guide. Product version: 3

Sophos Mobile Control Administrator guide. Product version: 3 Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing

More information

Before you begin with an Exchange 2010 hybrid deployment... 3. Sign up for Office 365 for an Exchange 2010 hybrid deployment... 10

Before you begin with an Exchange 2010 hybrid deployment... 3. Sign up for Office 365 for an Exchange 2010 hybrid deployment... 10 Contents Before you begin with an Exchange 2010 hybrid deployment... 3 Sign up for Office 365 for an Exchange 2010 hybrid deployment... 10 Verify prerequisites with an Exchange 2010 hybrid deployment...

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

8.10. Migrating to Microsoft Office 365

8.10. Migrating to Microsoft Office 365 8.10 Migrating to Microsoft Office 365 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a

More information

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0 Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

Sophos Mobile Control Administrator guide. Product version: 3.6

Sophos Mobile Control Administrator guide. Product version: 3.6 Sophos Mobile Control Administrator guide Product version: 3.6 Document date: November 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for

More information

Office 365 DirSync, ADFS, Single Sign On and Exchange Federation

Office 365 DirSync, ADFS, Single Sign On and Exchange Federation Chapter 11 Office 365 DirSync, ADFS, Single Sign On and Exchange Federation An Office 365 site is an organizational unit complete with its own security components and e-mail domain: @onmicrosoft.com

More information

Avatier Identity Management Suite

Avatier Identity Management Suite Avatier Identity Management Suite Integrating Exchange 2010 With Identity Enforcer Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX: 925-217-0853 Email: support@avatier.com

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Cloud Extender Installation Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Dell One Identity Manager 7.0. Administration Guide for Connecting to Microsoft Exchange

Dell One Identity Manager 7.0. Administration Guide for Connecting to Microsoft Exchange Dell One Identity Manager 7.0 Administration Guide for Connecting to Microsoft 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

Server Software Installation Guide

Server Software Installation Guide Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise

More information

Introduction to Mobile Access Gateway Installation

Introduction to Mobile Access Gateway Installation Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

OneLogin Integration User Guide

OneLogin Integration User Guide OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...

More information

McAfee Enterprise Mobility Management 11.0 Software

McAfee Enterprise Mobility Management 11.0 Software Product Guide McAfee Enterprise Mobility Management 11.0 Software For use with epolicy Orchestrator 4.6.5-5.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Before you begin with an Exchange 2010 hybrid deployment... 3. Sign up for Office 365 for an Exchange 2010 hybrid deployment... 10

Before you begin with an Exchange 2010 hybrid deployment... 3. Sign up for Office 365 for an Exchange 2010 hybrid deployment... 10 Contents Before you begin with an Exchange 2010 hybrid deployment... 3 Sign up for Office 365 for an Exchange 2010 hybrid deployment... 10 Verify prerequisites with an Exchange 2010 hybrid deployment...

More information

COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE

COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE Mobile Device Management, User Guide Copyright 2013, CommuniTake Technologies Ltd., Yokneam, Israel. All rights reserved. For a hard-copy

More information

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices

NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices End-of-Life Notice Please note that GO!Enterprise MDM server version 3.6.3 is the last to officially

More information

Introduction to the AirWatch Cloud Connector (ACC) Guide

Introduction to the AirWatch Cloud Connector (ACC) Guide Introduction to the AirWatch Cloud Connector (ACC) Guide The AirWatch Cloud Connector (ACC) provides organizations the ability to integrate AirWatch with their back-end enterprise systems. This document

More information

Telstra Mobile Device Management (T MDM) Getting Started Guide

Telstra Mobile Device Management (T MDM) Getting Started Guide Telstra Mobile Device Management (T MDM) Getting Started Guide Welcome Thank you for your interest in T MDM and Welcome! In this guide we will take you through the steps to enrolling your first device

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

System Configuration and Deployment Guide

System Configuration and Deployment Guide System Configuration and Deployment Guide This guide provides information on...... Configuring an Organization using the Organization Wizard... Setting a default Policy Suite using the Organization Wizard...

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

User Guide. Time Warner Cable Business Class Cloud Solutions Control Panel. Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007

User Guide. Time Warner Cable Business Class Cloud Solutions Control Panel. Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007 Chapter Title Time Warner Cable Business Class Cloud Solutions Control Panel User Guide Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007 Version 1.1 Table of Contents Table of Contents...

More information

Navigate your checklist... 3. Before you begin with Exchange 2007... 4. Sign up for Office 365... 11

Navigate your checklist... 3. Before you begin with Exchange 2007... 4. Sign up for Office 365... 11 Contents Navigate your checklist... 3 Before you begin with Exchange 2007... 4 Sign up for Office 365... 11 Verify coexistence prerequisites when deploying AD FS with Exchange 2007... 11 Collect needed

More information

qliqdirect Active Directory Guide

qliqdirect Active Directory Guide qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Office 365 Exchange Online Protection Administration Guide

Office 365 Exchange Online Protection Administration Guide Chapter 10 Office 365 Exchange Online Protection Administration Guide Office 365 version 2013 is a suite of software products: Software as a Service (SaaS). Customers can purchase Office 365 in many ways,

More information

Mobility Manager 9.5. Users Guide

Mobility Manager 9.5. Users Guide Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks

More information

Administration Guide BES12. Version 12.3

Administration Guide BES12. Version 12.3 Administration Guide BES12 Version 12.3 Published: 2015-10-30 SWD-20151028105551254 Contents Introduction... 11 About this guide...12 How to use this guide... 13 Steps to administer BES12... 13 Examples

More information

Employee Active Directory Self-Service Quick Setup Guide

Employee Active Directory Self-Service Quick Setup Guide Employee Active Directory Self-Service Quick Setup Guide (V2.0) Last update: 11/5/2014 Copyright 2014 InfraDog Inc. All rights reserved Corporate Phone: +1 (416) 473-4096, Fax: +1 (888) 863-3936, Email:

More information

Protected Trust Directory Sync Guide

Protected Trust Directory Sync Guide Protected Trust Directory Sync Guide Protected Trust Directory Sync Guide 2 Overview Protected Trust Directory Sync enables your organization to synchronize the users and distribution lists in Active Directory

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

Hybrid Architecture. Office 365. On-premises Exchange org (Exchange 2007+) Provisioned via DirSync. Secure Mail flow

Hybrid Architecture. Office 365. On-premises Exchange org (Exchange 2007+) Provisioned via DirSync. Secure Mail flow Hybrid Deployment Hybrid Architecture Provisioned via DirSync Exchange 2010 (HUB/CAS) Exchange 2013 CAS & MBX Secure Mail flow Exchange Federation (Free/Busy, Mail Tips, Archive, etc.) Mailbox data via

More information

Sophos Mobile Control Super administrator guide. Product version: 3

Sophos Mobile Control Super administrator guide. Product version: 3 Sophos Mobile Control Super administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...3 2 Super administrator accounts...4 3 The super administrator customer...5

More information

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Integrating Cisco ISE with GO!Enterprise MDM Quick Start Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise

More information

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0 Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios Devices 1 Table of Contents GO!Enterprise

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information

Cloud. Hosted Exchange Administration Manual

Cloud. Hosted Exchange Administration Manual Cloud Hosted Exchange Administration Manual Table of Contents Table of Contents... 1 Table of Figures... 4 1 Preface... 6 2 Telesystem Hosted Exchange Administrative Portal... 7 3 Hosted Exchange Service...

More information

Cisco TelePresence Management Suite Extension for Microsoft Exchange

Cisco TelePresence Management Suite Extension for Microsoft Exchange Cisco TelePresence Management Suite Extension for Microsoft Exchange Installation Guide D14846.01 June 2011 Software version 2.3 Contents Introduction 5 End user guidance 5 Server requirements 6 Exchange

More information

Sophos Mobile Control Startup guide. Product version: 3.5

Sophos Mobile Control Startup guide. Product version: 3.5 Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Cloud Services MDM. Overview & Setup Admin Guide

Cloud Services MDM. Overview & Setup Admin Guide Cloud Services MDM Overview & Setup Admin Guide 10/27/2014 CONTENTS Systems Overview... 2 Solution Overview... 2 System Requirements... 3 Admin Console Overview... 4 Logging into the Admin Console... 4

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of

More information

SaskTel Hosted Exchange Administrator Guide

SaskTel Hosted Exchange Administrator Guide SaskTel Hosted Exchange Administrator Guide Customer Center Administration Portal At least the first of the following tasks (Accept the Terms of Service) needs to be completed before the company portal

More information

Setting up Microsoft Office 365

Setting up Microsoft Office 365 Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft

More information

Mobile Device Management Solution Hexnode MDM

Mobile Device Management Solution Hexnode MDM Mobile Device Management Solution Hexnode MDM Frequently Asked Questions www.hexnode.com Frequently Asked Questions How is Hexnode MDM license calculated?...4 Which ports do I need to open for Hexnode

More information

Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see "Deploy Inbox Rules" below.

Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see Deploy Inbox Rules below. Configure the E-mail Router After the E-mail Router has been installed, you can configure several aspects of it. Some of these configuration tasks are mandatory. Others are optional in that you use them

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Introduction to the AirWatch Browser Guide

Introduction to the AirWatch Browser Guide Introduction to the AirWatch Browser Guide The AirWatch Browser application provides a safe, accessible and manageable alternative to Internet browsing using native device browsers. The AirWatch Browser

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

Cloud Services MDM. Telecom Management Admin Guide

Cloud Services MDM. Telecom Management Admin Guide Cloud Services MDM Telecom Management Admin Guide 10/24/2014 CONTENTS Telecom Management... 2 Enabling Telecom Setting... 2 Creating and Managing Telecom Plans... 3 Dynamic Assignment... 4 Dashboard Usage...

More information

Introducing the FirePass and Microsoft Exchange Server configuration

Introducing the FirePass and Microsoft Exchange Server configuration Deployment Guide Deploying Microsoft Exchange Server/Outlook Web Access and F5 s FirePass Controller Introducing the FirePass and Microsoft Exchange Server configuration Welcome to the FirePass Exchange

More information

Setup Guide: Server-side synchronization for CRM Online and Exchange Server

Setup Guide: Server-side synchronization for CRM Online and Exchange Server Setup Guide: Server-side synchronization for CRM Online and Exchange Server Version 8.0 Microsoft Dynamics CRM 2016 Authors: Elad Ben Yosef, Sumanta Batabyal This document is provided "as-is". Information

More information

AVG Business SSO Partner Getting Started Guide

AVG Business SSO Partner Getting Started Guide AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in

More information

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007 GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email

More information

Optimization in a Secure Windows Environment

Optimization in a Secure Windows Environment WHITE PAPER Optimization in a Secure Windows Environment A guide to the preparation, configuration and troubleshooting of Riverbed Steelhead appliances for Signed SMB and Encrypted MAPI September 2013

More information

MaaS360 Mobile Device Management (MDM) Administrators Guide

MaaS360 Mobile Device Management (MDM) Administrators Guide MaaS360 Mobile Device Management (MDM) Administrators Guide Copyright 2014 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Sophos Mobile Control Installation guide. Product version: 3.5

Sophos Mobile Control Installation guide. Product version: 3.5 Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External

More information

Sophos Mobile Control Installation guide

Sophos Mobile Control Installation guide Sophos Mobile Control Installation guide Product version: 2.5 Document date: July 2012 Contents 1 Introduction... 3 2 The Sophos Mobile Control server... 4 3 Set up Sophos Mobile Control... 13 4 Running

More information

Introduction to Mobile Application Management (MAM)

Introduction to Mobile Application Management (MAM) Introduction to Mobile Application Management (MAM) Overview This guide details how your organization can manage mobile applications using AirWatch's Mobile Application Management (MAM) functionality.

More information

Mobile Device Management in a BYOD World. Jay Cotton Microsoft PFE

Mobile Device Management in a BYOD World. Jay Cotton Microsoft PFE Mobile Device Management in a BYOD World Jay Cotton Microsoft PFE Mobile Device Management in a BYOD World Agenda It s a BYOD World What can I do to maintain control? How do these devices connect to Exchange?

More information

Compliance Rule Sets in MaaS360

Compliance Rule Sets in MaaS360 Compliance Rule Sets in MaaS360 MaaS360 allows you to apply sets of compliance rules on mobile devices. These rules are conditions that are checked on devices on real-time basis. If a device is not in

More information

Setup Guide for AD FS 3.0 on the Apprenda Platform

Setup Guide for AD FS 3.0 on the Apprenda Platform Setup Guide for AD FS 3.0 on the Apprenda Platform Last Updated for Apprenda 6.0.3 The Apprenda Platform leverages Active Directory Federation Services (AD FS) to support identity federation. AD FS and

More information

Using RD Gateway with Azure Multifactor Authentication

Using RD Gateway with Azure Multifactor Authentication Using RD Gateway with Azure Multifactor Authentication We have a client that uses RD Gateway to allow users to access their RDS deployment from outside their corporate network. They have about 1000+ users.

More information

Nevepoint Access Manager 1.2 BETA Documentation

Nevepoint Access Manager 1.2 BETA Documentation Nevepoint Access Manager 1.2 BETA Documentation Table of Contents Installation...3 Locating the Installation Wizard URL...3 Step 1: Configure the Administrator...4 Step 2: Connecting to Primary Connector...4

More information

Quick Start and Trial Guide (Mail) Version 3 For ios Devices

Quick Start and Trial Guide (Mail) Version 3 For ios Devices Quick Start and Trial Guide (Mail) Version 3 For ios Devices Information in this document is subject to change without notice. Complying with all applicable copyright laws is the responsibility of the

More information

Microsoft Dynamics GP Release

Microsoft Dynamics GP Release Microsoft Dynamics GP Release Workflow Installation and Upgrade Guide February 17, 2011 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is.

More information

Configuration Guide for Exchange 2003, 2007 and 2010

Configuration Guide for Exchange 2003, 2007 and 2010 Configuration Guide for Exchange 2003, 2007 and 2010 Table of Contents Exchange 2013... 2 Configuring Outbound Smart Host... 2 Configure Access Restriction to Prevent DoS Attacks... 2 Exchange 2007/2010...

More information

Migration User Guides: The Console Email Application Setup Guide

Migration User Guides: The Console Email Application Setup Guide Migration User Guides: The Console Email Application Setup Guide Version 1.0 1 Contents Introduction 3 What are my email software settings? 3 Popular email software setup tutorials 3 Apple Mail OS Maverick

More information