SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support more sophisticated MDM functionality. If a certain feature is not supported by some platform, it indicates that the platform cannot support the feature and building a support for it is not possible. Please ask a more thorough list of features from your SyncShield contact if you are interested in the differences between operating systems versions. SYSTEM FEATURES Device registration methods Active Directory / LDAP synchronization Device information import via Excel Registration from Self-Service Portal Self-registration via app market application Task notifications Data push notifications Requires data connection (Cellular data, WiFi) Import and synchronize user and device information from Active Directory / LDAP. Import information of the device fleet via.csv-file. Minimum required information: device name and phone number OR e-mail address. End users can register their devices via Self- Service Portal. SyncShield app can be downloaded from Appstore, Google Play market and Marketplace. Opening the app will begin device registration. SMS notifications as backup option Requires SIM card Device polling Device periodically connects to the server Task execution Scheduled tasks Periodic tasks Batch tasks SMS delivery Preset a certain task to be executed at a specific time. Preset a certain task to be executed periodically. Create customized sets of tasks, which are easy to run repeatedly. Send SMSs for informative purposes.
ACCOUNT CONFIGURATIONS Active Directory synchronization Self-registration options Self-Service Portal options Organisation structure Users & roles Device tagging Two tier authentication For in-house installations Synchronize the up-to-date device and user information from your Active Directory or other directory (LDAP). Choose whether to allow end user-made registrations. Choose what features are available for the end users in Self-Service portal. Create the kind of organization structure which fits your company s device fleet. Create users and assign roles: administrator /viewer for specific organisations. Tag devices automatically during registration, use custom tags and monitor policy status. Option for extra security, sends a login password to users phone whenever logging in the system. REPORTING AND TROUBLESHOOTING Device inventory Application inventory Device information and diagnostics Information of e.g. device model, hardware, software versions Domain reports Task Logs Event Logs For in-house installations Dashboard Reboot Listings of all devices by organization, user, platform, model etc. List of which applications are used in company devices and which devices use them Detailed reports on company account, devices, applications Information of all the tasks initiated for the company s devices, details of the task execution and administrator initiating the task. Information on all policy actions (warnings, violations), added and removed devices, configurations etc. Alerts and notifications concerning SyncShield administrator o Expiring certificates o Policy violations o New self-registrations o Failed self-registrations o Compromised device alerts o Removed MDM profiles
POLICY MANAGEMENT Custom policies for different management levels Inherited policy rules Policy rules Policy tasks Policy warnings Policy violations Define a corporate policy for the entire company, and unique policy for each organization. Company level policy rules affect all organisations, however there is a possibility to disable any company policy rule for an organization if necessary. Set required applications, files and settings for each organization. Each rule may have a parent rule, which needs to be met before applying the new rule. Device management tasks, such as enabling company app catalog or sending an SMS, may be linked to a policy. The tasks are executed when policy has been correctly applied or when the policy is reset. If the device does not comply with the policy, the end user may receive a warning message, which directs the end user to correct the situation. If the device does not comply with the policy in a set amount of time, policy violation message is sent to SyncShield administrator via e-mail, SMS and/or on SyncShield dashboard. It is possible to set a violation task, which occurs when the violation is reported to the administrator e.g. lock device. SELF-SERVICE PORTAL Portal customization End user actions Add devices Reinstall MDM Get device information Lock device Wipe device Change portal name and helpdesk conctact information shown to end users. End users can add their devices to the system, the devices are automatically linked to their MDM user profile. If the end user changes a device, he/she can continue with the same MDM profile by reinstalling the profile to the new device. End user automatically gets the device information upon MDM installation. End user can lock the device remotely, removes the need to contact helpdesk for immediate security action. End user can wipe the device remotely, removes the need to contact helpdesk for immediate security action.
APPLICATION MANAGEMENT Basic application management Includes installing, uninstalling and updating applications and listing applications on device Silent application management Application installations and uninstallations require no end user interaction Application inventory List of which applications are used in company devices and which devices use them Company app catalog Share company apps and recommend app market apps for end users in company s own app market, available applications depend on the device s organization Application blacklist Forbidden applications and exceptions Application roaming restrictions Determine which applications are not allowed to use data in foreign network Application installer lock Prevent all end user made application installations Appstore application volume purchasing program Apple s volume purchasing program (VPP) allows bundle purchases for specific apps to enterprise use. When bundle is bought, Apple delivers an Excel sheet containing license key for each installation of the app. Import this sheet to SyncShield. CONTENT MANAGEMENT File system management Add, delete and execute files on the device, information on the exact location required Distribute files via company app catalog Grant access to files via company app catalog, available files depend on the device s organization
CONNECTION MANAGEMENT Exchange account settings Create a settings template for Exchange account. Exchange settings can be both sent to and deleted from device. E-mail (pop/imap) settings Create a settings template for e-mail account. E-mail settings can be both sent to and deleted from device. TouchDown settings Create a settings template for TouchDown account. TouchDown settings can be both sent to and deleted from device. Lotus Notes Traveler settings Create an EAS settings template for Lotus Notes Traveler account. Lotus Notes Traveler settings can be both sent to and deleted from device. WiFi access point settings Send, edit and delete access point settings. Proxy settings Send, edit and delete access point settings. Send web bookmarks Send bookmark icon to device s home screen. EXPENSE MANAGEMENT Prevent MDM connections while roaming SyncShield notices when device is roaming and does not send notifications during roaming. Lock and wipe actions are regardless of this setting. Application roaming restrictions Determine which applications are not allowed to use data in foreign network. Data counters Displays how much cellular data, roaming data or WiFi data the device has used. Limit mobile data usage Per day, week, month.
SECURITY MANAGEMENT Lock device Lock the device remotely. Backup & restore For calendar, contacts, SMSs. Backups are encrypted and stored on SyncShield server. VPN settings Send VPN settings to the device, configure the settings and delete them from the device. Anti-Theft Protective action when SIM card is changed (lock, wipe). Detection of compromised device Detects jailbroken ios devices and rooted Android devices. Device lock code policies Autolock Set a time in minutes how long a device can be unused before the device is locked. Force lock code use Prevents end user from disabling the autolock. Minimum lock code length Alphanumeric lock code required Require complex characters Disallow simple lock code Maximum of failed attempts allowed After set amount of failed attempts is made, the device is wiped. Lock code expiration period Set how often the lock code should be renewed. Lock code history Prevents the reuse of old lock codes. Administrator given lock code End user cannot change the lock code.
Remote wipe Full wipe to factory settings Clears all data and settings. Selective wipe Wipes only phone memory, the external memory card is left unharmed. Corporate data wipe Deletes settings and applications which are linked to the company profile on the device. Certificate management Root certificate installation Install certificates which are not device specific. SCEP settings Device specific certificate delivery. Encryption Phone memory encryption Uses device s native encryption. SD card encryption Restrictions Disallow camera Disallow access to settings Disallow Bluetooth Disallow WLAN Disallow native browser Disallow native app market Disallow Youtube Disallow access to SD card
ios SPECIFICS Disallow user to make in-app purchases Disallow FaceTime Disallow Photo Stream Force encrypted backups ios backups are saved in itunes Force itunes password query Disallow itunes Disallow icloud backup Disallow icloud document and key-value synchronisation Disallow multiplayer gaming Disallow adding Game Center friends Disallow untrusted HTTPS certificates Don't remember what users enter in web forms Prevent access to fraud websites Disallow automatic sync while roaming Disallow screenshots Disallow voice dialing Disallow JavaScript Disallow popups Allow cookies
SAMSUNG ANDROID SPECIFICS Disallow non-market application installation Prevent SyncShield client uninstallation Disallow factory reset by user Disallow crash report sending Disallow GPS Disallow microphone use by 3rd party applications Disallow NFC adapter Disallow SD card write operations Disallow tethering Disallow VPN Disallow data roaming Disallow clipboard use Disallow screen capture Disallow USB debugging Disallow USB usage as mass storage Disallow USB media player