USER GUIDE: MaaS360 Financial IT Reg Enforcement Service



Similar documents
USER GUIDE: MaaS360 Services

Advanced Configuration Steps

Compliance Rule Sets in MaaS360

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

MaaS360 Mobile Device Management (MDM) Administrators Guide

MaaS360 Cloud Extender

Charter Business Desktop Security Administrator's Guide

MaaS360 On-Premises Cloud Extender

Using the Apple Configurator and MaaS3360

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview

Kaseya 2. User Guide. Version 1.0

MaaS360 Secure Productivity Suite (SPS): Secure Container User Guide

IBM MobileFirst Protect (MaaS360) Mobile Enterprise Gateway Migration Guide

Resource Online User Guide JUNE 2013

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway

Kaseya 2. User Guide. Version R8. English

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

FOR WINDOWS FILE SERVERS

Seagate Dashboard User Guide

VMware Mirage Web Manager Guide

Sophos Mobile Control Super administrator guide. Product version: 3

How To Use Senior Systems Cloud Services

Table of Contents. Introduction...9. Installation Program Tour The Program Components...10 Main Program Features...11

User Manual for Web. Help Desk Authority 9.0

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc.

Citrix Access Gateway Plug-in for Windows User Guide

Kaseya 2. User Guide. Version 7.0. English

Web Dashboard. User Manual. Build

Software Version 5.1 November, Xerox Device Agent User Guide

Remark FTP Utility. For Remark Office OMR. User s Guide

Server Installation, Administration and Integration Guide

User's Manual. Intego Remote Management Console User's Manual Page 1

OneDrive for Business User Guide

MySupport. End User Guide. Document Version: 1.3

Advanced Event Viewer Manual

ReadyNAS Setup Manual

Sophos Mobile Control Startup guide. Product version: 3.5

Quick Start Guide. Version R9. English

SafeGuard Enterprise Web Helpdesk

Net Protector Admin Console

Strategic Asset Tracking System User Guide

Verizon Remote Access User Guide

Vantage RADIUS 50. Quick Start Guide Version 1.0 3/2005

BDR for ShadowProtect Solution Guide and Best Practices

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

READYNAS INSTANT STORAGE. Quick Installation Guide

Novell ZENworks Asset Management 7.5

Learn More MaaS360 Cloud Extender Checklist (MDM for Blackberry)

User Guide. version 1.2

SonicWALL SSL VPN 3.5: Virtual Assist

ScoMIS Encryption Service

Audit Management Reference

CTERA Agent for Linux

Sophos Mobile Control Startup guide. Product version: 3

MaaS360 Mobile Service

formerly Help Desk Authority Upgrade Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

TANDBERG MANAGEMENT SUITE 10.0

Moxa Device Manager 2.0 User s Guide

About This Guide SolarEdge Configuration Tool Software Guide. About This Guide

NETWORK PRINT MONITOR User Guide

Wavelink Avalanche Mobility Center Java Console User Guide. Version 5.3

Device LinkUP + Desktop LP Guide RDP

HP IMC Firewall Manager

LogMeIn Hamachi. Getting Started Guide

Android App User Guide

Sophos Mobile Control Administrator guide. Product version: 3.6

Learn More Cloud Extender Requirements Cheat Sheet

PowerSchool Parent Portal User Guide. PowerSchool 7.x Student Information System

Configuration Information

System Area Manager. Remote Management

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0

User Guide Win7Zilla

Attix5 Pro. Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition. V6.0 User Manual for Mac OS X

Attix5 Pro Server Edition

Release 2.0. Cox Business Online Backup Quick Start Guide

Enroll a Windows Phone 8 Device

ONE Mail Direct for Mobile Devices

Guide to the Kofax Customer Portal

Table of Contents. Welcome Login Password Assistance Self Registration Secure Mail Compose Drafts...

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

CLOUD SECURITY FOR ENDPOINTS POWERED BY GRAVITYZONE

Server Installation Guide ZENworks Patch Management 6.4 SP2

Junos Pulse for Google Android

CTERA Agent for Mac OS-X


How to configure Mac OS X Server

Imaging License Server User Guide

CTERA Agent for Mac OS-X

Drake Hosted User Guide

SafeGuard Enterprise Web Helpdesk. Product version: 6.1

Admin Guide Virtual Private Server (VPS) MailStreet Hosting Control Panel (CP)

OneDrive for Business User Guide

Windows Server 2008 R2 Initial Configuration Tasks

safend a w a v e s y s t e m s c o m p a n y

Hyper-V Server 2008 Setup and Configuration Tool Guide

System Administration Training Guide. S100 Installation and Site Management

Transcription:

USER GUIDE: MaaS360 Financial IT Reg Enforcement Service 3.2011

Copyright 2011 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license agreement or nondisclosure agreement. The software may be used or copied only in accordance with the terms of those agreements. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or any means electronic or mechanical, including photocopying and recording for any purpose other than the purchaser s personal use without the written permission of Fiberlink Corporation. All brands and their products are trademarks or registered trademarks of their respective holders and should be noted as such. Fiberlink Corporation 1787 Sentry Parkway West Blue Bell, PA 19422 2

Table of Contents Introduction... 7 Major Features... 8 Navigation... 8 The Tabs... 8 My Reg Watch List... 9 Watch List Emails... 10 Managing Policies and Portal Administrators... 12 Policy Management and Configuration... 12 Portal Administrator Management... 13 Add User... 14 Edit User... 14 Delete User... 15 Search for Deleted Administrators... 16 Reset User Password... 17 Reactivate Locked Administrator Accounts... 18 MaaS360 Device Management View... 20 Overview... 20 Accessing the Device Views... 20 View All Devices Screen... 21 Smart Search... 23 Device Views... 25 Headings... 26 Summary View... 26 Hardware Inventory View... 27 Network Information View... 29 Software Installed View... 30 Operating System View... 30 Missing OS Patches View... 31 Missing Application Updates View... 31 Endpoint Security View... 32 Data Protection View... 33 Compliance Incidents View... 35 Internet Connections View... 36 VPN Connections View... 36 MaaS360 Services View... 37 Change History View... 38 Remote Control... 39 Software Distribution... 43 Manage Packages... 45 Distribute Package... 48 Manage Distributions... 51 Software Distributions from the Device Management Screen... 53 Reports Overview... 55 Types of Reports... 55 Graphs and Charts... 55 Tabs... 56 3

Filters... 56 Saving a Filter... 57 Using a Saved Filter... 59 Summary-to-Detail Drill-Down Views... 59 Printing and Downloading Report Information... 60 Navigating to Different Pages... 60 Agent Reports... 62 Agent Details... 62 Agent Details Tab... 62 Agent Policy Details Tab... 63 Any Connection Reporting... 65 Connection Details Tab... 65 Any Connection Details Report... 65 Wi-Fi Connection Details Tab... 66 Wi-Fi Connection Details Report... 66 VPN Usage Reports... 68 VPN Overview Tab... 68 Devices by Last VPN Connection Report... 68 Total VPN Connections (Top 10) Report... 68 VPN Connected Networks Report... 69 Total Connections and Average VPN Duration (Minutes) Report... 70 VPN Summary Tab... 70 VPN Connections Summary Report... 70 VPN Details Tab... 71 VPN Connections Details Report... 71 Policy Enforcement Reports... 73 Policy Enforcement Summary Tab... 73 Out-of-Compliance Events by Application Report... 73 Out-of-Compliance Events by Cause Report... 74 Out-of Compliance Enforcement Actions Report... 74 Out-of-Compliance Events (Last 7 Days) Report... 75 Devices Out-of-Compliance (Top 10) Report... 76 Devices by Out-of-Compliance Events Report... 77 Out-of-Compliance Events Tab... 77 Out-of-Compliance Events Report... 78 Enforcement Actions Tab... 78 Out-of Compliance Enforcement Actions Report... 79 Compliance Details Tab... 79 Out-of-Compliance Events and Enforcement Actions Report... 80 Hardware Inventory Reports... 81 Device Summary Tab... 81 Device Summary by Manufacturer (Top 10)... 81 Free Space on System Drive... 81 Physical Memory Installed... 82 Operating System Summary... 83 Hardware Identity Tab... 84 Hardware Identity Report... 84 Hardware Capacity Tab... 85 Hardware Capacity Report... 85 Operating System Tab... 86 4

Operating System Details Report... 87 Network Information Tab... 87 Network Information Details Report... 87 Software Inventory Reports... 89 Installed Software Tab... 89 Installed Software Report... 89 Software Details Tab... 89 Software Details Report... 90 Endpoint Security Reports... 91 Endpoint Security Summary Tab... 91 Installed Endpoint Security Applications Report... 91 Devices by Anti-Virus Definition Age Report... 91 Devices by Anti-Virus Version (Top 10) Report... 92 Devices by Personal Firewall Version (Top 10)... 93 Devices by Personal Firewall Status... 94 Summary by Device Tab... 95 Endpoint Security Details Report... 95 Anti-Virus Tab... 96 Anti-Virus Details Report... 96 Personal Firewall Tab... 97 Personal Firewall Details Report... 98 Patch Management Reports... 99 Patch Management Overview Tab... 99 Devices Missing Critical Microsoft Patches Report... 99 Total Missing Microsoft Patches by Severity Report... 99 Patch Summary by Device Tab... 100 Devices Missing Critical Microsoft Patches Report... 100 Summary by Patch Tab... 101 Missing Microsoft Patches Summary by Patch Report... 101 Patch Details Tab... 104 Missing Microsoft Patch Details Report... 104 Microsoft Patch Deployments Tab... 105 Microsoft Patch Deployments Report... 105 Data Protection Reports... 107 Data Protection Summary Tab... 107 Installed Data Protection Applications Report... 107 Devices by Encryption Status Report... 107 Devices by Encryption Application (Top 10) Report... 108 Summary by Device Tab... 109 Summary by Device Report... 109 Encryption Tab... 110 Encryption Details Report... 110 End User Instructions... 112 Starting the Application... 112 Minimizing the Application Window... 113 Using Online Help... 113 Viewing Version and Copyright Information... 114 Getting Status Details... 114 Main View... 114 Status for Individual Applications... 115 5

Overall Status... 116 System Tray Icons... 116 Compliance Icon... 116 Background Update Icon... 117 Message History... 117 Activity Log... 118 Activity Log Codes... 120 Uploading the Activity Log... 122 Adjusting Preferences... 122 Changing the Language for the Service... 122 Updates... 123 Getting Policy and Software Updates... 123 Troubleshooting... 124 Troubleshooting Compliance Events... 124 6

Introduction MaaS360 s Financial IT Reg Enforcement Service allows Fiberlink customers to see detailed information about their end users computers. It also allows you to define the steps it should take if a device is out of compliance. You can see information about the hardware and software on your end users computers, and the status of the security applications protecting them. After you load the software, it reports in to the MaaS360 Management Center where you can see graphs, charts and reports showing how well these computers are protected. It can show you how many of your users have no anti-virus protection, and how many have the software but the definitions are out of date. It can show you which computers are missing critical operating system patches and which drives on each computer are encrypted. You can then take action to enforce compliance to corporate security policies, as necessary. MaaS360 s Financial IT Reg Enforcement Service reports provide information about the following: 1. Hardware Inventory 2. Network Information 3. Software Installed 4. Operating System 5. Missing OS Patches 6. Missing Application Updates 7. Endpoint Security 8. Data Protection 9. Compliance Incidents 10. Internet Connections 11. VPN Connections 7

Major Features Navigation The user interface provides easy-to-use navigation with links, menus and tabs, allowing quicker access to the available applications. Links on the My Reg Watch List window take you directly to reports showing potential problems you may want to address immediately. Links on the Financial IT Reg Enforcement Suite window take you directly to reports you can use to proactively manage your organizations devices. Tabs correspond to a related set of available applications or tasks. The menus show the individual workflows, reports, etc. for the portal user. To access the menus, move your mouse over the tab and the menu will appear. Then click once to access the item. The Tabs A breadcrumb trail allows you to move backwards through different screens. Links on the right side of the page provide quick access to additional information about the MaaS360 Financial IT Reg Enforcement Service, how to get help, etc. The MaaS360 Platform includes the following tabs: 1. Home - takes you to the Home screen. 8

2. Manage allows you to manage your portal administrators, and provides access to the Device Summary Report. Depending on the services you are using, you may also be able to manage your policy from this tab. 3. Reports provides access to the MaaS360 Platform reports. 4. Support displays the Get Help page, which has a variety of resources to help you. My Reg Watch List The My Reg Watch List block appears at the top of the Home page. It shows you critical information about your endpoints and allows you to access the details you need to remediate problems. For example, the MaaS360 Platform will tell you if any of your devices do not have Anti-Virus or Personal Firewall software installed. You can click on the Watch List to see a list of those devices. The MaaS360 Platform displays how many devices are in a potentially problematic situation, allowing you to rectify the situation promptly. Watch List items include the following: Devices that do not have Anti-Virus or Personal Firewall software Devices that are missing at least one critical patch Devices with disabled Anti-Virus software Devices with disabled Personal Firewall software Anti-Virus definitions that are older than seven days Devices that do not have Encryption software You can click on each Watch List item to see a MaaS360 report that shows you detailed information about that item. In many cases report with filters set up to show the devices that meet the Watch List criteria. For example, if you click on the Watch List item for devices with disabled personal firewall software, MaaS360 automatically displays the Personal Firewall Details Report with the Status filter set to Stopped. 9

Watch List Emails An email will be sent each week to the email address on file for the account. It shows the Watch List items that could prove to be a problem for your organization. The Watch List items are links if you click on them you will be taken to a MaaS360 report that has the details about that item (after you log in). You can choose to opt out of these emails, if you wish, by performing the following steps: 1. Log into MaaS360 as usual. 2. Click the My Profile button at the top of any screen. 10

3. Click the Edit button at the bottom of the screen. 4. Change the Subscribe to My Watch List Email Alert from Yes to No, and click Save. 11

Managing Policies and Portal Administrators To make your MaaS360 Services run smoothly, there are a few basic maintenance tasks that a portal administrator will need to do. All of these workflows are accessible from the Manage tab. Policy Management and Configuration MaaS360 uses policies to govern everything from what should happen if a device has no anti-virus software to the Help Desk message that is displayed to the user. You can have multiple policies in your organization, but a device can only have one policy at a time. When a device is enrolled, it receives the default policy automatically. You can customize that policy or create different policies as necessary. Start by reviewing the default policy: 1. Click Step 3 on the Getting Started Checklist on the Home page. 2. Review the settings in the policy, reviewing the items on each of the tabs. Click Edit to make changes. 3. Make your changes. If you are finished and want to revise the policy later, click Save. If you want to distribute the new policy to users immediately, click Save and Publish. 12

4. Click Back to Results to see the policy. 5. The status of the policy has changed. It will be Needs Publish or Published, depending on whether you have published it or not. A policy must be published before it can be given to anyone. Every 15 minutes, the last saved policy (if there is one) is made available to your users, and the version number at the top of this page is incremented. Your end users will receive the updated policy automatically the next time they access the Internet. Portal Administrator Management Portal administrators can create portal administrators and give them the appropriate access. These users do not necessarily have the MaaS360 service software on their own machines. 13

Add User Administrators can create new portal administrators and assign them one or more roles. To add a new portal administrator: 1. Mouse over the Manage tab. 2. Select Add User under the Create Portal Administrators heading. 3. Enter the user name in the User Name field. Make sure it has a minimum of six characters. 4. Enter a valid email address in the Email Address field. The password for this person will be automatically generated and sent to this email address. 5. Click to select one or more roles to assign to the new user. When you click to select a role, the role description appears in the Role Description field. 6. Click the arrow buttons to move selected options or all options between the fields. 7. Click Add to finalize the changes. 8. A message confirms successful addition of the user and roles. Edit User Administrators can view, edit, or delete a portal administrator s role assignments. To edit portal administrator role assignments: 1. Hover over the Manage tab. 2. Select Manage Portal Administrators to view the Search Portal User screen. 14

3. Enter or select desired search criteria in the User Name box, the Email Address box and the Role drop-down list, if required. 4. Click Search to view results matching the entered search criteria. 5. Click the Edit icon associated with the user to view the Edit Portal User screen. 6. Click the arrow buttons to move selected roles or all roles between the fields, as necessary. 7. Click Save to save your changes and view the confirmation message. Delete User To delete a portal administrator: 1. Hover over the Manage tab. 2. Select Manage Portal Administrators to view the Search User screen. 15

3. Enter or select desired search criteria in the User Name box, the Email Address box and the Role drop-down list, if required 4. Click Search to view results matching the entered search criteria. 5. Click the Delete icon to delete the selected portal administrator accounts. A deletion confirmation message displays. Search for Deleted Administrators As part of the User Management Audit feature, the new Search for Deleted Administrators menu item allows you to search and view a list of all deleted portal administrator accounts and the associated audit details. To view deleted administrator accounts: 1. Mouse over the Manage tab, and select Search for Deleted Administrators. 2. Enter or select desired search criteria in the User Name field, the Email Address box and the Deletion Date boxes, if required. 3. Click Search. Results matching the search criteria display. 16

4. Click the Audit History icon to view the View Change History screen. 5. If required, click the View Change link to view the View Changes screen. Note: Items are highlighted in yellow to indicate a changed value, green text indicates a new value, and text with a red strike-through indicates that the value was deleted. Reset User Password You can also reset a user password. You may choose to reset a password when a user has forgotten his password or if a new portal user has requested you to reset and resend his password. To reset a portal administrator password: 1. Mouse over the Manage tab and click Manage Portal Administrators menu to view the Search Portal User screen. 17

2. Enter or select desired search criteria in the User Name field, the Email Address field or the Role drop-down list, as necessary. 3. Click Search. Results matching the search criteria display. 4. Click the Reset icon to reset the password. 5. The Reset Password Confirmation message displays. 6. Click Confirm to reset the selected portal administrator s password. A confirmation message displays. The new password will be sent to the portal administrator s email address. Reactivate Locked Administrator Accounts Due to the enhanced security features in the MaaS360 Services, if a user belonging to the MAS authentication domain enters an incorrect password five times consecutively, then the user account will be locked. If a user account is locked, it can be reactivated through the Manage Portal Administrators workflow. 18

To reactivate a locked administrator account: 1. Mouse over the Manage tab and click Manage Portal Administrators to view the Search Portal User screen. 2. Enter the desired search criteria. 3. Click Search to view the results matching the entered criteria. 4. Click the Reactivate icon to reactivate the locked user account. The Reset Password Confirmation screen displays. 5. Click Confirm to reactivate the locked user account. The Password Reset screen displays a confirmation message. The user account is reactivated and a new system-generated password is sent to the user s email address. 19

MaaS360 Device Management View Overview Device views provide detailed information about individual devices. This information can be useful for managing licenses, migrations and troubleshooting. The information in these views is collected and displayed in real- or near real-time, instead of daily as with the reports you find in the Reports tab. A unique identifier other than computer name is also used. As a result: Due to timing differences, you may find that data appears in your device views a few hours before it appears in your reports. Device views can show data about inactive devices but reports include only active ones. Device views can show multiple security applications, if they are installed on the device. The views will indicate which applications, if any, are running. Device view data is updated 15 minutes after a device heartbeats in to the server. Accessing the Device Views Many reports in MaaS360 list the Computer Name as a link. If you click the link, you will display the Device View for that endpoint. After viewing the information about the device, click Back To Results to return to the View All Devices screen. 20

You can also access the Device View for an endpoint from the View All Devices screen, and by performing a Smart Search. View All Devices Screen Access the screen by performing the following steps: 1. Mouse over the Manage tab. 2. Select View All Devices. The View All Devices screen appears. You can customize the columns displayed on the field by clicking the arrow to the right of each column, then selecting Columns. 21

Check the items you want to see on the screen. You can save your choice by selecting the Save Column Preference button. You can update the data on the screen by selecting the Refresh Data button. 22

You can search for a particular device using the filter at the top of the screen. Select a column, enter the search criteria and click Search. When you find the device you want, click the Computer Name. Smart Search You can also find a device by performing a Smart Search. 1. Mouse over the Manage tab and select Smart Search. 23

2. Specify if you want to search for Active Devices, Inactive Devices, or All Devices, and then specify when the devices should have reported in to the Fiberlink servers. 3. Enter the specific items you want to search for. You can use Boolean operators to search for more than one criterion at a time. Three conditions are available by default, but you can add more by clicking the green plus icon. 24

Category Attribute Operator Criteria The Device View where you would find the information about the attribute. Specific data item you are searching for. Operator for the search. Depending on the attribute, it could be Contains, Doesn t Contain, Begins With, Ends With, Equal To, Not Equal To, Between, and more. Value to be included in the search. Depending on the attribute, it could be text, a number, or a date. 4. Click Search to see the results. Device Views 5. Click on the Computer Name to see the Device View for that endpoint. The different Device View screens show specific details about the endpoint. The Summary View is the default. Select a different option from the pull-down menu to see the different device views for the selected device. Note: Depending on the MaaS360 services your organization has implemented, some of the options listed on the menu may not be visible. Contact your account representative for more information. 25

Headings The following four fields appear at the top of each view: OS Username Last Reported (GMT) Custom Asset Number License Status Username used to log into the computer. Last date that the computer contacted the Fiberlink servers. Unique identifier for the device as defined by your organization. Specifies if the device s license is Active or Inactive. All the views include following: The Actions button, which allows you to make the device inactive. It will not appear on views or in searches (unless you search for inactive devices) until the devices reports in to the Fiberlink servers. The Refresh button, which updates the information on the screen. The Device Online Status icon, which indicated if the device is online ( ) or offline ( ). The Back to Results button, which takes you back to the list of devices. Summary View The first screen you see when you access the device view is the Summary screen. It shows general information about the device and can help with basic troubleshooting. 26

The view contains the following fields: MaaS360 Services Service Package Name of the MaaS360 service package running on the computer. Installed Date Date the MaaS360 service was installed on the device. Hardware Manufacturer Company that made the computer. Model Model of the computer. Physical Memory Amount of physical memory the computer has. Installed Free Space on Percentage of the space on the system drive that is free. System Drive Operating Device s operating system. System Office/Location Custom attribute used to define the primary location of the device. Security Anti-Virus Status Specifies if anti-virus software has been installed on the device, and if it is Running or Stopped. Anti-Virus Definition Date Anti-Spyware Status Personal Firewall Status Encryption Status Last Backup Microsoft Auto- Update Status Number of Missing Critical OS Patches Date that the last anti-virus definitions were downloaded and installed on the device. Specifies if anti-spyware software has been installed on the device, and if it is Running or Stopped. Specifies if personal firewall software has been installed on the device, and if it is Running or Stopped. Shows where the device is in the encryption process. Date of the last backup. Displays how Microsoft automatic updates are being handled. Shows how many critical security operating system patches are missing from the device. Hardware Inventory View This report shows detailed information about the device s hardware. 27

The view contains the following fields: Basic Information Manufacturer Company that made the computer. Model Model of the computer. Computer Model Model ID of the computer. ID Motherboard Serial Number BIOS Serial Number BIOS Date Date of the BIOS software. Processor Computer s processor. Physical Memory Amount of physical memory the computer has. Installed WMI Status Serial number of the computer s motherboard (Windows) or the Apple serial number (Mac). Serial number of the basic input/output system boot firmware (Windows) or the boot ROM version (Mac). Specifies if the Windows Management Interface (WMI) is Running or Stopped. Test Device Indicates if the device is defined as a test machine. OS Username Last username that was used to log into the computer. User Access Specifies the access level of the last logged in user. Level CD/DVD Name Name of the CD/DVD drive. Local Timezone Configured local time for the device. Number of Drives Number of drives on the device. Drive Information Note: These fields will be repeated for each of the device s drives. Drive Size Amount of space on the drive. Free Space Amount of free space on the drive. Drive Label Drive identifier. File System Type Drive s file system type. System Drive Indicates if this is the system drive. Custom Attributes Custom Asset Custom inventory number for the device. Number Device Owner Name of the device s owner. Vendor Vendor from whom the device was purchased. 28

Purchase Order Number Purchase Type Purchase Date Purchase Price Warranty Number Warranty Type Warranty Expiration Date Office/Location Department Business Unit Comments Purchase order number for the device. Type of purchase, as defined by your organization. Date the device was purchased. Cost of the device. Identification number of the warranty. Type of warranty. Date the warranty expires. Primary physical location of the device. Department to which the device or device owner belongs. Field where you can enter any additional information or comments about the device. Network Information View This view shows detailed information about the networks the device uses. The fields will be repeated if the device uses more than one network. The view contains the following fields: Domain/Workgroup Adapter Adapter Type Adapter ID IP Address Subnet Mask DHCP Enabled MAC Address DNS Servers Gateway Device Driver Name Device Driver Version Device Driver Date Domain or workgroup to which the device belongs. Basic information about the adaptor. Type of network adaptor. Adaptor ID. IP address for the device. Bit mask covering the number of bits used in the prefix of the IP address. Indicates if Dynamic Host Configuration Protocol is enabled for the network adaptor. Unique identifier assigned by the adaptor s manufacturer. Domain Name System identification of the adaptor s servers. Identifier of the network node. Name of the program that allows other applications to interface with the device. Version of the device driver. Date of the device driver version. 29

Software Installed View The Software Installed view lists all the applications installed on the device. The view contains the following fields: Application Vendor Application Name Version Installed Date Company that provides the application. Name of the software application. Version number of the application. Date the application was installed. Operating System View This view shows detailed information about the device s operating system, and the operating system patches that have been installed. The view contains the following fields: Operating System OS Edition Operating system on the computer. Edition of the operating system. 30

Service Pack OS Architecture Version Default OS Language Microsoft Auto- Update Status Installed OS Patches Patch Name Patch Category Vendor Product Severity KB ID Bulletin ID Latest service pack installed on the computer. Specific architecture of the operating system. Operating system s version. Default operating system language. Specifies how automatic updates from Microsoft will be handled. Name of the patch. Click to see a description of the patch from the vendor s web site. Type of patch. Company that provided the patch. Software that needed the patch. How critical the patch is. Knowledgebase identification number of the patch. Bulletin that discusses the patch. Missing OS Patches View The Missing OS Patches view shows all the patches that are available for the device, but have not been installed. Patch Name Patch Category Vendor Product Severity KB ID Bulletin ID Name of the patch. Click to see a description of the patch from the vendor s web site. Type of patch. Company that provided the patch. Software that needed the patch. How critical the patch is. Knowledgebase identification number of the patch. Bulletin that discusses the patch. Missing Application Updates View This view shows missing application updates from vendors like Adobe and Apple. 31

The view contains the following fields: Application Update Name Application Update Category Vendor File Size (MB) Release Date Missing Application Update Detected Date Name of the update that is missing. Type of update that is missing. Company that provided the update. Download size of the update. Date the update became available. Date that MaaS360 determined that the update was missing. *This view is updated daily. Endpoint Security View The Endpoint Security view displays information about your security applications. It will show all the applications installed on the device, even if they are not currently enabled. The view has the following fields: Anti-Virus 32

Anti-Virus Detected Number of Vendors Vendor Indicates if an anti-virus application has been installed on the device. Specifies how many anti-virus applications have been installed on the device, whether they are running or not. Company that supplied the anti-virus application. Note: The following fields will be repeated for each unique vendor. Application Name Version Installed Date Status Anti-Virus Definition Date Anti-Virus Definition Last Scan Date Personal Firewall Personal Firewall Detected Number of Vendors Vendor Name of the anti-virus application. Version of the software. Date the application was installed. Specifies if the anti-virus application is Running or Stopped. Date of the most recent definition update. Definition s identifier. Date of the most recent anti-virus scan. Indicates if a personal firewall application has been installed on the device. Specifies how many personal firewall applications have been installed on the device, whether they are running or not. Company that supplied the personal firewall application. Note: The following fields will be repeated for each unique vendor. Application Name of the personal firewall application. Name Version Version of the application. Installed Date Date the application was installed. Status Specifies if the application is Running or Stopped. Anti-Spyware Anti-Spyware Indicates if an anti-spyware application has been installed on the device. Detected Number of Vendors Vendor Specifies how many applications have been installed on the device, whether they are running or not. Company that supplied the anti-spyware application. Note: The following fields will be repeated for each unique vendor. Application Name of the anti-spyware application. Name Version Version of the software. Installed Date Date that the application was installed. Status Indicates if the application is Running or Stopped. Anti-Spyware Date of the most recent definition update. Definition Date Anti-Spyware Definition s identifier. Definition Last Scan Date Date of the most recent anti-spyware scan. Data Protection View The Data Protection view shows the data protection applications resident on the device. Data protection applications include: 33

Data encryption Peripheral protection Backup and recovery Data leak prevention The view includes the following fields: Data Encryption Data Encryption Indicates if a data encryption application has been installed on the device. Detected Number of Specifies how many data encryption applications have been installed on Vendors the device, whether they are running or not. Vendor Note: The following fields will be repeated for each unique vendor. Application Name of the data encryption application. Name Version Version of the software. Installed Date Date the software was installed. Encryption Current state of encryption application. Status Encrypted Drives Names of the encrypted drives. Peripheral Protection Peripheral Protection Detected Number of Vendors Application Name Application Vendor Version Installed Date Status Backup & Recovery Indicates if a peripheral protection application has been installed on the device. Specifies how many peripheral protection applications have been installed on the device, whether they are running or not. Name of the peripheral protection application. Company that provided the software. Version of the software. Date the software was installed. Specifies if the application is Running or Stopped. 34

Backup & Recovery Detected Number of Vendors Vendor Indicates if a backup and recovery application has been installed on the device. Specifies how many backup and recovery applications have been installed on the device, whether they are running or not. Note: The following fields will be repeated for each unique vendor. Application Name of the backup and recovery application. Name Version Version of the software. Installed Date Date the software was installed. Status Indicates if the software is Running or Stopped. Last Backup Date of the most recent backup. Next Backup Date of the next scheduled backup. Backup Limit Maximum amount of data that can be backed up. Data Leak Prevention Data Leak Prevention Detected Number of Vendors Application Name Version Installed Date Status Indicates if a data leak prevention application has been installed on the device. Specifies how many data leak prevention applications have been installed on the device, whether they are running or not. Name of the data leak prevention application. Version of the software. Date the software was installed. Indicates if the software is Running or Stopped. Compliance Incidents View This view displays out-of-compliance events for the specified period. It also shows the actions that the service took as a result, which are defined by your policy. The view has the following fields: Event Date/Time When the event took place. OS Username Username used to log into the computer. 35

Event Type Application Type Application Name Description Type of out-of-compliance event. Type of security application that fell out of compliance. Name of the security application. Action taken by the MaaS360 as a result of the event. The action is determined by policy. *This view is updated daily. Internet Connections View This view shows the different Internet connections made by the device, no matter which connection manager it uses. The view contains the following fields: Start Time End Time Connection Duration (Minutes) OS Username Adaptor Name Connection Type IP Address Subnet Mask Connection Speed Bytes In (MB) Bytes Out (MB) *This view is updated daily. Date and time the connection started. Date and time the connection ended. Total duration of the connection. Username used to log into the computer. Manufacturer and model of the network adapter. Type of connection that was made (e.g., VPN, Home) IP address for the device. Bit mask covering the number of bits used in the prefix of the IP address. Speed of the connection. Amount of data downloaded onto the computer during the connection. Amount of data sent by the computer during the connection. VPN Connections View The VPN Connections view shows the different VPN connections made via the device for the specified timeframe. 36

The view contains the following fields: Start Time End Time Connection Duration (Minutes) OS Username VPN IP Address Subnet Mask Connected Network Date and time the VPN connection started. Date and time the VPN connection ended. Total duration of the connection. Username used to log into the computer. Type of VPN that was used. IP address for the device. Bit mask covering the number of bits used in the prefix of the IP address. Network that made the connection. *This view is updated daily. MaaS360 Services View The MaaS360 Services view displays the MaaS360 service package that is installed on the device and modules that package contains. This information is particularly useful if you need to contact Fiberlink s Customer Support. The view contains the following fields: Basic Information Service Package MaaS360 Service Package name that is installed on the device. Installed Date Date and time that the core product was installed (GMT) Agent Version Version of the installed core product. 37

EEA Status Number of Active Modules Module Specifies if EEA is Running or Stopped. Number of MaaS360 modules currently active on the device. Note: The following fields will be repeated for each module. Version Version of the module. Activation Date Date and time that the module was activated on the device. Other MaaS360 Services Service Name Name of additional Fiberlink services that may be installed on the device. Policy Update Username of the person who last updated the device s policies. Username Policy Set Name of the policy set in use on the device. Policy Groups Details about the four policy groups that comprise the policy set. Last Policy Date and time of the last policy update for the device. Update Date Change History View This view shows how the device s information has been modified over the specified timeframe. The view contains the following fields: Change Date Date and time the change was made. Change Made By Username of the person who changed the account. IP Address IP address of the person who made the change. Attribute Name Attribute that was changed. Old Value Original value of the attribute. New Value Final value of the attribute. 38

Remote Control MaaS360 s Remote Control feature works with many of the most popular remote control applications to help you troubleshoot your devices. You can take control of an end user s device without manually entering an IP address or initiating a connection. MaaS360 supports the following remote control applications: Microsoft Remote Desktop RealVNC UltraVNC TightVNC DameWare To use the Remote Control feature, you must have at least one of these applications installed on your device and the endpoints. You must also have permission to access those endpoints. If you do not have any of those applications, you may use one of the web-based applications. You should have Webex, Citrix, or a similar application installed on your device. Before using this feature, you must set it up. 1. Mouse over the Manage tab and select Remote Control Settings. 39

2. Select all of the remote control applications you are using. Select the checkbox for each one, and enter the location. 3. When you are finished, save your changes. To take control of a device, perform the following steps: 1. Mouse over the Manage tab and select Remote Control. 40

2. MaaS360 displays a list of the devices that have one or more of the supported Remote Control applications. You can use the filters to reduce the number of devices listed. 3. When you find the device you want, click Take Control. 41

4. A pop-up box appears with last reported IP addresses used by the device and the remote control applications information from the Remote Control Settings. Review the information, and select an IP address and remote control application. Click Take Control. MaaS360 will automatically launch the remote control application, seed the IP address information, and connect to the device. 42

Software Distribution The Software Distribution module allows the Administrator to distribute software applications and non-executable files to end user devices on or off the corporate network. Devices include laptops, desktops, tablets, smartphones, and mobile devices. The Software Distribution module under the Manage tab includes the following menu options: Manage Packages Distribute Packages Manage Distributions If you wish to upload a package, navigate to the Manage > Manage Packages screen, click the Upload Package button and select the type of package that you wish to upload. The Upload Package screen allows you to upload a package that you wish to distribute or install on your end user devices. A package can include an executable file that will be installed on the end user device or a non-executable file that will be downloaded to a desktop or a mobile device. 43

The available package types that you can upload include: Application (Windows Computers) Enterprise Application (ios) App Store Application (ios) Document (ios) Application (Windows Computers) allows you to upload packages for Windows Desktops and Laptops. Enterprise Application (ios) allows you to upload enterprise applications for ios devices. 44

App Store Application (ios) allows you to upload applications using the Apple itunes and the Apple App Store applications. Document (ios) allows you to upload documents to Apple ios devices On the Upload Package screen, the Total Storage Space and the Available Storage Space sections display the present space limit that is available on the Upload Server. The size of the package that you wish to distribute or install on your end user devices must be less than the Available Storage Space. Manage Packages The Manage > Manage Packages option shows the Manage Packages screen, which allows you to search and view all the available packages. The Manage Packages screen displays the Package Name, Platform, Filename, Package Type, File Size (MB), Status, Upload Date (GMT), and the Uploaded By details. Clicking the associated Distribute Package icon allows you to distribute the package. 45

Select the desired filter criteria and click Search to narrow the search results. If required, click the Upload Package button to upload a package or distribute a package from the Manage Packages screen. Clicking the Audit History button at the bottom of the screen displays a list of all actions that were performed on the package. Click Back To Results to return to the Manage Packages screen. If required, select CSV or Excel format option and click Export to export the displayed results. Clicking on a Package Name displays the associated View Package Details screen. Clicking the Package Details menu displays the Package Distributions menu option. Selecting the Package Details > Package Distributions option on the View Package Details screen displays the Distribution Name, Target Devices, Status, Distribution Date (GMT), Distributed By, Relevant Devices, and Successful Devices information for any actions that have been created referencing this package. Clicking the Actions menu displays the Distribute and the Delete actions. The Distribute action displays the Distribute Package screen, which allows you to distribute a package to a specific device, a device group or to all devices. The Distribute Package screen allows you to upload a package that you wish to distribute and install on your end user devices. A package can include an executable, 46

which must be installed or a non-executable file that will be downloaded to the device. The Delete action allows you to delete a package. Once a package is deleted, it can no longer be used in distributions. Any active distributions that reference the deleted package will be disabled. If you have also purchased the MaaS360 Mobile Device Management solution, clicking the Actions menu displays the Distribute, Update Provisioning Profile, Upgrade Package, and the Delete actions, as shown below. Every ios application is associated with a provisioning profile. An ios application is verified for its authenticity based on its provisioning profile which is embedded in the ios Package. ios Enterprise Applications requires a provisioning profile that authenticates your devices and allows them to use the application. You can create a provisioning profile by accessing the ios provisioning portal at http://developer.apple.com/iphone. Ensure that the provisioning profile matches the Bundle ID of the Enterprise application that you wish to distribute. The provisioning profile must also include an application expiry date. The Update Provisioning Profile action allows you to update an existing ios provisioning profile. 47

The Upgrade Package action allows you to upgrade an existing ios package. The Delete action allows you to delete a package. Once a package is deleted, it can no longer be used in distributions. Any active distributions that reference the deleted package will also be stopped. Distribute Package The Manage > Distribute Package option displays the Distribute Package screen, which allows you to distribute a package to the end user devices. Click the Search Package icon next to the Package text box to view a list of all the available packages. Alternatively, enter a few characters of a Package Name to view a list of all package names that include the entered string of characters. Click on a Package Name link to select the package. Select the desired Execution Behavior. If you wish to install an executable file, then select the Execute Package option and enter the execution command with the associated command options. If you wish to distribute a non-executable file that will be downloaded or saved to a location, then select the Save Package option. If required, enter the folder location where you wish the package to be automatically downloaded on the end user device. If you do not enter the drive letter in the Save Package text-box, the entered value will be used to create a folder in the Visibility Service s installation path. By default, C:\ Program Files\MaaS360\MaaS360 Visibility Service\ is the folder location where the distributed package will be saved. 48

Select the desired Target Devices for distribution of the package. To ensure efficient Internet bandwidth utilization, select the most suitable Distribution Behavior option. The Distribution Name field is automatically populated. Make changes, if required. Enter a relevant package description in the Description field. On the Distribute Package screen, select a desired option and hover your mouse pointer over the associated information icons to view more details, if required. Clicking the Advanced Settings button allows you to configure advance settings in the Advanced Settings pop-up window. Click Save Settings to save the Advanced Settings. Clicking the Distribute button on the Distribute Package screen allows you to review the package distribution details before performing a security check and then distributing the package to the selected devices or device groups. 49

Click Continue to complete the distribution. The package distribution confirmation message displays. If required, click the hyperlink text in the confirmation message to view the distribution details. Click Create Another Request if you wish to create another package. Click Manage Distributions if you wish to view and manage the package distributions. When you select a package that will be distributed to ios mobile devices, the following screen displays. Clicking the Distribute button on the Distribute Package screen allows you to review the package distribution details before performing a security check and then distributing the package to the selected devices or device groups. 50

Click Continue to complete the distribution. The package distribution confirmation message displays. Manage Distributions Select the Manage > Manage Distributions option to search and list all package distributions that you have performed on your end user devices. The Manage Distributions screen displays the Distribution Name, Package Name, Target Devices, Status, Distribution Date (GMT), Expiration Date (GMT), and the Distributed By information. Clicking on the New Distribution button allows you to create a new package distribution. On the Manage Distributions screen, select the desired filter options and click Search to view results matching the selected search criteria. Clicking on a Distribution Name link displays the associated Package Distribution details screen. On the Package Distribution <package distribution details> screen, clicking the Package Name link under the Basic Information section displays the Package 51

Distribution Details screen. On the Package Distribution Details screen, clicking on the Distribution Settings drop-down menu shows the Distribution Details and the Distribution Audit History options. The Distribution Details screen displays the Device Name, OS Username, Last Reported, Status, Description, and the Details information. The Distribution Audit History screen displays the Action Date (GMT), Action, Action By and the IP Address information. Clicking on the Actions tab displays the Create a Copy and the Stop actions. Clicking the Create a Copy action allows you to create a clone or a copy of the selected package distribution. If you wish to create a duplicate distribution, then click the Create a Copy action. The Distribute Package screen displays the details of the selected package distribution. Make changes, if required and click Distribute to create a copy of the selected package distribution. Clicking the Stop action allows you to stop distributing the selected package. 52

Software Distributions from the Device Management Screen The Manage > View All Devices option lists all devices on your corporate network. Clicking on a Device Name displays the View Device Details: <device name> screen. Selecting the Software Distributions option from the Summary drop-down list displays the Software Distributions screen, which includes the Distribution Date (GMT), Distribution Name, Package Name, Status, Description, and the Details information for any distribution actions that have been evaluated by the device. 53

On the View Device Details screen, if you wish to distribute a package to the device, then select the Distribute Software action on the Actions tab. On the Distribute Package screen, select the desired package that you wish to distribute and click Distribute to distribute the package to the device. Alternatively, on the Manage > Device Groups screen, click the MaaS360 folder icon and select the Distribute Software option to distribute a package to a device group, as shown below. 54

Reports Overview The report generation features allow you to use enhanced reporting functions (such as the tabular presentation of reports) to group associated graphs and reports, and it provides easy navigation between the reports. The enhanced reporting solution also includes filters, which help you generate a variety of real-time reports or narrow down report details based on your filter criteria. The graphs and charts provide an enhanced representation of the data in summary and detailed reports. The Print and Download links allow you to print and download the displayed tables to a variety of file formats. Types of Reports The MaaS360 Management Center provides the following types of reports: Note: 1. Device Summary 2. Agent Details 3. Policy Enforcement 4. Endpoint Security Overview a. Anti-Virus b. Personal Firewall 5. Data Protection Overview a. Encryption 6. Hardware Inventory 7. Software Inventory 8. Hardware Inventory for BlackBerry Handhelds 9. Software Inventory for BlackBerry Handhelds 10. Patch Management 11. VPN 12. Any Connection Reporting Not all reports are available for all services. If you have any questions access our Support page. Graphs and Charts Most of the data is presented in charts and graphs, and you can click on one bar or pie section to see details about that piece of data. You can also mouse over a bar or pie section to see the number being represented graphically. 55