Setting up the Sophos Mobile Control External EAS Proxy
|
|
- Miles Sutton
- 5 years ago
- Views:
Transcription
1 Setting up the Sophos Mobile Control External EAS Proxy
2 Setting up the External EAS Proxy This document tries to explain the concept of the Sophos Mobile Control External EAS Proxy which is available for download on Sophos.com and which can be installed separately. The requirements for the environment to use the EAS Proxy depend on the usage scenario. Possible scenarios, their requirements and installation steps are described below. This document only covers general environment requirements and does not cover explicit configuration steps for instances involved, e.g. reverse proxy, load balancer or Exchange server. Table of Contents 1. When is it required? Differences between the built-in and the External EAS Proxy How does it communicate with the SMC server? Usage scenario examples and environment requirements SMC and single External EAS proxy instance on different machines... 4 SMC server setup... 4 External EAS Proxy setup... 4 Environment requirements... 6 Advantages & Disadvantages SMC and single standalone EAS proxy on different machines behind a Reverse Proxy... 7 SMC Setup... 7 External EAS Proxy Setup... 7 Environment requirements... 8 Advantages & Disadvantages SMC and multiple standalone EAS proxy instances on different machines SMC Setup External EAS Proxy Setup Environment requirements Advantages & Disadvantages SMC and load balanced EAS proxies SMC Setup External EAS Proxy setup Environment requirements Advantages & Disadvantages... 16
3 1. When is it required? The external EAS Proxy should be used if one of the following scenarios applies: - If more than 300 devices should get s via the Sophos Mobile Control EAS Proxy - You use Lotus Traveler for non-ios devices - You want to support multiple backend servers - You want to set up load balancing for Exchange ActiveSync traffic 2. Differences between the built-in and the External EAS Proxy The built-in and External EAS Proxy differ in the used technology. For the built-in EAS Proxy a maximum of 2000 parallel connections is possible which depleted by 400 devices being registered on the SMC server as each device can open several connections to the SMC server. This limitation does not exist for the External EAS Proxy. Furthermore, the built-in EAS Proxy can handle only traffic for one server whereas the External EAS Proxy can handle connections to different servers using so called instances. Every instance listens on one specific port and forwards traffic to the server configured for that instance after device compliance is verified. 3. How does it communicate with the SMC server? The external EAS Proxy connects to the SMC server using the external URL of the SMC server. This connection is needed to get the access status for the devices which try to connect to the SMC server. If a device is allowed to receive the EAS Proxy caches the status for 10 minutes. If the device is not allowed to receive , this status is saved for 30 seconds. Once a timer expired, the EAS Proxy will ask for the status again. The communication is secured using a client certificate which is created during the creation of an instance within the External EAS Proxy. Those client certificates have to be uploaded to the Sophos Mobile Control server using the super administrator account. By uploading the client certificate to the SMC server, the SMC server and the EAS Proxy instance can create a secured connection to exchange data. If the SMC Server is not available, the EAS Proxy will continue to work for 60 minutes using the last known status of each device.
4 4. Usage scenario examples and environment requirements The External EAS Proxy can be used in many different ways. This chapter tries to explain the most common scenarios and the requirements for each scenario. A combination of the scenarios is also possible but not explained in that guide SMC and single External EAS proxy instance on different machines In this scenario it is assumed that the SMC server and the External EAS Proxy are installed on two separate machines. This might be required if different URLs should be used and the SMC server should not handle the load the traffic of the devices is causing. Furthermore, both components could use port 443 to communicate with the devices. Note: If you want to implement that scenario think about the URL the External EAS Proxy should be accessible from outside the network. This URL will be used within a Sophos Mobile Control configuration profile and by the devices to synchronize s. In this example, eas.company.com is used. SMC server setup The SMC server itself uses the URL smc.company.com. The certificate used for the SMC server URL smc.company.com can either be self-signed and created by the SMC setup or an officially certificate signed by a Certification Authority. An officially signed certificate is generally recommended and required if you want to manage Android devices. External EAS Proxy setup The External EAS Proxy is installed on a separate machine and uses a certificate to support incoming SSL traffic by the mobile devices. Therefore, a web server certificate was created for the URL eas.company.com and imported during the setup of the External EAS Proxy. A certificate signed by an official Certification Authority is recommended. Furthermore, one instance was created listening
5 on port 443 and forwarding all traffic to the server within the environment - in that case, exchange.company.com. After configuring the instance the following information pop up appears. After clicking on OK an explorer window will appear showing the client certificate located in C:\Program Files\Sophos\Sophos Mobile Control EAS Proxy\config\1\export. This certificate has to be uploaded to the SMC server. To do so, log in to the Sophos Mobile Control web console using super administrator credentials. Go to Settings System Setup and switch to the EAS Proxy tab. In there, press the browse button and choose the certificate you were directed to.
6 After selecting the file and pressing Open, press the Upload button. Once uploaded do not forget to press the Save button to confirm the changes. With uploading the certificate the EAS Proxy instance is able to successfully connect to the SMC server and get the access status of devices. Now you can start the EAS Proxy service Environment requirements To successfully use this scenario an external DNS entry for your designated External EAS Proxy URL eas.company.com is required. Further requirements do not exist for this scenario. Advantages & Disadvantages Advantages: - Traffic load separated between SMC server and EAS Proxy, - Separate URL for Exchange ActiveSync traffic, Disadvantages: - Higher costs for official certificates for SMC- & EAS-Proxy-URL - EAS Proxy blocks port 443 completely on the installed operating system - Two external DNS entries required
7 4.2. SMC and single standalone EAS proxy on different machines behind a Reverse Proxy In this scenario it is assumed that the SMC server and the External EAS Proxy are installed on two separate machines. However, both should use the same URL. A certificate signed by an external Certification Authority exists for the server URL smc.company.com. Note: In this scenario it is assumed that the Reverse Proxy splits the SSL connection and initiates a new one to the internal network resources. SMC Setup The SMC server itself should be accessible using the external URL smc.company.com. The certificate used for the SMC server should be self-signed and created by the SMC setup covering the internal DNS name of the SMC server. External EAS Proxy Setup The External EAS Proxy is installed on a separate machine and uses the same self-signed certificate as the SMC server. Furthermore, one instance was created listening on port 81 and forwarding all traffic to the server within the environment - in that scenario, exchange.company.com. Once the instance was created on the EAS Proxy, the client certificate has to be uploaded to the SMC server to enable communication between the servers. After configuring the instance the following information pop up appears.
8 After clicking on OK an explorer window will appear showing the client certificate located in C:\Program Files\Sophos\Sophos Mobile Control EAS Proxy\config\1\export. This certificate has to be uploaded to the SMC server. To do so, log in to the Sophos Mobile Control web console using super administrator credentials. Go to Settings System Setup and switch to the EAS Proxy tab. In there, press the browse button and choose the certificate you were directed to. After selecting the file and pressing Open, press the Upload button. Once uploaded do not forget to press the Save button to confirm the changes. With uploading the certificate the EAS Proxy instance is able to successfully connect to the SMC server and get the access status of devices. Now you can start the EAS Proxy service. Environment requirements To successfully implement this scenario, a Reverse Proxy is required in front of the SMC Server and EAS Proxy. The Reverse Proxy must use the officially signed certificate of smc.company.com for
9 incoming traffic for the SMC server and EAS Proxy. Furthermore, two path forwarding rules must be created to forward SMC and EAS related traffic correctly. All traffic coming in for smc.company.com/microsoft-server-activesync has to be forwarded to port 81 of the server hosting the EAS Proxy. All other traffic for smc.company.com/* has to be forwarded to port 443 of the SMC server itself. The table below summarizes the required configuration on the Reverse Proxy, assuming the SMC server uses the internal hostname smc.internal.com and the EAS Proxy the name easproxy.internal.com. Incoming URL Reverse Proxy Action Destination smc.company.com/microsoft-server- Forward traffic to EAS instance easproxy.internal.com:81 ActiveSync smc.company.com/* Forward traffic to SMC server smc.internal.com:443 To successfully establish an SSL connection, it might be required for the Reverse Proxy that the CA certificate of the self-signed certificate created during the SMC setup has to be uploaded. This CA certificate can be found in the folder %MDM_HOME%\tools\Wizard\certs on the Sophos Mobile Control server and is called ca_cert.crt. Advantages & Disadvantages Advantages: - Less load on the SMC server - Only one officially signed certificate required - Only one external DNS entry required Disadvantages: - Higher implementation effort / costs
10 4.3. SMC and multiple standalone EAS proxy instances on different machines Within this scenario several Exchange Servers exist within the environment e.g. in different locations. All traffic should go via the SMC EAS Proxy and is forwarded to the necessary server accordingly. Each EAS Proxy instance should be accessible via a separated URL. The SMC Server itself is installed on a separate machine. A wildcard certificates exists for the URL *.company.com and is used on the Reverse Proxy. Note: In this scenario it is assumed that the Reverse Proxy splits the SSL connection and initiates a new one to the internal network resources. SMC Setup The SMC server itself is accessible via the external URL smc.company.com. The certificate used for the SMC server should be self-signed and created during the SMC setup covering the internal DNS name of the SMC server e.g. smc.internal.com. External EAS Proxy Setup The certificate used for the EAS Proxy should be self-signed and created during the EAS Proxy setup. It should cover the internal DNS name of the SMC server. Four instances were created listening on the ports 81, 82, 83 and 84. Every instance is configured to forward the traffic to a different server - in that case, exchange1, exchange2, exchange3 and exchange4.
11 After configuring each of the instances the following information pop up appears: After clicking on OK an explorer window will appear showing the client certificate located in C:\Program Files\Sophos\Sophos Mobile Control EAS Proxy\config\X\export, while X is the number of the instance you have created. So if you have created four instances, you will have four different folders. The instance certificates located in the export folders have to be uploaded to the SMC server. To do so, log in to the Sophos Mobile Control web console using super administrator credentials from the server where the EAS Proxy is installed. Go to Settings System Setup and switch to the EAS Proxy tab. In there, press the browse button and choose the certificate you were directed to.
12 After selecting the file and pressing Open, press the Upload button. Once uploaded do not forget to press the Save button to confirm the changes. With uploading the certificates the EAS Proxy instances are able to successfully connect to the SMC server and get the access status of devices. Now you can start the EAS Proxy service. Environment requirements To successfully implement this scenario, a Reverse Proxy is required in front of the SMC Server and EAS Proxy. The Reverse Proxy must use the officially signed wildcard certificate for *.company.com. Furthermore, an external DNS entry for each of your designated External EAS Proxy URLs eap1.company.com, eap2.company.com, eap3.company.com and eap4.company.com is required. On the Reverse Proxy, five path forwarding rules must be created to forward SMC and EAS related traffic correctly. All traffic for smc.company.com has to be forwarded to port 443 of the SMC server itself. The table below summarizes the required configuration on the Reverse Proxy, assuming the SMC server uses the internal computer name smc.internal.com and the EAS Proxy the name easproxy.internal.com.
13 Incoming URL Reverse Proxy Action Destination eap1.company.com Forward traffic to EAS instance easproxy.internal.com:81 eap2.company.com Forward traffic to EAS instance easproxy.internal.com:82 eap3.company.com Forward traffic to EAS instance easproxy.internal.com:83 eap4.company.com Forward traffic to EAS instance easproxy.internal.com:84 smc.company.com/* Forward traffic to SMC server smc.internal.com To successfully establish an SSL connection, it might be required for the Reverse Proxy that the CA certificate of the self-signed certificate created during the SMC setup has to be uploaded. This CA certificate can be found in the folder %MDM_HOME%\tools\Wizard\certs on the Sophos Mobile Control server and is called ca_cert.crt. Advantages & Disadvantages Advantages: - Less load on the SMC server - Every instance has a separate URL, more detailed SMC profile configuration possible Disadvantages - Highest implementation effort - High costs for wildcard certificate
14 4.4. SMC and load balanced EAS proxies Within this scenario it is assumed that two EAS proxies should be used to handle the traffic. To distribute the traffic between the two proxies, a load balancer is placed in front of the EAS Proxies. Two URLs should be used in that scenario - one for the EAS Proxies and one for the SMC server. Note: In this scenario, it is assumed that the load balancer does not inspect or split the SSL traffic. SMC Setup The SMC Server is set up using a certificate signed by an official certification authority. The server uses the URL smc.company.com. External EAS Proxy setup The two EAS Proxies are installed on separate machines. Both Proxies should use one officially signed certificate. Therefore, a web server certificate was created for the URL eas.company.com. It has to be used by both EAS Proxies and imported during the EAS Proxy setup. During the configuration one instance was created was created on both EAS Proxies listening on port 81 and forwarding the traffic to the Exchange server exchange.internal.com.
15 After configuring the instance the following information pop up appears. After clicking on OK an explorer window will appear showing the client certificate located in C:\Program Files\Sophos\Sophos Mobile Control EAS Proxy\config\1\export. The certificates of both EAS Proxy instances have to be uploaded to the SMC server. To do so, log in to the Sophos Mobile Control web console using super administrator credentials. Go to Settings System Setup and switch to the EAS Proxy tab. In there, press the browse button and choose the certificate you were directed to. After selecting the file and pressing Open, press the Upload button. Once uploaded do not forget to press the Save button to confirm the changes. Once both certificates were uploaded the EAS Proxy tab should look similar to this:
16 With uploading the certificate the EAS Proxy instance is able to successfully connect to the SMC server and can verify the access status of devices. Now you can start the EAS Proxy service Environment requirements To implement this scenario, two external DNS entries must exist. One is required for the SMC server itself (e.g. smc.company.com ), and one for the EAS Proxy URL (e.g. eas.company.com ). All traffic for the SMC server URL is directly routed to the actual SMC server. Traffic for the URL easproxy.company.com/microsoft-server-activesync is accepted by the load balancer. The load balancer has to be configured that way, that it forwards the traffic to one of the two EAS Proxies using either the IP or the internal name. Assuming the EAS Proxies use the name EAS1.internal.com and EAS2.internal.com, the required routing configuration would look like that: Incoming URL Routing action Destination eas.company.com Load balancer forwards traffic to EAS EAS1.internal.com:81 Proxy 1 eas.company.com Load balancer forwards traffic to EAS EAS2.internal.com:81 Proxy 2 smc.company.com Traffic is directly routed to the SMC server smc.internal.com Advantages & Disadvantages Advantages: - Higher reliability in case one EAS Proxy is not available - Less load on the SMC server Disadvantages: - High costs to implement
Sophos Mobile Control SaaS startup guide. Product version: 6.1
Sophos Mobile Control SaaS startup guide Product version: 6.1 Document date: September 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your
More informationSophos Mobile Control SaaS startup guide. Product version: 7
Sophos Mobile Control SaaS startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8 5 Change your login
More informationSophos Mobile SaaS startup guide. Product version: 7.1
Sophos Mobile SaaS startup guide Product version: 7.1 Contents 1 About this guide...4 2 What are the key steps?...5 3 Change your password...6 4 Change your login name...7 5 Activate SMC Advanced licenses...8
More informationSophos Mobile as a Service
startup guide Product Version: 8 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses...5 Check your licenses...6
More informationSophos Mobile Control installation prerequisites form. Product version: 7
Sophos Mobile Control installation prerequisites form Product version: 7 Contents 1 About this document... 3 2 System environment... 3 3 Communication between devices and push servers... 11 4 Technical
More informationSophos Mobile in Central
startup guide Product Version: 8.1 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure technical
More informationSophos Mobile. installation guide. Product Version: 8.5
installation guide Product Version: 8.5 Contents About this guide... 1 About Sophos Mobile...2 Sophos Mobile licenses... 3 Trial licenses...3 Upgrade trial licenses to full licenses... 3 Update licenses...
More informationSophos Mobile. installation guide. product version: 8.6
installation guide product version: 8.6 Contents About this guide... 1 About Sophos Mobile...2 Sophos Mobile licenses... 3 Trial licenses...3 Upgrade trial licenses to full licenses... 3 Update licenses...
More informationSophos Mobile Control Installation prerequisites form
Sophos Mobile Control Installation prerequisites form Product version: 5.1 Document date: July 2015 Contents 1 About this document... 3 2 System environment... 3 3 Communication between devices and push
More informationSophos Mobile. installation guide. Product Version: 8
installation guide Product Version: 8 Contents About this guide... 1 About Sophos Mobile...2 Sophos Mobile licenses... 3 Trial licenses...3 Upgrade trial licenses to full licenses...3 Update licenses...3
More informationSophos Mobile. installation guide. product version: 9
installation guide product version: 9 Contents About this guide... 1 About...2 licenses... 3 Trial licenses...3 Upgrade trial licenses to full licenses... 3 Update licenses... 3 Set up... 4 Installation
More informationSophos Mobile as a Service
startup guide product version: 8.6 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses... 5 Check your licenses...6
More informationExample - Reverse Proxy for Exchange Services
The reverse proxy redirects incoming requests from Microsoft Exchange Server services to clients without providing the origin details. This example configuration shows how to configure a reverse proxy
More informationSophos Mobile in Central
startup guide product version: 8.6 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure IT
More informationSophos Mobile Control Super administrator guide. Product version: 3.5
Sophos Mobile Control Super administrator guide Product version: 3.5 Document date: July 2013 Contents 1 About Sophos Mobile Control...3 2 Super administrator accounts...4 3 The super administrator customer...5
More informationSophos Mobile. super administrator guide. Product Version: 8
Sophos Mobile super administrator guide Product Version: 8 Contents About this guide... 1 Document conventions... 1 Super administrator... 2 Super administrator tasks...2 Super administrator customer...
More information1 About this document System environment Communication between devices and push servers Technical support...
Contents 1 About this document... 3 2 System environment... 3 3 Communication between devices and push servers... 13 4 Technical support... 15 5 Legal notices... 16 Installation prerequisites form 1 About
More informationSophos Mobile super administrator guide. Product version: 7.1
Sophos Mobile super administrator guide Product version: 7.1 Contents 1 About this guide...4 1.1 Document conventions...4 2 Super administrator...5 2.1 Super administrator tasks...5 2.2 Super administrator
More informationSophos Mobile. server deployment guide. Product Version: 8.1
Sophos Mobile server deployment guide Product Version: 8.1 Contents About this guide... 1 Sizing considerations... 2 Architecture examples...6 Ports and protocols... 9 Usage scenarios for the standalone
More informationZENworks Mobile Workspace Installation Guide. September 2017
ZENworks Mobile Workspace Installation Guide September 2017 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights,
More informationSophos Mobile. super administrator guide. product version: 8.6
Sophos Mobile super administrator guide product version: 8.6 Contents About this guide... 1 Document conventions... 1 Super administrator... 2 Super administrator tasks...2 Super administrator customer...
More informationSophos Mobile. server deployment guide. product version: 8.6
Sophos Mobile server deployment guide product version: 8.6 Contents About this guide... 1 Sizing considerations... 2 Architecture examples...6 Ports and protocols... 9 Usage scenarios for the standalone
More informationSophos Mobile. super administrator guide. product version: 9
super administrator guide product version: 9 Contents About this guide... 1 Super administrator... 2 Super administrator tasks...2 Super administrator customer... 3 Log in as super administrator... 3 Switch
More informationUser guide NotifySCM Installer
User guide NotifySCM Installer TABLE OF CONTENTS 1 Overview... 3 2 Office 365 Users synchronization... 3 3 Installation... 5 4 Starting the server... 17 2 P a g e 1 OVERVIEW This user guide provides instruction
More informationHow to configure the UTM Web Application Firewall for Microsoft Remote Desktop Gateway connectivity
How to configure the UTM Web Application Firewall for Microsoft Remote Desktop Gateway connectivity This article explains how to configure your Sophos UTM to allow access Microsoft s Remote Desktop Gateway
More informationHow to configure the UTM Web Application Firewall for Microsoft Lync Web Services connectivity
How to configure the UTM Web Application Firewall for Microsoft Lync Web Services connectivity This article explains how to configure your Sophos UTM to allow access Microsoft s Lync Web Services (the
More informationIMPLEMENTING SINGLE SIGN-ON (SSO) TO KERBEROS CONSTRAINED DELEGATION AND HEADER-BASED APPS. VMware Identity Manager.
IMPLEMENTING SINGLE SIGN-ON (SSO) TO KERBEROS CONSTRAINED DELEGATION AND HEADER-BASED APPS VMware Identity Manager February 2017 V1 1 2 Table of Contents Overview... 5 Benefits of BIG-IP APM and Identity
More informationWorkspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902
Workspace ONE UEM Certificate Authentication for EAS with ADCS VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationSophos UTM Web Application Firewall For: Microsoft Exchange Services
How to configure: Sophos UTM Web Application Firewall For: Microsoft Exchange Services This guide explains how to configure your Sophos UTM 9.3+ to allow access to the relevant Microsoft Exchange services
More informationCYAN SECURE WEB HOWTO. SSL Intercept
CYAN SECURE WEB HOWTO January 2009 Applies to: CYAN Secure Web 1.6 and above allows you to inspect SSL encrypted traffic. Therefore all filter mechanisms can be applied to HTTPS traffic. Without, all data
More informationSophos Mobile. server deployment guide. product version: 9
server deployment guide product version: 9 Contents About this guide... 1 Sizing considerations... 2 Architecture examples...6 Ports and protocols... 16 EAS proxy usage scenarios...20 EAS proxy architecture
More informationHow to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT
How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT Ta Table of Contents Table of Contents TA TABLE OF CONTENTS 1 TABLE OF CONTENTS 1 BACKGROUND 2 CONFIGURATION STEPS 2 Create a SSL
More informationVMware Horizon View Deployment
VMware Horizon View provides end users with access to their machines and applications through a unified workspace across multiple devices, locations, and connections. The Horizon View Connection Server
More informationSophos Mobile Control startup guide. Product version: 7
Sophos Mobile Control startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 Sophos Mobile Control licenses...7 3.1 Trial licenses...7 3.2 Upgrade trial licenses
More informationAirWatch Mobile Device Management
RSA Ready Implementation Guide for 3rd Party PKI Applications Last Modified: November 26 th, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product Description
More informationHow to Set Up External CA VPN Certificates
To configure a client-to-site, or site-to-site VPN using s created by External CA, you must create the following VPN s for the VPN service to be able to authenticate Before you begin Use an external CA
More informationMigrate Data from Cisco Secure ACS to Cisco ISE
Migrate Data from Cisco Secure ACS to Cisco ISE This chapter describes exporting and importing Cisco Secure ACS, Release 5.5 or later data into Cisco ISE, Release 2.3 system using the migration tool. Export
More informationMicrosoft Exchange Server 2013 and 2016 Deployment
Microsoft Exchange Server 2013 and 2016 Deployment Barracuda Networks has conducted interoperability tests using the Barracuda Load Balancer ADC and Microsoft Exchange Server 2013 and Microsoft Exchange
More informationRevised: 08/02/ Click the Start button at bottom left, enter Server Manager in the search box, and select it in the list to open it.
Mobile App Windows Authentication & SSL Config Revised: 08/02/2017 Job Aid This Job Aid is intended for agency IT staff and explains how to enable Windows Authentication and SSL for your mobile applications
More informationWorkspace ONE UEM Integration with RSA PKI. VMware Workspace ONE UEM 1810
Workspace ONE UEM Integration with RSA PKI VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationCertificate Management
Certificate Management This guide provides information on...... Configuring the NotifyMDM server to use a Microsoft Active Directory Certificate Authority... Using Certificates from Outside Sources...
More informationVMware AirWatch Integration with RSA PKI Guide
VMware AirWatch Integration with RSA PKI Guide For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationConfiguration Guide. BlackBerry UEM Cloud
Configuration Guide BlackBerry UEM Cloud Published: 2018-04-18 SWD-20180411125526296 Contents About this guide... 7 Getting started... 8 Configuring BlackBerry UEM Cloud for the first time... 8 Administrator
More informationDeploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2
Deploying VMware Identity Manager in the DMZ JULY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have
More informationVMware AirWatch Certificate Authentication for EAS with ADCS
VMware AirWatch Certificate Authentication for EAS with ADCS For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationConfigure the IM and Presence Service to Integrate with the Microsoft Exchange Server
Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server Configure a Presence Gateway for Microsoft Exchange Integration, page 1 SAN and Wildcard Certificate Support, page
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationSophos Mobile Control Administrator guide. Product version: 5.1
Sophos Mobile Control Administrator guide Product version: 5.1 Document date: June 2015 Contents 1 About Sophos Mobile Control...5 1.1 Sophos Mobile Control on premise and as a Service...5 1.2 About this
More informationINSTALLATION GUIDE FOR ACPL FM220 RD WINDOWS APPLICATION INDEX
INSTALLATION GUIDE FOR ACPL FM220 RD WINDOWS APPLICATION INDEX CONTENT PAGE No. Setup FM220 RD Service 2 Setup FM220 RD Service Support Tool 5 Instructions to enable HTTPS in RD Service 8 RD Service troubleshooting
More informationNotifySCM Workspace Administration Guide
NotifySCM Workspace Administration Guide TABLE OF CONTENTS 1 Overview... 3 2 Login... 4 2.1 Main View... 5 3 Manage... 6 3.1 PIM... 6 3.2 Document...12 3.3 Server...13 4 Workspace Configuration... 14 4.1
More informationGroupWise Mobility Quick Start for Microsoft Outlook Users
GroupWise Mobility Quick Start for Microsoft Outlook Users August 2016 GroupWise Mobility Service 2014 R2 allows the Microsoft Outlook client for Windows to run against a GroupWise backend via Microsoft
More informationDeploying VMware Identity Manager in the DMZ. SEPT 2018 VMware Identity Manager 3.3
Deploying VMware Identity Manager in the DMZ SEPT 2018 VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have
More informationHave documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
VMware AirWatch Email Notification Service Installation Guide Providing real-time email notifications to ios devices with AirWatch Inbox and VMware Boxer Workspace ONE UEM v9.4 Have documentation feedback?
More informationWebDirect Configuration Guide
WebDirect Configuration Guide (The following graphics are screen shots from Microsoft ISA Server 2004/2006 which is the property of Microsoft Corp. and are included here for instructive use. Some images
More informationBlackBerry UEM Configuration Guide
BlackBerry UEM Configuration Guide 12.9 2018-11-05Z 2 Contents Getting started... 7 Configuring BlackBerry UEM for the first time... 7 Configuration tasks for managing BlackBerry OS devices... 9 Administrator
More informationConfiguration Guide. BlackBerry UEM. Version 12.9
Configuration Guide BlackBerry UEM Version 12.9 Published: 2018-07-16 SWD-20180713083904821 Contents About this guide... 8 Getting started... 9 Configuring BlackBerry UEM for the first time...9 Configuration
More informationLink Platform Manual. Version 5.0 Release Jan 2017
Version 5.0 Release 4.1.1 Jan 2017 Link Platform Manual Copyright 2017 NetLinkz. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
More informationOracle Enterprise Manager. 1 Before You Install. System Monitoring Plug-in for Oracle Unified Directory User's Guide Release 1.0
Oracle Enterprise Manager System Monitoring Plug-in for Oracle Unified Directory User's Guide Release 1.0 E24476-01 October 2011 The System Monitoring Plug-In for Oracle Unified Directory extends Oracle
More informationVMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources
VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources Workspace ONE UEM v9.6 Have documentation feedback? Submit a Documentation Feedback
More informationCertificates for Live Data Standalone
Certificates and Secure Communications, on page 1 Export Self-Signed Live Data Certificates, on page 2 Import Self-Signed Live Data Certificates, on page 3 Produce Certificate Internally, on page 4 Deploy
More informationSophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 1.1 Document date: July 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
More informationZENworks Mobile Workspace Configuration Server. September 2017
ZENworks Mobile Workspace Configuration Server September 2017 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights,
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationSena Device Server and Serial/IP Application Guide Version 1.0.0
Sena Device Server and Serial/IP Application Guide Version 1.0.0 2005. 3. 7. Revision History Revision Date Name Description V1.0.0 2005-04-21 Kumar Serial/IP 4.3.2 Guide Technical Support Sena Technologies,
More informationWorkspace ONE UEM Certificate Authority Integration with JCCH. VMware Workspace ONE UEM 1810
Workspace ONE UEM Certificate Authority Integration with JCCH VMware Workspace ONE UEM 1810 Workspace ONE UEM Certificate Authority Integration with JCCH You can find the most up-to-date technical documentation
More informationSetting up Microsoft Exchange Server 2016 with Avi
Page 1 of 14 Setting up Microsoft Exchange Server 2016 with Avi Networks view online What is Exchange Server 2016 Microsoft Exchange Server 2016 is an e-mail server solution, with calendar and contact
More informationComodo Offline Updater Utility Software Version
Comodo Offline Updater Utility Software Version 1.2.30701.2 i User Guide Guide Version 1.2.011811 Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Introduction to
More informationDEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Access Policy Manager v with Oracle Access Manager
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Access Policy Manager v10.2.1 with Oracle Access Manager Table of Contents Table of Contents Configuring the BIG-IP APM for WebGate Reverse Proxy and Oracle
More informationAndroid Mobile Single Sign-On to VMware Workspace ONE. SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.
Android Mobile Single Sign-On to VMware Workspace ONE SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on the VMware
More informationSophos Mobile Control Installation guide
Sophos Mobile Control Installation guide Product version: 1.0 Document date: May 2011 Contents 1 Introduction... 3 2 The Sophos Mobile Control server... 4 3 Set up Sophos Mobile Control... 13 4 Apple Push
More informationChecklist. Version 2.0 October 2015
Version 2.0 October 2015 Checklist Table of Contents Setup Issues 3 Virtual Services Platform 3 Device LinkUp 5 Desktop LP 6 VPN LP 6 Usage 7 Virtual Services Platform 7 VPN LP 7 Migration 8 AppDirect
More informationHave documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
VMware AirWatch Email Notification Service Installation Guide Providing real-time email notifications to ios devices with AirWatch Inbox and VMware Boxer Workspace ONE UEM v9.7 Have documentation feedback?
More informationBIG-IP Access Policy Manager : Portal Access. Version 12.1
BIG-IP Access Policy Manager : Portal Access Version 12.1 Table of Contents Table of Contents Overview of Portal Access...7 Overview: What is portal access?...7 About portal access configuration elements...7
More informationBIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0
BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web
More informationDEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Access Policy Manager with Oracle Access Manager
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Access Policy Manager with Oracle Access Manager Table of Contents Table of Contents Configuring the BIG-IP APM for WebGate Reverse Proxy and Oracle Access
More informationIceWarp to IceWarp Migration Guide
IceWarp Unified Communications IceWarp to IceWarp Migration Guide Version 12.0 IceWarp to IceWarp Migration Guide 2 Contents IceWarp to IceWarp Migration Guide... 4 Used Terminology... 4 Brief Introduction...
More informationGoogle Sync Integration Guide. VMware Workspace ONE UEM 1902
Google Sync Integration Guide VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,
More informationWorkspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810
Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationBIG-IP Access Policy Manager : Implementations. Version 12.1
BIG-IP Access Policy Manager : Implementations Version 12.1 Table of Contents Table of Contents Web Access Management...11 Overview: Configuring APM for web access management...11 About ways to time out
More informationInstalling and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.
Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on
More informationUsing vrealize Operations Tenant App as a Service Provider
Using vrealize Operations Tenant App as a Service Provider Using vrealize Operations Tenant App as a Service Provider You can find the most up-to-date technical documentation on the VMware Web site at:
More informationObject Storage Operation Manual
NTT Communications Cloudⁿ Object Storage Operation Manual Ver.. Do not redistribute (distribute, reproduce or provide) the content listed in this document. Versio n Edited date Ver..0 February 0, 03 Ver..
More informationSophos Mobile. startup guide. Product Version: 8.1
Sophos Mobile startup guide Product Version: 8.1 Contents About this guide... 1 Sophos Mobile licenses... 2 Trial licenses...2 Upgrade trial licenses to full licenses... 2 Update licenses... 2 What are
More informationCYAN SECURE WEB Installing on Windows
CYAN SECURE WEB September 2009 Applies to: 1.7 and above Table of Contents 1 Introduction... 2 2 Preparation... 2 3 Network Integration... 3 3.1 Out-of-line Deployment... 3 3.2 DMZ Deployment... 3 4 Proxy
More informationDEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP Access Policy Manager with IBM, Oracle, and Microsoft
DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP Access Policy Manager with IBM, Oracle, and Microsoft Table of Contents Table of Contents Introducing the BIG-IP APM deployment guide Revision history...1-1
More informationManual Owa Exchange 2010 Url Redirect To
Manual Owa Exchange 2010 Url Redirect To Internal Description of the OWA client connectivity flow in an Exchange 2013/2010 coexistence environment. Optional scenario for internal and external OWA clients.
More informationSymptom Condition / Workaround Issue No validation is provided for name and IP address fields when creating bookmarks.
Secure Remote Access Contents Platform Compatibility...1 Known Issues...1 Resolved Issues...2 Upgrading SonicOS SSL VPN Firmware Procedures...3 Related Technical Documentation...5 Platform Compatibility
More informationPlease select your version. Installation Instructions for BIG-IP F5 version 9.x and 10.x. Installation Instructions for F5 BIG-IP version 11
Installation Guide Please select your version Installation Instructions for BIG-IP F5 version 9.x and 10.x Installation Instructions for F5 BIG-IP version 11 Installation Instructions for BIG-IP F5 version
More informationVII. Corente Services SSL Client
VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...
More informationIpad Setup Problem Connection To Server Failed Exchange Activesync
Ipad Setup Problem Connection To Server Failed Exchange Activesync Discusses current issues that involve Microsoft Exchange ActiveSync and The connection to the server failed. Use the Microsoft Outlook
More informationHow to configure Sophos for all other clients
How to configure Sophos Email for all other clients 1. Add Your Domain & Verify Ownership 2. Add Mailboxes to Sophos Email 3. Restrict Delivery to Sophos IP Addresses 4. Modify MX records to point to Sophos
More informationJuniper SA 8.x Integration
Juniper SA 8.x Integration Contents 1 Overview 2 Prerequisites 3 File Downloads 4 Baseline 5 Architecture 6 Installation 6.1 Swivel Configuration 6.1.1 Configuring the RADIUS server 6.1.2 Enabling Session
More informationHave documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
VMware AirWatch Email Notification Service Installation Guide Providing real-time email notifications to ios devices with AirWatch Inbox and VMware Boxer AirWatch v9.1 Have documentation feedback? Submit
More informationContent and Purpose of This Guide... 1 User Management... 2
Contents Introduction--1 Content and Purpose of This Guide........................... 1 User Management........................................ 2 Security--3 Security Features.........................................
More informationSophos Enterprise Console advanced startup guide
Sophos Enterprise Console advanced startup guide For distributed installations Product version: 5.3 Document date: April 2015 Contents 1 About this guide...4 2 Planning installation...5 2.1 Planning the
More informationUsing AD360 as a reverse proxy server
Using AD360 as a reverse proxy server www.manageengine.com/active-directory-360/ Table of Contents Document summary 1 What is a reverse proxy? 1 Configuring AD360 as a reverse proxy 2 Enabling a context-based
More informationThis document describes the configuration of Secure Sockets Layer (SSL) decryption on the FirePOWER Module using ASDM (On-Box Management).
Contents Introduction Prerequisites Requirements Components Used Background Information Outbound SSL Decryption Inbound SSL Decryption Configuration for SSL Decryption Outbound SSL decryption (Decrypt
More informationVMware AirWatch Google Sync Integration Guide Securing Your Infrastructure
VMware AirWatch Google Sync Integration Guide Securing Your Email Infrastructure Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard
More informationForeScout Extended Module for Tenable Vulnerability Management
ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support
More informationBlue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7
Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the
More information