Setting up the Sophos Mobile Control External EAS Proxy

Size: px
Start display at page:

Download "Setting up the Sophos Mobile Control External EAS Proxy"

Transcription

1 Setting up the Sophos Mobile Control External EAS Proxy

2 Setting up the External EAS Proxy This document tries to explain the concept of the Sophos Mobile Control External EAS Proxy which is available for download on Sophos.com and which can be installed separately. The requirements for the environment to use the EAS Proxy depend on the usage scenario. Possible scenarios, their requirements and installation steps are described below. This document only covers general environment requirements and does not cover explicit configuration steps for instances involved, e.g. reverse proxy, load balancer or Exchange server. Table of Contents 1. When is it required? Differences between the built-in and the External EAS Proxy How does it communicate with the SMC server? Usage scenario examples and environment requirements SMC and single External EAS proxy instance on different machines... 4 SMC server setup... 4 External EAS Proxy setup... 4 Environment requirements... 6 Advantages & Disadvantages SMC and single standalone EAS proxy on different machines behind a Reverse Proxy... 7 SMC Setup... 7 External EAS Proxy Setup... 7 Environment requirements... 8 Advantages & Disadvantages SMC and multiple standalone EAS proxy instances on different machines SMC Setup External EAS Proxy Setup Environment requirements Advantages & Disadvantages SMC and load balanced EAS proxies SMC Setup External EAS Proxy setup Environment requirements Advantages & Disadvantages... 16

3 1. When is it required? The external EAS Proxy should be used if one of the following scenarios applies: - If more than 300 devices should get s via the Sophos Mobile Control EAS Proxy - You use Lotus Traveler for non-ios devices - You want to support multiple backend servers - You want to set up load balancing for Exchange ActiveSync traffic 2. Differences between the built-in and the External EAS Proxy The built-in and External EAS Proxy differ in the used technology. For the built-in EAS Proxy a maximum of 2000 parallel connections is possible which depleted by 400 devices being registered on the SMC server as each device can open several connections to the SMC server. This limitation does not exist for the External EAS Proxy. Furthermore, the built-in EAS Proxy can handle only traffic for one server whereas the External EAS Proxy can handle connections to different servers using so called instances. Every instance listens on one specific port and forwards traffic to the server configured for that instance after device compliance is verified. 3. How does it communicate with the SMC server? The external EAS Proxy connects to the SMC server using the external URL of the SMC server. This connection is needed to get the access status for the devices which try to connect to the SMC server. If a device is allowed to receive the EAS Proxy caches the status for 10 minutes. If the device is not allowed to receive , this status is saved for 30 seconds. Once a timer expired, the EAS Proxy will ask for the status again. The communication is secured using a client certificate which is created during the creation of an instance within the External EAS Proxy. Those client certificates have to be uploaded to the Sophos Mobile Control server using the super administrator account. By uploading the client certificate to the SMC server, the SMC server and the EAS Proxy instance can create a secured connection to exchange data. If the SMC Server is not available, the EAS Proxy will continue to work for 60 minutes using the last known status of each device.

4 4. Usage scenario examples and environment requirements The External EAS Proxy can be used in many different ways. This chapter tries to explain the most common scenarios and the requirements for each scenario. A combination of the scenarios is also possible but not explained in that guide SMC and single External EAS proxy instance on different machines In this scenario it is assumed that the SMC server and the External EAS Proxy are installed on two separate machines. This might be required if different URLs should be used and the SMC server should not handle the load the traffic of the devices is causing. Furthermore, both components could use port 443 to communicate with the devices. Note: If you want to implement that scenario think about the URL the External EAS Proxy should be accessible from outside the network. This URL will be used within a Sophos Mobile Control configuration profile and by the devices to synchronize s. In this example, eas.company.com is used. SMC server setup The SMC server itself uses the URL smc.company.com. The certificate used for the SMC server URL smc.company.com can either be self-signed and created by the SMC setup or an officially certificate signed by a Certification Authority. An officially signed certificate is generally recommended and required if you want to manage Android devices. External EAS Proxy setup The External EAS Proxy is installed on a separate machine and uses a certificate to support incoming SSL traffic by the mobile devices. Therefore, a web server certificate was created for the URL eas.company.com and imported during the setup of the External EAS Proxy. A certificate signed by an official Certification Authority is recommended. Furthermore, one instance was created listening

5 on port 443 and forwarding all traffic to the server within the environment - in that case, exchange.company.com. After configuring the instance the following information pop up appears. After clicking on OK an explorer window will appear showing the client certificate located in C:\Program Files\Sophos\Sophos Mobile Control EAS Proxy\config\1\export. This certificate has to be uploaded to the SMC server. To do so, log in to the Sophos Mobile Control web console using super administrator credentials. Go to Settings System Setup and switch to the EAS Proxy tab. In there, press the browse button and choose the certificate you were directed to.

6 After selecting the file and pressing Open, press the Upload button. Once uploaded do not forget to press the Save button to confirm the changes. With uploading the certificate the EAS Proxy instance is able to successfully connect to the SMC server and get the access status of devices. Now you can start the EAS Proxy service Environment requirements To successfully use this scenario an external DNS entry for your designated External EAS Proxy URL eas.company.com is required. Further requirements do not exist for this scenario. Advantages & Disadvantages Advantages: - Traffic load separated between SMC server and EAS Proxy, - Separate URL for Exchange ActiveSync traffic, Disadvantages: - Higher costs for official certificates for SMC- & EAS-Proxy-URL - EAS Proxy blocks port 443 completely on the installed operating system - Two external DNS entries required

7 4.2. SMC and single standalone EAS proxy on different machines behind a Reverse Proxy In this scenario it is assumed that the SMC server and the External EAS Proxy are installed on two separate machines. However, both should use the same URL. A certificate signed by an external Certification Authority exists for the server URL smc.company.com. Note: In this scenario it is assumed that the Reverse Proxy splits the SSL connection and initiates a new one to the internal network resources. SMC Setup The SMC server itself should be accessible using the external URL smc.company.com. The certificate used for the SMC server should be self-signed and created by the SMC setup covering the internal DNS name of the SMC server. External EAS Proxy Setup The External EAS Proxy is installed on a separate machine and uses the same self-signed certificate as the SMC server. Furthermore, one instance was created listening on port 81 and forwarding all traffic to the server within the environment - in that scenario, exchange.company.com. Once the instance was created on the EAS Proxy, the client certificate has to be uploaded to the SMC server to enable communication between the servers. After configuring the instance the following information pop up appears.

8 After clicking on OK an explorer window will appear showing the client certificate located in C:\Program Files\Sophos\Sophos Mobile Control EAS Proxy\config\1\export. This certificate has to be uploaded to the SMC server. To do so, log in to the Sophos Mobile Control web console using super administrator credentials. Go to Settings System Setup and switch to the EAS Proxy tab. In there, press the browse button and choose the certificate you were directed to. After selecting the file and pressing Open, press the Upload button. Once uploaded do not forget to press the Save button to confirm the changes. With uploading the certificate the EAS Proxy instance is able to successfully connect to the SMC server and get the access status of devices. Now you can start the EAS Proxy service. Environment requirements To successfully implement this scenario, a Reverse Proxy is required in front of the SMC Server and EAS Proxy. The Reverse Proxy must use the officially signed certificate of smc.company.com for

9 incoming traffic for the SMC server and EAS Proxy. Furthermore, two path forwarding rules must be created to forward SMC and EAS related traffic correctly. All traffic coming in for smc.company.com/microsoft-server-activesync has to be forwarded to port 81 of the server hosting the EAS Proxy. All other traffic for smc.company.com/* has to be forwarded to port 443 of the SMC server itself. The table below summarizes the required configuration on the Reverse Proxy, assuming the SMC server uses the internal hostname smc.internal.com and the EAS Proxy the name easproxy.internal.com. Incoming URL Reverse Proxy Action Destination smc.company.com/microsoft-server- Forward traffic to EAS instance easproxy.internal.com:81 ActiveSync smc.company.com/* Forward traffic to SMC server smc.internal.com:443 To successfully establish an SSL connection, it might be required for the Reverse Proxy that the CA certificate of the self-signed certificate created during the SMC setup has to be uploaded. This CA certificate can be found in the folder %MDM_HOME%\tools\Wizard\certs on the Sophos Mobile Control server and is called ca_cert.crt. Advantages & Disadvantages Advantages: - Less load on the SMC server - Only one officially signed certificate required - Only one external DNS entry required Disadvantages: - Higher implementation effort / costs

10 4.3. SMC and multiple standalone EAS proxy instances on different machines Within this scenario several Exchange Servers exist within the environment e.g. in different locations. All traffic should go via the SMC EAS Proxy and is forwarded to the necessary server accordingly. Each EAS Proxy instance should be accessible via a separated URL. The SMC Server itself is installed on a separate machine. A wildcard certificates exists for the URL *.company.com and is used on the Reverse Proxy. Note: In this scenario it is assumed that the Reverse Proxy splits the SSL connection and initiates a new one to the internal network resources. SMC Setup The SMC server itself is accessible via the external URL smc.company.com. The certificate used for the SMC server should be self-signed and created during the SMC setup covering the internal DNS name of the SMC server e.g. smc.internal.com. External EAS Proxy Setup The certificate used for the EAS Proxy should be self-signed and created during the EAS Proxy setup. It should cover the internal DNS name of the SMC server. Four instances were created listening on the ports 81, 82, 83 and 84. Every instance is configured to forward the traffic to a different server - in that case, exchange1, exchange2, exchange3 and exchange4.

11 After configuring each of the instances the following information pop up appears: After clicking on OK an explorer window will appear showing the client certificate located in C:\Program Files\Sophos\Sophos Mobile Control EAS Proxy\config\X\export, while X is the number of the instance you have created. So if you have created four instances, you will have four different folders. The instance certificates located in the export folders have to be uploaded to the SMC server. To do so, log in to the Sophos Mobile Control web console using super administrator credentials from the server where the EAS Proxy is installed. Go to Settings System Setup and switch to the EAS Proxy tab. In there, press the browse button and choose the certificate you were directed to.

12 After selecting the file and pressing Open, press the Upload button. Once uploaded do not forget to press the Save button to confirm the changes. With uploading the certificates the EAS Proxy instances are able to successfully connect to the SMC server and get the access status of devices. Now you can start the EAS Proxy service. Environment requirements To successfully implement this scenario, a Reverse Proxy is required in front of the SMC Server and EAS Proxy. The Reverse Proxy must use the officially signed wildcard certificate for *.company.com. Furthermore, an external DNS entry for each of your designated External EAS Proxy URLs eap1.company.com, eap2.company.com, eap3.company.com and eap4.company.com is required. On the Reverse Proxy, five path forwarding rules must be created to forward SMC and EAS related traffic correctly. All traffic for smc.company.com has to be forwarded to port 443 of the SMC server itself. The table below summarizes the required configuration on the Reverse Proxy, assuming the SMC server uses the internal computer name smc.internal.com and the EAS Proxy the name easproxy.internal.com.

13 Incoming URL Reverse Proxy Action Destination eap1.company.com Forward traffic to EAS instance easproxy.internal.com:81 eap2.company.com Forward traffic to EAS instance easproxy.internal.com:82 eap3.company.com Forward traffic to EAS instance easproxy.internal.com:83 eap4.company.com Forward traffic to EAS instance easproxy.internal.com:84 smc.company.com/* Forward traffic to SMC server smc.internal.com To successfully establish an SSL connection, it might be required for the Reverse Proxy that the CA certificate of the self-signed certificate created during the SMC setup has to be uploaded. This CA certificate can be found in the folder %MDM_HOME%\tools\Wizard\certs on the Sophos Mobile Control server and is called ca_cert.crt. Advantages & Disadvantages Advantages: - Less load on the SMC server - Every instance has a separate URL, more detailed SMC profile configuration possible Disadvantages - Highest implementation effort - High costs for wildcard certificate

14 4.4. SMC and load balanced EAS proxies Within this scenario it is assumed that two EAS proxies should be used to handle the traffic. To distribute the traffic between the two proxies, a load balancer is placed in front of the EAS Proxies. Two URLs should be used in that scenario - one for the EAS Proxies and one for the SMC server. Note: In this scenario, it is assumed that the load balancer does not inspect or split the SSL traffic. SMC Setup The SMC Server is set up using a certificate signed by an official certification authority. The server uses the URL smc.company.com. External EAS Proxy setup The two EAS Proxies are installed on separate machines. Both Proxies should use one officially signed certificate. Therefore, a web server certificate was created for the URL eas.company.com. It has to be used by both EAS Proxies and imported during the EAS Proxy setup. During the configuration one instance was created was created on both EAS Proxies listening on port 81 and forwarding the traffic to the Exchange server exchange.internal.com.

15 After configuring the instance the following information pop up appears. After clicking on OK an explorer window will appear showing the client certificate located in C:\Program Files\Sophos\Sophos Mobile Control EAS Proxy\config\1\export. The certificates of both EAS Proxy instances have to be uploaded to the SMC server. To do so, log in to the Sophos Mobile Control web console using super administrator credentials. Go to Settings System Setup and switch to the EAS Proxy tab. In there, press the browse button and choose the certificate you were directed to. After selecting the file and pressing Open, press the Upload button. Once uploaded do not forget to press the Save button to confirm the changes. Once both certificates were uploaded the EAS Proxy tab should look similar to this:

16 With uploading the certificate the EAS Proxy instance is able to successfully connect to the SMC server and can verify the access status of devices. Now you can start the EAS Proxy service Environment requirements To implement this scenario, two external DNS entries must exist. One is required for the SMC server itself (e.g. smc.company.com ), and one for the EAS Proxy URL (e.g. eas.company.com ). All traffic for the SMC server URL is directly routed to the actual SMC server. Traffic for the URL easproxy.company.com/microsoft-server-activesync is accepted by the load balancer. The load balancer has to be configured that way, that it forwards the traffic to one of the two EAS Proxies using either the IP or the internal name. Assuming the EAS Proxies use the name EAS1.internal.com and EAS2.internal.com, the required routing configuration would look like that: Incoming URL Routing action Destination eas.company.com Load balancer forwards traffic to EAS EAS1.internal.com:81 Proxy 1 eas.company.com Load balancer forwards traffic to EAS EAS2.internal.com:81 Proxy 2 smc.company.com Traffic is directly routed to the SMC server smc.internal.com Advantages & Disadvantages Advantages: - Higher reliability in case one EAS Proxy is not available - Less load on the SMC server Disadvantages: - High costs to implement

Sophos Mobile Control SaaS startup guide. Product version: 6.1

Sophos Mobile Control SaaS startup guide. Product version: 6.1 Sophos Mobile Control SaaS startup guide Product version: 6.1 Document date: September 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your

More information

Sophos Mobile Control SaaS startup guide. Product version: 7

Sophos Mobile Control SaaS startup guide. Product version: 7 Sophos Mobile Control SaaS startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8 5 Change your login

More information

Sophos Mobile SaaS startup guide. Product version: 7.1

Sophos Mobile SaaS startup guide. Product version: 7.1 Sophos Mobile SaaS startup guide Product version: 7.1 Contents 1 About this guide...4 2 What are the key steps?...5 3 Change your password...6 4 Change your login name...7 5 Activate SMC Advanced licenses...8

More information

Sophos Mobile as a Service

Sophos Mobile as a Service startup guide Product Version: 8 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses...5 Check your licenses...6

More information

Sophos Mobile Control installation prerequisites form. Product version: 7

Sophos Mobile Control installation prerequisites form. Product version: 7 Sophos Mobile Control installation prerequisites form Product version: 7 Contents 1 About this document... 3 2 System environment... 3 3 Communication between devices and push servers... 11 4 Technical

More information

Sophos Mobile in Central

Sophos Mobile in Central startup guide Product Version: 8.1 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure technical

More information

Sophos Mobile. installation guide. Product Version: 8.5

Sophos Mobile. installation guide. Product Version: 8.5 installation guide Product Version: 8.5 Contents About this guide... 1 About Sophos Mobile...2 Sophos Mobile licenses... 3 Trial licenses...3 Upgrade trial licenses to full licenses... 3 Update licenses...

More information

Sophos Mobile. installation guide. product version: 8.6

Sophos Mobile. installation guide. product version: 8.6 installation guide product version: 8.6 Contents About this guide... 1 About Sophos Mobile...2 Sophos Mobile licenses... 3 Trial licenses...3 Upgrade trial licenses to full licenses... 3 Update licenses...

More information

Sophos Mobile Control Installation prerequisites form

Sophos Mobile Control Installation prerequisites form Sophos Mobile Control Installation prerequisites form Product version: 5.1 Document date: July 2015 Contents 1 About this document... 3 2 System environment... 3 3 Communication between devices and push

More information

Sophos Mobile. installation guide. Product Version: 8

Sophos Mobile. installation guide. Product Version: 8 installation guide Product Version: 8 Contents About this guide... 1 About Sophos Mobile...2 Sophos Mobile licenses... 3 Trial licenses...3 Upgrade trial licenses to full licenses...3 Update licenses...3

More information

Sophos Mobile. installation guide. product version: 9

Sophos Mobile. installation guide. product version: 9 installation guide product version: 9 Contents About this guide... 1 About...2 licenses... 3 Trial licenses...3 Upgrade trial licenses to full licenses... 3 Update licenses... 3 Set up... 4 Installation

More information

Sophos Mobile as a Service

Sophos Mobile as a Service startup guide product version: 8.6 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses... 5 Check your licenses...6

More information

Example - Reverse Proxy for Exchange Services

Example - Reverse Proxy for Exchange Services The reverse proxy redirects incoming requests from Microsoft Exchange Server services to clients without providing the origin details. This example configuration shows how to configure a reverse proxy

More information

Sophos Mobile in Central

Sophos Mobile in Central startup guide product version: 8.6 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure IT

More information

Sophos Mobile Control Super administrator guide. Product version: 3.5

Sophos Mobile Control Super administrator guide. Product version: 3.5 Sophos Mobile Control Super administrator guide Product version: 3.5 Document date: July 2013 Contents 1 About Sophos Mobile Control...3 2 Super administrator accounts...4 3 The super administrator customer...5

More information

Sophos Mobile. super administrator guide. Product Version: 8

Sophos Mobile. super administrator guide. Product Version: 8 Sophos Mobile super administrator guide Product Version: 8 Contents About this guide... 1 Document conventions... 1 Super administrator... 2 Super administrator tasks...2 Super administrator customer...

More information

1 About this document System environment Communication between devices and push servers Technical support...

1 About this document System environment Communication between devices and push servers Technical support... Contents 1 About this document... 3 2 System environment... 3 3 Communication between devices and push servers... 13 4 Technical support... 15 5 Legal notices... 16 Installation prerequisites form 1 About

More information

Sophos Mobile super administrator guide. Product version: 7.1

Sophos Mobile super administrator guide. Product version: 7.1 Sophos Mobile super administrator guide Product version: 7.1 Contents 1 About this guide...4 1.1 Document conventions...4 2 Super administrator...5 2.1 Super administrator tasks...5 2.2 Super administrator

More information

Sophos Mobile. server deployment guide. Product Version: 8.1

Sophos Mobile. server deployment guide. Product Version: 8.1 Sophos Mobile server deployment guide Product Version: 8.1 Contents About this guide... 1 Sizing considerations... 2 Architecture examples...6 Ports and protocols... 9 Usage scenarios for the standalone

More information

ZENworks Mobile Workspace Installation Guide. September 2017

ZENworks Mobile Workspace Installation Guide. September 2017 ZENworks Mobile Workspace Installation Guide September 2017 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights,

More information

Sophos Mobile. super administrator guide. product version: 8.6

Sophos Mobile. super administrator guide. product version: 8.6 Sophos Mobile super administrator guide product version: 8.6 Contents About this guide... 1 Document conventions... 1 Super administrator... 2 Super administrator tasks...2 Super administrator customer...

More information

Sophos Mobile. server deployment guide. product version: 8.6

Sophos Mobile. server deployment guide. product version: 8.6 Sophos Mobile server deployment guide product version: 8.6 Contents About this guide... 1 Sizing considerations... 2 Architecture examples...6 Ports and protocols... 9 Usage scenarios for the standalone

More information

Sophos Mobile. super administrator guide. product version: 9

Sophos Mobile. super administrator guide. product version: 9 super administrator guide product version: 9 Contents About this guide... 1 Super administrator... 2 Super administrator tasks...2 Super administrator customer... 3 Log in as super administrator... 3 Switch

More information

User guide NotifySCM Installer

User guide NotifySCM Installer User guide NotifySCM Installer TABLE OF CONTENTS 1 Overview... 3 2 Office 365 Users synchronization... 3 3 Installation... 5 4 Starting the server... 17 2 P a g e 1 OVERVIEW This user guide provides instruction

More information

How to configure the UTM Web Application Firewall for Microsoft Remote Desktop Gateway connectivity

How to configure the UTM Web Application Firewall for Microsoft Remote Desktop Gateway connectivity How to configure the UTM Web Application Firewall for Microsoft Remote Desktop Gateway connectivity This article explains how to configure your Sophos UTM to allow access Microsoft s Remote Desktop Gateway

More information

How to configure the UTM Web Application Firewall for Microsoft Lync Web Services connectivity

How to configure the UTM Web Application Firewall for Microsoft Lync Web Services connectivity How to configure the UTM Web Application Firewall for Microsoft Lync Web Services connectivity This article explains how to configure your Sophos UTM to allow access Microsoft s Lync Web Services (the

More information

IMPLEMENTING SINGLE SIGN-ON (SSO) TO KERBEROS CONSTRAINED DELEGATION AND HEADER-BASED APPS. VMware Identity Manager.

IMPLEMENTING SINGLE SIGN-ON (SSO) TO KERBEROS CONSTRAINED DELEGATION AND HEADER-BASED APPS. VMware Identity Manager. IMPLEMENTING SINGLE SIGN-ON (SSO) TO KERBEROS CONSTRAINED DELEGATION AND HEADER-BASED APPS VMware Identity Manager February 2017 V1 1 2 Table of Contents Overview... 5 Benefits of BIG-IP APM and Identity

More information

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902 Workspace ONE UEM Certificate Authentication for EAS with ADCS VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Sophos UTM Web Application Firewall For: Microsoft Exchange Services

Sophos UTM Web Application Firewall For: Microsoft Exchange Services How to configure: Sophos UTM Web Application Firewall For: Microsoft Exchange Services This guide explains how to configure your Sophos UTM 9.3+ to allow access to the relevant Microsoft Exchange services

More information

CYAN SECURE WEB HOWTO. SSL Intercept

CYAN SECURE WEB HOWTO. SSL Intercept CYAN SECURE WEB HOWTO January 2009 Applies to: CYAN Secure Web 1.6 and above allows you to inspect SSL encrypted traffic. Therefore all filter mechanisms can be applied to HTTPS traffic. Without, all data

More information

Sophos Mobile. server deployment guide. product version: 9

Sophos Mobile. server deployment guide. product version: 9 server deployment guide product version: 9 Contents About this guide... 1 Sizing considerations... 2 Architecture examples...6 Ports and protocols... 16 EAS proxy usage scenarios...20 EAS proxy architecture

More information

How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT

How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT Ta Table of Contents Table of Contents TA TABLE OF CONTENTS 1 TABLE OF CONTENTS 1 BACKGROUND 2 CONFIGURATION STEPS 2 Create a SSL

More information

VMware Horizon View Deployment

VMware Horizon View Deployment VMware Horizon View provides end users with access to their machines and applications through a unified workspace across multiple devices, locations, and connections. The Horizon View Connection Server

More information

Sophos Mobile Control startup guide. Product version: 7

Sophos Mobile Control startup guide. Product version: 7 Sophos Mobile Control startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 Sophos Mobile Control licenses...7 3.1 Trial licenses...7 3.2 Upgrade trial licenses

More information

AirWatch Mobile Device Management

AirWatch Mobile Device Management RSA Ready Implementation Guide for 3rd Party PKI Applications Last Modified: November 26 th, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product Description

More information

How to Set Up External CA VPN Certificates

How to Set Up External CA VPN Certificates To configure a client-to-site, or site-to-site VPN using s created by External CA, you must create the following VPN s for the VPN service to be able to authenticate Before you begin Use an external CA

More information

Migrate Data from Cisco Secure ACS to Cisco ISE

Migrate Data from Cisco Secure ACS to Cisco ISE Migrate Data from Cisco Secure ACS to Cisco ISE This chapter describes exporting and importing Cisco Secure ACS, Release 5.5 or later data into Cisco ISE, Release 2.3 system using the migration tool. Export

More information

Microsoft Exchange Server 2013 and 2016 Deployment

Microsoft Exchange Server 2013 and 2016 Deployment Microsoft Exchange Server 2013 and 2016 Deployment Barracuda Networks has conducted interoperability tests using the Barracuda Load Balancer ADC and Microsoft Exchange Server 2013 and Microsoft Exchange

More information

Revised: 08/02/ Click the Start button at bottom left, enter Server Manager in the search box, and select it in the list to open it.

Revised: 08/02/ Click the Start button at bottom left, enter Server Manager in the search box, and select it in the list to open it. Mobile App Windows Authentication & SSL Config Revised: 08/02/2017 Job Aid This Job Aid is intended for agency IT staff and explains how to enable Windows Authentication and SSL for your mobile applications

More information

Workspace ONE UEM Integration with RSA PKI. VMware Workspace ONE UEM 1810

Workspace ONE UEM Integration with RSA PKI. VMware Workspace ONE UEM 1810 Workspace ONE UEM Integration with RSA PKI VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Certificate Management

Certificate Management Certificate Management This guide provides information on...... Configuring the NotifyMDM server to use a Microsoft Active Directory Certificate Authority... Using Certificates from Outside Sources...

More information

VMware AirWatch Integration with RSA PKI Guide

VMware AirWatch Integration with RSA PKI Guide VMware AirWatch Integration with RSA PKI Guide For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

Configuration Guide. BlackBerry UEM Cloud

Configuration Guide. BlackBerry UEM Cloud Configuration Guide BlackBerry UEM Cloud Published: 2018-04-18 SWD-20180411125526296 Contents About this guide... 7 Getting started... 8 Configuring BlackBerry UEM Cloud for the first time... 8 Administrator

More information

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2 Deploying VMware Identity Manager in the DMZ JULY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

VMware AirWatch Certificate Authentication for EAS with ADCS

VMware AirWatch Certificate Authentication for EAS with ADCS VMware AirWatch Certificate Authentication for EAS with ADCS For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server

Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server Configure a Presence Gateway for Microsoft Exchange Integration, page 1 SAN and Wildcard Certificate Support, page

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Sophos Mobile Control Administrator guide. Product version: 5.1

Sophos Mobile Control Administrator guide. Product version: 5.1 Sophos Mobile Control Administrator guide Product version: 5.1 Document date: June 2015 Contents 1 About Sophos Mobile Control...5 1.1 Sophos Mobile Control on premise and as a Service...5 1.2 About this

More information

INSTALLATION GUIDE FOR ACPL FM220 RD WINDOWS APPLICATION INDEX

INSTALLATION GUIDE FOR ACPL FM220 RD WINDOWS APPLICATION INDEX INSTALLATION GUIDE FOR ACPL FM220 RD WINDOWS APPLICATION INDEX CONTENT PAGE No. Setup FM220 RD Service 2 Setup FM220 RD Service Support Tool 5 Instructions to enable HTTPS in RD Service 8 RD Service troubleshooting

More information

NotifySCM Workspace Administration Guide

NotifySCM Workspace Administration Guide NotifySCM Workspace Administration Guide TABLE OF CONTENTS 1 Overview... 3 2 Login... 4 2.1 Main View... 5 3 Manage... 6 3.1 PIM... 6 3.2 Document...12 3.3 Server...13 4 Workspace Configuration... 14 4.1

More information

GroupWise Mobility Quick Start for Microsoft Outlook Users

GroupWise Mobility Quick Start for Microsoft Outlook Users GroupWise Mobility Quick Start for Microsoft Outlook Users August 2016 GroupWise Mobility Service 2014 R2 allows the Microsoft Outlook client for Windows to run against a GroupWise backend via Microsoft

More information

Deploying VMware Identity Manager in the DMZ. SEPT 2018 VMware Identity Manager 3.3

Deploying VMware Identity Manager in the DMZ. SEPT 2018 VMware Identity Manager 3.3 Deploying VMware Identity Manager in the DMZ SEPT 2018 VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. VMware AirWatch Email Notification Service Installation Guide Providing real-time email notifications to ios devices with AirWatch Inbox and VMware Boxer Workspace ONE UEM v9.4 Have documentation feedback?

More information

WebDirect Configuration Guide

WebDirect Configuration Guide WebDirect Configuration Guide (The following graphics are screen shots from Microsoft ISA Server 2004/2006 which is the property of Microsoft Corp. and are included here for instructive use. Some images

More information

BlackBerry UEM Configuration Guide

BlackBerry UEM Configuration Guide BlackBerry UEM Configuration Guide 12.9 2018-11-05Z 2 Contents Getting started... 7 Configuring BlackBerry UEM for the first time... 7 Configuration tasks for managing BlackBerry OS devices... 9 Administrator

More information

Configuration Guide. BlackBerry UEM. Version 12.9

Configuration Guide. BlackBerry UEM. Version 12.9 Configuration Guide BlackBerry UEM Version 12.9 Published: 2018-07-16 SWD-20180713083904821 Contents About this guide... 8 Getting started... 9 Configuring BlackBerry UEM for the first time...9 Configuration

More information

Link Platform Manual. Version 5.0 Release Jan 2017

Link Platform Manual. Version 5.0 Release Jan 2017 Version 5.0 Release 4.1.1 Jan 2017 Link Platform Manual Copyright 2017 NetLinkz. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

Oracle Enterprise Manager. 1 Before You Install. System Monitoring Plug-in for Oracle Unified Directory User's Guide Release 1.0

Oracle Enterprise Manager. 1 Before You Install. System Monitoring Plug-in for Oracle Unified Directory User's Guide Release 1.0 Oracle Enterprise Manager System Monitoring Plug-in for Oracle Unified Directory User's Guide Release 1.0 E24476-01 October 2011 The System Monitoring Plug-In for Oracle Unified Directory extends Oracle

More information

VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources

VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources Workspace ONE UEM v9.6 Have documentation feedback? Submit a Documentation Feedback

More information

Certificates for Live Data Standalone

Certificates for Live Data Standalone Certificates and Secure Communications, on page 1 Export Self-Signed Live Data Certificates, on page 2 Import Self-Signed Live Data Certificates, on page 3 Produce Certificate Internally, on page 4 Deploy

More information

Sophos Mobile Control Technical guide

Sophos Mobile Control Technical guide Sophos Mobile Control Technical guide Product version: 1.1 Document date: July 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory

More information

ZENworks Mobile Workspace Configuration Server. September 2017

ZENworks Mobile Workspace Configuration Server. September 2017 ZENworks Mobile Workspace Configuration Server September 2017 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights,

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Sena Device Server and Serial/IP Application Guide Version 1.0.0

Sena Device Server and Serial/IP Application Guide Version 1.0.0 Sena Device Server and Serial/IP Application Guide Version 1.0.0 2005. 3. 7. Revision History Revision Date Name Description V1.0.0 2005-04-21 Kumar Serial/IP 4.3.2 Guide Technical Support Sena Technologies,

More information

Workspace ONE UEM Certificate Authority Integration with JCCH. VMware Workspace ONE UEM 1810

Workspace ONE UEM Certificate Authority Integration with JCCH. VMware Workspace ONE UEM 1810 Workspace ONE UEM Certificate Authority Integration with JCCH VMware Workspace ONE UEM 1810 Workspace ONE UEM Certificate Authority Integration with JCCH You can find the most up-to-date technical documentation

More information

Setting up Microsoft Exchange Server 2016 with Avi

Setting up Microsoft Exchange Server 2016 with Avi Page 1 of 14 Setting up Microsoft Exchange Server 2016 with Avi Networks view online What is Exchange Server 2016 Microsoft Exchange Server 2016 is an e-mail server solution, with calendar and contact

More information

Comodo Offline Updater Utility Software Version

Comodo Offline Updater Utility Software Version Comodo Offline Updater Utility Software Version 1.2.30701.2 i User Guide Guide Version 1.2.011811 Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Introduction to

More information

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Access Policy Manager v with Oracle Access Manager

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Access Policy Manager v with Oracle Access Manager DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Access Policy Manager v10.2.1 with Oracle Access Manager Table of Contents Table of Contents Configuring the BIG-IP APM for WebGate Reverse Proxy and Oracle

More information

Android Mobile Single Sign-On to VMware Workspace ONE. SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.

Android Mobile Single Sign-On to VMware Workspace ONE. SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3. Android Mobile Single Sign-On to VMware Workspace ONE SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on the VMware

More information

Sophos Mobile Control Installation guide

Sophos Mobile Control Installation guide Sophos Mobile Control Installation guide Product version: 1.0 Document date: May 2011 Contents 1 Introduction... 3 2 The Sophos Mobile Control server... 4 3 Set up Sophos Mobile Control... 13 4 Apple Push

More information

Checklist. Version 2.0 October 2015

Checklist. Version 2.0 October 2015 Version 2.0 October 2015 Checklist Table of Contents Setup Issues 3 Virtual Services Platform 3 Device LinkUp 5 Desktop LP 6 VPN LP 6 Usage 7 Virtual Services Platform 7 VPN LP 7 Migration 8 AppDirect

More information

Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. VMware AirWatch Email Notification Service Installation Guide Providing real-time email notifications to ios devices with AirWatch Inbox and VMware Boxer Workspace ONE UEM v9.7 Have documentation feedback?

More information

BIG-IP Access Policy Manager : Portal Access. Version 12.1

BIG-IP Access Policy Manager : Portal Access. Version 12.1 BIG-IP Access Policy Manager : Portal Access Version 12.1 Table of Contents Table of Contents Overview of Portal Access...7 Overview: What is portal access?...7 About portal access configuration elements...7

More information

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0 BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web

More information

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Access Policy Manager with Oracle Access Manager

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Access Policy Manager with Oracle Access Manager DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Access Policy Manager with Oracle Access Manager Table of Contents Table of Contents Configuring the BIG-IP APM for WebGate Reverse Proxy and Oracle Access

More information

IceWarp to IceWarp Migration Guide

IceWarp to IceWarp Migration Guide IceWarp Unified Communications IceWarp to IceWarp Migration Guide Version 12.0 IceWarp to IceWarp Migration Guide 2 Contents IceWarp to IceWarp Migration Guide... 4 Used Terminology... 4 Brief Introduction...

More information

Google Sync Integration Guide. VMware Workspace ONE UEM 1902

Google Sync Integration Guide. VMware Workspace ONE UEM 1902 Google Sync Integration Guide VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810 Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

BIG-IP Access Policy Manager : Implementations. Version 12.1

BIG-IP Access Policy Manager : Implementations. Version 12.1 BIG-IP Access Policy Manager : Implementations Version 12.1 Table of Contents Table of Contents Web Access Management...11 Overview: Configuring APM for web access management...11 About ways to time out

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

Using vrealize Operations Tenant App as a Service Provider

Using vrealize Operations Tenant App as a Service Provider Using vrealize Operations Tenant App as a Service Provider Using vrealize Operations Tenant App as a Service Provider You can find the most up-to-date technical documentation on the VMware Web site at:

More information

Object Storage Operation Manual

Object Storage Operation Manual NTT Communications Cloudⁿ Object Storage Operation Manual Ver.. Do not redistribute (distribute, reproduce or provide) the content listed in this document. Versio n Edited date Ver..0 February 0, 03 Ver..

More information

Sophos Mobile. startup guide. Product Version: 8.1

Sophos Mobile. startup guide. Product Version: 8.1 Sophos Mobile startup guide Product Version: 8.1 Contents About this guide... 1 Sophos Mobile licenses... 2 Trial licenses...2 Upgrade trial licenses to full licenses... 2 Update licenses... 2 What are

More information

CYAN SECURE WEB Installing on Windows

CYAN SECURE WEB Installing on Windows CYAN SECURE WEB September 2009 Applies to: 1.7 and above Table of Contents 1 Introduction... 2 2 Preparation... 2 3 Network Integration... 3 3.1 Out-of-line Deployment... 3 3.2 DMZ Deployment... 3 4 Proxy

More information

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP Access Policy Manager with IBM, Oracle, and Microsoft

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP Access Policy Manager with IBM, Oracle, and Microsoft DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP Access Policy Manager with IBM, Oracle, and Microsoft Table of Contents Table of Contents Introducing the BIG-IP APM deployment guide Revision history...1-1

More information

Manual Owa Exchange 2010 Url Redirect To

Manual Owa Exchange 2010 Url Redirect To Manual Owa Exchange 2010 Url Redirect To Internal Description of the OWA client connectivity flow in an Exchange 2013/2010 coexistence environment. Optional scenario for internal and external OWA clients.

More information

Symptom Condition / Workaround Issue No validation is provided for name and IP address fields when creating bookmarks.

Symptom Condition / Workaround Issue No validation is provided for name and IP address fields when creating bookmarks. Secure Remote Access Contents Platform Compatibility...1 Known Issues...1 Resolved Issues...2 Upgrading SonicOS SSL VPN Firmware Procedures...3 Related Technical Documentation...5 Platform Compatibility

More information

Please select your version. Installation Instructions for BIG-IP F5 version 9.x and 10.x. Installation Instructions for F5 BIG-IP version 11

Please select your version. Installation Instructions for BIG-IP F5 version 9.x and 10.x. Installation Instructions for F5 BIG-IP version 11 Installation Guide Please select your version Installation Instructions for BIG-IP F5 version 9.x and 10.x Installation Instructions for F5 BIG-IP version 11 Installation Instructions for BIG-IP F5 version

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

Ipad Setup Problem Connection To Server Failed Exchange Activesync

Ipad Setup Problem Connection To Server Failed Exchange Activesync Ipad Setup Problem Connection To Server Failed Exchange Activesync Discusses current issues that involve Microsoft Exchange ActiveSync and The connection to the server failed. Use the Microsoft Outlook

More information

How to configure Sophos for all other clients

How to configure Sophos  for all other clients How to configure Sophos Email for all other clients 1. Add Your Domain & Verify Ownership 2. Add Mailboxes to Sophos Email 3. Restrict Delivery to Sophos IP Addresses 4. Modify MX records to point to Sophos

More information

Juniper SA 8.x Integration

Juniper SA 8.x Integration Juniper SA 8.x Integration Contents 1 Overview 2 Prerequisites 3 File Downloads 4 Baseline 5 Architecture 6 Installation 6.1 Swivel Configuration 6.1.1 Configuring the RADIUS server 6.1.2 Enabling Session

More information

Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. VMware AirWatch Email Notification Service Installation Guide Providing real-time email notifications to ios devices with AirWatch Inbox and VMware Boxer AirWatch v9.1 Have documentation feedback? Submit

More information

Content and Purpose of This Guide... 1 User Management... 2

Content and Purpose of This Guide... 1 User Management... 2 Contents Introduction--1 Content and Purpose of This Guide........................... 1 User Management........................................ 2 Security--3 Security Features.........................................

More information

Sophos Enterprise Console advanced startup guide

Sophos Enterprise Console advanced startup guide Sophos Enterprise Console advanced startup guide For distributed installations Product version: 5.3 Document date: April 2015 Contents 1 About this guide...4 2 Planning installation...5 2.1 Planning the

More information

Using AD360 as a reverse proxy server

Using AD360 as a reverse proxy server Using AD360 as a reverse proxy server www.manageengine.com/active-directory-360/ Table of Contents Document summary 1 What is a reverse proxy? 1 Configuring AD360 as a reverse proxy 2 Enabling a context-based

More information

This document describes the configuration of Secure Sockets Layer (SSL) decryption on the FirePOWER Module using ASDM (On-Box Management).

This document describes the configuration of Secure Sockets Layer (SSL) decryption on the FirePOWER Module using ASDM (On-Box Management). Contents Introduction Prerequisites Requirements Components Used Background Information Outbound SSL Decryption Inbound SSL Decryption Configuration for SSL Decryption Outbound SSL decryption (Decrypt

More information

VMware AirWatch Google Sync Integration Guide Securing Your Infrastructure

VMware AirWatch Google Sync Integration Guide Securing Your  Infrastructure VMware AirWatch Google Sync Integration Guide Securing Your Email Infrastructure Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard

More information

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information

Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7

Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the

More information