MOBILE SUPERVISOR. Revision Date: v.4.0.1

Size: px
Start display at page:

Download "MOBILE SUPERVISOR. Revision Date: v.4.0.1"

Transcription

1 MOBILE SUPERVISOR Revision Date: v

2 CHAPTER 1: GENERAL INFORMATION ABOUT MOBIVISOR BASIC MANAGEMENT STEPS In this chapter, the following issues are analysed; Described Subjects About This Chapter in this Document Meeting with the IOTIQ Mobile Device Management System and Adaptation Organisation System of the Mobile Device Management System Screens Screens and Modüles of the IOTIQ Mobile Device Management System In this chapter, information about the general structure and the usage of the system is given. As part of elucidating of this chapter, signing in to application, software properties, information about the screens and usage of the pages will be declared Explained Subjects About Chapter in This Document Information about the access, usage and user experience of the Mobile Device System will be given in this section of the document. 1. Meeting with the IOTIQ Mobile Device Management System and Adaptation. Information about the accessing the application, understanding of the system, logging into system and usage of the system after installing the application will be given in this section. 2. Organisation System of the Mobile Device Management System Screens. In order to use the MDM fastly and actively application menu and screen organization system should be known. In this context, systematic of management screens created for this application and general structure of the system will be explained in this section. 3. Screens and Modüles of the IOTIQ Mobile Device Management System. In this section, all screens of the system one by one will be detailed and which page is used for what kind of operations will be explained. While created screens is explaning, which points is important for engaging the system will be explained. You will understand which operations are realized by using which pages of MDM software, after the explanation mentioned in this chapter. Therefore, it is required that you pay attention to the naming that refers to in this chapter in order to fully understand subjects given and explained in detail in other chapters. 2

3 Meeting with the IOTIQ Mobile Device Management System and Adaptation Information about the accessing the application, understanding of the system, logging into system and usage of the system after installing the application will be given in this section. Firstly, how the user will login into the installed Mobile Device Management System will be described. Mobile Device Management System is a web based application and it can be used just by using whichever web browser. Organisation System of the Mobile Device Management System Screens In order to use the MDM fastly and actively application menu and screen organization system should be known. In this context, systematic of management screens created for this application and general structure of the system will be explained in this section. MDM System consists of main modules and forms belonging to these modules, projection screens. These parts can be reachable through MDM system. Screens and Modules of the IOTIQ Mobile Device Management System In the last section of this chapter, all screens of the system one by one will be detailed and which page is used for what kind of operations will be explained. While created screens is explaning, which points is important for engaging the system will be explained. In the tables below, modules and screens, which create the MDM system, are founded. Operations that are done in that module and pages will be explained shortly in this table. Short descriptions will be explained in detail. 3

4 Detailed Tables of the Screens and Modules of the System: Chapter USER PROFILE SETTING (Chapter 2) Edit Profile Change Password Themes USERS (Chapter 3) Add User Adding Internally Ldap Adding CSV Adding User List Edit User Web Action Logs ROLES (Chapter 4) Add Role Role List Edit Roles POLICIES (Chapter 5) My Locations New Show on Map Edit Criteria New Policies New Assign Policies to Users Assign Policies to Devices Firewall Violations Apns Call Blacklists Exchange Configs IOS Lost Messages Kiosk Modes Passcode Policies SharedDeviceConfigurations Simcard Numbers Single App Modes Wallpapers Brief information about the screen Edit his/her own profile Change his/her own password Change application theme Added a user manually Add an LDAP User Add users via CSV upload List and delete users Details of a users Web user action logs Adding a new role List and delete roles Role details and assigning List, add/edit and delete locations Adding a new location Showing location on map Editing location List, add/edit and delete criteria Adding a new criteria List, add/edit and delete policies Adding a new policy 4

5 Chapter Web Content Filters Wifi Configs Permission Grant States APPLICATIONS (Chapter 6) Add Edit Details Android IOS Lists Installations Blacklists / Whitelists Application Backups MESSAGING (Chapter 7) Broadcasting Messaging CONFIGURATIONS (Chapter 8) General Device Configuration Default VPN Connection Connections Device-Specific VPN Create a New VPN Select Devices for a VPN DEVICES (Chapter 9) Enrolled Devices Main Page Enrolled Devices Manage Actions Statistics Location Requests Installed Apps Policies COMMANDS (Chapter 10) Commands Brief information about the screen Adding a new application Editing an application Details of an application Adding Android applications Adding IOS applications List, add/edit and delete applications Installed and sent applications Application blacklist and whitelist Mobile app backups and restoring Sending bulk messages Sending/receiving messages The default device configs Device-specific VPN Adding a new VPN The enrolled device statistics Listing enrolled devices Managing an enrolled device Device command actions Device statistics Managing single device policies Device commands and their statuses GROUPS (Chapter 11) Groups New Group Group Details 5

6 Chapter Brief information about the screen 6

7 CHAPTER 2: USER PROFILE SETTINGS Edit Profile Edit Profile page is used in order to change profile information. User Profile Settings >> Edit Profile opens the interface which supports user to change his information He enters data into related part such as first name, last name, and user name which information he wants to change Finally, he should save the changes by clicking Save button 7

8 Change Password Changing Password page is used to change user logging password. User Profile Settings >> Change Password opens the interface which supports user to change his password He enters data into the current password, new password and verify password fields. Finally, he should save the changes by clicking Save button 8

9 LDAP Settings Config >> Ldap Settings, opens the interface which supports the logged in user to set ldap settings LDAP settings are configured in this page. LDAP settings are managed in different sections. These sections are, Connection Settings, Search Settings, Authentication Settings, Field Mappings. You can navigate between these tabs by either clicking related tab or clicking continue button right of the bottom of the form Connection Settings: To perform any operation in ldap directory, firstly you should bind with correct url,admin name and admin password. LDAP Url, Admin Domain Name and Admin Password is entered into related fields. Search Settings: These settings are used to search a user. In detail : Search Base determines from where to begin to search item in directory hierarchy. Search Filter as understood from its name, is used for filtering searches. Search Scope decides search behaviour. base - For searching only the base entry. one - For searching only the children of the base entry. sub - For searching the base entry and all its descendants. You can choose attributes you want to return from search operation by writing names of them to Attributes to return field separating with comma. Do not put space anywhere 9

10 Authentication Settings: This section is related to authentication of the ldap user. CN (Common Name) or DN (Domain Name) is selected from list according to the type of the active directory. For example, while a user is authenticated by dn in OpenLDAP, cn is used for authentication in Microsoft Active Directory. If your ldap directory type is OpenLdap,select DN then a new field Search Filter will be visible.since you will send only username and password information, dn should be found to authenticate especially when enrolling device to the your system.this is why you should set the search filter.in case of Microsoft Active Directory, there is no need for search filter because it authenticates by cn directly. If the usernames in your system and cns in ldap directory are different but related in some patterns, you can supply the parts for replacement. It can be, for example, the user names are like addresses however CNs are simply in your ldap directory Then, you can set replace field and with field as. 10

11 Field Mappings: You can add ldap users to your system from ldap tab of the add user page by searching ldap user and simply click save button.which fields in ldap correspond to which fields in your system is determined in Field Mappings tab. To illustrate, if you choose mail for UserName Fields, you should sign in with ldap mail in your system because your username field matches with mail of the ldap directory item.similarly, you can set fields (putting commas between them) to construct display name. From any tab you can save whole settings by clicking save button, and also you can test your settings for each tab. 11

12 Setting Theme Themes page is used to change theme of the system. User Profile Settings >> Themes opens the interface which supports user to change theme Themes that can be used are listed automatically Buttons over the themes are clicked to determine menu location If the Topbar Menu is clicked, menu is displayed at the top of the page and operations are realized by selecting menus and submenus from the top of the page If the Sidebar Menu is clicked, menu is displayed at the side part of the page and operations are realized by selecting menus and submenus from the side of the page User clicks on the theme that he want to use, then the theme of the system changes Theme of MDM system changes simultaneously If he wants to use default theme, user should click on the Use The Custom Theme button 12

13 CHAPTER 3: USERS Add Users Add User page is used in order to add new users. New user can be added in two different way. One of these is adding internally which supports user to add user information manually, the other one is LDAP (Lightweight Directory Access Protocol) which supports user to add user LDAP users by searching easily. Internal Adding Users >> Add, opens the interface which supports the logged in user to add new user User should chose adding option, as Internal Internal adding page is opened, he enters data first name, last name, and password information into related fields Finally, he should save the user s information by clicking Add button After the adding operation completed, success message is alerted 13

14 LDAP Adding Users >> Add, opens the interface which supports the logged in user to add new user User should chose adding option, as LDAP (Lightweight Directory Access Protocol) To add a user via LDAP, firstly system configurations should be done in System Settings page. If the configurations is not been done then an error exist while adding user via LDAP. LDAP adding page is opened, he enters data into Search LDAP User area in order to search the Ldap user, the user information is filtered and he choose which he wants DN (Distinguish Name) is filled automatically after he selected user Mail is filled automatically after he selected user CN (Common Name) is filled automatically after he selected the user. He enters data first name, last name information into related fields Finally, he should save the user s information by clicking Add button After the adding operation completed, success message is alerted 14

15 CSV Adding Users >> Add, opens the interface which supports the logged in user to add new user User should chose adding option, as CSV Import To download the sample CSV file, click on the Download Sample Csv File button. Click on the Browse button and select a CSV file in the appropriate format from the computer files. After the file is selected, the selected file name appears next to the Browse button. The Import button is clicked, the users are saved and the operation successful message is displayed. The CSV file s format should look like this: , User Name, Display Name, Password, Group, Is Administrator (optional) For example; sample@mobivisor.com,sampleuser,mobivisor,group,1 (group admin) sample@mobivisor.com,sampleuser,mobivisor,group (not group admin) 15

16 Possible error message reasons: A user with the same username may already exist. The CSV file format may be entered incorrectly. 16

17 Users List Users List page is used in order to list the added users. In this page user information can be edited, deleted and role can be added to selected user. Users >> List, opens the interface which supports the logged in user to view and transact some operations about users Users List >> Edit, if the Edit button is clicked then user information edit page is opened, operations done in this pages is explained detailed in Edit User part Users List >> Delete User, if the Delete User button is clicked then user is deleted Users List >> Add Role, if the Add Role button is clicked then adding role page is opened Delete User Users >> List, the user list page is opened Users added to the system is listed The user who will be deleted is searched or filtered from the list Then Delete User button is clicked and user is deleted 17

18 Edit User Users >> List, opens the interface which supports the logged in user to view and transact some operations about users Firstly, Users List page is opened and Edit button is clicked Edit User page is opened, user information is viewed automatically He enters data into the related first name, last name and fields which he wants to change Changed user information is saved by clicking Save button 18

19 WEB ACTIONS Web Actions screen is opened by following the Users -> Actions steps from menu.. IP, User Name, URL, Action, Date, Data log information belonging to the registered users are listed in the opened screen. Filtering operation for any user and any action can be realized by entering data into the User, Action, URL and IP fields located on the table. 19

20 CHAPTER 4: ROLES Add New Role Users >> Add, opens the interface which supports the logged in user to add new roles Authorities are listed in this page Enters the Role Name into the related field Then, the authorities which will be given to this role are chosen Finally, the role and role s authorities are saved by clicking the Submit button 20

21 21

22 Roles Users >> List, opens the interface which supports the logged in user to view, to update and to delete the recorded roles Roles and authorities are listed in this page Wanted role is found by filtering according to the role name If the user wants to update the role, clicks Edit Role button and Edit Role page is opened, operations done in this pages is explained detailed in Edit Role part If the user wants to delete the role, clicks Delete Role button and deletes role Edit Role Role which will be updated is filtered and then Edit Role button is clicked It is explained in more detail in Edit Role section 22

23 Delete Role Roles added to the system is listed The role which will be deleted is searched or filtered from the list Then Delete Role, button is clicked and role is deleted Set Role Roles added to the system is listed The role which will be deleted is searched or filtered from the list Role is selected by clicking the check box next to selected role After role is selected, users are listed below Users are selected who the role will be applied is selected from the list by marking checkbox next to users Finally SET ROLES button that is under users list is clicked to set selected roles to selected users 23

24 Edit Role Users >> List, opens the interface which supports the logged in user to view, to update and to delete the recorded roles Roles and authorities are listed in this page Wanted role is found by filtering according to the role name If the user wants to update the role, clicks Edit Role button and Edit Role page is opened To change the role name edit it, however if the authorities will be changed then the authorities are marked or unmarked 24

25 Finally, these changes are saved by clicking the Submit button 25

26 CHAPTER 5: POLICIES My Locations Policies >> My Locations, opens the interface which supports the logged in user to add his new locations, and to view, to edit and to delete the added locations If any location has been added, it will be listed. If + New button is clicked then adding location page is opened If Show On Map button is clicked then the location is shown on the map If Edit button is clicked then editing page is opened If Delete button is clicked then the chosen location is deleted Add New Location Policies >> My Locations step is followed and this page is opened + New button is clicked and location adding page is opened Location can be added in two different ways. First one is by selecting the location from the map, second one is searching location manually In order to add by marking from the map, user should specify that place, after that user should enter data into Maximum distance to the location (m) and Name of the Location fields 26

27 Finally, user should click on the Save button to record the location, or user can click on the Cancel button if user does not want to save In order to add location by searching, user should location information into the Search label, after finding the location user should enter data into Maximum distance to the location (m) and Name of the Location fields Finally, user should click on the Save button to record the location, or user can click on the Cancel button if user does not want to save The recorded location is listed in the bellowing location list Show On Map Recorded locations are listed automatically Location which will be viewed is chosen and the button next to the locations that is named as Show on Map is clicked Location and its geofence is showed on the map, in addition to this, maximum distance to the location and name of the location information are written in the related fields Edit Recorded locations are listed automatically Location which will be edited is chosen and the button next to the locations that is named as Edit is clicked The location can be readjusted by zooming in or zooming out on the map or searching again. Also, the maximum distance to the location(m) and location name information can be changed. After finishing to change location information, Update button is clicked to save changes. If the user does not want to change location then user should click on the Cancel button 27

28 Delete Recorded locations are listed automatically Location which will be deleted is chosen and the button next to the locations that is named as Delete is clicked and the location is deleted 28

29 Criteria Policies >> Criteria, opens the interface which supports the logged in user to add new criteria, and to view and to delete the added criteria Criteria are categorized in three groups, these are Date/Time, Location, SSID The recorded criteria which are added by the system users are listed in this page If +New button is clicked then adding criteria page is opened If Delete button is clicked then the chosen criteria is deleted Add Criteria + New button is clicked and criteria adding page is opened Criteria is categorized in three different conditions, these are Date/Time, Location and SSID User chooses the option that he wants to add criteria For exapmle, user select the SSID option and records SSID Page where the Wireless network information will be entered to apply this criteria is opened by selecting SSID (Service Set Identifier) option. In this screen user determines SSID that this criteria will be available in which network SSID field will be available in this screen A SSID information is entered into this field, for example TTNET_AIRTIES_0001 After completing the data entering operation, if user wants to add a different condition as like Date/Time or Location he should select that conditions and continue to add more conditions. However if he 29

30 does not want to add any other condition, Save button is clicked to save SSID criteria If user selects Location condition, in this screen user determines where the criteria will be valid For an example, selecting Location option; Locations recorded to system are listed in this screen One location is selected from the list by marking the check boxes After completing the location selection, if user wants to add a different condition as like Date/Time or SSID he should select that conditions and continue to add more conditions. However if he does not want to add any other condition, Save button is clicked to save location criteria If user selects Date/Time condition, in this screen user determines days and periods in order to add criteria User can set a time slot by selecting the start time and end time or if the All Day option is marked then the slot is set as all day and Start time and end time fields are hidden Repeat period is selected from the combo box If Every Day is selected then the criteria will be valid every day If Every Week is selected, then days of the week will be listed and markable If Every Month is selected, then Repeat This On Following Days Of Every Month field will be visible, day which the user want will be selected If Every Year is selected, then Repeat This On Following Days Of Every Month field will be visible, days of all months will be listed and user will select the month and day If No Repeat (Date Interval) is selected, then time slots will be visible. User will determine the start date and end date by selecting 30

31 from calendar. After completing the date arrangement, if user wants to add a different condition as like Location or SSID he should select that conditions and continue to add conditions. However if he does not want to add a different condition, Save button is clicked to save date/time criteria After data entry for these conditions is completed, Save button is clicked to save these criteria When saving process is completed the added criteria is listed in the bellowing list Delete Recorded criteria is listed automatically Delete button next to the criteria which is wanted to be deleted is clicked Deleting process is realized 31

32 Policies Policies >> Policies, opens the interface which supports the logged in user to add new policies, and to view and to delete the added policies The recorded policies that are added by the system user are listed in this page If +New button is clicked then adding policy page is opened If Delete button is clicked then the selected policy is deleted Add New Policy Policies >> Policies, step is followed and Manage Policies page is opened + New button is clicked and policy adding page is opened Features belonging to policies are listed in this page Criteria has been added previously is listed in this page Firstly, policy name is entered in the Policy Name field Features and options belonging to these features, eg. Accessible, Denied, Permitted, Disabled, Editable, Uneditable, Enabled, Forced, Unspecified, etc are selected from the list Criterion is selected from the criteria list After the selecting processes is completed, +Add button is clicked to save the policy. However, If the Cancel button is clicked the adding operation is finished After saving operation is completed the policy is added to the policies list 32

33 Delete Policy Policies >> Policies, step is followed and Manage Policies page is opened - Recorded policies are listed automatically Delete button next to the policy which is wanted to be deleted is clicked Deleting process is realized 33

34 Assign Policies to Users Policies >> Assign Policies, opens the interface which supports the logged in user to assign policies to users, and to view and to delete the added policies Users and their user information are listed in this page In order to assign policies to users, bellowing steps should be followed User is filtered according to user name or role If data is entered into the Username field, user is filtered according to the entered user name If data is entered into the Role field, user is filtered according to the entered role After completing to filter the user, the check box next to the user is selected After selecting the check box, policies and features of the policies are listed below When +Add buttons next to the policies are clicked, policy is assigned to the user. More then one policies can be added to same user in this way In order to delete assigned policies, bellowing steps should be followed User is filtered according to user name or role 34

35 If data is entered into the Username field, user is filtered according to the entered user name If data is entered into the Role field, user is filtered according to the entered role After completing to filter, user information and policies assigned to this user is listed X symbol, located next to the assigned policy, is clicked to unassigned the policies 35

36 Firewall Rules Policies >> Firewall Rules steps must be taken, using these steps, user can list or update the firewall rules for allowing or denying packages by policies or profiles. Listing Firewall Rules Allowing Rules and Denying Rules of firewalls are listed in different tabs. Firewall rules are listed with their host, port, network interface, port location, creation date properties and another field for actions that can be performed upon those firewall rules. Deleting a Firewall Hitting Delete key is enough for deleting a firewall, only if the firewall rule is not used in policies or profiles Deletion would result in an error if the firewall to be deleted is used in a policy or profile If the deletion is successful, deleted rule will instantly be removed from the list and user will be notified of the success status. Adding a Firewall When firewall rules are being listed as in the initial state of the page, hit Add button If the rule to be added is not a denying rule, package name option would not be visible. Other fields (Host Name, Port Location, Network Interface, etc.) are usable. Enter Host, Host Name, Port, Port Number, Network, Network Interface and Package Name, and then hit Save The rule will be saved unless it is already added. 36

37 37

38 Violations Policies >> Violations, opens the interface which supports the logged in user to view violations. All violations are listed. If the user wants to add new violations, clicks the Add button and give the name of the violations. User select the Causes Type. User select the Actions Type. If the user wants to save new violations, clicks Save button and the new violations was added. If the user wants to update the violations, clicks Edit button. If the user wants to delete the violations, clicks Remove button and delete the violations. 38

39 39

40 Access Point Names Policies >> Access Point Names opens the interface which supports the logged in user to view access point names list. The users fill in the empty fields on the APN page. Named and APN parts are required. User enter these part Name, APN, User Name, Password..etc. User choose the Environment part which is located in middle on the page. If the user filled all fields, click on Add button. Then, new access point names are saved. If the user want to edit their apn, click the Edit button. If the user want to delete their apn, click the Delete button. 40

41 Call Blacklists Policies >> Call Blacklists opens the interface which supports the logged in user to view call blacklists list. Users view list of the call blacklists. If user want to ban calling some numbers, users follow this steps, If the user has been banned previously, these numbers are listed on the screen. If the user cannot enter any call blacklists, s/he add new call blacklist on the Enter A Regular Expression part. If the user want to delete call blacklist, click the checkbox and click Delete button. If the user click the Delete button, call blacklist is deleted. 41

42 Exchange Configurations Policies >> Exchange Configurations, opens the interface which supports the logged in user to view exchange configurations. All Exchange Configurations are listed. If you want to add new Exchange configuration, click the Add button. Fill in desired fields. If you want to save new Exchange configuration, click Save button and the new Exchange configuration is added. 42

43 If you want to add an Exchange configuration which is similar to an existing config, click Copy button to create a template settings from existing config. If you want to delete the Exchange configuration, click Delete button and confirm the dialog to delete the Exchange configuration. 43

44 IOS App Notification Settings Policies >> IOS App Notification Settings opens the interface which supports the logged in user to view, list the IOS notifications. All IOS App Notification listed. If the user wants to add a new notifications, clicks Add button. User must write these parts : Name, Bundle Identifier, Notifications Enabled etc. If the user wants to save the new notification, clicks Add button and save the notification. If the user wants to delete the notification, clicks Delete button and delete the notification. 44

45 Kiosk Modes Policies >> Kiosk Modes, opens the interface which supports the logged in user to view Kiosk Modes. All Kiosk Modes listed. If the user wants to add new single app modes, clicks the Add button and enter the Kiosk Mode name. User enter the package name. User continue write the other parts of kiosk mode page. Then, User click the Add button for save their mode. If the user wants to edit new kiosk mode, clicks Edit button. 45

46 If the user wants to delete the kiosk mode, clicks Delete button. 46

47 Passcode Policies Policies >> Passcode Policies, opens the interface which supports the logged in user view the passcode policies. If the user add new passcode policies, click the Add button. User enter some feature of pascode policies like Name, Min. Passcode Length, Max Passcode Age... etc. If the user save passcode policies, click Save button and save the new passcode policies. If the user delete passcode policies, click the Remove link and delete the passcode policies. 47

48 Shared Device Configurations Policies >> Shared Device Configurations, opens the interface which supports the logged in user to view shared device configurations. All shared devices listed. If the user wants add new device, clicks the Add button. Then, user wants to add new device, enter the Name, If Lost Return To Message and Asset Tag Information part. If the user wants to save the new device, clicks Add button and the device added. If the user wants to delete the device, clicks Delete button and delete the device. 48

49 Simcard Numbers Policies >> Sim Card Numbers, opens the interface which supports the logged in user to view, list the system card numbers All sim card numbers listed. If the user wants to add new sim card numbers, clicks Add button and the sim card numbers added. If the user wants to save the new sim card numbers, clicks Save button and saves sim cards numbers. If the user wants to update the sim card number, clicks Edit button and update the sim card number. If the user wants to delete the sim card number, clicks Delete button and delete the sim card number. 49

50 Single App Modes Policies >> Single App Modes, opens the interface which supports the logged in user to view Single App Modes. All Single App Modes listed. If the user wants to add new single app modes, clicks the Add button and enter the single app mode name. User enter the package name. User select the value in Environment part. If the user wants to save new single app modes, clicks Add button and the new app modes was added. If the user wants to delete the single app modes, clicks Delete button. 50

51 Wallpapers Policies >> Wallpapers, opens the interface which supports the logged in user to view wallpapers. If the user wants to add new wallpapers, click the Add button. User enter the Name wallpapers and enter the Where part. If the user wants to choose the new wallpapers, clicks Choose File button and the wallpapers added or user can drop the file on the screen. If the user wants to temporary Image to modify, clicks Choose File button and the wallpapers added or user can drop the file on the screen. If the user wants to save new wallpaper, clicks Save button and save the new wallpapers. If the user wants to delete the wallpapers, clicks Delete button and delete the wallpapers. 51

52 Web Content Filters Policies >> Web Content Filters, opens the interface which supports the logged in user to view web content filters. All web content filters listed. If the user wants to add new filters, clicks the Add button and give the name of the filter. User select type of the filters. If the user select Built in, select the value type on Auto Filter Enabled User clicks the Save button. Then, save the new web content filters. If the user select Plugin, enter some values on the Plug in Features part. User select a value Filters Browsers and Filter Sockets part. 52

53 If the user wants to save new filters, clicks Save button and the new filter was added. If the user wants to delete the filter, clicks Delete button and delete the filter. 53

54 Wifi Configurations Policies >> Wifi Configurations, opens the interface which supports the logged in user to view wifi. All wifi Configurations listed. If the user wants to add new wifi, clicks the Add button and give the name of the wifi. User write the Service Set Identifier part. User select the Security Type and enter the password. In IOS Specific Settings, user select the checkboxs. If the user wants to save new wifi, clicks Save button and the new wifi was added. If the user wants to update the wifi, clicks Edit button. 54

55 If the user wants to delete the wifi, clicks Delete button and delete the wifi. 55

56 Wifi Configurations Policies >> Wifi Configurations, opens the interface which supports the logged in user to view wifi. All wifi Configurations listed. If the user wants to add new wifi, clicks the Add button and give the name of the wifi. User write the Service Set Identifier part. User select the Security Type and enter the password. In IOS Specific Settings, user select the checkboxs. If the user wants to save new wifi, clicks Save button and the new wifi was added. If the user wants to update the wifi, clicks Edit button. 56

57 If the user wants to delete the wifi, clicks Delete button and delete the wifi. 57

58 Permission Grant States Policies >> Permission Grant States, opens the interface which supports the logged in user to view permission grant states. This feature is ony supported on Android devices which are setup as Device Owner profile settings. All Permission Grant States are listed. If you want to add new Permission Grant State, click the Add button. Fill in desired fields. If you want to save new Permission Grant States, click Save button and the new Permission Grant States is added. If you want to add an Permission Grant States which is similar to an existing config, click Copy button to create a template settings from existing settings. If you want to delete the Permission Grant State, click Delete button and confirm the dialog to delete the Permission Grant States. 58

59 CHAPTER 6: APPLICATIONS Add New App Applications >> Add, opens the interface which supports the logged in user to add new application for Android and IOS Devices If Android menu selected then Android Device application adding page is opened If IOS menu is selected then IOS Device application adding page is opened Add New Application In this page, adding application for Android and IOS devices differs. Therefore, firstly user should choose to add application for what kind of operating system Android Applications Android menu is selected and Android Device application adding page is opened Android applications can be added in two different ways, first one is adding From Google Play Store, second one is From File 59

60 Fields in the page differs according to selection: If From Google Play Store is selected, then Application link, Application name, Image URL information should be entered. If user wants to add application manually Application link, application name and image URL information is entered into the related fields Submit button is clicked to add this application After adding completed, application is listed in application list If user wants to add application by searching, application is searched from Google Play Store for Android devices 60

61 He should enter the key words into the Application Name field located at the bottom of the page Should click Search button to find that application Found applications are listed below When mouse cursor overs the application images, information about that application is viewed When + symbol on application is clicked, application link, application name and Image URL information is written into related fields automatically Submit button is clicked to add this application After adding completed, application is listed in application list 61

62 If From File is selected, then Application Package, Application name, Image URL information should be entered and file should be appended If user wants to add application manually Application package, application name, image URL information is entered into the related fields Upload File button is clicked to select application file from computer Submit button is clicked to add this application After adding completed, application is listed in application list ios Applications IOS menu is selected and IOS Device application adding page is opened IOS applications can be added in two different ways, first one is adding itunesstoreapp, second one is Enterprise App 62

63 Fields in the page differs according to selection: If itunesstoreapp is selected, then itunes Store ID, Application Name, Image URL information should be entered. If user wants to add application manually itunes Store ID, Application Name, Image URL information is entered into the related fields Submit button is clicked to add this application After adding completed, application is listed in application list If user wants to add application by searching, application is searched from itunes Application Store for ios devices He should enter the key words into the Application Name field located at the bottom of the page If user wants, he can determine market that he wants to add application from the market list. If any market is selected, default market will be US Should click Search button to find that application Found applications in that market are listed below When mouse cursor overs the application images, information about that application is viewed 63

64 When + symbol on application is clicked, itunesstoreid, Application Name and Image URL information is written into related fields automatically Submit button is clicked to add this application After adding completed, application is listed in application list If Enterprise App is selected, then Application Name, Image URL, itunes Image URL, Bundle Identifier, Bundle Version information should be entered. Application Name, Image URL, itunes Image URL, Bundle Identifier, Bundle Version information is entered into the related fields IPA file is loaded in two ways. First one, Upload File is clicked and file is selected from computer, but file extension must be.ipa otherwise it does not work Second one, file is selected from computer and it is dragged into Drag icon image file here field and dropped, file extension must be.ipa otherwise it does not work After uploading process finished, uploaded file is added to IPA File part Submit button is clicked to add this application After adding completed, application is listed in application list 64

65 Application List Applications >> List, opens the interface which supports the logged in user to view and to install the added applications for Android and IOS Devices Applications and their environment information are listed in this page Download buttons next to the application is used to download application or view and check the application. If the application is an Android application and uploaded from play store, when download button is clicked that goes to Google Play Store If the application is an Android application and uploaded from file, when download button is clicked that downloads application file directly If the application is an IOS application and uploaded from itunesstore- App, when download button is clicked that goes to Apple Store If the application is an IOS application and uploaded from file, when download button is clicked that downloads application file directly To install an application to any device or to uninstall an application from any device bellowing steps should be followed; 65

66 Application is filtered according to application name or environment If data is entered into the application name field, application is filtered according to the entered application name If data is entered into the environment field, application is filtered according to the entered environment After completing to filter the application, the check box next to the application is selected After selecting the check box, users and enrolled devices are listed below and devices which of will be installed this application are selected Devices can be filtered by entering data into the fields in the Enrolled Devices table To install applications to devices, Check box next to the listed devices that will install this application are selected Install Apps to Devices button is clicked, in order to install application Selected more than one applications can be sent to more than one selected devices for installing simultaneously 66

67 When operation is completed a notice message is shown. These messages differs according to device status. These are going to be mentioned in Commands page in detail. To uninstall applications from devices, Check box next to the listed devices that will uninstall this application are selected Uninstall Apps from Devices button is clickted, in order to uninstall application Selected more than one applications can be sent to more than one selected devices for uninstalling simultaneously When operation is completed a notice message is shown. These messages differs according to device status. These are going to be mentioned in Commands page in detail. Uninstallation operation for ios devices can be done only for the application which have been installed by MDM system. Also, this process is realized as silent uninstallation, in other words it can be applied directly without users permission Delete Application Application is filtered according to application name or environment If data is entered into the application name field, application is filtered according to the entered application name If data is entered into the environment field, application is filtered according to the entered environment After completing to filter the application, the check box next to the application is selected After selection operation is completed a button named as Delete App is presented at the bottom of the table More than one checkboxes next to these applications can be selected and more than one application can be deleted at same time Delete App button is clicked and the selected application/applications are deleted 67

68 Edit Application Applications >> List, opens the interface which supports the logged in user to list applications for Android and IOS Devices User click the Edit button on the screen. User direct to another page. In this screen user can edit their application and add a new application. If the user edit their application; Select the area of the loading type. Then, user edit these area: App Package, Version Code, App Name, Image URL... etc. When the user save their new edit type, click the Save button. 68

69 69

70 Application Details Applications >> List, opens the interface which supports the logged in user to list applications for Android and IOS Devices. User click the Details button on the screen. User direct another page. In this page, user view to installation version of the application. User view to details of the application. User view the Application Name, Environment, Application Package Name and File or Store type. If application has another version, this name written under the application. Application s other version are listed. User send a request the other application which is use other version into a device. The version does not decrease. 70

71 71

72 Application Installations Applications >> Installations, opens the interface which supports the logged in user to view installed applications and devices information In the applications installations list, user name, application icon, application name, package name, request sent time, request answer time and status information are listed 72

73 Blacklists Policies >> Blacklists, opens the interface which supports the logged in user to create black lists for preventing users to install or to uninstall applications to only SAMSUNG Devices Blacklist applications prevent device users to install any application to Samsung Device Blacklist applications prevent device users to uninstall any application from Samsung Device Created blacklists are used while assigning policies to devices Current blacklists are listed automatically when the page is opened To create an installing blacklist to prevent user to install signified application to his device, the belowing steps should be followed Package name of the application is entered in the field Save button is clicked to add this rule After saving process is completed, saved installation control rule is added to the above list Saved blacklisted application will be valid for Running blacklist, running whitelist, application installation blacklist and appplication installation whitelist Added blacklist is used while assigning policy when the property is 73

74 going to be selected Also added blacklist is used for SAMSUNG device configurations, while managing policies for these kinds of devices 74

75 Apps To Backup Policies >> Apps To Backup steps must be taken, this way applications to be backed up on Samsung devices are listed. Apps To Backup screen starts with a list of package names of applications that can be backed up User adds apps that can be backed up at here, and assigns them to devices using policies or profiles Adding Apps To Backup User hits New at the initial state Package name is entered to the field opening up and Save button is hit. The package name is saved unless already added 75

76 Backup List Applications >> Backup List steps must be taken, this way backups listing page is shown Backup List starts with the list of all the back ups saved before. User can seek for a specific backup and revert to that state of that specific app The list includes information like device details, package name, user name, file size, backup creation date, server received data At the right hand side of the table, when the Download button is clicked, the logged file can be downloaded Again to the right, when Go To Device is clicked, the details of the logged device will be shown. Note: When the device details are shown, the username might not match the username shown on the application backups list. Backups table has the username when the backups are being taken, but the device has its current username. Restore button sends the device a command that will restore that backup of the particular package name Before restoration a warning takes place and asks for an approval for this job 76

77 CHAPTER 7 : MESSAGING Messaging, opens the interface which supports the logged in user to send message to all devices of an user Users and their user information such first name, last name, user name, number of his device, , his role and his profile are listed in this page In order to send message users, bellowing steps should be followed User is filtered according to user name or role If data is entered into the Username field, user is filtered according to the entered username If data is entered into the Role field, user is filtered according to the entered role After completing to filter the user, the check box next to the user is selected After selecting the check box, message text is entered into the message area under the user list When SEND button is clicked, message is sent to the selected users A message can be sent to more than one user in same time If a message is sent to a user whose device was not recorded to system, then user will get this message when his device is recorded 77

78 78

79 Message Create Messaging >> Messaging opens the interface which supports the logged in user to view, list the users. All Groups listed. If the user wants to write a message, select the users. If the user wants to save the new group, clicks Save button and save the group. User write a Send Message part. Click the Send button and message send. 79

80 CHAPTER 8: CONFIG General Device Configuration Config >> General Device Configuration, opens the interface which supports the logged in user to configure devices Configuration is managed in three sections, these are General Device Configuration, Default VPN Conncetion and Connections These settings will be valid for a device when device is recorded into MDM system after the setting is saved Last saved configuration will be valid General Device Configuration This page is opened by selecting General Device Configuration from tab menu in the configuration page In this page, general configuration is done for devices. Max screen lock timeout period in second is entered 80

81 Password policy is determined by selecting from list If require storage encryption is selected than device is forced to storage encryption Default GPS period in minute is entered Log rotate size in kilobyte is entered Log rotate count is entered Log check period in minutes is entered Log send check period in minutes is entered For Samsung devices, selections in the Samsung specific features is selected SAVE button is clicked to save configuration Default VPN Connection Configuration This page is opened by selecting Default VPN Connection Configuration from tab menu in the configuration page In this page, default VPN Connection configuration is done for devices. Data is entered into profile name, server name and pre-shared key, user name and user password fields 81

82 If LDAP Integrated check box is selected than user information is get from LDAP automatically, so there exist no need to enter user name and user password SAVE button is clicked to save connection settings Connection Configuration This page is opened by selecting Connection Configuration from tab menu in the configuration page Data is entered into incoming server name, incoming server port, outgoing server name, incoming protocol, outgoing protocol, outgoing server port fields SAVE button is clicked to save connection settings 82

83 83

84 Updating MDM Agents Config >> Update MDM Agents, opens the interface which sends devices with low MDM Agent Versions a new devicecommand which will remind them to update their MDM Agents. Configuration is managed in two sections, Android and IOS These settings will be independent from each other, so user can save either Android or IOS or both. When saved, all the devices that have their Android/IOS MDM Agents versions lower than given input will receive a notification IOS Device Notification This page is opened by selecting green Update button near Update IOS Devices Under A Specific Version header. In the opened part, IOS update settings reside. Version Number To Be Upgraded To field will be sent to every device lower than the given value to update Reminder Period is the value for minute-interval to notify the device for updating to specific version Send To All IOS Devices checkbox should be clicked to send it to any IOS device, once checked the label changes Click Send button on the bottom to send command to the selected devices, or hit the red cross button to cancel changes done Android Device Notification This page is opened by selecting green Update button near Update Android Devices Under A Specific Version header. In the opened part, Android update settings reside. Version Number To Be Upgraded To field will be sent to every device lower than the given value to update Reminder Period is the value for minute-interval to notify the device for updating to specific version APK Download Link is selected by the button next to it and it is either the latest version on Google Play or an apk URL given. Notification type defines how the notification will be shown on targeted device Send To All Android Devices checkbox should be clicked to send it to any Android device, once checked the label changes Click Send button on the bottom to send command to the selected devices, or hit the red cross button to cancel changes done 84

85 Statistics Tool Settings Configs >> Statistics Tool Dashboards Settings opens up the page for where Statistics Tool Dashboard URLs are being saved. Statistics Tool Dashboards consist of a name and URL Here in this page Statistics Tool Dashboards are created, updated or deleted Added dashboards appear on Devices>>(On Any Device s Row)Manage>>Statistics Statistics Tool URL A Statistics Tool URL: will have {{udid}} text substituded with the device s own UDID (the one Statistics Tool statistics are opened at) will have {{username}} text substituded with the device s own username (the one Statistics Tool statistics are opened at) will be embedded to the statistics popup page if the URL is copied and pasted to URL part 85

86 Device-Specific VPN Settings Config >> User-Specific VPN, opens the interface which supports the logged in user to configure VPN Settings of devices Device Specific VPN Setting page is opened, this page includes two submenus, these are; Select Devices for a VPN, current VPN connections are listed and devices can be selected from the list and VPN connection can be deleted in this page Create a New VPN, new VPN connections are created in this page Create A New VPN Config >> User-Specific VPN, opens the interface which supports the logged in user to configure VPN Settings of devices Create a New VPN, menu is clicked and adding new VPN connection page is opened Information about the VPN, profile name, server name, pre-shared key, user name, user password are entered into related fields If LDAP, Integrated check box is selected than user information is get from LDAP automatically, so there exist no need to enter user name and user password Save button is clicked to add new VPN connection After saving operation is completed, VPN is added to the list in Select Devices for A VPN page 86

87 Select Devices For A VPN Config >> User-Specific VPN, opens the interface which supports the logged in user to configure VPN Settings of devices Device Specific VPN Settings page is opened Select Devices For A VPN tab is selected from the tabular menu Profile Name, Server Name, Pre-Shared Key, User Name, User Password, Actions information about the VPN is displayed in the VPN list Send To Devices button next to the VPN is clicked A new table occurs when Send To Devices button is clicked and devices are listed. However devices in the list are only SAMSUNG Android and ios devices Checkbox next to device/devices which of the VPN will be assigned are selected, more than one device can be selected SAVE button is clicked and the selected VPN is assigned to the selected devices If Manage button next to devices is clicked then device management page is opened. Device management is explained more detailed in Devices ope 87

88 Delete A VPN Config >> User-Specific VPN, opens the interface which supports the logged in user to configure VPN Settings of devices Select Devices for VPN, menu is clicked and selecting VPN page is opened Created current VPN are listed automatically Information about the VPN, profile name, server name, pre-shared key, user name, user password are viewed in this list DELETE buttons next to VPN is clicked and VPN is deleted 88

89 System Settings Config >> System Settings, opens the interface which supports the logged in user to view system settings. In Ios settings area, user enter a value Enrollment Settings and Time Settings part. If the user add new ios settings, clicks Save button and the new setting was added. In Voip settings area, user enter the Url part and clicks Save button. 89

90 If the user want to change their password, clicks Change Password button. In Session settings area, user enter a value from in this part and clicks Save button. In Statistics Tool Report er area, user enter a value Transport Setup and Mail Body Setup. Then, user clicks Save button. In Other settings area, user enter a value in this part and finish the system settings. If the user save their settings, clicks Save button and save the system settings. 90

91 91

92 CHAPTER 9: DEVICES Devices Devices, opens the interface which supports the logged in user to manage devices and to delete devices Devices and their some information are listed in this page automatically Inactivity timeout minute is modifiable Devices in the list are categorized in different color according to the inactivity timeout minutes When the inacti vity timeout minute is changed then the color of the devices can be change according to that time The green rows are the active devices in that time slot The green rows are the inactive devices which have been logout before 2 times the length of time before inactivity timeout minute The red rows are the inactive devices in the system For example, inactivity time minute is 22, then Devices which are logged into the system in 22 minutes will be colored green Devices which are logged into the system in 44 minutes will be colored orange Devices which are not logged into the system in 44 minutes will be colored red 92

93 In order to manage devices, bellowing steps should be followed Device is filtered according to any information of the device, user name or role If data is entered into the Any field, devices are filtered according to the entered data 93

94 If data is entered into the Device field, device is filtered according to the entered device 94

95 If data is entered into the User field, device is filtered according to the entered user After completing to filter the device, Manage button next to the device is clicked 95

96 After clicking the button management page is opened Menus and Actions in the management page differ according to the selected device Android Devices Menus: Actions, Statistics, Location Requests, Installed Apss, Policies Actions: Location request, status request, lock screen now, wipe device, wipe agent data IOS Devices Menus: Actions, Location Requests, Installed Apps, Policies Actions: Lock, Device Info, Location, Wipe Samsung Devices Menus: Actions, Statistics, Location Requests, Installed Apss, Policies Actions: Location request, status request, lock screen now, wipe device, wipe agent data, Enforce Password Change, Reboot, Power Off 96

97 Device Locations Devices >> Device Locations steps must be taken in order to list the last locations of the devices Last locations of the devices are shown on the map and devices are listed on the column to the right Listing Device Locations Device Locations are listed and can be filtered as desired If desired, device locations can be filtered by the map viewport, to do this hit List Devices Only On The Viewport and only the devices on the current viewport will be listed on the column to the right Devices can also be filtered by username, that way if the keyword entered in the username field is not in the username of the device, then the device is not listed on the devices colummn Map Controls The map has some controls on it Locations can be searched on the map. If a keyword is written to the search bar and Enter is hit, then the map will change its position according to the searched place/city/country The map also has the controls to switch between map and satellite views. To the top-right corner, the map contains buttons to switch between them. 97

98 Device Inventory Here you can see all of your devices and each device s groups, apps, policies, etc. as a table. Get Report (CSV): Download the table as a CSV file Get Report (XLSX): Download the table as a Microsoft Excel XLSX file 98

99 Android Devices Menus Actions Actions: Devices >> Manage >> Actions, Actions button is clicked and actions are visible. In this page, some different commands are sent to the selected device. Locations Request button is clicked in order to get the current location of this device. When operation is completed a notice message is shown. These messages differs according to device status. These are going to be mentioned in Commands page in detail. Status Request button is clicked in order to get the current status of this device. When operation is completed a notice message is shown. These messages differs according to device status. These are going to be mentioned in Commands page in detail. Lock Screen Now button is clicked in order to lock the screen of the device. When operation is completed a notice message is shown. These messages differs according to device status. These are going to be mentioned in Commands page in detail. Wipe Logs button is clicked in order to delete collected MDM logs, contacts and application catalog on the selected device. When operation is completed a notice message is shown. These messages differs according to device status. These are going to be mentioned in Commands page in 99

100 detail. Wipe Device button is clicked in order to restore factory settings of the selected device. When operation is completed a notice message is shown. These messages differs according to device status. These are going to be mentioned in Commands page in detail. Wipe Agent Data button is clicked in order to delete the applications that are downloaded by Mobivisor System. Statistics Statistics: Devices >> Manage >> Statistics, Statistics button is clicked to generate some statistics. User can generate it for different time slots. Firstly, time slot is selected from the grouping data by list. System automatically assigned starting and ending dates according to the selected value Year: If year is selected, system assigns a default value as starting date and Current Date as ending date. Month: If month is selected, system assigns a default value as starting date and Current Date as ending date. Week: If week is selected, system assigns a default value, that range should be one year, by starting from Current Date to last year. Day: If day is selected, system assigns a default value, that range should be one month, by starting from Current Date to last month. Hour: If hour is selected, system assigns a default value, that range should be one week, by starting from Current Date to last week. Minute: If minute is selected, system assigns a default value, that range should be one day, starting from Current Date to last day. If the user wants to determine this date range then should select the starting and ending time from calendars. After determining these values, Retrieve button is clicked and graphics about the battery level, CPU, RAM, Storage of the device Location Requests Location Requests: Devices >> Manage >> Location Requests, Location Requests button is clicked to view all requests. 100

101 Location history is listed automatically Location can be filtered by selecting beginning and ending dates or all locations are listed if Show All option is selected If Show On Map button is clicked then that location is viewed on map IF user wants to get location report he should open the Reporting page by selecting the Location Reporting at the beginning of the list Installed Apps Installed Apss: Devices >> Manage >> Installed Apps, Installed Apps button is clicked to view all installed applications. All installed application is listed If the X symbol on the application is clicked then a command is sent to device to delete this application Policies Policies: Devices >> Manage >> Policies, Policies button is clicked to view and to edit added policies, and to add device features. 101

102 If there exist any added policies, they are listed in this page. If the Edit button on the Policies From User s Profile is clicked Assign Profiles to User page is opened. Operations that are explained in the Assign Profiles to User part are realized. If the Edit button on the Policies From User s Profile is clicked Assign Profiles to User page is opened. Operations that are explained in the Assign Profiles to User part are realized. User can edit device control features from the last part. In order to add feature the listed features are selected. After finishing managing police settings SAVE button is clicked to record. IOS Device Menus Actions Actions: Devices >> Manage >> Actions, Actions button is clicked and actions are visible. Some data entry and some different commands are sent to the selected device in this page. 102

103 Lock button is clicked in order to lock the device. When operation is completed a notice message is shown. These messages differs according to device status. These are going to be mentioned in Commands page in detail. Device Info button is clicked in order to get some information about device such as device name, version, model name, build version, model, model code (product name), serial number, device capacity, available Device-capacity, battery level, cellular technology, device IMEI number, MEID number of device etc. When operation is completed a notice message is shown. These messages differs according to device status. These are going to be mentioned in Commands page in detail. Location button is clicked in order to get the current location of this device. When operation is completed a notice message is shown. These messages differs according to device status. These are going to be mentioned in Commands page in detail. Wipe button is clicked in order to restore factory settings of the selected device. When operation is completed a notice message is shown. These messages differs according to device status. These are going to be mentioned in Commands page in detail. 103

104 Location Requests Location Requests: Devices >> Manage >> Location Requests, Location Requests button is clicked to view all requests. Location history is listed automatically Location can be filtered by selecting beginning and ending dates or all locations are listed if Show All option is selected If Show On Map button is clicked then that location is viewed on map If user wants to get location report he should open the Reporting page by selecting the Location Reporting at the beginning of the list Installed Apps Installed Apss: Devices >> Manage >> Installed Apps, Installed Apps button is clicked to view all installed applications. All installed application is listed If the X symbol on the application is clicked then a command is sent to device to delete this application SAMSUNG Device Menus Actions 104

105 Actions: Devices >> Manage >> Actions, Actions button is clicked and actions are visible. In this page, some different commands are sent to the selected device. Locations Request button is clicked in order to get the current location of this device. When operation is completed a notice message is shown. These messages differs according to device status. These are going to be mentioned in Commands page in detail. Status Request button is clicked in order to get the current status of this device. When operation is completed a notice message is shown. These messages differs according to device status. These are going to be mentioned in Commands page in detail. Lock Screen Now button is clicked in order to lock the screen of the device. When operation is completed a notice message is shown. These messages differs according to device status. These are going to be mentioned in Commands page in detail. Wipe Device button is clicked in order to restore factory settings of the selected device. When operation is completed a notice message is shown. These messages differs according to device status. These are going to be mentioned in Commands page in detail. Wipe Agent Data button is clicked in order to delete the applications that are downloaded by Mobivisor System. Enforce Password Change button is clicked in order to compel the user to change his device password Reboot button is clicked to restart device Power Off button is clicked to turn off device 105

106 Statistics Statistics: Devices >> Manage >> Statistics, Statistics button is clicked to generate some statistics. User can generate it for different time slots. Firstly, time slot is selected from the grouping data by list. System automatically assigned starting and ending dates according to the selected value Year: If year is selected, system assigns a default value as starting date and Current Date as ending date. Month: If month is selected, system assigns a default value as starting date and Current Date as ending date. Week: If week is selected, system assigns a default value, that range should be one year, by starting from Current Date to last year. Day: If day is selected, system assigns a default value, that range should be one month, by starting from Current Date to last month. Hour: If hour is selected, system assigns a default value, that range should be one week, by starting from Current Date to last week. Minute: If minute is selected, system assigns a default value, that range should be one day, starting from Current Date to last day. If the user wants to determine this date range then should select the starting and ending time from calendars. After determining these values, Retrieve button is clicked and graphics about the battery level, CPU, RAM, Storage of the device Location Requests Location Requests: Devices >> Manage >> Location Requests, Location Requests button is clicked to view all requests. 106

107 Location history is listed automatically Location can be filtered by selecting beginning and ending dates or all locations are listed if Show All option is selected If Show On Map button is clicked then that location is viewed on map IF user wants to get location report he should open the Reporting page by selecting the Location Reporting at the beginning of the list Installed Apps Installed Apss: Devices >> Manage >> Installed Apps, Installed Apps button is clicked to view all installed applications. All installed application is listed If the X symbol on the application is clicked then a command is send to device to delete this application Policies Policies: Devices >> Manage >> Policies, Policies button is clicked to view and to edit added policies, and to add device features. 107

108 If there exist any added policies, they are listed in this page. If the Edit button on the Policies From User s Profile is clicked Assign Profiles to User page is opened. Operations that are explained in the Assign Profiles to User part are realized. If the Edit button on the Policies From User s Profile is clicked Assign Profiles to User page is opened. Operations that are explained in the Assign Profiles to User part are realized. User can edit device control features from the last part. In order to add feature the listed features are selected. 108

109 After finishing managing police settings SAVE button is clicked to record. 109

110 CHAPTER 10: COMMANDS Command States Not Sent: The command is created and stays in the server (DB) At Push Server: The command is successfully transmitted to the Push Notification Server. (Google, APNS, etc.) Push Server Error: Push Notification Server rejects the request to send the command Transmitted: The command is delivered to the device, but its result has not been returned yet Success: The device executed the command and returned success result. Error: The device executed the command and returned error result Malformed: The device decided that the command is malformed Auto: state when command sent by devices automatically 110

111 Processes of Commands Some MDM commands sent to Android, ios and W8 devices includes data in it, processes of this kind of commands is explained below. Firstly command is created and state of this command will be Not Sent when the command is in database at Server. Command is sent to Notification server of Android, ios or W8 devices. Notification Server returns a response about validity of the sent message. If the response is positive then state of command changes as At Push Server, or if the response is negative then state of command changes as Push Server Error. Later, command is sent to device and command is committed by device. After device committed the command, send message to server. This message is categorized in 3 different states, these are Success, Error and Malformed. If the transaction is realized successfully, then state of the command will be changed as Success and message will be sent to server. Some commands includes data in itself, in such cases command data is send in message to server If the transaction is not realized successfully, then state of the command will be changed as Error and message will be sent to server If the transaction is not realized successfully as the command is wrong, applicable, missing or unknown then state of the command will be changed as Malformed and message will be sent to server 111

112 Processes of ios Devices- MDM commands Some MDM commands sent to ios devices does not include data in it; therefore, device wants command from server itself. Processes of this kind of command is explained below. Firstly command is created and state of this command will be Not Sent when the command is in database at Server. Command is sent to Notification server of Android, ios or W8 devices. Notification Server returns a response about validity of the sent message. If the response is positive then state of command changes as At Push Server, or if the response is negative then state of command changes as Push Server Error. Later, command is sent to device, information goes to device as it has a command. Device wants the command from server and state of the command is changed as Transmitted. Command is committed by device and the committed command message is send to server. This message is categorized in 3 different states, these are Success, Error and Malformed. If the transaction is realized successfully, then state of the command will be changed as Success and message will be sent to server. Some commands includes data in itself, in such cases command data is send in message to server If the transaction is not realized successfully, then state of the command will be changed as Error and message will be sent to server If the transaction is not realized successfully as the command is wrong, applicable, missing or unknown then state of the command will be changed as Malformed and message will be sent to server 112

113 Device Commands Sent Commands >> Device Commands Sent, opens the interface which supports the logged in user to view commands sent to devices. Also, this page is opened directly when user logs into system In this page there exist some graphics about commands First pie chart, Command Distrubiton, is about distribution of all commands until this time, in this chart each pie is related to a command. These commands are like location, device info, text message, add policy, etc. User can manage which commands to display in chart, when the command names above chart are clicked then that command is added to chart or removed from chart. Also when mouse overed on the pies of chart, numbers of commands are displayed Second graphic, Command State, is about states of commands. This graphics can be managed by user. If user wants to change graphic style, he can click on Grouped or Stacked buttons. Means of the status are explained detailly above Estimated time remaining, means that all sent message takes duration 113

114 to be sent to devices Third graphic, Command Send per Date, shows the rates of commands which of state is SEND. Options below graphics can be clicked and graphics change according to option. If year is clicked, graphic shows the distribution of send commands in years If month is clicked, graphic shows the distribution of send commands in months If week is clicked, graphic shows the distribution of send commands in weeks If day is clicked, graphic shows the distribution of send commands in days If hour is clicked, graphic shows the distribution of send commands in hours If minute is clicked, graphic shows the distribution of send commands in minutes Forth graphis, Command Time Interval Statistics, is about coming commands to MDM system. If per day is clicked, graphic shows numbers of coming commands in each day If per hour is clicked, graphic shows numbers of coming commands in each hour Device commands table shows the command details. 114

Application / Document Management. MaaS360 e-learning Portal Course 3

Application / Document Management. MaaS360 e-learning Portal Course 3 Application / Document Management MaaS360 e-learning Portal Course 3 Agenda > Application Management Overview MaaS360 Workflows Device Workflows > Document Management Overview MaaS360 Workflows Document

More information

Sophos Mobile. startup guide. Product Version: 8.1

Sophos Mobile. startup guide. Product Version: 8.1 Sophos Mobile startup guide Product Version: 8.1 Contents About this guide... 1 Sophos Mobile licenses... 2 Trial licenses...2 Upgrade trial licenses to full licenses... 2 Update licenses... 2 What are

More information

Apple ios Enterprise Mobility Management (cloud based)

Apple ios Enterprise Mobility Management (cloud based) Apple ios Enterprise Mobility Management (cloud based) Codeproof ios EMM offers the following enterprise mobility management and BYOD security features. App Restrictions Block the camera, Safari, App Store,

More information

AT&T Global Network Client for Android

AT&T Global Network Client for Android Version 4.1.0 AT&T Global Network Client for Android 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual

More information

Mobility Manager 9.5. Users Guide

Mobility Manager 9.5. Users Guide Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks

More information

Sophos Mobile as a Service

Sophos Mobile as a Service startup guide Product Version: 8 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses...5 Check your licenses...6

More information

Integration with Apple Configurator 2. VMware Workspace ONE UEM 1902

Integration with Apple Configurator 2. VMware Workspace ONE UEM 1902 Integration with Apple Configurator 2 VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about

More information

Sophos Mobile Control startup guide. Product version: 7

Sophos Mobile Control startup guide. Product version: 7 Sophos Mobile Control startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 Sophos Mobile Control licenses...7 3.1 Trial licenses...7 3.2 Upgrade trial licenses

More information

2. Install The AirWatch App Once connected to the internet, download and install the AirWatch MDM Agent app from the Apple App Store.

2. Install The AirWatch App Once connected to the internet, download and install the AirWatch MDM Agent app from the Apple App Store. Android Setup 1. Wireless Watchdogs Network Activation Once you receive your phone, contact Wireless Watchdogs at (866)522-0688 to activate the cellular network through AT&T, Verizon, T-mobile or Sprint.

More information

Sophos Mobile. startup guide. Product Version: 8.5

Sophos Mobile. startup guide. Product Version: 8.5 Sophos Mobile startup guide Product Version: 8.5 Contents About this guide... 1 Sophos Mobile licenses... 2 Trial licenses...2 Upgrade trial licenses to full licenses... 2 Update licenses... 2 What are

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

Compliance Manager ZENworks Mobile Management 2.7.x August 2013

Compliance Manager ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Compliance Manager ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Sophos Mobile Control Administrator guide. Product version: 5.1

Sophos Mobile Control Administrator guide. Product version: 5.1 Sophos Mobile Control Administrator guide Product version: 5.1 Document date: June 2015 Contents 1 About Sophos Mobile Control...5 1.1 Sophos Mobile Control on premise and as a Service...5 1.2 About this

More information

End User Manual. December 2014 V1.0

End User Manual. December 2014 V1.0 End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How

More information

Sophos Mobile SaaS startup guide. Product version: 7.1

Sophos Mobile SaaS startup guide. Product version: 7.1 Sophos Mobile SaaS startup guide Product version: 7.1 Contents 1 About this guide...4 2 What are the key steps?...5 3 Change your password...6 4 Change your login name...7 5 Activate SMC Advanced licenses...8

More information

Vodafone Secure Device Manager Administration User Guide

Vodafone Secure Device Manager Administration User Guide Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of June 2017. Vodafone Ready Business Contents Introduction 3 Help 4 How to find help in the Vodafone Secure

More information

MDM Server 5.26 Release Highlights. 7P Mobile Device Management. Rel: 1.0 /

MDM Server 5.26 Release Highlights. 7P Mobile Device Management. Rel: 1.0 / MDM Server 5.26 Release Highlights 7P Mobile Device Management Rel: 1.0 /2017-10-08 Doc.Nr.: RB.52600.V1.0EN Content 1 GENERAL... 3 1 General The following sections provide a brief overview of all new

More information

User Manual. ARK for SharePoint-2007

User Manual. ARK for SharePoint-2007 User Manual ARK for SharePoint-2007 Table of Contents 1 About ARKSP (Admin Report Kit for SharePoint) 1 1.1 About ARKSP 1 1.2 Who can use ARKSP? 1 1.3 System Requirements 2 1.4 How to activate the software?

More information

Compliance Manager ZENworks Mobile Management 3.0.x January 2015

Compliance Manager ZENworks Mobile Management 3.0.x January 2015 www.novell.com/documentation Compliance Manager ZENworks Mobile Management 3.0.x January 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Lookout Mobile Endpoint Security. Deploying Lookout with BlackBerry Unified Endpoint Management

Lookout Mobile Endpoint Security. Deploying Lookout with BlackBerry Unified Endpoint Management Lookout Mobile Endpoint Security Deploying Lookout with BlackBerry Unified Endpoint Management June 2018 2 Copyright and disclaimer Copyright 2018, Lookout, Inc. and/or its affiliates. All rights reserved.

More information

Sophos Mobile Control Super administrator guide. Product version: 3.5

Sophos Mobile Control Super administrator guide. Product version: 3.5 Sophos Mobile Control Super administrator guide Product version: 3.5 Document date: July 2013 Contents 1 About Sophos Mobile Control...3 2 Super administrator accounts...4 3 The super administrator customer...5

More information

VMware AirWatch Google Sync Integration Guide Securing Your Infrastructure

VMware AirWatch Google Sync Integration Guide Securing Your  Infrastructure VMware AirWatch Google Sync Integration Guide Securing Your Email Infrastructure AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

VMware AirWatch Integration with Apple Configurator 2 Guide Using Apple Configurator 2 and AirWatch to simplify mass deployments

VMware AirWatch Integration with Apple Configurator 2 Guide Using Apple Configurator 2 and AirWatch to simplify mass deployments VMware AirWatch Integration with Apple Configurator 2 Guide Using Apple Configurator 2 and AirWatch to simplify mass deployments AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback

More information

NotifyMDM Device Application User Guide Installation and Configuration for Android

NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM for Android, Version 3.x NotifyMDM for Android 1 Table of Contents NotifyMDM for Android 3 Installation Instructions

More information

Sponsor Documentation

Sponsor Documentation CHAPTER 17 This chapter provides user documentation for sponsor users who create guest accounts. It contains the following sections: Introduction to Cisco NAC Guest Server Connecting to the Cisco NAC Guest

More information

Sophos Mobile Control SaaS startup guide. Product version: 7

Sophos Mobile Control SaaS startup guide. Product version: 7 Sophos Mobile Control SaaS startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8 5 Change your login

More information

Salesforce Classic Guide for iphone

Salesforce Classic Guide for iphone Salesforce Classic Guide for iphone Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

Deploying Lookout with IBM MaaS360

Deploying Lookout with IBM MaaS360 Lookout Mobile Endpoint Security Deploying Lookout with IBM MaaS360 February 2018 2 Copyright and disclaimer Copyright 2018, Lookout, Inc. and/or its affiliates. All rights reserved. Lookout, Inc., Lookout,

More information

Sophos Mobile Control SaaS startup guide. Product version: 6.1

Sophos Mobile Control SaaS startup guide. Product version: 6.1 Sophos Mobile Control SaaS startup guide Product version: 6.1 Document date: September 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your

More information

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1 CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9

More information

Comodo Dome Shield - Admin Guide

Comodo Dome Shield - Admin Guide rat Comodo Dome Shield Software Version 1.12 Administrator Guide Guide Version 1.12.111717 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo Dome

More information

COMMUNITAKE ENTERPRISE MOBILITY: USE GUIDELINES

COMMUNITAKE ENTERPRISE MOBILITY: USE GUIDELINES COMMUNITAKE ENTERPRISE MOBILITY: USE GUIDELINES INTRODUCTION The CommuniTake Enterprise Mobility (CEM) solution is part of the CommuniTake Mobility solutions suite. It is aimed at organizations that look

More information

LUCITY SECURITY. This manual covers managing users, groups, and permissions for Lucity. Version: 2017r2

LUCITY SECURITY. This manual covers managing users, groups, and permissions for Lucity. Version: 2017r2 LUCITY SECURITY This manual covers managing users, groups, and permissions for Lucity. Version: 2017r2 CONTENTS SECURITY... 1 Security Program... 2 Getting Started... 3 Setting up a Security Admin User...

More information

Salesforce Classic Mobile Guide for iphone

Salesforce Classic Mobile Guide for iphone Salesforce Classic Mobile Guide for iphone Version 41.0, Winter 18 @salesforcedocs Last updated: November 30, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered

More information

Using the isupport Customer Profile Screen

Using the isupport Customer Profile Screen Using the isupport Customer Profile Screen The Customer Profile screen (accessed via the Desktop menu) enables you to record customer information that can be used in all isupport functionality. Note that

More information

Workspace MDM Management Site Manual

Workspace MDM Management Site Manual Workspace MDM Management Site Manual 8. Appendix (Web site ver 8.1.1) 1 1 Appendix... 3 1.1 Function list... 4 1.2 Easy Setup procedure... 8 1.3 Input method of import data... 10 1.4 Details on CSV for

More information

IRIS System Administrator s Guide

IRIS System Administrator s Guide IRIS System Administrator s Guide This guide is intended for Resettlement Agency administrators of the Immigration & Refugee Information System (IRIS). NOTE: the functionality described here represents

More information

NotifyMDM Device Application User Guide Installation and Configuration for ios with TouchDown

NotifyMDM Device Application User Guide Installation and Configuration for ios with TouchDown NotifyMDM Device Application User Guide Installation and Configuration for ios with TouchDown NotifyMDM for ios Devices, Version 3.x NotifyMDM for ios with TouchDown 1 Table of Contents NotifyMDM for ios

More information

Getting Started GateManager5 PREMIUM Domain Administration

Getting Started GateManager5 PREMIUM Domain Administration Getting Started GateManager5 PREMIUM Domain Administration This document helps you get started with Secomea s hosted GateManager5 in relation to the GateManager 5 Domain Administration. This guide assumes

More information

EMPLOYER USER GUIDE PLEASE NOTE

EMPLOYER USER GUIDE PLEASE NOTE EMPLOYER USER GUIDE Getting Started... Error! Bookmark not defined. Request Log-In Permission... 3 Log In... 4 My Control Panel... 5 Post a New Job... Error! Bookmark not defined. Review Employee Applications...

More information

Comodo Antispam Gateway Software Version 2.11

Comodo Antispam Gateway Software Version 2.11 Comodo Antispam Gateway Software Version 2.11 User Guide Guide Version 2.11.041917 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...3

More information

USER MANUAL. TapCRM TABLE OF CONTENTS. Version: 1.4

USER MANUAL. TapCRM TABLE OF CONTENTS. Version: 1.4 USER MANUAL TABLE OF CONTENTS Introduction... 1 Benefits of TapCRM... 1 Prerequisites... 1 Installation & Configuration... 2 TapCRM Plug-in Installation... 2 Front Side Instructions... 9 Contact Us...

More information

Administrative Training Mura CMS Version 5.6

Administrative Training Mura CMS Version 5.6 Administrative Training Mura CMS Version 5.6 Published: March 9, 2012 Table of Contents Mura CMS Overview! 6 Dashboard!... 6 Site Manager!... 6 Drafts!... 6 Components!... 6 Categories!... 6 Content Collections:

More information

Sophos Mobile. super administrator guide. Product Version: 8

Sophos Mobile. super administrator guide. Product Version: 8 Sophos Mobile super administrator guide Product Version: 8 Contents About this guide... 1 Document conventions... 1 Super administrator... 2 Super administrator tasks...2 Super administrator customer...

More information

ios Supervised Devices

ios Supervised Devices www.novell.com/documentation ios Supervised Devices ZENworks Mobile Management 3.2.x October 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use

More information

AirWatch for Android Devices for Skype for Business

AirWatch for Android Devices for Skype for Business Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by Michigan Medicine ensure security for smart phones and tablets that connect to the Michigan Medicine environment.

More information

Comodo Antispam Gateway Software Version 2.12

Comodo Antispam Gateway Software Version 2.12 Comodo Antispam Gateway Software Version 2.12 User Guide Guide Version 2.12.112017 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Antispam Gateway...3

More information

Comodo Comodo Dome Antispam MSP Software Version 2.12

Comodo Comodo Dome Antispam MSP Software Version 2.12 Comodo Comodo Dome Antispam MSP Software Version 2.12 User Guide Guide Version 2.12.111517 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 Table of Contents 1 Introduction to Comodo Dome

More information

OpenProject AdminGuide

OpenProject AdminGuide OpenProject AdminGuide I. Contents I. Contents... 1 II. List of figures... 2 1 Administration... 2 1.1 Manage projects...2 1.2 Manage users...5 1.3 Manage groups...11 1.4 Manage roles and permissions...13

More information

Google Sync Integration Guide. VMware Workspace ONE UEM 1902

Google Sync Integration Guide. VMware Workspace ONE UEM 1902 Google Sync Integration Guide VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

BizMobile Go! Instruction Manual. (ios) Checkin, Profile & Template

BizMobile Go! Instruction Manual. (ios) Checkin, Profile & Template (ios) Checkin, Profile & Template Preparing Device Create device information for device management. Create Device information Step 1. Go to CONFIG -> Device -> Create 2. Enter necessary information Input

More information

VMware AirWatch Google Sync Integration Guide Securing Your Infrastructure

VMware AirWatch Google Sync Integration Guide Securing Your  Infrastructure VMware AirWatch Google Sync Integration Guide Securing Your Email Infrastructure Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard

More information

Sophos Mobile as a Service

Sophos Mobile as a Service startup guide product version: 8.6 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses... 5 Check your licenses...6

More information

AirWatch for ios Devices

AirWatch for ios Devices Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by UMHS to ensure security for smart phones and tablets that connect to the UMHS environment. AirWatch provides

More information

Managing WCS User Accounts

Managing WCS User Accounts CHAPTER 7 This chapter describes how to configure global e-mail parameters and manage WCS user accounts. It contains these sections: Adding WCS User Accounts, page 7-1 Viewing or Editing User Information,

More information

Link to other configuration guides for information on...

Link to other configuration guides for information on... Configuration Guide: Adding Users and Enrolling Devices This guide provides information on...... Adding users manually or via batch import using the Add New User Wizard... Setting up an Organization for

More information

PBWORKS - Student User Guide

PBWORKS - Student User Guide PBWORKS - Student User Guide Fall 2009 PBworks - Student Users Guide This guide provides the basic information you need to get started with PBworks. If you don t find the help you need in this guide, please

More information

BBVA Compass Spend Net Payables

BBVA Compass Spend Net Payables User Guide BBVA Compass Spend Net Payables User Guide Vault Services Table of Contents Introduction 2 Technical Requirements 2 Getting started 3 Sign In 3 General Navigation 4 Upload/Create Payment 5

More information

evoclock+ - AsureForce Mobile V3.0 Reference Guide AsureForce Mobile Version 3.0 Reference Guide AsureForce Mobile 1 P a g e

evoclock+ - AsureForce Mobile V3.0 Reference Guide AsureForce Mobile Version 3.0 Reference Guide AsureForce Mobile 1 P a g e AsureForce Mobile Version 3.0 Reference Guide AsureForce Mobile 1 P a g e Table of Contents Quick Reference... 2 AsureForce Mobile... 3 Getting Started... 3 AsureForce Mobile App Setup... 3 AsureForce

More information

Cox Business Online Backup Administrator Guide. Version 2.0

Cox Business Online Backup Administrator Guide. Version 2.0 Cox Business Online Backup Administrator Guide Version 2.0 2012 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic,

More information

3CX Mobile Device Manager

3CX Mobile Device Manager 3CX Mobile Device Manager Manual 1 Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples

More information

Sophos Mobile super administrator guide. Product version: 7.1

Sophos Mobile super administrator guide. Product version: 7.1 Sophos Mobile super administrator guide Product version: 7.1 Contents 1 About this guide...4 1.1 Document conventions...4 2 Super administrator...5 2.1 Super administrator tasks...5 2.2 Super administrator

More information

HPE Intelligent Management Center v7.3

HPE Intelligent Management Center v7.3 HPE Intelligent Management Center v7.3 Service Operation Manager Administrator Guide Abstract This guide contains comprehensive conceptual information for network administrators and other personnel who

More information

CounterACT User Directory Plugin

CounterACT User Directory Plugin Version 6.1.2 and Above Table of Contents About the User Directory Plugin... 3 Endpoint User Details... 3 Verify Endpoint Authentication... 3 User Directory Inventory... 4 HTTP Login Action... 5 HTTP Sign

More information

Comodo One Software Version 3.26

Comodo One Software Version 3.26 rat Comodo One Software Version 3.26 Service Desk Staff Guide Guide Version 4.16.101018 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Service Desk Module...3

More information

Sophos Mobile. super administrator guide. product version: 8.6

Sophos Mobile. super administrator guide. product version: 8.6 Sophos Mobile super administrator guide product version: 8.6 Contents About this guide... 1 Document conventions... 1 Super administrator... 2 Super administrator tasks...2 Super administrator customer...

More information

Service Desk Staff Guide. Software version 4.16 Guide version ITarian 1255 Broad Street Clifton, NJ 07013

Service Desk Staff Guide. Software version 4.16 Guide version ITarian 1255 Broad Street Clifton, NJ 07013 Service Desk Staff Guide Software version 4.16 Guide version 4.16.110618 ITarian 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Service Desk Module...3 1.1 Quick Start...5 1.2

More information

VMware Workspace ONE UEM Integration with Smart Glasses. VMware Workspace ONE UEM 1811

VMware Workspace ONE UEM Integration with Smart Glasses. VMware Workspace ONE UEM 1811 VMware Workspace ONE UEM Integration with Smart Glasses VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you

More information

Microsoft Windows SharePoint Services

Microsoft Windows SharePoint Services Microsoft Windows SharePoint Services SITE ADMIN USER TRAINING 1 Introduction What is Microsoft Windows SharePoint Services? Windows SharePoint Services (referred to generically as SharePoint) is a tool

More information

Mobile Device Growth 1

Mobile Device Growth 1 SM5 Mobile Device Growth Evolutions Mobile devices are quickly replacing desktops Mobile Devices Adoption at Enterprise Popular Productivity Apps Mobile Devices at Work Portability, take it anywhere Cost

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

Raptor University. District Admin Training. Instructor: RAPTOR TECHNOLOGIES, LLC

Raptor University. District Admin Training. Instructor: RAPTOR TECHNOLOGIES, LLC Raptor University District Admin Training Instructor: RAPTOR TECHNOLOGIES, LLC This presentation includes instruction on the following topics to get you started using Raptor: Learning Objectives Navigating

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Comodo One Software Version 3.16

Comodo One Software Version 3.16 rat Comodo One Software Version 3.16 Service Desk Staff Guide Guide Version 4.6.112817 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Service Desk Module...3

More information

Comodo IT and Security Manager Software Version 6.9

Comodo IT and Security Manager Software Version 6.9 Comodo IT and Security Manager Software Version 6.9 End User Guide Guide Version 6.9.072817 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo IT

More information

Managing Your Website with Convert Community. My MU Health and My MU Health Nursing

Managing Your Website with Convert Community. My MU Health and My MU Health Nursing Managing Your Website with Convert Community My MU Health and My MU Health Nursing Managing Your Website with Convert Community LOGGING IN... 4 LOG IN TO CONVERT COMMUNITY... 4 LOG OFF CORRECTLY... 4 GETTING

More information

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810 Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Managing WCS User Accounts

Managing WCS User Accounts 7 CHAPTER This chapter describes how to configure global email parameters and manage WCS user accounts. It contains these sections: Adding WCS User Accounts, page 7-2 Viewing or Editing User Information,

More information

RISKMAN QUICK REFERENCE GUIDE TO SYSTEM CONFIGURATION & TOOLS

RISKMAN QUICK REFERENCE GUIDE TO SYSTEM CONFIGURATION & TOOLS Introduction This reference guide is aimed at RiskMan Administrators who will be responsible for maintaining your RiskMan system configuration and also to use some of the System Tools that are available

More information

OpenDrive Wordpress Plugin Guide

OpenDrive Wordpress Plugin Guide OpenDrive Wordpress Plugin Guide Version 2.0.1 OpenDrive Online storage, backup and cloud content management Contents 1. Drive 3 1.1 Drive... 3 1.2 Working with files... 4 1.2.1 Work with a particular

More information

Endpoint Manager for Mobile Devices Setup Guide

Endpoint Manager for Mobile Devices Setup Guide Endpoint Manager for Mobile Devices Setup Guide ii Endpoint Manager for Mobile Devices Setup Guide Contents IBM Endpoint Manager for Mobile Devices Setup Guide......... 1 Components.............. 1 Architecture..............

More information

Sophos Mobile in Central

Sophos Mobile in Central startup guide Product Version: 8.1 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure technical

More information

Adding Users and Enrolling Devices

Adding Users and Enrolling Devices www.novell.com/documentation Adding Users and Enrolling Devices ZENworks Mobile Management 3.2.x September 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents

More information

AirWatch for Android Devices for AirWatch InBox

AirWatch for Android Devices for AirWatch InBox Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by Michigan Medicine ensure security for smart phones and tablets that connect to the Michigan Medicine environment.

More information

Chapter 1. Configuring VPGO

Chapter 1. Configuring VPGO Chapter 1. Configuring VPGO The VPGO module is configured in the VISUAL PLANNING client. You can define as many VPGO templates as you need based on the three existing template types: Diary template Events

More information

Remote Access Resources

Remote Access Resources Remote Access Resources Windows 7 Windows 10 Firm Laptop Windows Windows Mac Computer Apple ipad Mac Computer Android Devices Apple ipad Remote Access Remote Access for Personal Computer (Windows) Quick

More information

Introduction to application management

Introduction to application management Introduction to application management To deploy web and mobile applications, add the application from the Centrify App Catalog, modify the application settings, and assign roles to the application to

More information

NTP Software VFM Administration Web Site For Microsoft Azure

NTP Software VFM Administration Web Site For Microsoft Azure NTP Software VFM Administration Web Site For Microsoft Azure User Manual Revision 1.1. - July 2015 This guide details the method for using NTP Software VFM Administration Web Site, from an administrator

More information

The Kindred Directory allows you to search for employees and locations across all of our lines of business.

The Kindred Directory allows you to search for employees and locations across all of our lines of business. Release 2.0 July 2017 1 GETTING STARTED The Kindred Directory allows you to search for employees and locations across all of our lines of business. The Kindred Directory can be accessed in a variety of

More information

Overview NOTE: Listing Overview. User Profile. Language Selection. Asset(s) View. Asset(s) Details. Editing Mode

Overview NOTE: Listing Overview. User Profile. Language Selection. Asset(s) View. Asset(s) Details. Editing Mode Overview Listing Overview User Profile Language Selection Asset(s) View Asset(s) Details Editing Mode NOTE: Some functions may not be available to all users depending on permissions granted. Some of the

More information

CANVAS OBSERVER GUIDE

CANVAS OBSERVER GUIDE CANVAS OBSERVER GUIDE This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike License Table of Contents Introduction...3 What is the Observer role?...4 How can I use Canvas

More information

Getting Started with Soonr

Getting Started with Soonr WWW.SOONR.COM Getting Started with Soonr A Quick Start Guide for New Users Soonr Inc. 12/19/2012 Revision 1.1 Copyright 2012, Soonr Inc., all rights reserved. Table of Contents 1 How Soonr Workplace Works...

More information

Comodo IT and Security Manager Software Version 6.6

Comodo IT and Security Manager Software Version 6.6 Comodo IT and Security Manager Software Version 6.6 End User Guide Guide Version 6.6.053117 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo IT

More information

SpaceShuttle User guide v3

SpaceShuttle User guide v3 SpaceShuttle User guide v3 1.Get Started with SpaceShuttle p2 1.1 For Windows p2 How to download and install Aspera Connect p2 1.2 For Mac p4 How to download and install Aspera Connect p4 2. Accessing

More information

Comodo One Software Version 3.18

Comodo One Software Version 3.18 rat Comodo One Software Version 3.18 Service Desk Staff Guide Guide Version 4.8.122817 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Service Desk Module...

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information

SIMSme Management Cockpit Documentation

SIMSme Management Cockpit Documentation Introduction SIMSme Management Cockpit Documentation Version 2.1 February 2018 Table of Contents 1 INTRODUCTION... 2 2 USERS... 3 3 LICENSES... 5 4 GROUPS... 7 5 CHANNELS... 8 6 DASHBOARD...10 7 APP SETTINGS...12

More information

Access ACS. Administrator s User Guide

Access ACS. Administrator s User Guide Access ACS Administrator s User Guide Copyright Copyright 2009 ACS Technologies Group, Inc. All rights reserved. Reproduction of any part of this publication by mechanical or electronic means, including

More information

Provisioning Mobile Device Manager in the Control Panel. Admin Guide

Provisioning Mobile Device Manager in the Control Panel. Admin Guide Provisioning Mobile Device Manager in the Control Panel Admin Guide Document Revision Date: Mar. 8, 2013 Provisioning MDM in the Control Panel i Contents Overview... 1 Accessing MDM in the Control Panel...

More information

S2 NetBox v4.8 Basic End-User Admin Training

S2 NetBox v4.8 Basic End-User Admin Training S2 NetBox v4.8 Basic End-User Admin Training 4/8/16 S2 Security 1 Table of Contents Introduction... 3 Log into your NetBox System... 3 Person Records... 5 Accessing Person Records... 5 Content of a Person

More information