ALTIRIS SECURITY SOLUTION 6.1 FOR HANDHELDS ADMINISTRATOR GUIDE

Size: px
Start display at page:

Download "ALTIRIS SECURITY SOLUTION 6.1 FOR HANDHELDS ADMINISTRATOR GUIDE"

Transcription

1 ALTIRIS SECURITY SOLUTION 6.1 FOR HANDHELDS ADMINISTRATOR GUIDE

2 Notice Copyright 2004 Altiris Inc. All rights reserved. Product Version: 6.1 Document Date: October 14, 2004 Bootworks U.S. Patent No. 5,764,593. RapiDeploy U.S. Patent No. 6,144,992. Recovery Solution U.S. Patent No. 5,778,395, 5,907,672, , , , , , , , GB , B , Other patents pending. Due to the inherently complex nature of computer software, Altiris does not warrant that the Altiris software is error-free, will operate without interruption, is compatible with all equipment and software configurations, or will otherwise meet your needs. The content of this documentation is furnished for informational use only, is subject to change without notice, and should not be construed as a commitment by Altiris. Altiris Inc. assumes no responsibility or liability for any errors or inaccuracies that may appear in this documentation. For the latest documentation, visit our Web site at Altiris, the Altiris logo, BootWorks, Inventory Solution, LabExpert, PC Transplant, RapiDeploy, and RapidInstall are registered trademarks of Altiris, Inc. in the United States. Carbon Copy is a registered trademark licensed to Altiris, Inc. in the United States and a trademark of Altiris, Inc. in other countries. Altiris express, Altiris Protect, Application Management Solution, Application Metering Solution, Asset Control Solution, Asset Management Suite, Client Management Suite, Compliance Toolkit, Connector Solution, Conflict Analysis Solution, Contract Management Solution, Deployment Server, Deployment Solution, Energy Saver Toolkit, Education Management Suite, Helpdesk Solution Software, Lab Management Suite, Migration Toolkit, Mobile Client for SMS, Monitor Solution, Notification Server, Patch Management Solution, Problem Management Suite, Recovery Solution, Server Management Suite, Site Monitor Solution, Software Delivery Solution, TCO Management Solution, UNIX Client for SMS, Web Administrator for SMS, Web Reports, and other product names are trademarks of Altiris, Inc. in the United States and other countries. Microsoft, Windows, and the Windows logo are trademarks, or registered trademarks of Microsoft Corporation in the United States and/or other countries. HP and Compaq are registered trademarks of the Hewlett-Packard Corporation. Dell is a registered trademark of Dell Inc. Macintosh is a registered trademark of the Apple Computer Corporation. Palm OS is a registered trademark of Palm Computing, Inc. BlackBerry is a service mark and a trademark of Research In Motion Limited Corporation. RIM is a service mark and trademark of Research In Motion (RIM) All other brand names are trademarks or registered trademarks of their respective companies. Altiris Security Solution 6.1 for Handhelds Administrator Guide 2

3 Contents Notice Chapter 1: Introduction Chapter 2: Installing Altiris Security Solution for Handhelds Installing Altiris Security Solution for Handhelds on the Notification Server Licensing Chapter 3: Altiris Security Solution for Handhelds Policy Editor Installing the Policy Editor Customizing Security Policies Group Info Tab Password Tab General Tab PalmOS Tab PocketPC Tab RIM Tab Saving Policy Files Chapter 4: Using Altiris Security Solution for Handhelds Configuration Administrator Setup Installing Altiris Security Solution for Handhelds on Pocket PC Handhelds Updating Security Policy for Pocket PC Handhelds Discovering RIM Host Computers Without Security Solution Installed Installing Altiris Security Solution for Handhelds on RIM Handhelds Deploying Security Policy to RIM Handhelds Tasks Pocket PC Tasks RIM Tasks Packages Pocket PC Packages RIM Packages Collections Reports Uninstalling Altiris Security Solution for Handhelds from Pocket PC Handhelds Uninstalling Altiris Security Solution from RIM Host Computers Uninstalling Altiris Security Solution for Handhelds from RIM Handhelds Uninstalling Altiris Security Solution for Handhelds Altiris Security Solution 6.1 for Handhelds Administrator Guide 3

4 Contents Chapter 5: Frequently Asked Questions Index Altiris Security Solution 6.1 for Handhelds Administrator Guide 4

5 Chapter 1: Introduction Altiris Security Solution for Handhelds is the industry standard for handheld data security. It provides multi-layered security for Palm, Pocket PC, and RIM handhelds ensuring corporate information is secure once it leaves the corporate walls. Altiris Security Solution for Handhelds eliminates the most significant security risks associated with deploying handhelds by providing security tools to strengthen user authentication, encrypt data on the handheld, and erase important corporate data if a handheld is deemed lost or stolen. Altiris Security Solution for Handhelds combined with Altiris Inventory Solution for Handhelds and Altiris Software Delivery Solution for Handhelds provides a complete set of management tools for you to Get a Grip on your handhelds. Altiris Security Solution for Handhelds is on-device security, offering flexible options to define and enforce security policies for the growing number of handheld users. A high level of data integrity is achieved with the three-tiered system of security: password policy enforcement, strong industry standard data encryption and fail-safe bitwiping. The Altiris Security Solution for Handhelds Policy Editor is provided so that you can centrally control and tailor the configuration and management of security policies to the requirements of distinct end user collections. For example, administrators are given the option of encrypting all or selected databases or allowing only approved applications to launch. Brute Force attacks can be prevented by automatically launching Altiris Bitwipe technology to wipe databases, applications or folders upon too many unsuccessful password attempts. The solution also allows you to encrypt data stored on external storage cards or on virtual volumes within internal device memory. Notes: This release of Altiris Security Solution for Handhelds only supports Pocket PC and RIM handhelds. Altiris will soon update the solution to include Palm OS support and it will be available from the Altiris Solution Center. A separate end user reference guide is included with Altiris Security Solution for Handhelds. This end user guide provides instructions to help end users work with the solution on their handheld. The information in the end user guide can be copied and customized into a help guide that you may wish to build and distribute for your specific implementation of the solution. Altiris Security Solution 6.1 for Handhelds Administrator Guide 5

6 Chapter 2: Installing Altiris Security Solution for Handhelds This chapter provides information on installing and licensing Altiris Security Solution for Handhelds on the Notification Server. This chapter also explains the installation of Altiris Security Solution for Handhelds on Pocket PC and RIM handhelds, and their prerequisites. Prerequisites Altiris Security Solution for Handhelds is designed to work with Notification Server. We recommend that you use the most current release of Notification Server 6.0. For more information on installing the Notification Server, see Setup and Installation in the Altiris Notification Server Help. Pocket PC Handhelds Altiris Security Solution for Handhelds supports most handhelds based on the Pocket PC 2002 and Windows Mobile 2003 operating systems. An administrator Pocket PC handheld that has the typical applications and databases found on end user handhelds is required to configure proper policy settings. A Windows based computer with Microsoft ActiveSync installed and a partnership with the administrator Pocket PC handheld to import policy template data. The Altiris Pocket PC Agent must be installed on all Pocket PC handhelds that are to be protected with the solution. The Altiris Security Solution for Handhelds and the security policy files are distributed to end user handhelds through this agent. The solution requires that the administrator first configure an administrator Pocket PC handheld that has the typical applications and databases that end users have on their handhelds. The solution provides the Altiris Security Solution for Handhelds Policy Editor to help you define security policies for your organization. The Policy Editor requires Microsoft ActiveSync to read the applications and databases on the administrator Pocket PC handheld. These applications and databases make up your policy template data that can then be customized with the editor to suit your organizations needs. It is not necessary to install the Policy Editor on the Notification Server. Instructions are contained within this guide that explains how to copy the Policy Editor executable to a separate Windows desktop/laptop for security policy configurations. Note: Microsoft ActiveSync is available as a free download from windowsmobile/resources/downloads/pocketpc/activesync37.mspx. RIM Handhelds Altiris Security Solution for Handhelds is compatible with RIM 850, 857, 950, and 957 handhelds. RIM Desktop Manager and the Altiris Windows Notification Server Agent installed on end users desktops and laptops synchronizes with the RIM handheld. For more information on the Windows Notification Server Agent installation, see Altiris Notification Server Help. RIM handheld software version 2.6 or greater provided by your RIM re-seller must have been installed on the end users RIM handheld through the host computer that will receive the installation files. Discovery policies exist within the solution to help administrators determine if this requirement has been met. Note: RIM Desktop and Handheld software are available for download from products/software/index.shtml. Altiris Security Solution 6.1 for Handhelds Administrator Guide 6

7 Chapter 2: Installing Altiris Security Solution for Handhelds Installing Altiris Security Solution for Handhelds on the It is recommended that you first install Inventory Solution for RIM Blackberry from Altiris on the RIM handheld before installing Altiris Security Solution for Handhelds. For more information on installation of Inventory Solution on RIM Blackberry, see Inventory Solution For RIM Blackberry Product Guide. No administrator handheld is required to configure RIM security policies. Altiris Security Solution for Handhelds must be installed on the RIM handheld prior to sending customized policy files. Policy files that are sent prior to installing Altiris Security Solution for Handhelds will not be processed. Important Items Before You Begin It is recommended that you first configure and test Altiris Security Solution for Handhelds in a controlled environment prior to rolling out to end users. This ensures that all settings have been verified and no undesirable settings have been enabled that would restrict the end user from operating their handheld. The Policy Editor requires that you set up an administrator password. Please ensure that the password you set up will not be used by an end user. Having the same password for both the administrator and end user will cause the solution to work incorrectly. Note: The following are end user handheld options that are end user configured only. The end user can access the following settings on their handheld: Pocket PC Decrypt PIM databases after unlock. Personal Information Management (PIM) databases are decrypted "on-the-fly." When the user requests for access to a PIM application, the database will decrypt to allow access. Users can enable the Decrypt PIM databases after unlock setting and all PIM databases are decrypted upon unlocking the handheld. End users may not delete any of the administrator's selections for wipe or encryption of databases and folders, but end users can add to the administrator's selections of databases and folders to wipe or encrypt. RIM Clear Memory option wipes unallocated memory. The standard RIM OS does not wipe unallocated memory and vital information may still be available on the handheld even after deletion. Clear Memory allows the end user to wipe these unallocated memory bits. End user is required to set the handheld wipe password. The wipe password is different from the authentication password. The wipe password can be enabled by the end user. If the wipe password is entered, Altiris Security Solution for Handhelds immediately wipes databases that have been selected for wiping. Installing Altiris Security Solution for Handhelds on the Notification Server You can install Altiris Security Solution for Handhelds on the Notification Server using the Altiris Console. To install the Altiris Security Solution for Handhelds 1 Click Start > Programs > Altiris > Altiris Console. 2 On the Altiris Console, click the Configuration tab. 3 On the treeview pane, click Configuration > Solutions Settings > Upgrade/Install Additional Solutions. 4 On the content pane, click the Available Solutions tab, and then click Solutions. 5 From the list of solutions, select Security Solution for Handhelds. The Solution Update screen appears. 6 On the Solution Update screen, click Start to begin the solution download. Altiris Security Solution 6.1 for Handhelds Administrator Guide 7

8 Chapter 2: Installing Altiris Security Solution for Handhelds Licensing When the download completes, on the content pane, click the Currently Installed tab. Here, you can view all the solutions that you have installed. Licensing Each Altiris product comes with a 10-day trial license that is installed by default. You can register and obtain a 30-day evaluation license through our web site at or purchase a full product license. The trial license installed on the handheld is valid for 15 days. To apply your product license within the Altiris Console, navigate to Configuration > Licensing > Install License. Browse to the folder that you saved your license file to or copy and paste the contents of the license in the pane provided. Select Install License to apply the settings. Navigate to the License Status tab and select Refresh to view the updated status. A registration key is required on end user handhelds to register the application. On the Altiris Console, click the Configuration tab. Navigate to Configuration > Solutions Settings > Security Solution for Handhelds > Security Solution for Handhelds - Security Policy Configuration. The registration key number is displayed on the content pane of Altiris Security Solution for Handhelds page in the License Key box. There is a single registration key number applicable to all handhelds regardless of operating system. The registration number found in the License Key box should be typed in the Policy Editor application when defining security policies. This registration number is sent to end user handhelds as part of the security policy and registers the end user s handheld as a valid application user. Altiris Security Solution 6.1 for Handhelds Administrator Guide 8

9 Chapter 3: Altiris Security Solution for Handhelds Policy Editor The Altiris Security Solution for Handhelds Policy Editor allows you to customize settings for the installation of Altiris Security Solution for Handhelds on end user handhelds. This includes features such as, auto lock, bomb functionality, and database encryption. Altiris Security Solution for Handhelds Policy Editor supports multiple policy configurations or groups. You can specify different policy settings for each group of end users, simplifying the entire policy management process. Quick Links Installing the Policy Editor (page 9) Customizing Security Policies (page 10) Saving Policy Files (page 22) Installing the Policy Editor Use the Policy Editor to create new policies and modify them. The policies can be customized to suit the security requirement of the organization. For more information on customizing policies, see Customizing Security Policies on page 10. For Pocket PC protection, the solution requires that the administrator first configures an administrator Pocket PC handheld that has the typical applications and databases that end users have on their handhelds. The solution provides the Policy Editor to help you define security policies for your organization. The Policy Editor requires the use of Microsoft ActiveSync to read the applications and databases on the administrator Pocket PC handheld. It is not necessary that the Policy Editor be installed on the Notification Server. Instructions below explain how to copy the Policy Editor executable to a separate Windows desktop or laptop for security policy configurations. For RIM protection, no administrator handheld is required to configure security policies. However, it is recommended that you test your policies on an administrator handheld prior to rolling out the policy in production environment. To install the Policy Editor on a Windows computer 1 Locate the AltirisSecuritySolutionPolicyEditor.exe in the C: > Program Files > Altiris > Security Solution for Handhelds > Admin folder on the Notification Server. 2 Copy the executable file to the desktop computer that syncs with the administrator handheld. 3 Run the executable file. Note: The Policy Editor executable file is not recommended to be executed on the Notification Server. 4 After the installation is complete, click Start > Programs > Altiris > Solutions > Handheld Management Suite > Altiris Security Solution > Altiris Security Solution for Handhelds Policy Editor to launch the Policy Editor. Altiris Security Solution 6.1 for Handhelds Administrator Guide 9

10 Chapter 3: Altiris Security Solution for Handhelds Policy Editor Customizing Security Policies Customizing Security Policies Create a custom policy that fit the requirements of your organization by altering the security settings. The different sections of the Policy Editor program are described below: Group Info Tab (page 10) Password Tab (page 10) General Tab (page 12) PocketPC Tab (page 16) RIM Tab (page 20) Group Info Tab Use the Group Info tab to specify details about the new group, such as end users who receive the set of policy files. You can create a group for each handheld type, and then policy for each group. You can differentiate groups depending on types of handhelds. This helps in creating customized policies for each type of handheld. Notes: You should not use the same security policy for all the handhelds. The following items in the Group Info tab are not sent to end user handhelds as part of the policy settings. Group Info Tab Options Feature Description Group Name Displays the group name. To change the Group Name, left-click the group name in the left pane under the Groups folder. Description Helps distinguish one group s settings from another. You can enter the description in the Description box. Password Tab Use the Password tab to configure the administrator password settings. You can also set password rules for end user handhelds in this section. Setting the Administrator Password For Altiris Security Solution for Handhelds to function properly it is required that you first set an administrator password. The administrator password is also required to uninstall the solution from the end user handhelds. In this section you can set or modify the administrator password, and set password rules for end users. You first need to install the Policy Editor. For more information in installation of Policy Editor, see Installing the Policy Editor on page 9. To set the Administrator password 1 Open the Altiris Security Solution for Handhelds Policy Editor. Note: If you are launching the Policy Editor for the first time, you see a New Group window. 2 Click Groups on the left pane, and then click the New Group icon. 3 Type a name for this new Group in the Name box. 4 Type the administrator password in the Password box. 5 Re-type the administrator password in the Confirm Password box. 6 Click OK. Altiris Security Solution 6.1 for Handhelds Administrator Guide 10

11 Chapter 3: Altiris Security Solution for Handhelds Policy Editor Customizing Security Policies To change the Administrator password 1 Open the Altiris Security Solution for Handhelds Policy Editor. 2 Select the Group for which you need to change the password. 3 In the Password tab, type the new administrator password in the Password box. 4 Re-type the administrator password in the Confirm Password box. 5 Type the old password in the Old Password box. 6 Re-type the old administrator password in the Verify Old Password box. 7 Click OK. Important: Please ensure that the password you choose will not be used by an end user. Having the same password for both the administrator and end user will cause the solution to work incorrectly. Password Tab Options Feature Password Administration Password Verify password Old password Verify old password Password history length Description The items in this section are for password administration. Used to enter the new administrator password. Note: When you initially create a new Group, you are prompted to set up an administrator password; however, you may change the administrator password later. Used to confirm the administrator password. Used to enter the old administrator password. Used to confirm the old administrator password. Used to track end users passwords to ensure that they do not repeatedly use the same password. Create unlock password End User Password Rules Minimum password length Requires both letters and digits By increasing the password history length, you can set a number of passwords for Altiris Security Solution for Handhelds to remember. With a setting of 1, Altiris Security Solution for Handhelds remembers the end user s current password, so that they cannot use it twice in a row. Setting this option to 2 makes the Altiris Security Solution for Handhelds remember the current and previous password, and setting this option to 3 will remember the current password as well as the prior two, and so on. Used to create a temporary unlock password, which is valid for 60 minutes. The temporary unlock password is used when an end user has forgotten their password. The temporary unlock password is unique for a given handheld, its time and date, and the user group it has been assigned to. For instructions on how to generate a temporary unlock password, see To generate a temporary unlock password on page 12. You can control the password rules governing the end user's password. This password is used to access the handheld. These rules include minimum password length, alphanumeric requirement, and password expiration. Select the appropriate check box for the options that you require. Used to enforce a minimum password length. The minimum length for the password is decided by the value selected from the drop-down list. Used to enforce that both letters and digits are required in the end user s password. Altiris Security Solution 6.1 for Handhelds Administrator Guide 11

12 Chapter 3: Altiris Security Solution for Handhelds Policy Editor Customizing Security Policies Password Tab Options Feature Change password after Disable use buttons to enter password To generate a temporary unlock password For Pocket PC handheld, before generating the temporary unlock password, the end user needs to tap the button marked ID on the main lockout screen of their Pocket PC handheld, note the ID number, and give the ID number to the administrator. For RIM handheld, before generating the temporary unlock password, the end user needs to type REMOTECODE in the Password box of their RIM handheld, retrieve their device ID, and give the device ID number to the administrator. 1 Open the Policy Editor, and click the Password tab. 2 Click Create unlock password. This displays Unlock Password dialog box. 3 Type the ID Number generated by the end user handheld in the Device ID box. 4 Set the time and date for which the password will begin to be effective. 5 Click OK. Note: The time for which the temporary unlock password is valid relates to the end user s handheld time, and not the workstation time from which the temporary unlock password is generated. You should consider time zones when generating unlock passwords for end users. 6 Ensure that the end user enters the generated temporary password in their handheld. 7 The end user is then asked to reset their handheld password. General Tab Description Use the General tab to define the activation, bomb, user, lockdown, and other properties. The various sections of the General tab are explained in the following tables. Activation section Used to prompt the end user to change their password after a specific amount of time. The time period is decided by the value selected from the drop-down list. Note: Both 12 months and 1 year are shown as available options. Use 12 months instead of 1 year. Disables the use of hardware buttons to enter end user password for the handheld. Use the Activation section to activate settings to lock the handheld when turned off completely or after being turned off for a specified time. Altiris Security Solution 6.1 for Handhelds Administrator Guide 12

13 Chapter 3: Altiris Security Solution for Handhelds Policy Editor Customizing Security Policies Activation Section Options Element Description Auto lock on power Used to set Altiris Security Solution for Handhelds to automatically lock the off (on timeout for handheld when it is turned off, or optionally, after the handheld has been RIM handhelds) turned off for a specified amount of time. If off more than x minutes User Can Override You can choose to allow end users to control most settings on the client handheld by enabling this option. Selecting the check box next to this setting enables this feature on the client s handheld. Selecting the User Can Override check box allows the end user to modify the initial settings for the designated options. Clearing the User Can Override check box prevents the end user from changing the initial settings for the corresponding option. Note: It is recommended that you do not enable the User Can Override setting for RIM handhelds. Enabling this setting allows the end user to disable enforcement of password protection. Used to automatically lock the handheld when it has been turned off for a specified amount of time. Bomb section User Can Override Selecting the User Can Override check box allows the end user to modify the initial settings for the designated options. Clearing the User Can Override check box prevents the end user from changing the initial settings for the corresponding option. Note: For RIM handhelds this setting controls how long the default timeout is set at. Selecting User Can Override allows the end user to change the default timeout values to meet their specific requirements. Altiris Security Solution for Handhelds protects against brute force password attacks with data bitwipe functionality, or the bomb. You can set security policies such as wipe data after x failed logon attempts or wipe data if not synchronized in x days. If the bomb is triggered, then all data flagged for bitwiping is completely erased; not only is the data erased, it is also overwritten to ensure that it cannot be recovered. Altiris Security Solution 6.1 for Handhelds Administrator Guide 13

14 Chapter 3: Altiris Security Solution for Handhelds Policy Editor Customizing Security Policies Bomb Section Options Element Attempts limit Description Used to allow Altiris Security Solution for Handhelds to either activate the bitwiping process, or lockout the end user if a specified number of incorrect passwords are entered in the lockout screen. Method Bitwipe storage card if bomb is triggered If not synced (with end users host PC) User Can Override Selecting the User Can Override check box allows the end user to modify the initial settings for the designated options. Clearing the User Can Override check box prevents the end user from changing the initial settings for the corresponding option. Used to select the method of data protection. Wipe This method initiates the bitwiping process on selected databases and folders when the attempts limit has been met. Lockout This method permanently locks the handheld when the attempts limit has been met. The end user's password no longer allows access to their handheld and they are required to contact the administrator to generate a temporary unlock password using the temporary unlock utility. Used to destroy the contents of any storage card connected to the handheld when the bomb is triggered. The bomb triggers due to one of the following reasons: When the end user exceeds the number of log on attempts than the number specified in the settings. When the end user enters a wipe password in the lockout screen. If the handheld has not synced with the host computer within the time specified in the security policy. If an immediate bitwipe policy is sent. Used to activate the data protection bitwiping process if the handheld has not synced within a specified amount of time (specified in days and hours) with the end users host computer. Note: The administrator selects databases and folders that are erased if the bomb is triggered. User section User Can Override Selecting the User Can Override check box allows the end user to modify the initial settings for the designated options. Clearing the User Can Override check box prevents the end user from changing the initial settings for the corresponding option. Use the User section to set whether information about the owner of the handheld is displayed on the lockout screen. These settings are explained below. Altiris Security Solution 6.1 for Handhelds Administrator Guide 14

15 Chapter 3: Altiris Security Solution for Handhelds Policy Editor Customizing Security Policies User Section Options Element Show user information Description Used to display the information listed in the handheld s owner information on the lockout screen. User Can Override Selecting the User Can Override check box allows the end user to modify the initial settings for the designated options. Clearing the User Can Override check box prevents the end user from changing the initial settings for the corresponding option. Note: The end user should only enter their Owner Information in the handheld s Owner Information section. They should not enable Show Owner Information when the device is turned on through the default device owner settings. Altiris Security Solution will show the Owner Information automatically upon startup. If the default handheld Show Owner Information upon startup setting is enabled, Altiris Security Solution will work to minimize this window upon start up and will cause a delay before the user can use the handheld. Lockdown Communications section Use the Lockdown Communication section to prevent the end user from using IrDA, WiFi and Bluetooth, and Speaker/Microphone. The various settings involved in this section are explained below. Lockdown Communications Options Element IrDA (Infrared Beaming) Description Prevents end users handhelds from receiving or sending data via the infrared (IrDA) port. Selecting the IrDA check box disables infrared beaming. Clearing the check box to enables IrDA. WiFi and Bluetooth Prevents end users handhelds from receiving or sending WiFi and Bluetooth wireless signals. Selecting the WiFi and Bluetooth check box disables WiFi and Bluetooth. Clearing the check box enables wireless communication. Speaker/ Microphone Note: Both Bluetooth and WiFi are disabled. There is no option to enable any one of the two. Disables the ability of recording and playing back of sounds on the end user s handheld. Immediate Security Actions section Use the Immediate Security Actions section to immediately lock the handheld, immediately bitwipe, and force encrypted memory card use, when inserted into the handheld. The various options in this section are explained below. Immediate Security Actions Options Element Lock the handheld immediately Description Locks the handheld immediately upon uploading the new policy to the handheld. Altiris Security Solution 6.1 for Handhelds Administrator Guide 15

16 Chapter 3: Altiris Security Solution for Handhelds Policy Editor Customizing Security Policies Immediate Security Actions Options Element Immediate bitwipe Force encrypted memory card use PalmOS Tab Description Use the PalmOS tab to customize the settings specific to Altiris Security Solution for Handhelds for the Palm operating system. This tab is further divided into several sections. Note: Although the Policy Editor includes a Palm OS tab, this release of Security Solution for Handhelds does not yet support security policies for Palm operating system handhelds. Palm OS support will be coming shortly and will be available from the Altiris Solution Center when released. PocketPC Tab Bitwipes selected data upon uploading the new policy file to the handheld. Enable this option to require that any memory cards inserted into the handheld are formatted with a password protected encrypted volume, before the memory card can be read from or written to. Note: Be careful while using this option as it requires end users to format their memory card upon initial insertion, and completely wipes all the data from the card. When this option is enforced, end users are shown a warning upon card insertion indicating that their memory card will be formatted and all previous data erased. If they select not to proceed with the format, the memory card will not be available. Use the PocketPC tab to customize the settings that are specific to Altiris Security Solution for Handhelds for Pocket PC handhelds. The administrator Pocket PC handheld is used in this section to configure security policies for end user Pocket PC handhelds. You must have the administrator Pocket PC handheld connected to the computer via ActiveSync that is running the Policy Editor at the time of data import. The administrator Pocket PC handheld is one that has all of the standard applications and databases that your end users have on their handhelds. You also must first install the Altiris Security Solution for Handhelds on the administrator Pocket PC handheld prior to importing template information. Failure to do so results in unexpected errors. For more information, see Configuration on page 23. Importing Template Information There are several buttons on the Pocket PC tab, such as, Encrypted Databases, Encrypted Folders, Protected Applications, Approved Applications, Wiped Databases, and Wiped Folders. Clicking these buttons opens new dialog boxes that display the contents on the handheld currently connected to the computer via Microsoft ActiveSync. Each dialog box has a button labeled Import. To import template information Click Import. Use this button to begin importing template information from the connected handheld. Note: You must have the administrator Pocket PC handheld connected to the computer, via ActiveSync, that is, running the Policy Editor at the time of data import. You also must first install the Altiris Security Solution for Handhelds on the administrator Pocket PC handheld prior to importing template information. Failure to do so results in unexpected errors. For more information, see Configuration on page 23. If you do not wish to use the features "Protected Applications" or "Approved Applications" it is recommended that you keep these boxes clear and do not import applications from the handheld within these sections Altiris Security Solution 6.1 for Handhelds Administrator Guide 16

17 Chapter 3: Altiris Security Solution for Handhelds Policy Editor Customizing Security Policies Encryption section For Pocket PC handheld users, there is an option to modify the encryption settings. Encryption Section Options Element Description Algorithm Allows you to set which encryption algorithm to use when encrypting files and databases on the Pocket PC handheld. The three options available for encryption algorithm are: None Encryption Algorithm is not applicable. Fast This is a proprietary encryption algorithm that is relatively fast. This option offers good security for the time needed to encrypt data. Strong This is a stronger form of encryption that takes longer than Fast. This option is offered in 128-bit and 512-bit Blowfish versions, as well as 128-bit and 256- bit AES versions. Lock on reset Auto Encrypt New Databases User Can Override Selecting the User Can Override check box allows the end user to modify the initial settings for the designated options. Clearing the User Can Override check box prevents the end user from changing the initial settings for the corresponding option. Activates the Altiris Security Solution for Handhelds Lock if the Pocket PC handheld is reset. User Can Override Selecting the User Can Override check box allows the end user to modify the initial settings for the designated options. Clearing the User Can Override check box prevents the end user from changing the initial settings for the corresponding option. Automatically encrypts new databases. Select this check box to activate this feature. Note: Automatically encrypting new databases can cause some applications to quit responding or not work at all. Encrypted Databases User Can Override Selecting the User Can Override check box allows the end user to modify the initial settings for the designated options. Clearing the User Can Override check box prevents the end user from changing the initial settings for the corresponding option. Altiris Security Solution for Handhelds allows you to administer the selection of databases that are encrypted on the end user s Pocket PC handheld. To encrypt Pocket PC databases 1 Open the Altiris Security Solution for Handhelds Policy Editor. 2 Click the Pocket PC tab. 3 Click Encrypted databases. 4 Initiate the ActiveSync session, then click Import. Altiris Security Solution 6.1 for Handhelds Administrator Guide 17

18 Chapter 3: Altiris Security Solution for Handhelds Policy Editor Customizing Security Policies This imports all the existing Pocket PC handheld databases to the open dialog box. 5 Select the check box against the database that you want to protect for encryption. Clear the check box to prevent the associated database from being encrypted. 6 Click OK. Note: This is an optional procedure for customizing the databases for encryption beyond the standard Personal Information Manager (PIM) databases. If you do not want to import any information, there is a standard list of PIM databases to use. Encrypted Folders Altiris Security Solution for Handhelds allows you to administer the selection of folders that are encrypted on the end user s Pocket PC handheld. To encrypt folders 1 Open the Altiris Security Solution for Handhelds Policy Editor. 2 Click the Pocket PC tab. 3 Click Encrypted folders. 4 Initiate ActiveSync session, then click Import. This imports all the existing Pocket PC handheld folders to the open dialog box. 5 Select the check box against folders that you want to protect for encryption. Clear the check box to prevent the associated database from being encrypted. 6 Click OK. Notes: This is an optional procedure to customize the folders for encrypting beyond the standard folders list. If you do not want to import any information, there is a standard list of folders to use. It is not recommended that you encrypt the Windows, Temp, Connection Manager or Documents and Settings folders on Pocket PC handhelds. Protected Applications Altiris Security Solution for Handhelds allows you to administer the selection of applications on the end user s Pocket PC handheld that are protected with a password (the end user is prompted for their handheld password before the selected applications can run). This feature is typically used when organizations deploy specific applications to end users that contain company data. If an end user handheld is compromised prior to the handheld being locked, this setting prevents the protected application from being launched if a valid password is not entered. To protect applications 1 Open the Altiris Security Solution for Handhelds Policy Editor. 2 Click the Pocket PC tab. 3 Click Protected applications. 4 Initiate ActiveSync session, then click Import. This imports all the existing Pocket PC handheld applications to the open dialog box. 5 Select the check box against the applications that you want to prompt for password protection. Clear the check box to prevent the associated application from being prompted for password protection. 6 Click OK. Notes: This is an optional procedure to customize the applications that require application launch protection. If you do not wish to use this feature it is recommended that you clear the protected Altiris Security Solution 6.1 for Handhelds Administrator Guide 18

19 Chapter 3: Altiris Security Solution for Handhelds Policy Editor Customizing Security Policies applications box and do not import applications from the handheld. Use the Clear setting if you have mistakenly imported applications. Certain types of applications can be missing from the protected applications list even after performing an import. To add an application to this list, use the Pocket PC handheld s default File Explorer to create a shortcut to the hidden application s.exe file within the My Device\Windows\Start menu folder. Import the application list into the Policy Editor once again to allow launch protection of the newly added applications. Approved Applications Altiris Security Solution for Handhelds allows you to administer the selection of applications that Pocket PC end users are allowed to launch. To approve applications 1 Open the Altiris Security Solution for Handhelds Policy Editor. 2 Click the Pocket PC tab. 3 Click Approved applications. 4 Initiate ActiveSync session, then click Import. This imports all the existing Pocket PC handheld applications to the open dialog box. 5 Select the check box against the application for approval or clear the check box to prevent the associated application from being allowed to launch. Notes: Any application that does not appear in the Approved application list is not allowed to launch. Do not import applications if you do not want to enforce this option. Use the Clear setting if you have mistakenly imported applications. The standard PIM applications are always approved for launch, regardless of the settings specified in this dialog box. Certain type of applications can be missing from the Approved applications list even after performing an import action. To add an application to this list, use the Pocket PC handheld s default File Explorer to create a shortcut to the hidden application s.exe file within the My Device\Windows\Start menu folder. Import the application list into the Policy Editor once again to allow approval for these applications. Wiped Databases Altiris Security Solution for Handhelds allows you to select the databases to be deleted if the bomb is triggered on end users Pocket PC handheld. Altiris Security Solution for Handhelds protects against brute force password attacks with data bitwipe functionality, or the bomb. You can set security policies such as wipe data after x failed logon attempts or wipe data if not synchronized in x days. If the bomb is triggered, then all the data flagged for bitwiping is completely erased (wiped); not only is the data erased, it is also overwritten to ensure that it cannot be recovered. To wipe databases 1 Open the Altiris Security Solution for Handhelds Policy Editor. 2 Click the Pocket PC tab. 3 Click Wiped databases. 4 Initiate ActiveSync session, then click Import. This imports all the existing Pocket PC handheld databases to the open dialog box. 5 Select the check box against the database to mark it for deletion when the bomb is triggered. Clear the check box to prevent the deletion of the associated database when the bomb is triggered. Altiris Security Solution 6.1 for Handhelds Administrator Guide 19

20 Chapter 3: Altiris Security Solution for Handhelds Policy Editor Customizing Security Policies Note: This is an optional procedure to customize the databases for wiping when the bitwiping bomb is triggered. If you do not want to import any databases, there is a standard list of PIM databases that you can use. Wiped Folders Altiris Security Solution for Handhelds allows you to select the folders to be deleted if the bomb is triggered on end users Pocket PC handhelds. Altiris Security Solution for Handhelds protects against brute force password attacks with data bitwipe functionality, or the bomb. You can set security policies such as wipe data after x failed logon attempts or wipe data if not synchronized in x days. If the bomb is triggered, then all the data flagged for bitwiping is completely erased (wiped); not only is the data erased, it is also overwritten to ensure that it cannot be recovered. To wipe folders 1 Open the Altiris Security Solution for Handhelds Policy Editor. 2 Click the Pocket PC tab. 3 Click Wiped folders. 4 Initiate ActiveSync session, then click Import. This imports all the existing Pocket PC handheld folders to the open dialog box. 5 Select the check box against the folder to mark it for deletion when the bomb is triggered. Clear the check box to prevent the deletion of the associated folder when the bomb is triggered Note: This is an optional procedure to customize the folders for bitwiping when the bomb is triggered. If you do not want to import any folders, there is a standard list of folders to use. License Number Enter the license key provided to you when you purchased Altiris Security Solution for Handhelds. For more information on locating your license key, see Licensing on page 8. The license key is then transferred via the policy file to the end user s handheld. This is to ensure that all end user handhelds are registered when you distribute your policy files to them. RIM Tab Use the RIM tab to customize settings that are specific to Altiris Security Solution for Handhelds for RIM handhelds. Encryption Altiris Security Solution for Handhelds provides options to select the type of encryption to be used on end users RIM handhelds. To select the type of encryption 1 Open the Altiris Security Solution for Handhelds Policy Editor. 2 Click the RIM tab. 3 Select the encryption type, Fast or Strong, from the drop-down list. 4 Select User Can Override to allow the end user to modify the initial settings for the designated options. Clear this check box to prevent the end user from changing the initial settings for the cleared options. Note: We do not recommend enabling User Can Override for this setting. Altiris Security Solution 6.1 for Handhelds Administrator Guide 20

21 Chapter 3: Altiris Security Solution for Handhelds Policy Editor Customizing Security Policies Encryption of Databases Altiris Security Solution for Handhelds provides options to select which databases are encrypted on end users RIM handhelds. To select specific databases for encryption protection 1 Open the Altiris Security Solution for Handhelds Policy Editor. 2 Click the RIM tab. 3 Select the check box against the Encrypt databases options that you want to force encryption on. You can select one or more of the options from Mail, Tasks, Memo, and Address book. 4 Select User Can Override to allow the end user to modify the initial settings for the designated options. Note: We do not recommend enabling User Can Override for this setting. Remote Bitwipe Feature Altiris Security Solution for Handhelds provides the option to immediately bitwipe certain databases remotely on end users RIM handhelds if the handheld is deemed lost or stolen. To remotely bitwipe selected databases 1 Open the Altiris Security Solution for Handhelds Policy Editor. 2 Click the RIM tab. 3 Select the check box for the Destroy selected device contents above option. Make sure that you have selected the check boxes against the databases that you wish to remotely delete. 4 Make sure that your administrator password is correctly typed in the admin password fields in the Password tab. 5 Distribute this policy file using the Sample Security Policy task. For more information, see To deploy policy files to RIM handhelds via on page 28. Notification of Administrator Level Events Altiris Security Solution for Handhelds provides the option to notify the administrator of security policy events for RIM handhelds through . Altiris Security Solution for Handhelds sends an note to the administrator specifying when a policy file has been accepted by an end user handheld. To notify the administrator via 1 Open the Altiris Security Solution for Handhelds Policy Editor. 2 Click the RIM tab. 3 Select the check box against the Notify administrator about security events via . 4 Type the address where you would like to send the notifications, in the box. Note: The administrator does not receive a notification when selecting to remotely destroy selected handheld contents. License Number Enter the license key provided to you when you purchased Altiris Security Solution for Handhelds. For more information on locating your license key, see Licensing on page 8. The license key is then transferred via the policy file to the end users handheld. This is to ensure that all end user handhelds are registered when you distribute your policy files to them. Altiris Security Solution 6.1 for Handhelds Administrator Guide 21

ALTIRIS CONNECTOR 6.0 FOR HP SYSTEMS INSIGHT MANAGER PRODUCT GUIDE

ALTIRIS CONNECTOR 6.0 FOR HP SYSTEMS INSIGHT MANAGER PRODUCT GUIDE ALTIRIS CONNECTOR 6.0 FOR HP SYSTEMS INSIGHT MANAGER PRODUCT GUIDE Notice Copyright 1998-2004 Altiris Inc. All rights reserved. Product Version: 6.0 Document Date: June 11, 2004 Bootworks U.S. Patent No.

More information

ALTIRIS APPLICATION MANAGEMENT SOLUTION 6.0 SP1 HELP

ALTIRIS APPLICATION MANAGEMENT SOLUTION 6.0 SP1 HELP ALTIRIS APPLICATION MANAGEMENT SOLUTION 6.0 SP1 HELP Notice Copyright 2000-2004 Altiris Inc. All rights reserved. Product Version: 6.0 Document Date: December 21, 2004 Bootworks U.S. Patent No. 5,764,593.

More information

ALTIRIS Connector Pack 6.0 for Remedy Product Guide

ALTIRIS Connector Pack 6.0 for Remedy Product Guide ALTIRIS Connector Pack 6.0 for Remedy Product Guide Notice Altiris Connector Pack 6.0 for Remedy Copyright 1998-2005 Altiris, Inc. All rights reserved. Document Date: October 31, 2005 Bootworks U.S. Patent

More information

ALTIRIS. Inventory Solution for Network Devices 6.0 SP2 Help

ALTIRIS. Inventory Solution for Network Devices 6.0 SP2 Help ALTIRIS Inventory Solution for Network Devices 6.0 SP2 Help Notice Inventory Solution 6.0 for Network Devices Product Guide 2001-2005 Altiris, Inc. All rights reserved. Document Date: January 17, 2007

More information

ALTIRIS CONNECTOR PACK 6.0 FOR HP OPENVIEW PRODUCT GUIDE

ALTIRIS CONNECTOR PACK 6.0 FOR HP OPENVIEW PRODUCT GUIDE ALTIRIS CONNECTOR PACK 6.0 FOR HP OPENVIEW PRODUCT GUIDE Notice Copyright 1998-2005 Altiris Inc. All rights reserved. Product Version: 6.0 Document Date: March 9, 2005 Bootworks U.S. Patent No. 5,764,593.

More information

Software Delivery Solution 6.1 SP1 HF2 for Windows Release Notes

Software Delivery Solution 6.1 SP1 HF2 for Windows Release Notes Software Delivery Solution 6.1 SP1 HF2 for Windows Release Notes February 17, 2006 NOTICE The content in this document represents the current view of Altiris as of the date of publication. Because Altiris

More information

HP CLIENT MANAGER 6.1 PRODUCT GUIDE

HP CLIENT MANAGER 6.1 PRODUCT GUIDE HP CLIENT MANAGER 6.1 PRODUCT GUIDE Notice HP Client Manager Copyright 2003-2005 Altiris Inc. All rights reserved. Product Version: 6.1 Document Date: June 29, 2005 Bootworks U.S. Patent No. 5,764,593.

More information

NotifySync 4.7. Notify Technology Corporation

NotifySync 4.7. Notify Technology Corporation 1 NotifySync 4.7 Notify Technology Corporation Device Requirements 2 BlackBerry OS 4.1 4.7 (5.0 coming soon) 4.5.0 and later Attachments can be downloaded and saved to the file system or SD Card. Any attachment

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Sophos Central Device Encryption. Administrator Guide

Sophos Central Device Encryption. Administrator Guide Sophos Central Device Encryption Administrator Guide Contents About... 1 Manage BitLocker Drive Encryption... 2 Migrate to...2 Prepare Device Encryption...3 Device Encryption step by step... 3 Device Encryption

More information

Mobility Manager 9.5. Users Guide

Mobility Manager 9.5. Users Guide Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks

More information

BlackBerry Wireless Handheld Getting Started Guide

BlackBerry Wireless Handheld Getting Started Guide BlackBerry Wireless Handheld Getting Started Guide Phone button Open the phone screen Earpiece Headset jack USB port Notification LED Trackwheel Select or click an item Escape button Exit a screen Alt

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

RSA Authentication Manager 7.1 Help Desk Administrator s Guide

RSA Authentication Manager 7.1 Help Desk Administrator s Guide RSA Authentication Manager 7.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,

More information

ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference. December 2016

ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference. December 2016 ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference December 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

BlackBerry Wireless Handheld Getting Started Guide

BlackBerry Wireless Handheld Getting Started Guide BlackBerry Wireless Handheld Getting Started Guide Phone button Open the phone screen Earpiece Headset jack USB port Notification LED Trackwheel Select or click an item Escape button Exit a screen Alt

More information

ALTIRIS Local Recovery Pro 6.2 SP1 Help

ALTIRIS Local Recovery Pro 6.2 SP1 Help ALTIRIS Local Recovery Pro 6.2 SP1 Help Notice Local Recovery Pro 6.2 SP1 1994-2006 Altiris, Inc. All rights reserved. Document Date: July 19, 2006 Protected by one or more of the following U.S. Patents:

More information

One Identity Password Manager User Guide

One Identity Password Manager User Guide One Identity Password Manager 5.8.2 User Guide Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

DISCLAIMER COPYRIGHT List of Trademarks

DISCLAIMER COPYRIGHT List of Trademarks DISCLAIMER This documentation is provided for reference purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this documentation, this documentation

More information

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2 Forescout Version 1.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

BlackBerry Wireless Handheld Getting Started Guide

BlackBerry Wireless Handheld Getting Started Guide BlackBerry Wireless Handheld Getting Started Guide Headset jack Earpiece Notification LED Phone button Open the phone screen Trackwheel Select or click an item Escape button Exit a screen Alt key Type

More information

Application Security for Java-based BlackBerry Handhelds

Application Security for Java-based BlackBerry Handhelds Application Security for Java-based Originally posted: February 2003 Latest revision: May 2003 Introduction Corporate data access capabilities supported by the BlackBerry platform enable wireless connectivity

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

TechDirect User's Guide for ProDeploy Client Suite

TechDirect User's Guide for ProDeploy Client Suite TechDirect User's Guide for ProDeploy Client Suite Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates

More information

NETWRIX GROUP POLICY CHANGE REPORTER

NETWRIX GROUP POLICY CHANGE REPORTER NETWRIX GROUP POLICY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 November 2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

ZENworks 2017 Update 2 Endpoint Security Agent Reference. February 2018

ZENworks 2017 Update 2 Endpoint Security Agent Reference. February 2018 ZENworks 2017 Update 2 Endpoint Security Agent Reference February 2018 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

Novell ZENworks Handheld Management

Novell ZENworks Handheld Management Administration Guide AUTHORIZED DOCUMENTATION Novell ZENworks Handheld Management 7 SP1 IR4 January 24, 2011 www.novell.com Novell ZENworks 7 Handheld Management Administration Guide Legal Notices Novell,

More information

NotifyMDM Device Application User Guide Installation and Configuration for Android

NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM for Android, Version 3.x NotifyMDM for Android 1 Table of Contents NotifyMDM for Android 3 Installation Instructions

More information

The following device commands are used most frequently: Lock/Unlock device O - O O. Reset screen password O - O - Factory reset + Initialize SD Card

The following device commands are used most frequently: Lock/Unlock device O - O O. Reset screen password O - O - Factory reset + Initialize SD Card 10 Device management Administrators can install apps on an activated device using device commands and check the profiles settings. Moreover, they can update, delete, or re-install apps installed on users'

More information

FieldView. Management Suite

FieldView. Management Suite FieldView The FieldView Management Suite (FMS) system allows administrators to view the status of remote FieldView System endpoints, create and apply system configurations, and manage and apply remote

More information

ZENworks 11 Support Pack 4 Endpoint Security Agent Reference. October 2016

ZENworks 11 Support Pack 4 Endpoint Security Agent Reference. October 2016 ZENworks 11 Support Pack 4 Endpoint Security Agent Reference October 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S.

More information

User Guide. Version R94. English

User Guide. Version R94. English AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Altiris Software Management Solution 7.1 from Symantec User Guide

Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement

More information

ZENworks 2017 Update 1 Full Disk Encryption Pre-Boot Authentication Reference. July 2017

ZENworks 2017 Update 1 Full Disk Encryption Pre-Boot Authentication Reference. July 2017 ZENworks 2017 Update 1 Full Disk Encryption Pre-Boot Authentication Reference July 2017 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes Workspace ONE UEM v9.6 Have documentation feedback? Submit

More information

ForeScout Extended Module for Carbon Black

ForeScout Extended Module for Carbon Black ForeScout Extended Module for Carbon Black Version 1.0 Table of Contents About the Carbon Black Integration... 4 Advanced Threat Detection with the IOC Scanner Plugin... 4 Use Cases... 5 Carbon Black Agent

More information

Veritas System Recovery 18 Management Solution Administrator's Guide

Veritas System Recovery 18 Management Solution Administrator's Guide Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

ForeScout Extended Module for IBM BigFix

ForeScout Extended Module for IBM BigFix Version 1.1 Table of Contents About BigFix Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 About Support for Dual Stack Environments... 5 Concepts, Components,

More information

Sophos Central Self Service Portal help

Sophos Central Self Service Portal help Sophos Central Self Service Portal help Contents 1 About this Help...3 2 Email...4 2.1 Manage Quarantined Email...4 2.2 Emergency Inbox...4 3 Mobile Control...5 3.1 Set up Sophos Mobile Control on your

More information

Handbook. CLIÉ handheld basic operations. Exchanging and updating files/data using the HotSync operation. Entering text on your CLIÉ.

Handbook. CLIÉ handheld basic operations. Exchanging and updating files/data using the HotSync operation. Entering text on your CLIÉ. A-BU6-100-11 (1) CLIÉ handheld basic operations Exchanging and updating files/data using the HotSync operation Entering text on your CLIÉ handheld Customizing your CLIÉ handheld (Preferences) Exchanging

More information

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes AirWatch v9.3 Have documentation feedback? Submit a Documentation

More information

ForeScout Extended Module for Qualys VM

ForeScout Extended Module for Qualys VM ForeScout Extended Module for Qualys VM Version 1.2.1 Table of Contents About the Qualys VM Integration... 3 Additional Qualys VM Documentation... 3 About This Module... 3 Components... 4 Considerations...

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 2.1 November 2011 R3 Copyright 2011, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

NetWrix Account Lockout Examiner Version 4.0 User Guide

NetWrix Account Lockout Examiner Version 4.0 User Guide NetWrix Account Lockout Examiner Version 4.0 User Guide Table of Contents Introduction... 1 Product Architecture... 1 About Security Roles... 2 Default Installation Folders, Virtual Directory, and Startup

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

ForeScout Extended Module for IBM BigFix

ForeScout Extended Module for IBM BigFix ForeScout Extended Module for IBM BigFix Version 1.0.0 Table of Contents About this Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 Concepts, Components, Considerations...

More information

User Guide. BlackBerry Workspaces for Windows. Version 5.5

User Guide. BlackBerry Workspaces for Windows. Version 5.5 User Guide BlackBerry Workspaces for Windows Version 5.5 Published: 2017-03-30 SWD-20170330110027321 Contents Introducing BlackBerry Workspaces for Windows... 6 Getting Started... 7 Setting up and installing

More information

Administrator Guide. Windows Embedded Standard 7

Administrator Guide. Windows Embedded Standard 7 Administrator Guide Windows Embedded Standard 7 Copyright 2010, 2012 2015, 2017 HP Development Company, L.P. Citrix and XenDesktop are registered trademarks of Citrix Systems, Inc. and/or one more of its

More information

SECURE USER GUIDE FOR EXTERNAL PARTNERS

SECURE  USER GUIDE FOR EXTERNAL PARTNERS SECURE E-MAIL USER GUIDE FOR EXTERNAL PARTNERS A guide for using encrypted electronic mail to protect the privacy and data integrity of sensitive information. October 2016 Data Classification: Public Information

More information

ForeScout Extended Module for MobileIron

ForeScout Extended Module for MobileIron Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Authentication Services ActiveRoles Integration Pack 2.1.x. Administration Guide

Authentication Services ActiveRoles Integration Pack 2.1.x. Administration Guide Authentication Services ActiveRoles Integration Pack 2.1.x Administration Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Avalanche Remote Control User Guide. Version 4.1

Avalanche Remote Control User Guide. Version 4.1 Avalanche Remote Control User Guide Version 4.1 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

Lookout Mobile Endpoint Security. Deploying Lookout with BlackBerry Unified Endpoint Management

Lookout Mobile Endpoint Security. Deploying Lookout with BlackBerry Unified Endpoint Management Lookout Mobile Endpoint Security Deploying Lookout with BlackBerry Unified Endpoint Management June 2018 2 Copyright and disclaimer Copyright 2018, Lookout, Inc. and/or its affiliates. All rights reserved.

More information

Salesforce Classic Guide for iphone

Salesforce Classic Guide for iphone Salesforce Classic Guide for iphone Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Demonstration Instructions

Demonstration Instructions Demonstration Instructions Digital Defence Ltd. Secure Mobile Version 10.2.1 19 th July 2010 Table of Contents TABLE OF CONTENTS... 2 1. DEMONSTRATION INSTRUCTIONS... 3 1.1 PREREQUISITES... 3 1.2 PROCEDURE...

More information

BlackBerry 7100v from Vodafone Installation Guide

BlackBerry 7100v from Vodafone Installation Guide BlackBerry 7100v from Vodafone Installation Guide Contents Contents 2 Introduction 3 BlackBerry Enterprise Solution 3 Using your BlackBerry 7100v Handheld 3 Installing the BlackBerry Desktop Manager 3

More information

AT&T Business Messaging Account Management

AT&T Business Messaging Account Management Account Management Administrator User Guide July 2016 1 Copyright 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T

More information

Evaluation Guide Host Access Management and Security Server 12.4

Evaluation Guide Host Access Management and Security Server 12.4 Evaluation Guide Host Access Management and Security Server 12.4 Copyrights and Notices Copyright 2017 Attachmate Corporation, a Micro Focus company. All rights reserved. No part of the documentation materials

More information

Message Networking 5.2 Administration print guide

Message Networking 5.2 Administration print guide Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do

More information

Software Token. Installation and User Guide. 22 September 2017

Software Token. Installation and User Guide. 22 September 2017 Software Token Installation and User Guide 22 September 2017 Notices Following are policies pertaining to proprietary rights and trademarks. Proprietary Rights The information contained in this document

More information

Sophos Mobile Control Administrator guide. Product version: 5.1

Sophos Mobile Control Administrator guide. Product version: 5.1 Sophos Mobile Control Administrator guide Product version: 5.1 Document date: June 2015 Contents 1 About Sophos Mobile Control...5 1.1 Sophos Mobile Control on premise and as a Service...5 1.2 About this

More information

Transport Gateway Installation / Registration / Configuration

Transport Gateway Installation / Registration / Configuration CHAPTER 2 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.

More information

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5 USER GUIDE CTERA Agent for Windows June 2016 Version 5.5 Copyright 2009-2016 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Device IT Policy Comparison

Device IT Policy Comparison Device IT Policy Comparison IT policies supported on devices synchronizing via the GO!NotifyLink for BlackBerry device application or GO!NotifyLink ActiveSync Solution Document Last Updated 01/15/15 GO!NotifyLink

More information

Guide Installation and User Guide - Mac

Guide Installation and User Guide - Mac Guide Installation and User Guide - Mac With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally sign

More information

NETWRIX PASSWORD EXPIRATION NOTIFIER

NETWRIX PASSWORD EXPIRATION NOTIFIER NETWRIX PASSWORD EXPIRATION NOTIFIER QUICK-START GUIDE Product Version: 3.3.247 March 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Endpoint Protection with DigitalPersona Pro

Endpoint Protection with DigitalPersona Pro DigitalPersona Product Brief Endpoint Protection with DigitalPersona Pro An introductory technical overview to DigitalPersona s suite for Access Management, Data Protection and Secure Communication. April

More information

Sophos Mobile Control startup guide. Product version: 7

Sophos Mobile Control startup guide. Product version: 7 Sophos Mobile Control startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 Sophos Mobile Control licenses...7 3.1 Trial licenses...7 3.2 Upgrade trial licenses

More information

System Administrator s Guide Login. Updated: May 2018 Version: 2.4

System Administrator s Guide Login. Updated: May 2018 Version: 2.4 System Administrator s Guide Login Updated: May 2018 Version: 2.4 Contents CONTENTS... 2 WHAT S NEW IN THIS VERSION 2018R1 RELEASE... 4 Password Retrieval via Email (GDPR Alignment)... 4 Self-Registration

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

ZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk. November 2018

ZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk. November 2018 ZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk November 2018 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

Full Disk Encryption Pre-Boot Authentication Reference

Full Disk Encryption Pre-Boot Authentication Reference www.novell.com/documentation Full Disk Encryption Pre-Boot Authentication Reference ZENworks 11 Support Pack 2 November 08, 2012 Legal Notices Novell, Inc., makes no representations or warranties with

More information

ZENworks 2017 Update 2 ZENworks Agent Reference. February 2018

ZENworks 2017 Update 2 ZENworks Agent Reference. February 2018 ZENworks 2017 Update 2 ZENworks Agent Reference February 2018 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights,

More information

NotifyMDM Device Application User Guide Installation and Configuration for ios with TouchDown

NotifyMDM Device Application User Guide Installation and Configuration for ios with TouchDown NotifyMDM Device Application User Guide Installation and Configuration for ios with TouchDown NotifyMDM for ios Devices, Version 3.x NotifyMDM for ios with TouchDown 1 Table of Contents NotifyMDM for ios

More information

Netwrix Auditor. Virtual Appliance and Cloud Deployment Guide. Version: /25/2017

Netwrix Auditor. Virtual Appliance and Cloud Deployment Guide. Version: /25/2017 Netwrix Auditor Virtual Appliance and Cloud Deployment Guide Version: 9.5 10/25/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Active Sync Devices: Procedures and Policies

Active Sync Devices: Procedures and Policies Active Sync Configuration: ipad Active Sync Devices: Procedures and Policies November 2010-1 - Active Sync Configuration: TABLE OF CONTENTS Activation Procedures 3 Security Policy: Overview 3 Active Sync

More information

HP Database and Middleware Automation

HP Database and Middleware Automation HP Database and Middleware Automation For Windows Software Version: 10.10 SQL Server Database Refresh User Guide Document Release Date: June 2013 Software Release Date: June 2013 Legal Notices Warranty

More information

Deploying VMware Workspace ONE Intelligent Hub. October 2018 VMware Workspace ONE

Deploying VMware Workspace ONE Intelligent Hub. October 2018 VMware Workspace ONE Deploying VMware Workspace ONE Intelligent Hub October 2018 VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

ZENworks 2017 What s New Reference. December 2016

ZENworks 2017 What s New Reference. December 2016 ZENworks 2017 What s New Reference December 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent

More information

3CX Mobile Device Manager

3CX Mobile Device Manager 3CX Mobile Device Manager Manual 1 Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples

More information

Veritas System Recovery 16 Management Solution Administrator's Guide

Veritas System Recovery 16 Management Solution Administrator's Guide Veritas System Recovery 16 Management Solution Administrator's Guide Documentation version: 2017 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo

More information

VMware AirWatch Tizen Guide

VMware AirWatch Tizen Guide VMware AirWatch Tizen Guide AirWatch v8.4 and higher Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product is protected

More information

Rapid Recovery License Portal Version User Guide

Rapid Recovery License Portal Version User Guide Rapid Recovery License Portal Version 6.1.0 User Guide 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

VMware AirWatch: Directory and Certificate Authority

VMware AirWatch: Directory and Certificate Authority Table of Contents Lab Overview - HOL-1857-06-UEM - VMware AirWatch: Directory and Certificate Authority Integration... 2 Lab Guidance... 3 Module 1 - Advanced AirWatch Configuration, AD Integration/Certificates

More information

HP Intelligent Management Center SOM Administrator Guide

HP Intelligent Management Center SOM Administrator Guide HP Intelligent Management Center SOM Administrator Guide Abstract This guide contains comprehensive conceptual information for network administrators and other personnel who administrate and operate the

More information

Release Notes 1 of 5. Release Notes. BlackBerry 7100g BlackBerry 7290 Wireless Handheld.

Release Notes 1 of 5. Release Notes. BlackBerry 7100g BlackBerry 7290 Wireless Handheld. Release Notes 1 of 5 Release Notes BlackBerry 7100g BlackBerry 7290 Wireless Handheld Release Notes 2 of 5 NOTE This document is provided for informational purposes only, and does not constitute a binding

More information

Oracle Enterprise Single Sign-on Kiosk Manager

Oracle Enterprise Single Sign-on Kiosk Manager Oracle Enterprise Single Sign-on Kiosk Manager User s Guide Release 10.1.4.0.3 E10338-01 June 2007 Oracle Enterprise Single Sign-on Kiosk Manager User s Guide, Release 10.1.4.0.3 E10338-01 Copyright 2006-2007,

More information

Salesforce Classic Mobile Guide for iphone

Salesforce Classic Mobile Guide for iphone Salesforce Classic Mobile Guide for iphone Version 41.0, Winter 18 @salesforcedocs Last updated: November 30, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered

More information

Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide

Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Installation and Configuration Guide The software described in this book is furnished under a license agreement

More information

Creating Resources on the ZFS Storage Appliance

Creating Resources on the ZFS Storage Appliance Oracle Enterprise Manager Ops Center Creating Non-Global Zones Using a SAN Storage Library 12c Release 3 (12.3.0.0.0) E65613-01 October 2015 This guide provides an end-to-end example for how to use Oracle

More information

User Guide. Version R92. English

User Guide. Version R92. English AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Vodafone Secure Device Manager Administration User Guide

Vodafone Secure Device Manager Administration User Guide Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of June 2017. Vodafone Ready Business Contents Introduction 3 Help 4 How to find help in the Vodafone Secure

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Authentication Manager Self Service Password Request Administrator s Guide

Authentication Manager Self Service Password Request Administrator s Guide Authentication Manager Self Service Password Request 9.0.2 Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

EAM Portal User's Guide

EAM Portal User's Guide EAM Portal 9.0.2 User's Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Lasso Continuous Data Protection Lasso CDP Client Guide August 2005, Version Lasso CDP Client Guide Page 1 of All Rights Reserved.

Lasso Continuous Data Protection Lasso CDP Client Guide August 2005, Version Lasso CDP Client Guide Page 1 of All Rights Reserved. Lasso CDP Client Guide August 2005, Version 1.6.8 Lasso CDP Client Guide Page 1 of 32 Copyright Copyright 2005 Lasso Logic, LLC. All Rights Reserved. No part of this publication may be reproduced, stored

More information

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0 Administration Guide Published: 2013-01-29 SWD-20130131125552322 Contents 1 Related resources... 18 2 About BlackBerry Enterprise Server

More information