McAfee Enterprise Mobility Management 12.0 Software

Size: px
Start display at page:

Download "McAfee Enterprise Mobility Management 12.0 Software"

Transcription

1 Product Guide McAfee Enterprise Mobility Management 12.0 Software For use with epolicy Orchestrator Software

2 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundscore, Foundstone, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, McAfee Stinger, McAfee Total Protection, TrustedSource, VirusScan, WaveSecure are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others. Product and feature names and descriptions are subject to change without notice. Please visit mcafee.com for the most current products and features. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Enterprise Mobility Management 12.0 Software Product Guide

3 Contents Preface 5 About this guide Audience Conventions Find product documentation Introduction 7 epolicy Orchestrator features customized for McAfee EMM McAfee EMM components Server components Client components Using McAfee EMM in PKI environments Getting started 13 Update the default administrator account Create a service record Configure an authorization directory Configure an SMTP server and default notification settings Configure a SCEP server for PKI environments Customize the company profile Customize certificate expiration notifications Using permission sets with McAfee EMM Authorizing users 19 Manage provisioning tokens Require provisioning tokens Update provisioning tokens Authorize users Bulk-authorize and notify LDAP or ActiveSync users Authorize select LDAP users Authorize select ActiveSync users Authorize LDAP or ActiveSync users based on a list Unlock users Managing device mapping Activate manual Android Device ID Mapping Manually approve Android Device ID Mapping Working with devices 27 Device configuration requirements Communicating with users Configure devices Configure ios devices Configure Android devices Configure Windows Phones Resolving compliance issues on devices McAfee Enterprise Mobility Management 12.0 Software Product Guide 3

4 Contents 5 Managing devices 33 Organizing mobile devices in the System Tree Viewing mobile properties Performing mobile actions Managing compliance in epolicy Orchestrator Updating mobile devices Distributing apps and files Create or modify packages Assign and push packages Managing volume licenses for ios apps Add or update volume licenses for ios package apps Manually redeem or delete volume licenses Using McAfee VMS with McAfee EMM Deploy McAfee VMS Configuring policies 43 Using McAfee EMM policies in epolicy Orchestrator Configure policies Monitoring devices 45 Using dashboards and monitors with McAfee EMM Using queries and reports with McAfee EMM Using the Threat Event Log with McAfee EMM Performing system maintenance 51 Edit the McAfee EMM registered server Update MDM, push, and portal certificates Update GCM settings Update the device catalog Back up your McAfee EMM installation Viewing McAfee EMM log files A Policy settings 55 B Mobile properties 59 Index 65 4 McAfee Enterprise Mobility Management 12.0 Software Product Guide

5 Preface This guide provides the information you need to work with your McAfee product. Contents About this guide Find product documentation About this guide This information describes the guide's target audience, the typographical conventions and icons used in this guide, and how the guide is organized. Audience McAfee documentation is carefully researched and written for the target audience. The information in this guide is intended primarily for: Administrators People who implement and enforce the company's security program. Conventions This guide uses these typographical conventions and icons. Book title, term, emphasis Bold User input, code, message Interface text Hypertext blue Title of a book, chapter, or topic; a new term; emphasis. Text that is strongly emphasized. Commands and other text that the user types; a code sample; a displayed message. Words from the product interface like options, menus, buttons, and dialog boxes. A link to a topic or to an external website. Note: Additional information, like an alternate method of accessing an option. Tip: Suggestions and recommendations. Important/Caution: Valuable advice to protect your computer system, software installation, network, business, or data. Warning: Critical advice to prevent bodily harm when using a hardware product. McAfee Enterprise Mobility Management 12.0 Software Product Guide 5

6 Preface Find product documentation Find product documentation After a product is released, information about the product is entered into the McAfee online Knowledge Center. Task 1 Go to the McAfee ServicePortal at and click Knowledge Center. 2 Enter a product name, select a version, then click Search to display a list of documents. 6 McAfee Enterprise Mobility Management 12.0 Software Product Guide

7 1 1 Introduction McAfee Enterprise Mobility Management (McAfee EMM ) provides management and security for mobile devices in enterprise environments. McAfee EMM leverages McAfee epolicy Orchestrator to deliver management and security for ios and Android devices, and Windows Phones. With McAfee EMM, enterprises smoothly integrate mobile data protection into their existing infrastructure. McAfee EMM can be used to: Enforce authentication, authorization, and encryption Manage and secure corporate , contacts, and calendars Define security and use policies Block jailbroken or rooted devices Remotely lock or wipe lost devices Centrally manage McAfee VirusScan Mobile Security (McAfee VMS) on Android devices Secure Android devices with App Protection through McAfee Global Threat Intelligence (McAfee GTI) Monitor and report on the mobile enterprise McAfee EMM offers a comprehensive, scalable solution for the rapidly expanding bring-your-own-device (BYOD) market and for traditional enterprise-driven environments, providing a unified solution for complete mobile security. Contents epolicy Orchestrator features customized for McAfee EMM McAfee EMM components Using McAfee EMM in PKI environments McAfee Enterprise Mobility Management 12.0 Software Product Guide 7

8 1 Introduction epolicy Orchestrator features customized for McAfee EMM epolicy Orchestrator features customized for McAfee EMM McAfee EMM is managed exclusively by epolicy Orchestrator. Understanding how these products' features interact helps you navigate and use the system effectively. For this epolicy Orchestrator feature Dashboards Permission Sets Policy Catalog Queries & Reports Server Settings McAfee EMM adds... Predefined, mobile-specific dashboards and monitors. McAfee Enterprise Mobility Management permission category. Mobile Actions permission category. EMM Hub and SCEP Server permissions in the existing Registered Servers permission category. Android, ios, and Windows Phone policy categories in the Enterprise Mobility Management product group. Predefined, mobile-specific queries. Custom query property groups: EMM Properties, Device Details, Device Properties, Mobile Applications, Telecommunication Properties, PKI Properties, and (PKI) Certificate Properties. EMM Server Settings with access to System Settings, Package Management, and User Notifications. Package Management, User Notifications, and some System Settings still appear in the legacy McAfee EMM console. These pages are launched from epolicy Orchestrator and appear in Silverlight. If you're having trouble viewing these pages, enable pop-ups from your epolicy Orchestrator URL. Server Tasks System Information Threat Event Log User Management EMM Certificates Notification server task. Mobile Properties window. Mobile actions: Lock, MDM Uninstall, Unlock, Wipe, and Wipe Corporate Data. Predefined, mobile-specific threats. Locked Users page. McAfee EMM components The McAfee EMM system includes server-side and client-side components that are managed through epolicy Orchestrator. McAfee EMM 12.0 can be used with epolicy Orchestrator The McAfee EMM extension bundle for epolicy Orchestrator includes these extensions: McAfee Enterprise Mobility Management Provides the core McAfee EMM functionality. McAfee Mobile epo Allows epolicy Orchestrator to communicate with mobile devices. PKI Enables secure, certificate-based authentication for VPN or Wi-Fi connections on ios devices. Help Provides context-sensitive help for McAfee EMM interface pages, and provides on-screen access to the product guide. 8 McAfee Enterprise Mobility Management 12.0 Software Product Guide

9 Introduction McAfee EMM components 1 In addition to the built-in McAfee EMM components, some product features require supplementary servers. Product feature Single sign-on policies (ios 7 and later) Server requirement Kerberos-based authentication server, like a Windows Domain Controller with Kerberos enabled. Directory Services, such as Active Directory or LDAP. PKI PKI with certificate-based authentication for VPN or Wi-Fi Certificate authority (CA) server running Windows Server 2008 R2 64-bit with Service Pack 1 or later, with SCEP enabled. To use challenge authentication (recommended), the server must be in English or Spanish. Validation authority, such as a Remote Authentication Dial-In User Service (RADIUS) server. Server components These components are installed on enterprise servers to administer McAfee EMM. Figure 1-1 Typical enhanced security configuration For High Availability or basic security configurations, see the McAfee EMM Installation Guide. McAfee EMM server component Hub Portal Description Manages communication between McAfee EMM components and with epolicy Orchestrator. The Hub allows secure communication across the firewall (between the DMZ and the internal network) and eliminates the need to open custom firewall ports. SSL communication is established between the components. The Hub is paired with the McAfee EMM database, which stores all data required for McAfee EMM to function. Allows device users to initiate wipe requests in the event their device is lost or stolen. Users access the Portal from a browser on a PC or mobile device. We recommend installing the Portal in the DMZ. McAfee Enterprise Mobility Management 12.0 Software Product Guide 9

10 1 Introduction Using McAfee EMM in PKI environments McAfee EMM server component Proxy Push Notifier Description Proxies ActiveSync traffic to the servers. This IIS (Internet Information Services) application controls access to enterprise resources on the DMZ server. We recommend installing the Proxy in the DMZ. Sends push notifications to mobile devices. The Push Notifier is a required component that communicates with Apple and Google push notification services. We recommend installing the Push Notifier in the DMZ. Client components These components are installed on mobile devices that are registered on the enterprise network. They help configure the device and communicate with the McAfee EMM server. McAfee EMM client component McAfee EMM ios app McAfee EMM Android app McAfee Secure Container app (Android devices) Description Free app that enforces security policies, notifies users of compliance issues, and configures corporate , contacts, and calendars using the device's native apps. Free app that enforces security policies, notifies users of compliance issues, and optionally pairs with McAfee Secure Container to manage corporate , contacts, and calendars. Free app that encrypts and passcode-secures enterprise , contacts, and calendars. For Android devices, you can require or recommend the McAfee VMS app with McAfee EMM to centrally manage anti-malware protection. Using McAfee EMM in PKI environments When used in Public Key Infrastructure (PKI) environments, McAfee EMM provides secure, certificate-based authentication for VPN or Wi-Fi connections on ios devices. In PKI environments, device-based or client authentication certificates can be used instead of, or in addition to, a password when ios users connect to VPN or Wi-Fi. In McAfee EMM 12.0 and later, PKI functionality is fully integrated with epolicy Orchestrator. Certificates, as well as VPN and Wi-Fi configurations, are managed with McAfee EMM policies. McAfee EMM serves as the registration authority in PKI environments, relaying certificate requests and actual certificates between user devices and your chosen certificate authority (CA). McAfee EMM does not act as a CA. McAfee EMM also checks certificate expiration dates during device check-in, then requests and relays a renewed certificate if the expiration date falls within 21 days. You can modify the 21-day default in the Hub web.config file. PKI Requirements To take advantage of certificate-based authentication for VPN or Wi-Fi, you need the following. 10 McAfee Enterprise Mobility Management 12.0 Software Product Guide

11 Introduction Using McAfee EMM in PKI environments 1 An established account with a standalone or enterprise Microsoft CA. The account used for the challenge key must be a service account with Manage CA permissions (for standalone) or Enroll permissions (for enterprise). A CA server running Windows Server 2008 R2 64-bit with Service Pack 1 or later, with SCEP enabled. To use challenge authentication (recommended), the server must be in English or Spanish. An application, such as IIS Manager, capable of binding SSL to CertSrv (the SCEP service web application). A validation authority, like a Remote Authentication Dial-In User Service (RADIUS) server. Certificate distribution can occur without this server, but it's required for certificate-based VPN or Wi-Fi authentication. Figure 1-2 Typical PKI and High Availability configuration Getting started with PKI After establishing the infrastructure for your PKI environment, follow these steps to take advantage of certificate authentication functionality in epolicy Orchestrator. Configure a Simple Certificate Enrollment Protocol (SCEP) server in epolicy Orchestrator Registered Servers. This enables epolicy Orchestrator to communicate with the CA. See Configure a SCEP server for PKI environments. Add server and client certificates on the Certificates tab of McAfee EMM ios policies. Configure VPN or Wi-Fi on the VPN and Wi-Fi tabs of McAfee EMM ios policies. See also Configure a SCEP server for PKI environments on page 15 McAfee Enterprise Mobility Management 12.0 Software Product Guide 11

12 1 Introduction Using McAfee EMM in PKI environments 12 McAfee Enterprise Mobility Management 12.0 Software Product Guide

13 2 2 Getting started Get started quickly by completing these preliminary tasks. Contents Update the default administrator account Create a service record Configure an authorization directory Configure an SMTP server and default notification settings Configure a SCEP server for PKI environments Customize the company profile Customize certificate expiration notifications Using permission sets with McAfee EMM Update the default administrator account Secure the connection between the McAfee EMM Hub and the epolicy Orchestrator server by changing the default system administrator logon credentials. Task 1 Select Menu Configuration Server Settings Enterprise Mobility Management System Settings Console Access. 2 Click Add, complete the fields, then click Save. Option Access Type Role Username Password Definition Local User System Administrator User name for the connection to the McAfee EMM server. Password for the connection to the McAfee EMM server. 3 Select the default account, then click Delete. McAfee Enterprise Mobility Management 12.0 Software Product Guide 13

14 2 Getting started Create a service record Create a service record A service (SRV) record automatically directs user devices to the McAfee EMM Portal so users don't need to enter the server name during device configuration. Task 1 Create an SRV record with this format: _activation._tcp.<domainname> IN SRV <EMMportalhostname> <domainname> is the domain name used in company addresses. <EMMportalhostname> is the fully qualified domain name of the McAfee EMM portal. An SRV record for Acme, Corp. would look like this: _activation._tcp.acme.com IN SRV emm.acme.com 2 Publish the SRV record to a device-accessible Domain Name System (DNS) server. Configure an authorization directory To authorize users, specify an authorization directory. You can use LDAP or ActiveSync Protocol for user authentication. policy settings override authorization directory settings. Task 1 Select Menu Configuration Server Settings Enterprise Mobility Management System Settings Auth Directories. 2 Do one of the following: To add a directory, click Add. To edit a directory, select the directory from the list, then click Edit. 3 Complete or modify the fields based on your authentication type, then click Save. User authentication options vary depending on the LDAP server settings specified during installation. For LDAP user authentication: Option Server Type FQDN Domain DN Username Password Definition AD Domino Fully qualified domain name of the LDAP server. This field populates when FQDN is completed. Domain distinguished name of the LDAP. AD This field populates when FQDN is completed. Domino Leave this field blank. User name for the connection to the server. Password for the connection to the server. 14 McAfee Enterprise Mobility Management 12.0 Software Product Guide

15 Getting started Configure an SMTP server and default notification settings 2 Option External EMM Proxy Server Address Use SSL Definition Fully qualified domain name of the McAfee EMM Proxy. Devices connect to this McAfee EMM Proxy address for ActiveSync. This option is selected by default and can't be changed. For ActiveSync Protocol user authentication: Option ActiveSync Authentication Address Domain Verification Username Verification Password ActiveSync External DNS Use SSL Definition Fully qualified domain name of the ActiveSync server. Domain name of the ActiveSync server. User name for the connection to the server. Password for the connection to the server. External DNS or IP address of the server that connects to the McAfee EMM Proxy. This option is selected by default and can't be changed. Configure an SMTP server and default notification settings Before sending user notifications, configure an SMTP server. You can also specify default notification settings to speed the bulk-authorization process. Task 1 Select Menu Configuration Server Settings Enterprise Mobility Management System Settings Mail Settings. 2 Complete the fields, then click Save. Option Message From Address Message Subject Self Service Portal Message SMTP Relay Server Definition address that user notifications are sent from. Subject line for user notifications. Body of the default user notification message. For details, see Bulk-authorize and notify LDAP or ActiveSync users. External DNS or IP address of the SMTP server. 3 (Optional) To send a test text message, click Send Test SMS. See also Bulk-authorize and notify LDAP or ActiveSync users on page 21 Configure a SCEP server for PKI environments Configuring a Simple Certificate Enrollment Protocol (SCEP) server enables dynamic retrieval of certificates from a Microsoft certificate authority in PKI environments. Before you begin Set up your PKI infrastructure. For details, see Using McAfee EMM in PKI environments. You can configure multiple SCEP servers, one for each certificate authority. McAfee Enterprise Mobility Management 12.0 Software Product Guide 15

16 2 Getting started Customize the company profile Task For option definitions, click? in the interface. 1 Select Menu Configuration Registered Servers, then click New Server. 2 From the Server type drop-down list, select SCEP Server, enter a unique name for the server, then click Next. 3 Provide details about the connection to your SCEP server, click Verify connection to establish connection with the server, then click Save. See also Using McAfee EMM in PKI environments on page 10 Customize the company profile Customize the company name and user agreement that appears on user devices during configuration. An editable, default user agreement is provided for the standard epolicy Orchestrator languages, with English displayed by default until you add other languages. The language displayed in epolicy Orchestrator is based on the language selected when you logged on. The language displayed on user devices is based on the language specified on the device. Language-aware user notifications require ios app or later or Android app 3.0 or later. Task For option definitions, click? in the interface. 1 Select Menu Configuration Server Settings Enterprise Mobility Management. 2 At bottom right of the screen, click Edit. 3 In the General Settings section, modify the Company Name and User Agreement, then click Save. If you select a User Agreement language for which default translated text isn't provided, text is displayed in the epolicy Orchestrator language selected at logon, or in English. Translate or modify this text as needed for the selected language. Customize certificate expiration notifications Automatically receive notification when portal, push, or mobile device management (MDM) certificates near expiration by customizing the default EMM Certificates Notification server task. The server task can be viewed, edited, or disabled, but it can't be deleted. Before you begin An server must be configured in epolicy Orchestrator. For details, see the epolicy Orchestrator documentation. 16 McAfee Enterprise Mobility Management 12.0 Software Product Guide

17 Getting started Using permission sets with McAfee EMM 2 Task For option definitions, click? in the interface. 1 Select Menu Automation Server Tasks. 2 In the EMM Certificates Notification row, click Edit. 3 Use the Server Task Builder to customize the server task. Using permission sets with McAfee EMM McAfee EMM permissions define rights for policies, server settings, and actions performed on mobile devices. McAfee EMM adds these permissions: McAfee Enterprise Mobility Management permissions category Defines permissions for McAfee EMM policies and Server Settings, including the legacy McAfee EMM console. Mobile Actions permissions category Defines permissions for mobile actions and Locked Users. EMM Hub and SCEP Server permissions Located in the existing Registered Servers permission category, defines permissions for McAfee EMM servers. For users not assigned a global administrator user role, McAfee EMM grants No Permissions by default. Permissions must be granted for users to access or use permission-controlled features of McAfee EMM. Permissions assigned to epolicy Orchestrator features might affect users' ability to perform McAfee EMM functions. For example, to access mobile actions, users must also have permission to view the System Tree. For details about managing permission sets, see the epolicy Orchestrator documentation. McAfee Enterprise Mobility Management 12.0 Software Product Guide 17

18 2 Getting started Using permission sets with McAfee EMM 18 McAfee Enterprise Mobility Management 12.0 Software Product Guide

19 3 3 Authorizing users Grant users access to your network from their mobile devices based on LDAP or ActiveSync credentials. You can set temporary passwords, or provisioning tokens, unlock users with failed password attempts, and (optionally) manage Device ID Mapping for certain Android devices. Contents Manage provisioning tokens Authorize users Unlock users Managing device mapping Manage provisioning tokens Provisioning tokens provide an optional, extra measure of security when users configure their devices. You can use provisioning tokens only with ios and Android devices. Windows Phones can't be configured successfully if users are assigned provisioning tokens. Tasks Require provisioning tokens on page 19 Turn on the provisioning token requirement so that you can create and send provisioning tokens as you authorize users. Update provisioning tokens on page 20 Update a user's provisioning token manually when a token expires, or when a user needs to configure another device. Require provisioning tokens Turn on the provisioning token requirement so that you can create and send provisioning tokens as you authorize users. Selecting the provisioning token option doesn't affect users who have already configured their devices. If you require provisioning tokens: McAfee Enterprise Mobility Management 12.0 Software Product Guide 19

20 3 Authorizing users Manage provisioning tokens When you bulk-authorize users, a default token and expiration are added to the notification message. See Bulk-authorize and notify LDAP or ActiveSync users. When you authorize select users, you're prompted to specify provisioning token options. See Authorize select LDAP users. Task 1 Select Menu Configuration Server Settings Enterprise Mobility Management System Settings Authorized Users. 2 Select Allow Only Authorized Users and Require Provisioning Token. 3 Specify options for the provisioning token, then click Save. Option Token Length Hours Valid Definition Number of characters in the token. Number of hours the temporary password is valid. See also Bulk-authorize and notify LDAP or ActiveSync users on page 21 Authorize select LDAP users on page 22 Update provisioning tokens Update a user's provisioning token manually when a token expires, or when a user needs to configure another device. Before you begin The user must be on the Authorized Users list. See Authorize users. (Optional) To send the updated provisioning token to users in a text message or , an SMTP server must be configured in Mail Settings. See Configure an SMTP server and default notification settings. Task 1 Select Menu Configuration Server Settings Enterprise Mobility Management System Settings Authorized Users. 2 Click Update Token, then select a user or group. 3 Specify options for the provisioning token, then click Save. Option Provisioning Token Hours Valid Delivery Action Definition Temporary password. Number of hours the temporary password is valid. This value overrides the default value set on the Authorized Users screen. Select how the user receives the temporary password: No Action Send SMS Opens the Provisioning SMS screen. Enter the Recipient's Phone Number, Carrier, Subject, and Message, then click Send SMS. Send Opens an to the user containing the temporary password. Click Send to deliver the . See also Authorize users on page 21 Configure an SMTP server and default notification settings on page McAfee Enterprise Mobility Management 12.0 Software Product Guide

21 Authorizing users Authorize users 3 Authorize users Choose an authorization method based on the type of user authentication in use on your system and the number of users you need to authorize. Tasks Bulk-authorize and notify LDAP or ActiveSync users on page 21 Authorize many users at once and automatically send them s or text messages with configuration details. You can bulk-authorize users based on LDAP groups or by importing a list in comma-separated value (CSV) format. This authorization method is recommended if you require provisioning tokens. Authorize select LDAP users on page 22 By default, all users with valid Active Directory or Domino credentials can configure their devices. For greater security, specify which LDAP users or groups can configure devices. Authorize select ActiveSync users on page 23 Allow selected users to configure their devices by manually specifying their ActiveSync credentials. Authorize LDAP or ActiveSync users based on a list on page 23 Allow a list of users to configure their devices using LDAP or ActiveSync credentials. Bulk-authorize and notify LDAP or ActiveSync users Authorize many users at once and automatically send them s or text messages with configuration details. You can bulk-authorize users based on LDAP groups or by importing a list in comma-separated value (CSV) format. This authorization method is recommended if you require provisioning tokens. Before you begin An SMTP server must be configured in Mail Settings. See Configure an SMTP server and default notification settings. (Optional) To automatically assign temporary passwords as you authorize users, change your settings to require provisioning tokens. See Require provisioning tokens. (Optional) To authorize users based on a CSV list, create a list. For details about formatting, see CSV format for list-based user authorization. Task 1 Select Menu Configuration Server Settings Enterprise Mobility Management User Notifications. 2 Click Provision Users, complete the fields, then click Next. Search LDAP (LDAP authentication) Option Source Location User/Group Search Results Definition Search LDAP Specifies the domain of the LDAP server. Select the users or groups to add as authorized users. Entering a user or group name populates the Search Results. Select users from this list and use the arrows to move them to the list of Users to Provision. McAfee Enterprise Mobility Management 12.0 Software Product Guide 21

22 3 Authorizing users Authorize users Import CSV (LDAP or ActiveSync Protocol authentication) Option Source Location CSV File Path Definition Import CSV Specifies the domain of the LDAP or ActiveSync server. Browse to select the CSV file. 3 On the second Provision Users screen, complete the fields, then click Send or Send SMS. Option Delivery Method Definition SMS This option is available only with CSV import. Notification Message Enter the message you want to send to users. If you select as the Delivery Method, the default notification text specified in Mail Settings appears. You can edit the message before sending. If you select SMS as the Delivery Method, the notification message can't exceed 140 characters. If your system settings require a provisioning token, a default token and expiration are added to your notification message in the format OTPToken: %OTPToken % Token Expiration: %OTPTokenExpiration%. Don't delete this text. Targeted Users Confirm the users to authorize. See also Configure an SMTP server and default notification settings on page 15 Require provisioning tokens on page 19 CSV format for list-based user authorization on page 24 Authorize select LDAP users By default, all users with valid Active Directory or Domino credentials can configure their devices. For greater security, specify which LDAP users or groups can configure devices. Before you begin (Optional) To create and send temporary passwords as you authorize users, change your settings to require provisioning tokens. See Require provisioning tokens. Task 1 Select Menu Configuration Server Settings Enterprise Mobility Management System Settings Authorized Users. 2 Select Allow Only Authorized Users. 3 Click Add, then complete the fields to search for a user or group: Option Source Location User/Group Definition Search LDAP Domain of the LDAP server. Enter at least the first three characters of the user or group to add. 4 Do one of the following, based on whether your settings require provisioning tokens: Provisioning tokens Select the user or group to add, specify additional options, then click Save. 22 McAfee Enterprise Mobility Management 12.0 Software Product Guide

23 Authorizing users Authorize users 3 Option Provisioning Token Hours Valid Delivery Action Definition Temporary password. Number of hours the temporary password is valid. This value overrides the default value set on the Authorized Users screen. Select how the user receives the temporary password: No Action Send SMS Opens the Provisioning SMS screen. Enter the Recipient's Phone Number, Carrier, Subject, and Message, then click Send SMS. Send Opens an to the user containing the temporary password. Click Send to deliver the . No provisioning tokens Select the user or group to add, click Save to add them to the list of authorized users, then click Save again. See also Require provisioning tokens on page 19 Authorize select ActiveSync users Allow selected users to configure their devices by manually specifying their ActiveSync credentials. Task 1 Select Menu Configuration Server Settings Enterprise Mobility Management System Settings Authorized Users. 2 Click Add, complete the fields, then click Save. Option Source Location Username First Name Last Name Definition Manually Define User Domain of the ActiveSync server. User name of the individual to authorize. address of the individual to authorize. First name of the individual to authorize. Last name of the individual to authorize. Authorize LDAP or ActiveSync users based on a list Allow a list of users to configure their devices using LDAP or ActiveSync credentials. Before you begin Create a CSV list of authorized users. For details on formatting, see CSV format for list-based user authorization. McAfee Enterprise Mobility Management 12.0 Software Product Guide 23

24 3 Authorizing users Unlock users Task 1 Select Menu Configuration Server Settings Enterprise Mobility Management System Settings Authorized Users. 2 Select Allow Only Authorized Users. 3 Click Add, complete the fields, then click Save. Option Source Location CSV File Path Definition Import CSV Domain of the LDAP or ActiveSync server. Browse to select the CSV file. See also CSV format for list-based user authorization on page 24 CSV format for list-based user authorization Use these guidelines to format a CSV file for importing authorized users. Format your CSV file with a file name on row one of your spreadsheet, column headings on row two, and user data beginning on row three. Column headings must read exactly as shown here. [File Name] UserName FirstName LastName Phone UserXyz userxyz@company.com User Xyz Unlock users When users exceed the number of allowed attempts to enter their credentials during device configuration, an administrator must unlock the user account. Administrators must be granted permission in the Mobile Actions permission category for the Locked Users page to appear in the epolicy Orchestrator menu. Task For option definitions, click? in the interface. 1 Select Menu User Management Locked Users. 2 Select the users to unlock, then click Actions Unlock. The user is removed from the Locked Users list. See also Performing mobile actions on page McAfee Enterprise Mobility Management 12.0 Software Product Guide

25 Authorizing users Managing device mapping 3 Managing device mapping During configuration, certain mobile devices require resolution of device identification information. The resolution method varies by device type. ios 7 devices If a user has two or more of the same device type running ios 7, the user selects the unique serial number (Wi-Fi device) or IMEI number (SIM-enabled device) during configuration. The IMEI or serial number is usually printed on the back of the device or available in the device's general settings. If a user selects an incorrect IMEI or serial number during configuration, enabling Clear McAfee ID in Settings allows them to log on to the app again and select the correct device. Android devices Android devices that were provisioned with ActiveSync for might report two separate Device IDs to the McAfee EMM server. Device ID Mapping pairs the duplicate IDs so that the device appears only once in the System Tree. By default, Device ID Mapping is set to Automatic. This is the recommended setting, but you can manually approve Device ID pairings for increased security and assurance of user and device identity. Manual Device ID Mapping requires action by both the McAfee EMM administrator and the device user. When manual Device ID Mapping is activated: The Device Status for unpaired devices appears as Pending Approval until an administrator approves the Device ID pairing. Android users with a Device ID Mapping discrepancy must respond to a confirmation notification during provisioning. Users can't sync until the Device ID pairing is resolved. For details about provisioning Android devices with manual Device ID Mapping activated, see Manually configure for Android devices. See also Manually configure for Android devices on page 30 Activate manual Android Device ID Mapping To manually approve Android Device ID pairings, activate manual Device ID Mapping. McAfee EMM automatically maps Device IDs by default. Task 1 Select Menu Configuration Server Settings Enterprise Mobility Management System Settings Device ID Mapping. 2 Select Manual, then click Save. Manually approve Android Device ID Mapping If you activated manual ID mapping for Android devices, you must approve each duplicate Device ID pairing when users configure their devices. Task 1 Select Menu Configuration Server Settings Enterprise Mobility Management System Settings Device ID Mapping. 2 Select the device to approve, then click Approve. McAfee Enterprise Mobility Management 12.0 Software Product Guide 25

26 3 Authorizing users Managing device mapping The McAfee EMM server sends the user a confirmation notification. After the user confirms, the Device Status on the System Information page (Mobile Properties Device Details) changes from Pending Approval to Available and the device begins syncing. 26 McAfee Enterprise Mobility Management 12.0 Software Product Guide

27 4 Working with devices In order for devices to sync corporate data and communicate with the McAfee EMM server, they must be configured and in compliance. Contents Device configuration requirements Communicating with users Configure devices Resolving compliance issues on devices Device configuration requirements Before configuring mobile devices, verify these requirements for your McAfee EMM installation and the devices on your network. Category Servers Requirement Configure ActiveSync to use the same LDAP server as McAfee EMM for authentication. Grant these server permissions: Grant this permission... Local administrator rights on the McAfee EMM Hub server. Read-only access to the LDAP Directory server. To the LDAP account used to... Access the database. Query the database for user and group searches. Authorization Configure an authorization directory. See Configure an authorization directory. If your system selectively authorizes users, add users to the Authorized Users list. If you set provisioning tokens for authorized users, send users their tokens. Use the User Notifications feature to bulk-authorize users and send their provisioning tokens at the same time. See Bulk-authorize and notify LDAP or ActiveSync users. SRV record McAfee EMM device catalog To enable devices to automatically detect the McAfee EMM Portal, create an SRV record. See Create a service record. To configure new mobile device models, update the McAfee EMM device catalog. See Update the device catalog. McAfee Enterprise Mobility Management 12.0 Software Product Guide 27

28 4 Working with devices Communicating with users Category Device operating system Device Wi-Fi access rules Requirement For details about supported mobile device operating systems, see KB ios Port 5223 outbound must be open. Android Port 5228 outbound must be open. See also Configure an authorization directory on page 14 Bulk-authorize and notify LDAP or ActiveSync users on page 21 Create a service record on page 14 Update the device catalog on page 53 Communicating with users Facilitate a smooth onboarding process by communicating with mobile device users about configuration steps and planned changes or restrictions to their devices. User Notifications allow you to authorize many users at once and automatically send an with configuration steps and provisioning tokens. For guidance on sending User Notifications, see Bulk-authorize and notify LDAP or ActiveSync users. After configuring their devices, users might notice some changes in functionality. In some cases, the only difference is that users must enter a passcode to access their device. In other cases, your security policy might limit access to apps or block corporate data sync based on device status. To reduce support calls, make users aware of anticipated changes in advance. See also Bulk-authorize and notify LDAP or ActiveSync users on page 21 Configure devices Mobile devices are configured with the McAfee EMM app and, optionally for Android devices, McAfee Secure Container and McAfee VMS. Configuration provides access to corporate , contacts, and calendars. Configuration must be done on the device. Because the process involves entering user credentials, we recommend sharing the configuration instructions with users so that they can configure their own devices. After configuration, if a device is noncompliant, the user receives push notifications describing compliance issues. Compliance issues must be resolved in order for the device to sync corporate data. See Resolving compliance issues on devices. Carefully plan your optional McAfee VMS deployment before configuring devices. Some compliance settings might interfere with configuration. See Using McAfee VMS with McAfee EMM. 28 McAfee Enterprise Mobility Management 12.0 Software Product Guide

29 Working with devices Configure devices 4 Tasks Configure ios devices on page 29 Use the McAfee EMM app to configure ios devices. Configure Android devices on page 29 The configuration method for Android devices varies depending on whether you get through McAfee Secure Container or through the device's native apps. Configure Windows Phones on page 31 Use Exchange ActiveSync to manually configure for Windows Phone 7 or Windows Phone 8. See also Resolving compliance issues on devices on page 31 Using McAfee VMS with McAfee EMM on page 40 Configure ios devices Use the McAfee EMM app to configure ios devices. Task 1 Download the McAfee EMM app from the Apple App Store. 2 Launch the McAfee EMM app, enter your address and password, then tap Sign In. If prompted, enter the server address provided by your administrator, then tap Sign In. If prompted, enter the provisioning token provided by your administrator, then tap OK. 3 Review and accept the terms of the license agreement, then click Next. 4 Tap Install, then confirm by tapping Install Now. If prompted, enter the device passcode, then tap Done. 5 Tap Install to allow your administrator to remotely manage your device, then tap Done. Configure Android devices The configuration method for Android devices varies depending on whether you get through McAfee Secure Container or through the device's native apps. These instructions provide general guidance to configure an Android device. Specific screens might vary by device manufacturer. To configure through McAfee Secure Container, follow the steps in Configure Android devices with the McAfee EMM app. To configure through your device's native apps, follow the steps in Configure Android devices with the McAfee EMM app, then Manually configure for Android devices. Tasks Configure Android devices using the McAfee EMM app on page 30 Use the McAfee EMM app to configure all Android devices. During configuration, the app facilitates installation of McAfee Secure Container and McAfee VMS, if those apps are required or recommended. Manually configure for Android devices on page 30 If McAfee Secure Container isn't required and you choose not to install it, you can configure through your device's native app. McAfee Enterprise Mobility Management 12.0 Software Product Guide 29

30 4 Working with devices Configure devices Configure Android devices using the McAfee EMM app Use the McAfee EMM app to configure all Android devices. During configuration, the app facilitates installation of McAfee Secure Container and McAfee VMS, if those apps are required or recommended. Task 1 Download the McAfee EMM app from Google Play, confirm the download, tap Install, then confirm the installation. 2 Launch the McAfee EMM app, enter your address and password, then tap Sign In. If prompted, enter the server address provided by your administrator, then tap Sign In. If prompted, enter the provisioning token provided by your administrator, then tap OK. 3 Review and accept the terms of the license agreement, then click Accept. 4 Tap Activate to activate Device Administrator. 5 If prompted, enter the device passcode, then tap OK. 6 If prompted, install McAfee VMS. a Do one of the following, depending on how McAfee VMS is distributed. McAfee EMM Recommended Apps From McAfee EMM Recommended Apps, tap McAfee VMS. Corporate app store Access the corporate app store using the URL provided by your administrator, then tap McAfee VMS. Google Play Private Channel Tap Play Store Apps Categories <Organization Name>, then tap McAfee VMS. If prompted, select to allow app installation from unknown sources. b Open the notification bar, select the downloaded file, then tap Install. If prompted, select to install using a package installer. 7 Install McAfee Secure Container. McAfee Secure Container is either required or recommended based on your company's security policies. If required, you can't sync corporate data without configuring McAfee Secure Container. If recommended, you can skip McAfee Secure Container configuration and set up using Exchange ActiveSync. See Manually configure for Android devices. a b c From McAfee EMM Recommended Apps, select McAfee Secure Container to access the app in Google Play, then tap Install. When installation is complete, return to the McAfee EMM app, then tap Update Configuration. Enter your password and set a passcode for McAfee Secure Container. See also Manually configure for Android devices on page 30 Manually configure for Android devices If McAfee Secure Container isn't required and you choose not to install it, you can configure through your device's native app. Before you begin Configure your device using the McAfee EMM app. If allowed by your organization, skip installing McAfee Secure Container during configuration in order to enable manual configuration. See Configure Android devices using the McAfee EMM app. 30 McAfee Enterprise Mobility Management 12.0 Software Product Guide

31 Working with devices Resolving compliance issues on devices 4 If security policy blocks unencrypted devices, verify that encryption is enabled in device settings. Task 1 Tap Applications Settings Accounts and sync Add Account Microsoft Exchange ActiveSync. 2 Enter your address, password, domain\user name, and proxy server address, then tap Done. If you receive a push notification about compliance issues, review the notification, resolve compliance issues, then attempt to re-sync . If you receive an sync error message followed by a push notification, open the notification, then tap OK to confirm setup. It might take a few minutes for the McAfee EMM server to send a notification to your device. If you receive a second sync error message, contact your system administrator for resolution. When the administrator resolves the issue, a second notification appears in the notification area. Open it and tap OK to complete the setup. 3 If prompted, tap OK to allow remote security administration. See also Configure Android devices using the McAfee EMM app on page 30 Configure Windows Phones Use Exchange ActiveSync to manually configure for Windows Phone 7 or Windows Phone 8. This task provides general guidance to configure a Windows Phone. Specific screens might vary by device manufacturer. Task 1 Tap Settings & Accounts Add an Account Outlook. 2 Enter your address and password, then tap Sign In. The message "Your settings could not be found..." appears. 3 Enter the domain, then tap Sign In. The message "Your settings could not be found..." appears. 4 Tap OK, then tap Advanced. 5 Enter the server address of the McAfee EMM Proxy, then tap Sign In. Resolving compliance issues on devices Compliance issues must be resolved on the device. The McAfee EMM and McAfee VMS apps can help users resolve issues. When a device is flagged as noncompliant, the device stops syncing corporate data and a notification is automatically sent to the device. Notifications tell users how to resolve the problem so they can resume corporate data sync. Users receive one notification for each noncompliance event. After resolving all compliance issues, devices become compliant at the next attempt to sync . McAfee Enterprise Mobility Management 12.0 Software Product Guide 31

Installation Guide. McAfee Enterprise Mobility Management 10.1

Installation Guide. McAfee Enterprise Mobility Management 10.1 Installation Guide McAfee Enterprise Mobility Management 10.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Firewall Enterprise epolicy Orchestrator Extension

McAfee Firewall Enterprise epolicy Orchestrator Extension Integration Guide Revision A McAfee Firewall Enterprise epolicy Orchestrator Extension COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

McAfee Boot Attestation Service 3.5.0

McAfee Boot Attestation Service 3.5.0 Product Guide McAfee Boot Attestation Service 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Product Guide. McAfee Enterprise Mobility Management (McAfee EMM ) 9.6

Product Guide. McAfee Enterprise Mobility Management (McAfee EMM ) 9.6 Product Guide McAfee Enterprise Mobility Management (McAfee EMM ) 9.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Rogue Database Detection For use with epolicy Orchestrator Software

McAfee Rogue Database Detection For use with epolicy Orchestrator Software McAfee Rogue Database Detection 1.0.0 For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

McAfee Host Intrusion Prevention 8.0

McAfee Host Intrusion Prevention 8.0 Product Guide Self Protection addendum Revision A McAfee Host Intrusion Prevention 8.0 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel and McAfee logos, McAfee Active Protection,

More information

McAfee epolicy Orchestrator Software

McAfee epolicy Orchestrator Software User Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Boot Attestation Service 3.0.0

Boot Attestation Service 3.0.0 Product Guide Boot Attestation Service 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

McAfee Data Protection for Cloud 1.0.1

McAfee Data Protection for Cloud 1.0.1 Product Guide McAfee Data Protection for Cloud 1.0.1 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 Migration Guide McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel

More information

McAfee Endpoint Security

McAfee Endpoint Security Migration Guide McAfee Endpoint Security 10.2.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the

More information

Migration Guide. McAfee File and Removable Media Protection 5.0.0

Migration Guide. McAfee File and Removable Media Protection 5.0.0 Migration Guide McAfee File and Removable Media Protection 5.0.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK

More information

McAfee File and Removable Media Protection 6.0.0

McAfee File and Removable Media Protection 6.0.0 Product Guide McAfee File and Removable Media Protection 6.0.0 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the

More information

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide McAfee MVISION Mobile Microsoft Intune Integration Guide Administrator's guide for providing Integration with Microsoft Intune MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS

More information

Installation Guide. McAfee Web Gateway. for Riverbed Services Platform

Installation Guide. McAfee Web Gateway. for Riverbed Services Platform Installation Guide McAfee Web Gateway for Riverbed Services Platform COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Addendum. McAfee Virtual Advanced Threat Defense

Addendum. McAfee Virtual Advanced Threat Defense Addendum McAfee Virtual Advanced Threat Defense 3.10.0 COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or

More information

Best Practices Guide. Amazon OpsWorks and Data Center Connector for AWS

Best Practices Guide. Amazon OpsWorks and Data Center Connector for AWS Best Practices Guide Amazon OpsWorks and Data Center Connector for AWS COPYRIGHT C opyright 2013 McAfee, I nc. Do not c opy without permission. TRADEMARK ATTRIBUTIONS M cafee, the McAfee logo, McAfee Active

More information

Product Guide Revision A. McAfee Client Proxy 2.3.2

Product Guide Revision A. McAfee Client Proxy 2.3.2 Product Guide Revision A McAfee Client Proxy 2.3.2 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee SiteAdvisor Enterprise 3.5.0

McAfee SiteAdvisor Enterprise 3.5.0 Installation Guide McAfee SiteAdvisor Enterprise 3.5.0 for use with epolicy Orchestrator 4.5 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,

More information

Installation Guide. McAfee Web Gateway Cloud Service

Installation Guide. McAfee Web Gateway Cloud Service Installation Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Client Proxy Product Guide

McAfee Client Proxy Product Guide McAfee Client Proxy 2.3.5 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,

More information

McAfee MVISION Mobile AirWatch Integration Guide

McAfee MVISION Mobile AirWatch Integration Guide McAfee MVISION Mobile AirWatch Integration Guide Administrator's guide for providing Integration with AirWatch MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and

More information

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator) McAfee Client Proxy 2.3.4 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide McAfee MVISION Mobile Microsoft Intune Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active

More information

Installation Guide. McAfee Endpoint Security for Servers 5.0.0

Installation Guide. McAfee Endpoint Security for Servers 5.0.0 Installation Guide McAfee Endpoint Security for Servers 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator) McAfee Client Proxy 2.3.3 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Reference Guide Revision B. McAfee Cloud Workload Security 5.0.0

Reference Guide Revision B. McAfee Cloud Workload Security 5.0.0 Reference Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee MVISION Mobile epo Extension Product Guide

McAfee MVISION Mobile epo Extension Product Guide McAfee MVISION Mobile epo Extension 1809 Product Guide September 11, 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee MVISION Mobile IBM MaaS360 Integration Guide

McAfee MVISION Mobile IBM MaaS360 Integration Guide McAfee MVISION Mobile IBM MaaS360 Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Product Guide. McAfee Plugins for Microsoft Threat Management Gateway Software

Product Guide. McAfee Plugins for Microsoft Threat Management Gateway Software Product Guide McAfee Plugins for Microsoft Threat Management Gateway 1.4.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee MVISION Mobile IBM MaaS360 Integration Guide

McAfee MVISION Mobile IBM MaaS360 Integration Guide McAfee MVISION Mobile IBM MaaS360 Integration Guide Administrator's guide for providing Integration with IBM MaaS360 MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee

More information

McAfee Content Security Reporter Installation Guide. (McAfee epolicy Orchestrator)

McAfee Content Security Reporter Installation Guide. (McAfee epolicy Orchestrator) McAfee Content Security Reporter 2.5.0 Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee MVISION Endpoint 1808 Installation Guide

McAfee MVISION Endpoint 1808 Installation Guide McAfee MVISION Endpoint 1808 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

Product Guide. McAfee Endpoint Upgrade Assistant 1.5.0

Product Guide. McAfee Endpoint Upgrade Assistant 1.5.0 Product Guide McAfee Endpoint Upgrade Assistant 1.5.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Cloud Workload Discovery 4.5.1

Cloud Workload Discovery 4.5.1 Product Guide Cloud Workload Discovery 4.5.1 For use with McAfee epolicy Orchestrator COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel

More information

McAfee MVISION Mobile Citrix XenMobile Integration Guide

McAfee MVISION Mobile Citrix XenMobile Integration Guide McAfee MVISION Mobile Citrix XenMobile Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active

More information

Account Management. Administrator Guide. Secure Gateway (SEG) Service Administrative Guides. Revised August 2013

Account Management. Administrator Guide. Secure  Gateway (SEG) Service Administrative Guides. Revised August 2013 Secure E-Mail Gateway (SEG) Service Administrative Guides Account Management Administrator Guide Revised August 2013 * The Directory Services Connector (DSC) feature is not included as a standard feature

More information

McAfee Change Control and McAfee Application Control 8.0.0

McAfee Change Control and McAfee Application Control 8.0.0 Installation Guide McAfee Change Control and McAfee Application Control 8.0.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are

More information

McAfee Content Security Reporter 2.6.x Migration Guide

McAfee Content Security Reporter 2.6.x Migration Guide McAfee Content Security Reporter 2.6.x Migration Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Migration Guide. McAfee Content Security Reporter 2.4.0

Migration Guide. McAfee Content Security Reporter 2.4.0 Migration Guide McAfee Content Security Reporter 2.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Data Loss Prevention Discover 11.0

Data Loss Prevention Discover 11.0 Installation Guide Data Loss Prevention Discover 11.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee MVISION Endpoint 1811 Installation Guide

McAfee MVISION Endpoint 1811 Installation Guide McAfee MVISION Endpoint 1811 Installation Guide COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator)

McAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator) McAfee Application Control 8.1.0 - Windows Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0 Installation Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Management of Native Encryption 3.0.0

McAfee Management of Native Encryption 3.0.0 Product Guide McAfee Management of Native Encryption 3.0.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

McAfee Content Security Reporter Release Notes. (McAfee epolicy Orchestrator)

McAfee Content Security Reporter Release Notes. (McAfee epolicy Orchestrator) McAfee Content Security Reporter 2.5.0 Release Notes (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0 Product Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Endpoint Upgrade Assistant 2.3.x Product Guide

McAfee Endpoint Upgrade Assistant 2.3.x Product Guide McAfee Endpoint Upgrade Assistant 2.3.x Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee MVISION Mobile MobileIron Integration Guide

McAfee MVISION Mobile MobileIron Integration Guide McAfee MVISION Mobile MobileIron Integration Guide Administrator's guide for providing Integration with MobileIron MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee

More information

Scripting Guide. McAfee Drive Encryption 7.2.0

Scripting Guide. McAfee Drive Encryption 7.2.0 Scripting Guide McAfee Drive Encryption 7.2.0 COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or other

More information

Firewall Enterprise epolicy Orchestrator

Firewall Enterprise epolicy Orchestrator Integration Guide McAfee Firewall Enterprise epolicy Orchestrator Extension version 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Archiving Service. Exchange server setup (2010) Secure Gateway (SEG) Service Administrative Guides

Archiving Service. Exchange server setup (2010) Secure  Gateway (SEG) Service Administrative Guides Secure E-Mail Gateway (SEG) Service Administrative Guides Archiving Service Exchange server setup (2010) 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks

More information

McAfee Change Control and McAfee Application Control 6.1.4

McAfee Change Control and McAfee Application Control 6.1.4 Installation Guide McAfee Change Control and McAfee Application Control 6.1.4 For use with epolicy Orchestrator 4.6.0-5.1.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission.

More information

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0 Product Guide McAfee Endpoint Upgrade Assistant 1.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee MVISION Mobile Threat Detection Android App Product Guide

McAfee MVISION Mobile Threat Detection Android App Product Guide McAfee MVISION Mobile Threat Detection Android App 1809.4.7.0 Product Guide September 11, 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator 5.9.0)

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator 5.9.0) McAfee Endpoint Upgrade Assistant 1.6.0 Product Guide (McAfee epolicy Orchestrator 5.9.0) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Client Proxy Installation Guide

McAfee Client Proxy Installation Guide McAfee Client Proxy 2.3.5 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM,

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 Revision J McAfee Network Security Platform 8.3 (Integration Guide) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Rogue System Detection 5.0.0

McAfee Rogue System Detection 5.0.0 Product Guide McAfee Rogue System Detection 5.0.0 For use with epolicy Orchestrator 5.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the

More information

Product Guide. McAfee Web Gateway Cloud Service

Product Guide. McAfee Web Gateway Cloud Service Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee File and Removable Media Protection Installation Guide

McAfee File and Removable Media Protection Installation Guide McAfee File and Removable Media Protection 5.0.8 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Endpoint Security Threat Prevention Installation Guide - macos

McAfee Endpoint Security Threat Prevention Installation Guide - macos McAfee Endpoint Security 10.5.5 - Threat Prevention Installation Guide - macos COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

Product Guide. McAfee Web Gateway Cloud Service

Product Guide. McAfee Web Gateway Cloud Service Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

Product Guide. McAfee SiteAdvisor Enterprise 3.5 Patch2

Product Guide. McAfee SiteAdvisor Enterprise 3.5 Patch2 Product Guide McAfee SiteAdvisor Enterprise 3.5 Patch2 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Upgrade Assistant 2.0.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

Vodafone Secure Device Manager Administration User Guide

Vodafone Secure Device Manager Administration User Guide Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of June 2017. Vodafone Ready Business Contents Introduction 3 Help 4 How to find help in the Vodafone Secure

More information

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Security 10.6.0 - Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Drive Encryption Client Transfer Migration Guide. (McAfee epolicy Orchestrator)

McAfee Drive Encryption Client Transfer Migration Guide. (McAfee epolicy Orchestrator) McAfee Drive Encryption 7.2.5 Client Transfer Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Network Security Platform 8.1

McAfee Network Security Platform 8.1 Revision M McAfee Network Security Platform 8.1 (Integration Guide) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee File and Removable Media Protection Product Guide

McAfee File and Removable Media Protection Product Guide McAfee File and Removable Media Protection 5.0.8 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide

McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

VMware Workspace ONE UEM Integration with Apple School Manager

VMware Workspace ONE UEM Integration with Apple School Manager VMware Workspace ONE UEM Integration with Apple School Manager VMware Workspace ONE UEM Integration with Apple School Manager VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation

More information

McAfee Cloud Workload Security Product Guide

McAfee Cloud Workload Security Product Guide Revision B McAfee Cloud Workload Security 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware

More information

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes Workspace ONE UEM v9.6 Have documentation feedback? Submit

More information

Addendum. McAfee Virtual Advanced Threat Defense

Addendum. McAfee Virtual Advanced Threat Defense Addendum McAfee Virtual Advanced Threat Defense 3.10.2 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or

More information

Sophos Mobile. startup guide. Product Version: 8.1

Sophos Mobile. startup guide. Product Version: 8.1 Sophos Mobile startup guide Product Version: 8.1 Contents About this guide... 1 Sophos Mobile licenses... 2 Trial licenses...2 Upgrade trial licenses to full licenses... 2 Update licenses... 2 What are

More information

Hardware Guide. McAfee MVM3200 Appliance

Hardware Guide. McAfee MVM3200 Appliance Hardware Guide McAfee MVM3200 Appliance COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee Artemis,

More information

Sophos Mobile Control startup guide. Product version: 7

Sophos Mobile Control startup guide. Product version: 7 Sophos Mobile Control startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 Sophos Mobile Control licenses...7 3.1 Trial licenses...7 3.2 Upgrade trial licenses

More information

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 Guide to Deploying VMware Workspace ONE DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

McAfee Investigator Product Guide

McAfee Investigator Product Guide McAfee Investigator Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,

More information

Installation Guide. McAfee epolicy Orchestrator Software. Draft for Beta

Installation Guide. McAfee epolicy Orchestrator Software. Draft for Beta Installation Guide McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

ipad in Business Mobile Device Management

ipad in Business Mobile Device Management ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management

More information

McAfee Policy Auditor 6.2.2

McAfee Policy Auditor 6.2.2 Release Notes McAfee Policy Auditor 6.2.2 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel

More information

McAfee Endpoint Security Threat Prevention Installation Guide - Linux

McAfee Endpoint Security Threat Prevention Installation Guide - Linux McAfee Endpoint Security 10.5.1 - Threat Prevention Installation Guide - Linux COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Agent Interface Reference Guide. (McAfee epolicy Orchestrator Cloud)

McAfee Agent Interface Reference Guide. (McAfee epolicy Orchestrator Cloud) McAfee Agent 5.5.0 Interface Reference Guide (McAfee epolicy Orchestrator Cloud) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Google Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes AirWatch v9.3 Have documentation feedback? Submit a Documentation

More information

McAfee MVISION Mobile Silverback Integration Guide

McAfee MVISION Mobile Silverback Integration Guide McAfee MVISION Mobile Silverback Integration Guide Administrator's guide for providing Integration with Silverback MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

McAfee epo Deep Command 1.0.0

McAfee epo Deep Command 1.0.0 Product Guide McAfee epo Deep Command 1.0.0 For use with epolicy Orchestrator 4.6.x Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Product Guide Revision A. Endpoint Intelligence Agent 2.2.0

Product Guide Revision A. Endpoint Intelligence Agent 2.2.0 Product Guide Revision A Endpoint Intelligence Agent 2.2.0 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Content Security Reporter 2.6.x Installation Guide

McAfee Content Security Reporter 2.6.x Installation Guide McAfee Content Security Reporter 2.6.x Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Mobility Manager 9.5. Users Guide

Mobility Manager 9.5. Users Guide Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Sophos Mobile Control Administrator guide. Product version: 5.1

Sophos Mobile Control Administrator guide. Product version: 5.1 Sophos Mobile Control Administrator guide Product version: 5.1 Document date: June 2015 Contents 1 About Sophos Mobile Control...5 1.1 Sophos Mobile Control on premise and as a Service...5 1.2 About this

More information

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE Guide to Deploying VMware Workspace ONE with VMware Identity Manager SEP 2018 VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

McAfee Application Control Windows Installation Guide

McAfee Application Control Windows Installation Guide McAfee Application Control 8.2.0 - Windows Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Building a BYOD Program Using Jamf Pro. Technical Paper Jamf Pro or Later 2 February 2018

Building a BYOD Program Using Jamf Pro. Technical Paper Jamf Pro or Later 2 February 2018 Building a BYOD Program Using Jamf Pro Technical Paper Jamf Pro 10.2.0 or Later 2 February 2018 copyright 2002-2018 Jamf. All rights reserved. Jamf has made all efforts to ensure that this guide is accurate.

More information