Phil Schwan Technical
|
|
- Marilyn Summers
- 6 years ago
- Views:
Transcription
1 Phil Schwan Technical
2 Today s challenges Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources. The explosion of devices is eroding the standards-based approach to corporate IT. Deploying and managing applications across platforms is difficult. Users need to be productive while maintaining compliance and reducing risk.
3 People-centric IT Enable your end users Allow users to work on the devices of their choice and provide consistent access to corporate resources. Unify your environment Users Devices Apps Data Deliver a unified application and device management onpremises and in the cloud. Management. Access. Protection. Protect your data Help protect corporate information and manage risk.
4 Enable users Challenges Users want to use the device of their choice and have access to both their personal and work-related applications, data, and resources. Users want an easy way to be able to access their corporate applications from anywhere. IT departments want to empower users to work this way, but they also need to control access to sensitive information and remain in compliance with regulatory policies. Solutions Users can register their devices, which makes them known to IT, who can then use device authentication as part of providing access to corporate resources. Users can enroll their devices, which provides them with the company portal for consistent access to applications and data, and to manage their devices. IT can publish access to corporate resources with conditional access based on the user s identity, the device they are using, and their location.
5 Helping IT to enable users Users can work from anywhere on their devices with access to their corporate resources. Users can enroll devices for access to the company portal for easy access to corporate applications. IT can publish desktop virtualization resources for access to centralized resources. Users can register devices for single sign-on and access to corporate data with Workplace Join. Firewall IT can provide seamless corporate access. IT can publish access to resources with the web application proxy based on device awareness and the users identity.
6 People-centric Application Delivery Accessing apps the right way, on the right device Target applications based on user role the best way for each device Windows/Windows RT Windows Phone ios Android MSI App-V (MDOP) Remote App RDS Native App/ App Store OS X Evaluate device capabilities for optimal application delivery Local installation Microsoft Application Virtualization Desktop Virtualization (VDI) Web applications
7 Unify your environment Challenges MDM products are typically delivered as point solutions, which do not integrate with the main PC management solution already in use. Managing multiple identities and keeping the information in sync across environments is a drain on IT resources. Solutions IT has a single pane of glass to view and manage all managed devices, whether on-premises or cloudbased, PCs or mobile devices. Users and IT can leverage their common identity for access to external resources through federation.
8 Unify your environment Deliver comprehensive application and device management Single Admin Console User Unified infrastructure enables IT to manage devices where they live Comprehensive settings management across platforms, including certificates, VPNs, and wireless network profiles IT can manage the device and application lifecycle
9 Providing users with a common identity IT can use Active Directory Federation Services to connect with Windows Azure for a consistent cloud-based identity. Users are more productive by having a single sign-on to all their resources. Users get access through accounts in Windows Azure Active Directory to Windows Azure, Office 365, and third-party applications. IT can provide users with a common identity across on-premises or cloudbased services, leveraging Windows Server Active Directory and Windows Azure Active Directory. Developers can build applications that leverage the common identity model.
10 Registering and Enrolling Devices Users can enroll devices that configure the device for management with Windows Intune; the user can then use the Company Portal for easy access to corporate applications Data from Windows Intune is in sync with Configuration Manager, which provides unified management across both on-premises and in the cloud Users can register BYO devices for single sign-on and access to corporate data with Workplace Join. As part of this, a certificate is installed on the device IT can publish access to corporate resources with the Web Application Proxy based on device awareness and the user s identity.; multi-factor authentication can be used through Windows Azure Active Authentication (formerly PhoneFactor) As part of the registration process, a new device object is created in Active Directory, establishing a link between the user and their device
11 Protect your data Challenges As users bring their own devices in to use for work, they will also want to access sensitive information and have access to this information locally on the device. A significant amount of corporate data can only be found locally on user devices. IT needs to be able to secure, classify, and protect data based on the content it contains, not just where it resides, including maintaining regulatory compliance. Solutions Users can work on the device of their choice and be able to access all their resources, while IT can identify at-risk devices through jailbreak and root detection IT can enforce a set of central access and audit polices, and be able to protect sensitive information based on the content of the documents. IT can centrally audit and report on information access.
12 Help protect corporate information and manage risk Users can access corporate data regardless of device or location with Work Folders for data sync and desktop virtualization for centralized applications. IT can provide a secure and familiar solution for users to access sensitive corporate data from anywhere with VDI and RemoteApp technologies. Personal Apps and Data Company Apps and Data Remote App Enrollment Lost Retired or Stolen Identify at-risk devices through jailbreak and root detection Selective wipe removes corporate applications, data, certificates/profiles, and policies based as supported by each platform Company Apps and Data Centralized Data Full wipe as supported by each platform Remote App Can be executed by IT or by user via Company Portal Policies Sensitive data or applications can be Policies kept off device and accessed via Remote Desktop Services Lost or Stolen Retired Personal Apps and Data
13 Full and Selective Wipe Category Windows 8.1 (x86/rt OMA-DM managed) Windows 8 RT Windows Phone ios Android Full Wipe ( through EAS) ( through EAS) Selective Wipe Corporate Apps (from ConfigMgr / Intune) VPN and Wifi Profiles (Uninstalled + sideloading key removed) Sideloading key removed Certificates Revoked on server N/A Revoked on server Revoked on server Revoked on server Settings Policy enforcement is removed Policy enforcement is removed Policy enforcement is removed Policy enforcement is removed Policy enforcement is removed Management Agent Corporate App Data N/A. Built into OS N/A. Built into OS N/A. Built into OS Management profile removed Data remains encrypted if app is EFS aware App container removed during uninstall App container removed during uninstall Device administrator privilege is revoked
14 Unified Device Management Console
15 Platform Support OS Platform Management Agent End User Experience Windows 8.1 PC ConfigMgr Agent Or Management Agent(OMA-DM) Software Center/Application Catalog Windows Company Portal app Windows PC ConfigMgr Agent Software Center/Application Catalog (Win8,Win7,Vista,XP) Windows RT Management agent (OMA-DM) Windows Company Portal app Windows Phone 8 Management agent (OMA-DM) Windows Phone 8 Company Portal app ios Apple MDM Protocol Native ios Company Portal App Android Android MDM agent (OMA-DM) Native Android Company Portal App Mac ConfigMgr Agent Limited self service experience Linux/Unix ConfigMgr Agent N/A
16 What s New in Mobile Device Inventory? Personal vs. Corporate Owned Devices By default, user-enrolled devices are Personal Admin can specify corporateowned devices App inventory Personal devices Inventory of applications installed by ConfigMgr/Intune only Corporate devices Complete inventory of all applications on the device* App Management New global condition to differentiate app installs on corporate versus personal * ios Apple MDM allows only inventory of MDM provisioned apps
17 Mobile Device Settings in ConfigMgr 2012 R2 Category Windows 8.1 PC & RT Windows Phone 8 ios VPN Android Wi-Fi Certificates Password (*) (*) (*) Device restrictions (*) (*) Store access Browsers (*) (*) Content Rating Cloud Synch Encryption (*) (*) (*) Security (*) (*) (*) * Subset of settings Note: Table applicable to direct MDM and not EAS
18 Resource Access Configuration New Features* Configure networking profiles VPN profiles Support for Windows 8.1 Automatic VPN Wi-Fi protocol and authentication settings Management and distribution of certificates Benefits End users get access to company resources with no manual steps for them Platforms Windows 8.1 Windows 8.1 RT ios Android
19 VPN Profile Management Support for major SSL VPN vendors Support for VPN standards Automatic VPN connection SSL VPNs from Cisco, Juniper, Check Point, Microsoft, Dell SonicWALL, F5 Subset of vendors have Windows Windows RT VPN plug-in PPTP,L2TP, IKEv2 DNS name-based initiation support for Windows 8.1 and ios Application ID based initiation support for Windows 8.1
20 Wi-Fi and Certificate Profiles Wi-Fi settings Manage Wi-Fi protocol and authentication settings Provision Wi-Fi networks that device can auto connect Specify certificate to be used for Wi-Fi connection Manage and distribute certificates Deploy trusted root certificates Support for Security Center Endpoint Protection(SCEP) protocol
21 Work Folders Sync files and data across devices New feature in Windows 8.1 client and Windows Server 2012 R2 Configuration Manager and Windows Intune support New settings to help provision the Work Folder discovery settings Company Portals have links to Work Folders
22 Distribution Point for Windows Azure Windows Azure Distribution Point PR1 Policy Content MP Firewall MP Microsoft Update Rich feature set Integrated monitoring In-console content monitoring Ability to monitor storage and traffic out usage Content is fully encrypted DP Corporate Network
23 Phil Schwan Technical
905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in use for work and home globally by 2017 Before Now 32% of
More informationHow Microsoft s Enterprise Mobility Suite Provides helps with those challenges
2 Agenda Enterprise challenges for mobility How Microsoft s Enterprise Mobility Suite Provides helps with those challenges Hybrid identity With Azure Active Directory and Azure Active Directory Premium
More informationWindows ierīces Enterprise infrastruktūrā. Aris Dzērvāns Microsoft
Windows ierīces Enterprise infrastruktūrā Aris Dzērvāns Microsoft Windows 8.1 Update the vision for everyone Designed for the way you live and work Brings together all you do On great devices Always business
More informationPlanning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On-Premises Tools
Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On-Premises Tools OD20398B; On-Demand, Video-based Course Description This course teaches IT professionals how to
More informationPlanning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On- Premises Tools
Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On- Premises Tools 20398BA - 5 Days - Instructor-led, Hands-on Introduction This five-day course teaches IT professionals
More informationPlanning for and Managing Devices in the Enterprise: Enterprise Management Suite (EMS) & On-Premises Tools
Enterprise Management Suite (EMS) & On-Premises Tools Page 1 of 7 Planning for and Managing Devices in the Enterprise: Enterprise Management Suite (EMS) & On-Premises Tools Course 20398A: 4 days; Instructor-Led
More informationAt Course Completion After completing this course, students will be able to:
Course Details Course Code: Duration: Notes: 20398B 5 days This course syllabus should be used to determine whether the course is appropriate for the students, based on their current skills and technical
More information20398: Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) and On- Premises Tools
Let s Reach For Excellence! TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC Address: 103 Pasteur, Dist.1, HCMC Tel: 08 38245819; 38239761 Email: traincert@tdt-tanduc.com Website: www.tdt-tanduc.com; www.tanducits.com
More informationWHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365
WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often
More informationWindows 10 Management Technologies: What s New. Michael Niehaus Senior Product Marketing Manager, Windows Microsoft
Windows 10 Management Technologies: What s New Michael Niehaus Senior Product Marketing Manager, Windows Microsoft Business needs are evolving. Windows 10 offers to meet those needs. MANAGEMENT CHOICES
More informationMobility Windows 10 Bootcamp
Mobility Windows 10 Bootcamp Length: 8 days Format: Bootcamp Time: Day About This Course This boot camp is designed to provide students with the knowledge and skills required to install and configure Windows
More informationManaging Windows 8.1 Devices with XenMobile
Managing Windows 8.1 Devices with XenMobile Mobile Device Management for Windows 8.1 Devices The Bring Your Own Device Challenge With the advent of the bring your own device (BYOD) trend, employees expect
More informationForeScout Extended Module for VMware AirWatch MDM
ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5
More informationSecure Access - Update
Secure Access - Update for people, devices, things and services Jonas Gyllenhammar Senior Consultant Engineer - Specialist The New Reality All Major OSs One Client On-the-go Home network Untrusted LAN
More informationConfiguring Windows 10 Devices (697)
Configuring Windows 10 Devices (697) Manage Identity Support Microsoft Store, Microsoft Store for Education, Microsoft Store for Business, and cloud apps. Install and manage software by using Microsoft
More informationWindows 10 Azure AD / EMS
Windows 10 Azure AD / EMS Jörgen Nilsson @ccmexec Jorgen.nilsson@onevinn.se Blog: http://ccmexec.com #win10tour The traditional IT environment is no more Our users have More than one device A large number
More informationMCSA Windows 10. A Success Guide to Prepare- Microsoft Configuring Windows Devices. edusum.com
70-697 MCSA Windows 10 A Success Guide to Prepare- Microsoft Configuring Windows Devices edusum.com Table of Contents Introduction to 70-697 Exam on Microsoft Configuring Windows Devices... 2 Microsoft
More informationDelivering a Secure BYOD Solution with XenMobile MDM and Cisco ISE
Delivering a Secure BYOD Solution with XenMobile MDM and Cisco ISE Bhumik Patel Solutions Architect, Citrix Systems May 21 st 2013 App Complete Enterprise Mobility Business Apps Productivity and Collaboration
More informationMobile device management at Microsoft
Mobile device management at Microsoft Page 1 Mobile device management at Microsoft Situation As the use of personal devices in the workplace expands, IT is challenged with managing a data environment where
More informationOffice 365: Modern Workplace
Office 365: Modern Workplace November 8, 2018 Bruce Ward, VP of Business Strategy Helping you grow your business with scalable IT services & solutions for today s challenges & tomorrow s vision. 2018 Peters
More informationMastering the Move to Modern Management using ConfigMgr
Mastering the Move to Modern Management using ConfigMgr Josué Negrón Sr. Solutions Architect VMware Brooks Peppin EUS Systems Engineer VMware Agenda Challenges with PCLM Solutions What are your Options?
More informationWindows 7 Deployment Key Milestones
Windows 7 Deployment Key Milestones 2012 2013 2014 Client Deployment and Management Tool Windows 7 Deployment Select Tool (3-6 months) Deployment Tool Architecture (1-2 months) Assess Hardware (1-2 months)
More informationWORKPLACE Data Leak Prevention: Keeping your sensitive out of the public domain. Frans Oudendorp Ronny de Jong
Data Leak Prevention: Keeping your sensitive out of the public domain Frans Oudendorp Ronny de Jong Session objectives & takeaways Session objectives: Overview of information protection solutions How to
More informationThe Device Has Left the Building
The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use
More informationForeScout Extended Module for MobileIron
Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...
More informationNE Administering System Center Configuration Manager and Intune
NE-20696 Administering System Center Configuration Manager and Intune Summary Duration 5 Days Audience IT Professionals Level 300 Technology System Center Configuration Manager Delivery Method Instructor-led
More informationQuo vadis? System Center Configuration Manager Full managed desktop. Mobile device management Light managed device policies, inventory,
Quo vadis? System Center Configuration Manager Full managed desktop Mobile device management Light managed device policies, inventory, Hybrid management One pane of glass Integration of mobile device management
More informationMobile Security using IBM Endpoint Manager Mobile Device Management
Mobile Security using IBM Endpoint Manager Mobile Device Management Mahendra Chopra Security Solution Architect @ IBM CIO Lab, Innovation mahendra.chopra@in.ibm.com Agenda Market Trends Mobile Security?
More informationMD-101: Modern Desktop Administrator Part 2
Days: 5 Description: This five-day course is for Desktop Administrators that deploy, configure, secure, manage, and monitor devices and client applications in an enterprise environment. As desktops has
More informationARCHITECTURAL OVERVIEW REVISED 6 NOVEMBER 2018
REVISED 6 NOVEMBER 2018 Table of Contents Architectural Overview Workspace ONE Logical Architecture GUIDE 2 VMware Workspace ONE Cloud-Based Reference Architecture - Architectural Overview Architectural
More informationMicrosoft IT deploys Work Folders as an enterprise client data management solution
Microsoft IT deploys Work Folders as an enterprise client data management solution Published May 2014 The following content may no longer reflect Microsoft s current position or infrastructure. This content
More informationManaging and Maintaining Windows 8
70-688 Managing and Maintaining Windows 8 New exam title: Supporting Windows 8.1 The following tables itemize changes to Exam 70-688. These changes will be made in January to include updates that relate
More informationIntune Policies Guide
TechReady Are you ready to implement IT solutions? Intune Policies Guide Mobile Device Management with Enterprise Mobility Suite Created for: TechReady 15 September 2016 Version 0.3 Created by: Adrian
More informationUse EMS to protect your mobile data and mobile app
Use EMS to protect your mobile data and mobile app Peter Daalmans Senior Consultant, Enterprise Mobility MVP CTGlobal. pds@ctglobalservices.com PETER DAALMANS Enterprise Mobility MVP @ CTGlobal Blog: https://peterdaalmans.com
More informationSophos Mobile Control SaaS startup guide. Product version: 6.1
Sophos Mobile Control SaaS startup guide Product version: 6.1 Document date: September 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your
More informationBYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-BOaRDING and Securing DEVICES IN YOUR Corporate NetWORk PrepaRING YOUR NetWORk to MEEt DEVICE DEMaND The proliferation of smartphones and tablets brings increased
More informationThomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017
Thomas Lippert Principal Product Manager Sophos Mobile Spring 2017 Market Overview Trends Security or data breaches involving mobile devices are on the rise More people use mobile devices for work than
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationBlackBerry UEM Configuration Guide
BlackBerry UEM Configuration Guide 12.9 2018-11-05Z 2 Contents Getting started... 7 Configuring BlackBerry UEM for the first time... 7 Configuration tasks for managing BlackBerry OS devices... 9 Administrator
More informationIntroducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS
Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS 1 Business drivers and their impact on IT AGILITY Move fast, be nimble and flexible 66% of business owners identify business agility as a priority EFFICIENCY
More informationCounterACT Afaria MDM Plugin
Version 1.7.0 and Above Table of Contents About Afaria MDM Service Integration... 4 About This Plugin... 4 How It Works... 5 Continuous Query Refresh... 5 Offsite Device Management... 6 Supported Devices...
More information2016 BITGLASS, INC. mobile. solution brief
mobile solution brief BYOD Security has been a constant challenge for many enterprises. Stories of failed MDM deployments are rampant, with firms struggling achieve meaningful adoption. According to the
More informationREVISED 4 JANUARY 2018 VMWARE WORKSPACE ONE REFERENCE ARCHITECTURE FOR SAAS DEPLOYMENTS
REVISED 4 JANUARY 2018 VMWARE WORKSPACE ONE REFERENCE ARCHITECTURE FOR SAAS DEPLOYMENTS Table of Contents Executive Summary VMware Reference Architectures Audience Reference Architecture Design Methodology
More informationWindows 10. Tech Note. Open the Window to Endless Possibilities. Windows for the Enterprise. Universal App Experience
Windows 10 ENTERPRISE MOBILITY MANAGEMENT Tech Note Open the Window to Endless Possibilities Windows 10 shows a renewed focus on the Enterprise. It successfully harmonizes user experience and device management
More informationSecure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices
Michal Zlesák Area Sales Manager Michal.zlesak@enterasys.com Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices A Siemens Enterprise Communications Company
More informationAirWatch Mobile Device Management
RSA Ready Implementation Guide for 3rd Party PKI Applications Last Modified: November 26 th, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product Description
More informationSecure & Unified Identity
Secure & Unified Identity for End & Privileged Users Copyright 2015 Centrify Corporation. All Rights Reserved. 1 Key Point #1: Perimeter is Dissolving Making Identity Matter Most You must plant a strong
More informationSymantec Endpoint Protection Family Feature Comparison
Symantec Endpoint Protection Family Feature Comparison SEP SBE SEP Cloud SEP Cloud SEP 14.2 Device Protection Laptop, Laptop Laptop, Tablet Laptop Tablet & & Smartphone Smartphone Meter Per Device Per
More informationForescout. eyeextend for VMware AirWatch. Configuration Guide. Version 1.9
Forescout Version 1.9 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191
More informationForeScout Extended Module for MaaS360
Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...
More informationSophos Mobile Control SaaS startup guide. Product version: 7
Sophos Mobile Control SaaS startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8 5 Change your login
More informationAirWatch for Android Devices for AirWatch InBox
Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by Michigan Medicine ensure security for smart phones and tablets that connect to the Michigan Medicine environment.
More informationCOURSE OUTLINE: B Deploying and Managing Windows 10 Using Enterprise Services. Course Name. Course Duration Course Structure Course Overview
Course Name Course Duration Course Structure Course Overview Course Outcome Course Details 20697-2B Deploying and Managing Windows 10 Using Enterprise Services 5 Days Instructor-Led This course provides
More informationConfiguration Guide. BlackBerry UEM. Version 12.9
Configuration Guide BlackBerry UEM Version 12.9 Published: 2018-07-16 SWD-20180713083904821 Contents About this guide... 8 Getting started... 9 Configuring BlackBerry UEM for the first time...9 Configuration
More informationMCSE- Windows Server 2012
COURSE CONTENT MCSE- Windows Server 2012 Course 20413C: Designing and Implementing a Server Infrastructure 1. Planning Server Upgrade and Migration Considerations for Upgrades and Migrations Creating a
More informationAirWatch for ios Devices
Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by UMHS to ensure security for smart phones and tablets that connect to the UMHS environment. AirWatch provides
More informationApple OS Deployment Guide for the Enterprise
Apple OS Deployment Guide for the Enterprise So your organization is about to deploy Mac, iphone, ipad and/or Apple TV to your users and you re not sure where to start? That s where the Apple management
More informationPLANNING YOUR WINDOWS 10 DEPLOYMENT: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE
GUIDE OCTOBER 2018 PRINTED 29 OCTOBER 2018 PLANNING YOUR WINDOWS 10 DEPLOYMENT: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE Table of Contents Overview Introduction Purpose Audience Meeting
More informationCitrix SSO for ios. Page 1 18
Citrix SSO for ios Page 1 18 Contents OVERVIEW... 3 WHAT'S NEW... 3 KNOWN ISSUES AND FIXED ISSUES... 4 FEATURE COMPARISON BETWEEN CITRIX VPN AND CITRIX SSO... 5 COMPATIBILITY WITH MDM PRODUCTS... 6 CONFIGURE
More informationMOC 20416B: Implementing Desktop Application Environments
MOC 20416B: Implementing Desktop Application Environments Course Overview This course provides students with the knowledge and skills to design, deploy, and manage a physical and virtual Windows Server
More informationVMware AirWatch: Directory and Certificate Authority
Table of Contents Lab Overview - HOL-1857-06-UEM - VMware AirWatch: Directory and Certificate Authority Integration... 2 Lab Guidance... 3 Module 1 - Advanced AirWatch Configuration, AD Integration/Certificates
More informationAdnan Cloud Solutions Architect. SAFFA living in Netherlands, work globally. Microsoft Trainer +25y (xrl MSLearning)
Adnan Hendricks Cloud Solutions Architect SAFFA living in Netherlands, work globally Microsoft Trainer +25y (xrl MSLearning) Microsoft MVP + 5 Years @Microspecialist Adnan@ microspecialistconsulting.com
More informationWindows 8/RT Features Matrix
Windows 8/RT Features Matrix The following matrix shows what AirWatch features are available to the Windows 8.0/RT and the Windows 8.1/RT platforms. Feature Windows 8.0/RT Windows 8.1/RT Activation & Enrollment
More informationWorkspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810
Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationXperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment
Xperia TM in Business Mobile Device Management Read about how Xperia TM devices can be administered in a corporate IT environment Device management clients Exchange ActiveSync The my Xperia service Third
More informationSystems Manager Cloud-Based Enterprise Mobility Management
Datasheet Systems Manager Systems Manager Cloud-Based Enterprise Mobility Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and
More informationDeploying and Managing Windows 10 Using Enterprise Services
Deploying and Managing Windows 10 Using Enterprise Services Course 20697-2C 5 Days Instructor-led, Hands-on Course Description This 5-day course provides administrators with the knowledge and skills necessary
More informationMicrosoft. MS-101 EXAM Microsoft 365 Mobility and Security. m/ Product: Demo File
Page No 1 https://www.dumpsplanet.com m/ Microsoft MS-101 EXAM Microsoft 365 Mobility and Security Product: Demo File For More Information: MS-101-dumps Question: 1 Your company uses Windows Defender Advanced
More informationGo mobile. Stay in control.
Go mobile. Stay in control. Enterprise Mobility + Security Jeff Alexander Sr. Technical Evangelist http://about.me/jeffa36 Mobile-first, cloud-first reality 63% 80% 0.6% Data breaches Shadow IT IT Budget
More informationC: Deploying and Managing Windows 10 Using Enterprise Services. Duration: 5 days; Instructor-led
20697-2C: Deploying and Managing Windows 10 Using Enterprise Services Duration: 5 days; Instructor-led WHAT YOU WILL LEARN This course provides administrators with the knowledge and skills necessary to
More informationThe Zentri Secure IoT Platform
The Zentri Secure IoT Platform Zentri s Secure IoT Platform empowers industrial, commercial, and consumer product companies to securely build, launch, manage, and scale cloud-connected products. With Zentri,
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationCAN MICROSOFT HELP MEET THE GDPR
CAN MICROSOFT HELP MEET THE GDPR REQUIREMENTS? Danny Uytgeerts Microsoft 365 TSP / P-Seller Privacy Consultant (certified DPO) Member of DPO-Pro (Professional association of Belgian DPOs) danny.uytgeerts@realdolmen.com
More informationConfiguration Guide. BlackBerry UEM. Version 12.7 Maintenance Release 2
Configuration Guide BlackBerry UEM Version 12.7 Maintenance Release 2 Published: 2017-12-04 SWD-20171130134721747 Contents About this guide... 8 Getting started... 9 Configuring BlackBerry UEM for the
More informationCloud Print Migration Step-by-Step Deployment Guide
Getting Started Cloud Print Migration Step-by-Step Deployment Guide On-premise print server Print via shared print queues Print drivers distributed from server Manual maintenance and updates Single point
More informationVIRTUSA BYOD PROGRAM
VIRTUSA BYOD PROGRAM Self-help Installation Guide for ios Devices JULY 24, 2018 VIRTUSA Version 1.0 1 Virtusa BYOD Program The Virtusa BYOD (Bring Your Own Device) program allows all Virtusa employees
More informationSecurity Challenges: Integrating Apple Computers into Windows Environments
Integrating Apple Computers into Windows Environments White Paper Parallels Mac Management for Microsoft SCCM 2018 Presented By: Table of Contents Environments... 3 Requirements for Managing Mac Natively
More informationMicrosoft Deploying and Managing Windows 10 Using Enterprise Services
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20697-2 Deploying and Managing Windows 10 Using Enterprise Services Length 5 days Price $4290.00 (inc GST) Version C Overview This course provides administrators
More informationMicrosoft Intune App Protection Policies Integration. VMware Workspace ONE UEM 1811
Microsoft Intune App Protection Policies Integration VMware Workspace ONE UEM 1811 Microsoft Intune App Protection Policies Integration You can find the most up-to-date technical documentation on the VMware
More informationForescout. eyeextend for MobileIron. Configuration Guide. Version 1.9
Forescout Version 1.9 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191
More informationVMware AirWatch Google Sync Integration Guide Securing Your Infrastructure
VMware AirWatch Google Sync Integration Guide Securing Your Email Infrastructure Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard
More informationOVERVIEW... 3 WHAT'S NEW... 3 COMPATIBILITY WITH MDM PRODUCTS... 5 CONFIGURE AN MDM MANAGED VPN PROFILE FOR CITRIX SSO... 5
Citrix SSO Contents OVERVIEW... 3 WHAT'S NEW... 3 COMPATIBILITY WITH MDM PRODUCTS... 5 CONFIGURE AN MDM MANAGED VPN PROFILE FOR CITRIX SSO... 5 Device level VPN Profiles... 5 Per-App VPN Profiles... 7
More informationDeploying and Managing Windows 10 Using Enterprise Services
Deploying and Managing Windows 10 Using Enterprise Services Course # Exam: Prerequisites Technology: Delivery Method: Length: 20697-2 70-697 20697-1 Windows Instructor-led (classroom) 5 Days Overview About
More informationGuide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1
Guide to Deploying VMware Workspace ONE DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationDeployment Genval November 2018
MODERN WORKPLACE FOR MODERN PEOPLE Deployment Genval November 2018 1. Traditional Deployment 2. Modern Deployment - Autopilot 3. Demo 4. Traditional vs Modern Deployment 5. Realdolmen Case About me : Ives
More informationAirWatch for Android Devices for Skype for Business
Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by Michigan Medicine ensure security for smart phones and tablets that connect to the Michigan Medicine environment.
More informationExam /Course C or B Configuring Windows Devices
Exam 70-697/Course 20697-1C or 20697-2B Configuring Windows Devices Course 20697-2B Deploying and Managing Windows 10 Using Enterprise Services About this course This course provides administrators with
More informationCitrix SSO for Mac OS X. User Guide
Citrix SSO for Mac OS X User Guide Contents OVERVIEW... 3 FEATURE COMPARISON BETWEEN CITRIX VPN AND CITRIX SSO... 4 COMPATIBILITY WITH MDM PRODUCTS... 5 CONFIGURE AN MDM MANAGED VPN PROFILE FOR CITRIX
More informationCONFIGURING BASIC MACOS MANAGEMENT: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE
GUIDE FEBRUARY 2019 PRINTED 26 FEBRUARY 2019 CONFIGURING BASIC MACOS MANAGEMENT: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE Table of Contents Overview Introduction Purpose Audience
More informationSix steps to control the uncontrollable
Six steps to control the uncontrollable Learn how to use Microsoft Enterprise Mobility Suite to protect cloud apps, manage devices, and guard against advanced threats today Introduction Employees today
More informationAdaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia
Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia F5 EMEA Webinar Listopad 2014 Andrzej Kroczek Field Systems Engineer Today s Network and App Access: So Many Variables! LOCATIONS USERS DEVICES
More informationMobility Manager 9.5. Users Guide
Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks
More informationCOURSE B: DEPLOYING AND MANAGING WINDOWS 10 USING ENTERPRISE SERVICES
ABOUT THIS COURSE This course provides administrators with the knowledge and skills necessary to deploy and manage Windows 10 desktops, devices, and applications in an enterprise environment. Students
More informationCourse Outline. Deploying and Managing Windows 10 Using Enterprise Services Course B: 5 days Instructor Led
Deploying and Managing Windows 10 Using Enterprise Services Course 20697-2B: 5 days Instructor Led Prerequisites: Students should have at least two years of experience in the IT field and should already
More informationVMware AirWatch Certificate Authentication for Cisco IPSec VPN
VMware AirWatch Certificate Authentication for Cisco IPSec VPN For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationGuide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1
Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware
More informationGoogle Sync Integration Guide. VMware Workspace ONE UEM 1902
Google Sync Integration Guide VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,
More informationVirtru Microsoft Protection
Virtru Microsoft Email Protection Seamless Experience, Automatic Protection, Persistent Control Encrypt Outlook and OWA on the client-side with the flip of a switch Track and control access to emails and
More informationTable of Contents HOL-1757-MBL-6
Table of Contents Lab Overview - - VMware AirWatch: Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with AirWatch (30 min)... 8 Getting Started... 9 F5 BigIP Configuration...
More informationCentrify Identity Services for AWS
F R E Q U E N T L Y A S K E D Q U E S T I O N S Centrify Identity Services for AWS Service Description and Capabilities What is included with Centrify Identity Services for AWS? Centrify Identity Services
More information