Symantec Mobile Management for Configuration Manager

Size: px
Start display at page:

Download "Symantec Mobile Management for Configuration Manager"

Transcription

1 Symantec Mobile Management for Configuration Manager Installation Guide 7.2 SP1

2 Symantec Mobile Management for Configuration Manager: Installation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Last updated: Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Athena are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party ( Third Party Programs ). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Software file accompanying this Symantec product for more information on the Third Party Programs. See "Symantec Mobile Management for Configuration Manager Third-Party Legal Notices" on page 143 The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR and subject to restricted rights as defined in FAR Section "Commercial Computer Software - Restricted Rights" and DFARS , "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement. Symantec Corporation, 350 Ellis Street, Mountain View, CA

3 Technical Support Symantec Technical Support maintains support centers globally. Technical Support s primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates. Symantec s support offerings include the following: A range of support options that give you the flexibility to select the right amount of service for any size organization Telephone and/or Web-based support that provides rapid response and up-to-the-minute information Upgrade assurance that delivers software upgrades Global support purchased on a regional business hours or 24 hours a day, 7 days a week basis Premium service offerings that include Account Management Services For information about Symantec s support offerings, you can visit our website at the following URL: All support services will be delivered in accordance with your support agreement and the then-current enterprise technical support policy. Contacting Technical Support Customers with a current support agreement may access Technical Support information at the following URL: Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to replicate the problem. When you contact Technical Support, please have the following information available: Product release level Hardware information Available memory, disk space, and NIC information

4 Operating system Version and patch level Network topology Router, gateway, and IP address information Problem description: Error messages and log files Licensing and registration Customer service Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes If your Symantec product requires registration or a license key, access our technical support Web page at the following URL: Customer service information is available at the following URL: Customer Service is available to assist with non-technical questions, such as the following types of issues: Questions regarding product licensing or serialization Product registration updates, such as address or name changes General product information (features, language availability, local dealers) Latest information about product updates and upgrades Information about upgrade assurance and support contracts Information about the Symantec Buying Programs Advice about Symantec's technical support options Nontechnical presales questions Issues that are related to CD-ROMs or manuals Support agreement resources If you want to contact Symantec regarding an existing support agreement, please contact the support agreement administration team for your region as follows: Asia-Pacific and Japan customercare_apac@symantec.com Europe, Middle-East, and Africa North America and Latin America semea@symantec.com supportsolutions@symantec.com

5 Contents Chapter 1 About this guide... 9 Introducing this guide... 9 Comment on the documentation... 9 Chapter 2 Introducing Mobile Management for Configuration Manager About Mobile Management for Configuration Manager Components of Mobile Management for Configuration Manager Required Components Optional Components Supported Features Before you begin Chapter 3 Requesting an APNS Certificate Creating a new APNS Certificate Renew certificate Installing and updating the replacement APNS Certificate Replace expired APNS Certificate Chapter 4 Setting up Google Cloud Messaging Prerequisites Gmail account creation Creating a project ID Enabling the GCM Service Obtain server key Chapter 5 System Requirements Central and Primary Servers Secondary Servers or Management Points Administrator Console Workstation PCs Required Ports/Protocols Security Group Configuration Apple Enterprise Membership Requirements SYMC Agent for ios Requirements... 36

6 6 Contents ios Profile Security Requirements Supported Mobile Devices Mobile Device Network Chapter 6 Installing Installation Components Symantec Mobile Management Components Installation Order Push Services Installation Procedure Console and Services Installation Procedures Part 1 Console Installation Part 2 Add ISV Proxy Certificate Part 3 Services Installation Post-Installation Procedures Chapter 7 Set Up Profiles for ios Devices View Profiles Configure ios Signing and Encryption Profile Create Security Credentials Root or Signing with Public Key Encryption Configure MDM Enrollment Profile Chapter 8 Enrolling Devices Authentication for Agent Enrollment ios Device Install Symantec Mobile MGMT Agent Enroll ios Device Android Device Authorizing the Symantec Mobile MGMT Agent for Device Administrator Privileges Windows Phone 7 Device Chapter 9 Registering Devices Windows Mobile and Windows CE Devices BlackBerry Smartphones Chapter 10 Device Licensing View License Information License Warning Dialog License Tool

7 Access the License Tool Obtain Licenses View Licenses Chapter 11 View Devices in Collections ios Device (iphone, ipad, ipod Touch) Android Device Windows Phone Windows Mobile or Windows CE Device BlackBerry Smartphone Chapter 12 Configuring Device Ownership Set Ownership Chapter 13 EAS Blocking Blocking Settings Exchange ActiveSync Blocking Functionality F5 Rules Query EAS Authorized Devices Chapter 14 Additional Procedures Using a Non-Domain Admin Account for Installation Enabling ASP.Net in IIS Query for All Windows Mobile Devices Collection DNS Text Record Setup for Android and ios Services Chapter 15 Upgrading Upgrade Procedure

8 8 Contents

9 Chapter 1 About this guide Introducing this guide This guide contains the installation prerequisites and installation procedures for Symantec Mobile Management for Microsoft System Center Configuration Manager. This guide is intended for administrators who are familiar with Configuration Manager and its operation and who are authorized to install software. Comment on the documentation Let us know what you like and dislike about the documentation. Were you able to find the information you needed quickly? Was the information clearly presented? Report errors and omissions, or tell us what you would find useful in future versions of our guides and online help. Please include the following information with your comment: The title and product version of the guide on which you want to comment. The topic (if relevant) on which you want to comment. Your name. your comment to evdocs@symantec.com. Please only use this address to comment on product documentation. We appreciate your feedback.

10 10 About this guide Comment on the documentation

11 Chapter 2 Introducing Mobile Management for Configuration Manager This chapter contains the following topics: About Mobile Management for Configuration Manager Components of Mobile Management for Configuration Manager Supported Features Before you begin About Mobile Management for Configuration Manager Symantec Mobile Management for Configuration Manager provides device management for Windows Mobile /CE, BlackBerry, ios, Android, and Windows Phone 7 mobile devices using the Microsoft System Center Configuration Manager Console. Software package creation and assignment are available for Windows Mobile/CE devices. Profile management, profile payload configuration, profile assignment, and Mobile Library Feed creation/assignment is available for ios and Android devices. Mobile Library Feed creation and assignment is available for Windows Phone 7 devices. Access to Live Support Session, which enables the remote viewing of current information on Windows Mobile, Windows CE devices, BlackBerry smartphones, and Android devices is also available.

12 12 Introducing Mobile Management for Configuration Manager Components of Mobile Management for Configuration Manager Components of Mobile Management for Configuration Manager The following is an overview of the main components of Symantec Mobile Management for Configuration Manager. The components are installed on servers (Central, Primary, Secondary, Management Point) in the site environment. Where the components are installed depends on the site configuration and hierarchy. There are optional components that can also be installed. For more information, see Installation Components on page 39. Required Components Optional Components Push Services- includes the APNS Web Service, Google Cloud Messaging (GCM) Service, and Feedback Web Service. These Windows and Web services are required for ios and Android device management. Console- administrator console integration components for device management. Services- management point integration for mobile device communication. Replication Services- creates a copy of the Athena database for recovery purposes and provides synchronization of data across multiple database environments. Required for multi-server environments. Reporting Services- provides a standard set of reports for managed devices and/or collections. Required if using Exchange ActiveSync Management Services. Exchange ActiveSync Management Services- enables the management of mobile devices that support Microsoft Exchange within Microsoft Configuration Manager. Required if you will be using EAS Blocking blocking rules. See EAS Blocking functionality on page 112. Windows Mobile/CE Feature Packs- feature packs for Windows Mobile and Windows CE devices. Includes Positioning (GPS), Phone, and Security Essentials (Lock and Wipe) device functionality.

13 Introducing Mobile Management for Configuration Manager Components of Mobile Management for Configuration Manager 13 Supported Features The following table shows features that are available for device management using the Symantec Mobile Management for Configuration Manager Console. These features are available after all components are installed. Note: Lock and Wipe for Windows Mobile/CE is available with the optional Security Essentials Feature Pack. Feature Device Support Configuration Manager Feature Android BlackBerry ios (iphone, ipad, ipod Touch) Windows Phone 7 Windows Mobile/Windows CE Remote Management X X X X Inventory Reporting X X X X X Device Explorer X X X X X Device License Status X X X X X Device Ownership X X X X X Device Profile Distribution (Profile Editor/ Configuration Editor) X X Provisioning/ Software Distribution (Package Wizard, Distribution Wizard) X Remote Control X X Mobile Library including content notification to device X X X Lock X X X

14 14 Introducing Mobile Management for Configuration Manager Before you begin Configuration Manager Feature Android BlackBerry ios (iphone, ipad, ipod Touch) Windows Phone 7 Windows Mobile/Windows CE Wipe X X X ios App Push X (5.0 +) Volume Purchase Program Exchange ActiveSync (EAS) Blocking X X (5.0 +) X Symantec Licensing X X X X X Dynamic Enrollment X X X ios 6 device support X Before you begin Before the installation can be performed, the following must be set up: You have a working instance of Microsoft System Center Configuration Manager. A SCEP server is configured (optional). Contact support for assistance. You have either a commercial certificate authority (recommended best practice) or a self-administered certificate authority available to generate the necessary certificates. Contact Symantec support for assistance. The following set up procedures are included in this guide: Server software is installed and ports are configured. See System Requirements on page 31. Google Cloud Messaging (GCM) for Android is set up. See Setting up Google Cloud Messaging on page 23. APNS certificate for ios is available. See Requesting an APNS Certificate on page 15.

15 Chapter 3 Requesting an APNS Certificate An SSL certificate signed by Symantec and Apple is installed by the Push Services Installer. The certificate is obtained by submitting a request to Symantec for a signed certificate. The section describes the procedures to generate, renew, manually install, and update the SSL certificate. Creating a new APNS Certificate Services that send notifications to an Apple ios device must be registered with Apple. Symantec Mobile Management for Configuration Manager uses the Apple Push Notification Service to deliver notification messages to the Mobile MGMT agent and to the Mobile Device Management (MDM) component of ios. The Apple Push Notification Service allows a server to communicate with the device without affecting performance or battery life. Note: A Windows 2008 server is required. If you cannot access the Apple push certificate portal using Firefox or Internet Explorer, use Safari to create the MDM certificate. To generate a certificate request 1. Select Start > Control Panel > Administrative Tools > Internet Information Services (IIS) Manager. 2. Select the server, and then double-click Server Certificates.

16 16 Requesting an APNS Certificate Before you begin 3. On the Actions menu, click Create Certificate Request and enter the following information: Common Name - name that is attached to your certificate request. Organization - name of your organization. Organizational unit - name of the group or department within your organization City/locality - city or locality where your organization is located. State/province - state or province where your organization is located. Country/region - country or region where your organization is located. 4. Click Next. 5. In the CryptographicServiceProviderProperties window, select Microsoft RSA SChannel Cryptographic Provider for the Cryptographic service provider. 6. Set Bit length to 2048 and click Next. 7. In the File Name window, type a file path and name or click the ellipsis button to browse. 8. Click Finish to generate and save the certificate request. The CSR file is saved as a.txt file. 9. the CSR file to your Symantec partner or SE to request a signed CSR. Your partner or SE will deliver a signed CSR via . Create certificate procedure To create the certificate: 1. After you receive the signed CSR from Symantec, use your web-browser (Firefox, IE 8 or Safari) and visit Sign in with a verified Apple ID. 2. Click Create a Certificate and agree to the Terms of Use. 3. Select Choose File. Navigate to your signed CSR and click Upload. After a moment, your certificate will be available for download. 4. Download the certificate. The certificate is a.pem file. Copy the.pem file to the server where the CSR was created. 5. In IIS Manager, select the server and double-click Server Certificates.

17 Requesting an APNS Certificate Before you begin On the right, under Actions, choose Complete Certificate. When prompted, enter the path to the new.pem file. Note: You may need to select *.* to see your.pem file in your selected path. 7. Enter a user-friendly name for the certificate and then click OK. The new certificate is now available with a private key. 8. Select the certificate and under Actions, choose Export. Enter a path and file name to store the MDM certificate (key-pair) with a password. The exported file has a file-type of.pfx. IMPORTANT: Save the file in a safe place. You will need to browse to this file when running the Symantec Mobile Management Push Services installation. Renew certificate Typically, Apple certificates are valid for one year. After every year of use, you must renew the certificate. Important: You can only renew a certificate BEFORE it expires. If the certificate has expired, you will not be able to renew the certificate. You will have to generate a new certificate. If a new certificate is generated, then a new certificate Subject is generated and it will have the following effects: The MDM Profile will need to be modified with the new APNS certificate subject. See Replace Expired APNS Certificate on page 21 for information on expired certificates. All IOS devices will need to re-enroll to be able to accept push requests. Generate the Certificate Signing Request To generate a certificate request: 1. Select Start > Control Panel > Administrative Tools > Internet Information Services (IIS) Manager. 2. Select the server, and then double-click Server Certificates.

18 18 Requesting an APNS Certificate Before you begin 3. On the Actions menu, click Create Certificate Request and enter the following information: Common Name- name that is attached to your certificate request. Organization- name of your organization. Organizational unit- name of the group or department within your organization City/locality- city or locality where your organization is located. State/province- state or province where your organization is located. Country/region- country or region where your organization is located. 4. Click Next. 5. In the CryptographicServiceProviderProperties window, select Microsoft RSA SChannel Cryptographic Provider for the Cryptographic service provider. 6. Set Bit length to 2048 and click Next. 7. In the File Name window, type a file path and name or click the ellipsis button to browse. 8. Click Finish to generate and save the certificate request. The CSR file is saved as a.txt file. 9. the CSR file to your Symantec partner or SE to request a signed CSR. Your partner or SE will deliver a signed CSR via . Renew certificate procedure To renew a certificate: 1. After you receive the signed CSR from Symantec, use your web-browser (Firefox, IE 8 or Safari) and visit Sign in with a verified Apple ID. 2. Select the current APNS cert and click Renew. 3. Select Choose File. 4. Navigate to your signed CSR and click Upload. After a moment, your certificate will be available for download. Download the certificate. The certificate is a.pem file. Copy the.pem file to the server where the CSR was created. 5. In IIS Manager, select the server and double-click Server Certificates.

19 Requesting an APNS Certificate Before you begin On the right, under Actions, choose Complete Certificate. When prompted, enter the path to the new.pem file. Note: You may need to select *.* to see your.pem file in your selected path. 7. Enter a user-friendly name for the certificate and then click OK. The new certificate is now available with a private key. 8. Select the certificate and under Actions, choose Export. Enter a path and file name to store the MDM certificate (key-pair) with a password. The exported file has a file-type of.pfx. Important: Save the file in a secure location. You will need to browse to this file when running the Symantec Mobile Management Push Services installation. Installing and updating the replacement APNS Certificate During the Symantec Mobile Management for Configuration Manager installation, the MDM certificate thumbprint (APNS Cert Thumbprint) is entered. The entry updates the APNSService.exe.config file automatically and integrates the MDM certificate with Configuration Manager. The certificate will expire within a year of the installation. Use the following procedure to manually install and then update an expired MDM certificate. Note: See Replace Expired APNS Certificate on page 21 for information on expired certificates. Install certificate procedure The replacement APNS certificate is installed using the Microsoft Certificates MMC PlugIn. To install the replacement APNS Certificate: 1. On the server where the APNS service is running, click Start > Run (Search Program and Files) MMC and click Enter. 2. When the MMC Console appears, click File > Add/Remove Snap In and then select the Certificates snap-in from the Available snap-ins list. 3. Click Add >. 4. Select Computer Account and click Next. 5. On the next panel, select Local Computer and click Finish. 6. On the Add or Remove Snap-ins panel, click OK.

20 20 Requesting an APNS Certificate Before you begin 7. In the left hand column of the MMC Console, Certificates Local Computer_ appears. Expand this entry by selecting + at the left of the entry. 8. Expand Personal and then click Certificates. 9. Right Click Certificates and select All Tasks > Import. 10. Browse for the PFX file that was created or renewed. If the file is not on this server, copy and move it. Change the X.509 Certificate (*.cer, *.crt) drop-down list entry to Personal Information Exchange (*.pfx, *.p12) to locate the file. Once the file has been located and selected, click Next. 11. Enter the password. You do not need to make the key exportable but you should Include all extended properties. Click Finish to import the certificate. 12. Double-click the MDM Certificate you imported. Make note of the thumbprint. Update certificate procedure To update the replacement certificate: 1. Navigate to C:\Program Files (x86)\odyssey Software\Athena\SCCM\WindowsServices (this path may be different depending upon your installation and release version). 2. Locate and open the APNSService.exe.config file in a text editor, such as Notepad. 3. Enter the MDM Certificate s thumbprint in the APNSAuthCertThumbPrint setting and save the file. 4. Restart the Odyssey Software APNS Service using the Microsoft Administrative Tools console: Access Start > Administrative Tools > Services. Locate the Odyssey Software APNS Service. Right-click the service and select Start.

21 Requesting an APNS Certificate Before you begin 21 Replace expired APNS Certificate When renewing an expired APNS certificate, determine if the Push Certificate Subject needs updating in the MDM Enrollment Profile. To check the Push Certificate Profile: 1. Open the Configuration Manager Console and navigate to Site Database > Computer Management > Mobile Device Management > Symantec Mobile Management > Profiles. 2. Right-click Enrollment MDM Profile and select Edit. 3. Note the entry in the Push Certificate Subject field. If the entry is the same as the Subject taken from the new APNS certificate, then no changes are required. If the entries are different, you will need to update the profile with the new value taken from the Subject of the Cert, starting with the characters com.apple. and the remainder of the subject. If the Subject has changed, all devices will need to re-enroll to receive the new Push Certificate Subject, which ensures that APNS will work properly with the devices.

22 22 Requesting an APNS Certificate Before you begin

23 Chapter 4 Setting up Google Cloud Messaging Prerequisites Google Cloud Messaging (GCM) for Android allows information from servers in the site environment to be sent to Android device applications. To use GCM, you need to generate a Project ID, enable the GCM service, and generate a server key using the Google apis website. Port 5228, 5229, and for connectivity with the GCM service using WiFi, VPN, etc. GCM typically uses port 5228, but may also use ports 5229 and GCM does not provide specific IPs, so it frequently changes IPs. Also, Google does not recommend using ACLs. Port 443- must be open, outbound, on the Internet-facing server where Push Services are installed. This port is required for IP addresses behind android.googleapis.com. See the Push Services Installation Procedure on page 42 for more information. Google Mail (Gmail) account- to enable GCM. Note: For Android and higher versions, a Gmail account is not required. To use GCM, you must have the following: Android 2.2 and higher versions- Google Play store installed. Android 2.2 and lower versions- Gmail account available.

24 24 Setting up Google Cloud Messaging Before you begin Gmail account creation If you do not have a Gmail account, you must create one before you can enable GCM. For Android and higher versions, this procedure is not required. To set up a Gmail account: Creating a project ID 1. Access the following website: 2. Enter an account name that is easily identified, such as companyname.configman.mdm@gmail.com. A project ID is required to use the GCM service. The project ID will also be required for the Symantec Mobile Management for Configuration Manager installation. To create a project ID: 1. Access the Google apis console at the following website: Sign in using your Gmail address and password. 2. Click Create Project.

25 Setting up Google Cloud Messaging Before you begin The Google apis Dashboard displays. From the API Project drop down list, click Create. 4. Enter a name for the project and click Create project.

26 26 Setting up Google Cloud Messaging Before you begin 5. Your browser URL will change. Make note of the browser URL #project number. For example: This number is the project ID and will be your GCM sender ID. The project ID is required for the Symantec Mobile Management for Configuration Manager installation.

27 Setting up Google Cloud Messaging Before you begin 27 Enabling the GCM Service To enable GCM service for your project: 1. If not already selected, select your project from the API Project drop-down list. 2. Select Services from the left pane. 3. Scroll down and locate Google Cloud Messaging for Android. 4. Click the OFF control. 5. The Google APIs Terms of Service page displays. Click I agree to these Terms and click Accept. GCM is now enabled for the project.

28 28 Setting up Google Cloud Messaging Before you begin Obtain server key For Symantec Mobile Management for Configuration Manager to use GCM, the project ID (see Creating a project ID on page 24) and a server key must be obtained from Google, and then entered during the Symantec Mobile Management for Configuration Manager installation procedure. This will allow messages from a server to communicate with Android applications on Android devices managed in Configuration Manager. Generate server key from Google apis website To obtain a server key: 1. Access the Google apis console at the following website: Sign in using your Gmail address and password. 2. Select your project ID from the API Project drop-down list. 3. Select API Access. 4. Click Create new Server key.

29 Setting up Google Cloud Messaging Before you begin Optionally, to limit the servers in your site environment that will accept requests, enter the IP addresses for those servers in the dialog on the screen. 6. Click Create. The server key is created and is shown under Key for server apps (with IP locking). You will need this server key and the project ID (see Creating a project ID on page 24) for the Symantec Mobile Management for Configuration Manager installation.

30 30 Setting up Google Cloud Messaging Before you begin

31 Chapter 5 System Requirements This chapter lists the software requirements for servers in the System Center Configuration Manager environment. It also includes required domain group, port/protocol configuration, mobile device, ios, Android, and Windows Phone 7 specific requirements. For more information about the Configuration Manager requirements, visit the Microsoft website ( Notes: All site servers must be members of the same or trusted Active Directory domain. Central and Primary Servers Windows Server 2008 (32 or 64-Bit Edition) or R2 (64-Bit Edition) SQL Server 2005 with Service Pack 2 or higher or SQL Server 2008 Microsoft Access Database Engine 2010 SP1 (64-Bit version). Visit for the information and the download. Windows Server Active Directory Domain Microsoft System Center Configuration Manager 2007 R2 Service Pack 1 or higher (includes SP2, R2, R3) Microsoft Internet Information Services (IIS) version 7.1 (Windows Server 2008), 7.5 (Windows Server 2008 R2) ASP.Net 2.0 enabled in IIS. See Enabling ASP.Net in IIS on page 118 for more information. Microsoft.NET Framework 2.0 or higher

32 32 System Requirements Central and Primary Servers Microsoft Message Queuing (MSMQ)- Microsoft Message Queuing Service, Message Queuing, Message Queuing Server, and Directory Service Integration (installed on the server where APNS is running, which is typically the Central server). Windows Communication Foundation (WCF) service activated. (Microsoft.NET 2.2 Framework or higher) Microsoft Silverlight 4.0 for 32 bit systems Microsoft Silverlight 5.0 for 64 bit systems The following are also required on the Configuration Manager server if the console is used on the Central or Primary server: Microsoft Management Console (MMC) 3.0 or higher Sun Microsystems J2SE Runtime Environment Version 6 (Update 5) or higher The following are required for supporting ios devices in Symantec Mobile Management for System Center Configuration Manager: MDM (Apple Mobile Device Management) Services configured on any server that can access the internet or any server for WiFi Microsoft Simple Certificate Enrollment Protocol (SCEP)/Network Device Enrollment Service (NDES) Note: SCEP/NDES is optional if a single Identity Certificate is not used for all ios devices. Windows Server Certification Authority Role (CertServ) configured on a domain managed server. For more information, visit the following Microsoft website: 80DE-819F-40D7-8B8E-10845BC8D446&displaylang=en Note: ios devices will access the SCEP server using a URL that the devices can reach.

33 System Requirements Secondary Servers or Management Points 33 Secondary Servers or Management Points Windows Server 2008 (32 or 64-Bit Edition) or R2 (64-Bit Edition) Microsoft System Center Configuration Manager 2007 R2 Service Pack 1 or higher (includes SP2, R2, R3) Microsoft Internet Information Services (IIS) version 7.1 (Windows Server 2008), 7.5 (Windows Server 2008 R2) ASP.Net 2.0 enabled in IIS. See Enabling ASP.Net in IIS on page 118 for more information. Microsoft.NET Framework 2.0 or higher Microsoft Message Queuing (MSMQ)- Microsoft Message Queuing Service, Message Queuing, Message Queuing Server, and Directory Service Integration Administrator Console Workstation PCs Windows XP Professional, Windows 7, Windows Server 2008 Microsoft ActiveSync 4.2 or higher Microsoft Management Console 3.0 or higher Sun Microsystems J2SE Runtime Environment Version 6 (Update 5) or higher Microsoft Silverlight 4.0 for 32 bit systems Microsoft Silverlight 5.0 for 64 bit systems Required Ports/Protocols Note: If your site security policy dictates using different ports, please consult Symantec support for assistance. The following are the required ports for communication to devices: Port 80- for Symantec Mobile Management Device Client communication with the Athena Web Services. Agents use either port 80 or 443 inbound to the Web Server for inventory. Port 389- LDAP Service. From the Enrollment Server to an LDAP Server (internal network) for authentication.

34 34 System Requirements Required Ports/Protocols Port 443- for Symantec Mobile Management Device Client communication with the Athena Web Services with SSL Encryption. Agents use either port 80 or 443 inbound to the Web Server for inventory. Port 444- for ios enrollment with MDM (default). This port can be changed. Port for communication between the console and the Tunnel Server. This port can be changed. Port for communication between devices and the Tunnel Server. This port can be changed. Port for Symantec Mobile Management Replication Services SQL server connection. This port can be changed. To communicate with Apple services, the following outbound ports must be open for outbound connections over TCP: Port must be open, outbound, on the server hosting the Athena APNS NT Service for communication with the Apple Push Notification Service (APNS). Port must be open, outbound, on any network on which ios devices will be confined to a WLAN and unable to access cellular data networks. For a higher level of security, firewall rules can limit this port to the /8 address block which is assigned to Apple can be left closed if all ios devices being managed have access to a cellular data network. Port must be open, outbound, on the server hosting the Athena APNS NT Service for communication with the Apple Push Notification Feedback Service (APNS). To communicate with GCM services, the following ports must be available: Port 443- must be open, outbound, on the Internet-facing server where Push Services are installed. This port is required for IP addresses behind android.googleapis.com. See the Push Services Installation Procedure on page 42 for more information. Port 5228, 5229, and for connectivity using WIFI, VPN, etc. GCM typically uses port 5228, but may also use ports 5229 and GCM does not provide specific IPs, so it frequently changes IPs. Also, Google does not recommend using ACLs.

35 System Requirements Security Group Configuration 35 Security Group Configuration Membership of the domain groups determine access to interactive Live Support Sessions from Symantec Mobile Management Device Explorer, and security groups for Tunnel Server. After installation, members of security groups will have Athena Database read access. The Active Directory account of the Configuration Manger Console user must be added to the groups. The following is the preferred security group configuration that should be defined before performing the installation: Tier1 (Level 1 group for Tunnel Server) Tier2 (Level 2 group for Tunnel Server) Tier3 (Level 3 group for Tunnel Server) The number determines access level - the higher the number, the more access the group will have. Three different security groups must be created for use and can use any name or site naming convention. Apple Enterprise Membership Requirements If you are only using MDM (features), an APNS certificate is required and Apple memberships are not required. If you are developing in-house apps, the following memberships are required: ios Developer Enterprise Program membership- visit the following website to become a member: This program provides the certificate that allows the use of APNS for the Symantec Mobile MGMT agent for ios and is the certificate used within the Symantec Mobile Management server-side solution. The program also provides the certificate for developing and testing an in-house developed MDM agent. Developer Program- visit the following website to become a member: This program will provide the certificate used to sign a site-developed branded version of the Symantec Mobile MGMT agent for submission to the App Store.

36 36 System Requirements SYMC Agent for ios Requirements SYMC Agent for ios Requirements For Symantec Mobile MGMT agent functionality, the following certificates and Provisioning Profile are required before installation occurs: MDM push certificate (com.apple.mgmt). Developer certificate. APNS Provisioning Profile for the Symantec Mobile MGMT Agent. ios Profile Security Requirements To configure server settings for ios Profile security, the following is required: Profile Signing Certificate- certificate used for signing on the Management Point server (local computer) personal store. This cert is created automatically during installation. Profile Encryption Certificate- certificate used for encryption on the Management Point server (local computer) personal store. This cert is created automatically during installation. Device Encryption Credential- credential payload containing a certificate to be placed on devices for encryption/decryption. Device Signing Credential- credential payload containing a certificate to be placed on devices to validate signing. Device Signing/Encryption Root Credential- credential payload containing a server root certificate to be placed on devices to complete the certificate chain for the decryption and signing validation certificates. Used only for non-commercial CAs. Note: See Create Security Credentials on page 72 for more information on credential payload creation.

37 System Requirements Supported Mobile Devices 37 Supported Mobile Devices The following devices can be managed using Symantec Mobile Management for Configuration Manager: Android 2.2 and above Apple iphone ios 4.3 and above 3GS, 4, 4S models Apple ipad ios 4.3 and above all models Apple ipod Touch ios 4.3 and above 3rd generation, 4th generation models BlackBerry x Windows Mobile 6.0, 6.1, 6.5 Professional and Standard Windows CE Windows Phone 7.5 and above Mobile Device Network Any reachable IP-based device connection including Ethernet cradle (Windows CE devices), /WiFi, or WWAN (e.g. GSM/GPRS or EDGE, CDMA 1xRTT or EVDO). Note: Some WWAN providers do not pre-configure their device network settings for reachable network IP addresses. This must be requested from the carrier or the device network settings must be modified prior to deployment. Other WWAN providers configure reachable IP addresses as the default for their WWAN settings.

38 38 System Requirements Supported Mobile Devices

39 Chapter 6 Installing The Symantec Mobile Management for System Center Configuration Manager components, which include Push Services, Console, Services, Reporting Services, Replication Services, and optional Windows Mobile/CE Feature Packs, must be installed in a specific order on the servers in the site environment. For multiple server sites, the installation should be done following the site hierarchy starting with the highest level server and then proceeding to the lower level servers. Installation Components The Symantec Mobile Management for Configuration Manager installation includes the following components: Push Services- includes the APNS Web Service, Google Cloud Messaging (GCM) Service, and Feedback Web Service. These Windows and Web services are required for ios and Android device management. Console- administrator console integration components for device management, which includes Symantec Mobile Management utilities for interactive troubleshooting and live support, device data inventory/history (Device Explorer), package creation (Device Software Package Wizard), and package distribution (Software Distribution Wizard). See the Device Explorer User Guide, ios, Android, and Windows Phone 7 Features User Guide, and Windows Mobile/CE Package Creation, Assignment, and Distribution Guide for more information.

40 40 Installing Installation Components Services- management point integration for mobile device communication. Includes servers and database configuration, ios/android setup, and the Athena Tunnel Server installation. The Athena Tunnel Server is a secure HTTPS tunnel which uses two-way SSL certificate-based authentication to provide a custom connection gateway from a site to Windows Mobile, Windows CE, BlackBerry smartphones, and Android devices. Replication Services- required for multi-server environments. Creates a copy of the Athena database for recovery purposes and provides synchronization of data across multiple database environments. See the Replication Services Installation Guide for more information. Reporting Services (optional)- standard set of reports for managed devices and/or collections. See the Reporting Services Installation Guide for more information. Reporting Services is required if installing Exchange ActiveSync Management Services. Exchange ActiveSync (EAS) Management Services (optional)- enables the management of mobile devices that support Microsoft Exchange within Microsoft Configuration Manager. EAS Management Services is an extension to and uses the Symantec Mobile Management for Configuration Manager Administrator Console functionality. The Symantec Mobile Management for Configuration Manager Services and Administrator Console are required for running EAS Management Services. EAS Management Services includes reporting, which requires the installation of the Reporting Services component. If you will be using EAS Blocking rules, EAS Management Services is required. See the EAS Management Services Installation and User Guide for more information. Windows Mobile/CE Feature Packs (optional)- feature packs for Windows Mobile and Windows CE devices. Includes Positioning (GPS), Phone, and Security Essentials (Lock and Wipe) device functionality. See the Windows Mobile/Windows CE Feature Pack Installation Guide for more information.

41 Installing Installation Components 41 Symantec Mobile Management Components Installation Order The following outline shows the server, installation order, and Symantec Mobile Management component for installation: Internet-facing Server 1. Push Services Note: If all components reside on one server, install Push Services after installing the Console and Services. Central Server 1. Console 2. ISV Proxy (first time only) 3. Services 4. Reporting Services (optional) 5. Feature Packs (Windows Mobile/CE optional) 6. Replication Services Primary Server 1. Console 2. Services 3. Feature Packs (Windows Mobile/CE optional) 4. Replication Services Secondary Server 1. Console (optional) 2. Services Note: It is recommended that you restart the Configuration Manager Console after the Console and Services installers have completed successfully.

42 42 Installing Push Services Installation Procedure Push Services Installation Procedure The Push Services Installation consists of the APNS Web Service, GCM Service, and the Feedback Service. The network topology of the site environment will determine where and when Push Services are installed. Push Services must be installed on a server that has access to the internet. Typically, this is a server that is not running Configuration Manager. Note: If all components reside on one server, install Push Services after installing the Console and Services. To perform the Push Services installation: 1. Locate the executable and start the installation wizard by double-clicking the Symantec Mobile Management Push Services icon. 2. The Welcome screen appears. Click Next to run the installation wizard. 3. Accept the end user software license agreement and click Next to continue. Optionally, click Print to print a hard copy of the license agreement before continuing with the installation (only appears for first time installations). 4. Accept the default installation folder or click Change to browse and select a different folder. When finished, click Next to continue. 5. Both the Feedback and Push services are selected for installation by default. Click the components to change the installation option. When finished, click Next to continue.

43 Installing Push Services Installation Procedure 43 APNS Web Service Configuration 6. Click Browse and locate the APNS certificate. Then, enter the password for the certificate. If this password is incorrect, a warning message will appear when the installation processes and the installation will stop. When finished, click Next to continue. Note: If Push services > APNS web services was not selected in the previous step, the APNS Service Configuration screen does not display.

44 44 Installing Push Services Installation Procedure Google Cloud Messaging Configuration Credentials are required which will be sent to the Google Cloud Messaging (GCM) service and then routed to the Android device. The credentials are generated by the installation program using the project ID and server key that was created during GCM setup. 7. Enter the project ID in Google API Project ID and server key in Server API Key which were created during the Android GCM setup procedure. When finished, click Next to continue. If credentials for the project ID and server key already exist in the site environment, select Replace existing credentials and then enter a new project ID and server key.

45 Installing Push Services Installation Procedure 45 Feedback Service Configuration The ios Feedback Service communicates with the Central server database and the APNS Web Service to obtain a list of ios devices that are no longer communicating with the server. 8. Enter the names for the Central or Primary database server and the Central database server where the APNS and GCM services reside. If the Feedback Service is located on a different server than the Push Services, enter the Fully Qualified Domain Name (FQDN) of the server in Server where device Push services are running. Note: The Server where device Push services are running entry only appears if the Push Services are installed on a different server. When finished, click Next to continue. 9. Click Install to start the installation using the settings specified in the previous steps. 10. Click Finish to exit the wizard and complete the installation. Optionally, click Show the Windows Installer log to view the log upon exiting the wizard. The Installer Log shows any errors or other events that occurred during the installation.

46 46 Installing Console and Services Installation Procedures Console and Services Installation Procedures Notes: To ensure success, all requirements should be met before beginning the installation procedure. Configuration Manager should be installed in Mixed mode, not Native mode. Contact Symantec support for more information about running Symantec Mobile Management for Configuration Manager in Native mode environments. The Symantec Mobile Management for Configuration Manager Console and Services Installation consists of three parts that must be done in the following order: 1. Part 1 Console Installation on page Part 2 Add ISV Proxy Certificate on page Part 3 Services Installation on page 53. A Configuration Manager administrator is recommended to perform the installation as the appropriate rights and permission are required to administer the Configuration Manager server(s). On Central/Primary servers, the installer should also be a member of the SMS Admins security group. Note: The installation procedures generate log files that may contain sensitive information. To protect this information, purge the log files after the installation is successfully completed.

47 Installing Console and Services Installation Procedures 47 Part 1 Console Installation The Console installation must be done for each console residing in the site environment. If the console is being installed on a 64bit OS (Server 2008/Windows 7) and the console will be used to access Live Support Session for Remote Control, the 64bit version of the Java JRE (Java Runtime Environment) must be installed on the desktop/server. If the 64bit version of the Java JRE has not been installed, an error message will appear on the Remote Control page even though Java has been installed on the desktop/server. If the file JRE-{latest version}-windows-x64.exe is not available on the desktop/server, use the 64bit version of Internet Explorer to browse to and obtain the latest 64bit version of the JRE installation. Note: During the Console Installation, the Console should not be accessed from the location where it is being installed. To install the Administrator Console: 1. Locate the executable and start the installation wizard by double-clicking the Symantec Mobile Management Console icon. Note: For Windows 7 systems, right-click the icon and select Run as administrator. 2. The Welcome screen appears. Click Next to run the installation wizard for the Console portion of the installation. 3. Accept the end user software license agreement and click Next to continue. Optionally, click Print to print a hard copy of the license agreement before continuing with the installation (This screen only appears for first time installations). 4. Accept the default installation folder or click Change to browse and select a different folder. When finished, click Next to continue.

48 48 Installing Console and Services Installation Procedures 5. Enter the fully qualified domain name of the Central server. The Symantec Mobile Management Database Name field contains the recommended name of Athena. This entry is the database name of the Central server as the console will pull data from the Central server. When finished, click Next to continue.

49 Installing Console and Services Installation Procedures Locate and select the Central server database by clicking Browse or type the Central server database name. If the current user is a Configuration Manager administrator, use the default Windows authentication credentials of current user. If using SQL server logins, select Server authentication using the Login ID and password below to create the SQL server login. When finished, click Next to continue. 7. Click Install to start the installation of the Console using the settings specified in the previous steps. 8. Click Finish to exit the wizard and complete the Console Installation. Optionally, click Show the Windows Installer log to view the log upon exiting the wizard. The Installer Log shows any errors or other events that occurred during the installation.

50 50 Installing Console and Services Installation Procedures Part 2 Add ISV Proxy Certificate The second part of the installation provides instructions for manually adding the Symantec ISV proxy certificate (provided by Symantec) to the Configuration Manager Console. Note: This procedure should be performed on all Central and Primary servers in the site hierarchy. For messages sent from Athena Web Services to be authenticated by Configuration Manager, an ISV (Independent Software Vendor) proxy certificate is required. The certificate (odyssey-athena-sccm.cer) enables devices running Symantec Mobile Management to communicate securely with the Management Point by validating that they are Symantec devices. To add the certificate to the Configuration Manager Console: 1. Access the Configuration Manager Console. 2. Expand Site Database > Site Management > yoursitename > Site Settings > Certificates. 3. Right-click ISV Proxy and select Register or Renew ISV Proxy.

51 Installing Console and Services Installation Procedures On the certificate registration or renewal screen, select Register certificate for a new ISV proxy.

52 52 Installing Console and Services Installation Procedures 5. Click Browse to locate and select the ISV proxy certificate that is provided by Symantec. The Administrator Console Installation automatically places the certificate in the C:\Program Files (x86)\odyssey Software\Athena\SCCM folder by default. If you have installed the console to another location, the certificate will be located in that installation folder. 6. Click Apply. 7. Click OK to exit the screen. The certificate is added and can be viewed in the ISV proxy pane. This completes part 2 of the installation.

53 Installing Console and Services Installation Procedures 53 Part 3 Services Installation The Services Installation is done on all (one or multiple) Management Point servers to which the devices are reporting. For multiple server sites, the Services installation should be done following the site hierarchy. For example, starting with the highest level server and then proceeding to the lower level servers. See Symantec Mobile Management Components Installation Order on page 41 for more information. Note: The computer account must have system administrator access to the database server for creation of the Athena database and permissions assignment. The following steps must be done on each Configuration Manager server: 1. Log in as a Configuration Manager administrator. 2. On each Configuration Manager server, locate the executable and start the installation wizard by double-clicking the Symantec Mobile Management Services icon. 3. The Welcome screen appears. Click Next to run the installation wizard for the Services portion of the Symantec Mobile Management for Configuration Manager installation. 4. Both the Tunnel Server and Symantec Mobile Management Services are selected for installation by default. Click the Tunnel Server and/or Symantec Mobile Management Services components to change the installation options. Note: The Tunnel Server is required. If not installing the Tunnel Server at this point or server location, it must be installed on another server located in the Configuration Manager site environment.

54 54 Installing Console and Services Installation Procedures Optionally, click Change to browse and select a different folder. Optionally, click Space to view the disk space that is required for the selected option(s). When finished, click Next to continue. 5. Accept the end user software license agreement and click Next to continue. Optionally, click Print to print a hard copy of the license agreement before continuing with the installation (This screen only appears for first time installations). 6. Accept the default installation folder or click Change to browse and select a different folder. When finished, click Next to continue.

55 Installing Console and Services Installation Procedures For Tunnel Sever component installation, enter the names of the three security groups that were created for use with Tunnel Server. A different group must be used for each level. The entries must be WINS names in the format domain\group name. For example, e3qa\atier1. Note: Level 1 has the least rights, while Level 3 has the most rights. See Security Group Configuration on page 35 for more information. When finished, click Next to continue.

56 56 Installing Console and Services Installation Procedures 8. Depending on the topology of the site, select the server type: Central server (default)- Root Primary server. Secondary server- does not have a database. This is the server where the Athena Web Services are installed. When finished, click Next to continue.

57 Installing Console and Services Installation Procedures The Site Code field is populated with the three character alphanumeric code of the Management Point server. Enter the following: SCCM Database- name of the SCCM database. SCCM Database Server- name of the server where the SCCM database resides. When finished, click Next to continue.

58 58 Installing Console and Services Installation Procedures 10. Review the default values for the following options. Make any changes as required for the site: Management Point Address- IP address of server. Typically this entry is the address of the Central server or the Primary server (when installing on a Primary server). Note: The prefix is not automatically pre-pended to the IP address, so it must be entered with the IP address when a server is running DHCP. For example, a valid entry is If is not entered, the correct Management Point address will not be written to the Athena web.config file and DCOM will be used to communicate, which is problematic. Management Point Port- port of the server that is specified in the Management Point Address field. Typically, the entry is port 80. EndPoint Server Name- name of the Management Point server. DNS Suffix specifies the DNS suffix that managed devices use to connect to the server. This setting is not required for WINS. Note: Run the ipconfig /all command in a command window to view the DNS suffix of the server. Log to EventLog- when selected, specifies when the Athena Device Tracker (Tracker) service logs run time errors to the server Event Log under the Athena application group. Used by Athena Tracker and Web Services. Log to DeviceLog Table- when selected, specifies when Tracker service writes run time errors and run time status messages to the Athena database DEVICELOG table. Used by Athena Tracker and Web Services.

59 Installing Console and Services Installation Procedures 59 Derive Device Name From Host Name determines whether the custom parsing logic within the Athena Tracker service is used to derive the Device Name property from the DNS Host Name attribute passed to the device from a DHCP server. Derive Device Name From Phone Number (Phone devices only) determines whether the custom parsing logic within the Athena Tracker service is used to derive the Device Name property from the device(s) Phone Number attribute. When finished, click Next to continue.

60 60 Installing Console and Services Installation Procedures 11. The Device Agent Server Configuration screen is used to configure secure server connections (SSL) for ios and Android device communication. The Agent (ios and Android) entries configure the Symantec Mobile MGMT agent: Using SSL protocol- select to enable SSL. Server Name- name of the server where devices communicate. This entry can be an IP address, machine name, or FQDN. The default is the server where the installation is being performed. Port Override- port to use for SSL connections. The default is 443. The ios MDM (SSL) entries configure a separate port for the native Apple ios agent: Server Name- name of the server where devices communicate. This entry can be an IP address, machine name, or FQDN. The default is the server where the installation is being performed. SSL Port Override- port to use for SSL connections. The default is 444. If this entry is left blank, the default SSL port 443 is used. Certificate- select the web server SSL certificate from the drop-down list. When finished, click Next to continue.

61 Installing Console and Services Installation Procedures Enter the server name where Push Services reside. Enter the project ID in GCM Project ID. The project ID was created in the GCM setup procedure and also entered in the Google Cloud Messaging step in the Push Services installation. See Google Cloud Messaging Configuration on page 44 for more information. When finished, click Next to continue.

62 62 Installing Console and Services Installation Procedures 13. Devices typically communicate with the Mobile Library proxy on a Secondary server. The proxy communicates with the actual Mobile Library via web services. Enter the server name where the Mobile Library proxy resides. When finished, click Next to continue.

63 Installing Console and Services Installation Procedures Optionally, if you will be using Microsoft Exchange ActiveSync (EAS) blocking rules with EAS Blocking, enter the name of the server where the EAS Management role (component) resides. For more information see the EAS Management Services Installation and User Guide and Exchange ActiveSync Blocking on page 111. When finished, click Next to continue.

64 64 Installing Console and Services Installation Procedures 15. The Symantec Mobile Management Database Name entry is populated with the recommended name Athena. This entry must match the Symantec Mobile Management Database Server that will be entered on the next screen of the installation wizard. Select Use existing database for Central or Primary server installations if planning to create the database manually or preserve existing device information when performing an upgrade or re-installation. Note: This option is not available when installing Secondary servers. Update packages from central database server- selected by default when installing a Primary server. When selected, this setting will get package updates from the Central database server. For example, when installing a new Primary server in an existing site hierarchy, this option will copy all packages (system and user-defined) from the existing Central server. Note: This option is not available when installing Central or Secondary servers.

65 Installing Console and Services Installation Procedures 65 Enter the Central Database Server name when installing a Primary server. This entry should be a fully qualified domain name. Note: This option is not available when installing Central or Secondary servers. When finished, click Next to continue. 16. A list of servers is populated by default in the Symantec Mobile Management Database Server drop-down list. Select the database server where the Athena Database is located or will reside. When using a Secondary server, the database server must be the database of the Primary (parent) server of this Secondary server. Note: If the drop-down list does not contain any entries, locate and select the SQL server on this domain by clicking Browse or type the server name. If the current user is a Configuration Manager administrator, accept the default of Windows authentication credentials of current user. If not, select Server authentication using the Login ID and password below and see Using a Non-Domain Admin Account for Installation procedure on page 117. When finished, click Next to continue.

66 66 Installing Console and Services Installation Procedures 17. On the Product License screen, select You have purchased a license and want to install it to replace the trial license which is installed by default if you have purchased a license for the software. Leave this option unchecked if you are using a trial license. Perform one of the following steps: If the SLF (obtained when the product license was purchased) resides on the server, select Browse to your SLF and click Browse to locate the file. OR If the server has access to the internet, click Provide information for the Licensing Server and enter all information. This selection allows you to activate the product license from the Symantec licensing server using the License Serial Number and required information. When finished, click Next to continue.

67 Installing Post-Installation Procedures Click Install to start the installation of the Services using the settings specified in the previous steps. 19. Click Finish to complete the installation and exit the wizard. The Services installation portion of the Symantec Mobile Management for Configuration Manager is now complete. Note: The installation procedures generate log files that may contain sensitive information. To protect this information, purge the log files after the installation is successfully completed. Post-Installation Procedures Perform the procedures in the Set Up Profiles for ios Devices chapter beginning on page 69. Optionally, perform the DNS Text Record Setup for Android and ios Services procedure on page 126. This allows users to enroll ios or Android devices using their individual addresses. If you will be using Microsoft Exchange ActiveSync (EAS) blocking rules, the EAS Blocking Service installed with the Services component will be running on all servers (where Services are installed) in the environment. The EAS Blocking Service should only be run on one server in the environment. You should leave the service running on the Central server (recommended) and disable it on the other servers in the environment. For more information see Exchange ActiveSync Blocking on page 111 and the EAS Management Services Installation and User Guide. To disable the EAS Blocking Service using the Microsoft Administrative Tools console: 1. Access Start > Administrative Tools > Services. 2. Locate SMM-CM EAS Blocking Services. 3. Right-click the service and select Stop. 4. Right-click the service and select Properties. 5. On the General tab, change Startup Type to Disabled.

68 68 Installing Post-Installation Procedures

69 Chapter 7 Set Up Profiles for ios Devices View Profiles The Signing and Encryption and Enrollment MDM Profiles are created during the Services installation. These system-created profiles are required for securing ios devices and automatically display in the Profiles list for configuration with your site-specific credentials information. Once configured, the profiles will be automatically distributed to ios devices. To view profiles: 1. Access the Configuration Manager Console, and expand Site Database > Computer Management > Mobile Device Management > Symantec Mobile Management. 2. Select Profiles. The Profiles list displays. Profiles are managed from the Profiles list. For more information, see the ios, Android, and Windows Phone 7 Features User Guide. The following default ios Profiles display in the list: ios Signing and Encryption Profile- used to sign configuration profiles (which prevents third-party tampering) and for ios devices to recognize signed profiles. This profile is automatically assigned to devices when Signed and/or Encrypt is selected for an ios profile. The ios Signing and Encryption Profile also contains the root certificate to complete the certificate chain for the decryption and signing validation certificates.

70 70 Set Up Profiles for ios Devices Configure ios Signing and Encryption Profile Enrollment MDM Profile- used to identify an ios device and allow the device to enroll in Configuration Manager. A credential payload that contains signing and encryption keys must be created and added to this ios Profile. See Create Security Credentials on page 72 for more information. Configure ios Signing and Encryption Profile The ios Signing and Encryption Profile is assigned to devices when Sign and/or Encrypt profile is specified for an ios profile and is distributed with the new profile automatically. To edit the profile: 1. Right-click the profile and click Edit. The Profile Editor displays.

71 Set Up Profiles for ios Devices Configure ios Signing and Encryption Profile Select the following certificates for the site: Root Certificate- self-signed. This server certificate is associated with the Signing and Encryption Certificates if using a site-created certificate and not a commercial CA, such as VeriSign. Signing Certificate Public- complementary Signing Certificate with Public Key. This certificate allows devices to recognize and accept profiles signed using the Signing Cert with Private and Public Keys. Encryption Certificate Public-Private- allows devices to decrypt and install profiles that were encrypted using the Encryption Certificate with Public Key.

72 72 Set Up Profiles for ios Devices Create Security Credentials Create Security Credentials Private keys, and an Encryption Certificate with Public key are required to sign and encrypt profiles sent to ios devices. For this reason, security credentials or payloads for devices with the complementary Signing Certificate with Public Key, and Encryption Certificate with Public and Private keys must be created and distributed to devices. After creating the security credentials, they can be added to the Enrollment MDM Profile. The Enrollment MDM Profile will be automatically assigned to ios devices during the enrollment process. Configuring security credentials and distributing with the Enrollment MDM Profile is typically the method used for sites using SSL for communication or for sites that are using more than one root certificate. Root or Signing with Public Key A credential payload with the Root Certificate associated with the Signing and Encryption Certificates must be created if not using a commercial CA. To create the Root credential: 1. In Configuration Manager, expand Site Database > Computer Management > Mobile Device Management > Symantec Mobile Management. 2. Expand Profiles.

73 Set Up Profiles for ios Devices Create Security Credentials Select Configuration Editor. Payloads are defined for profiles using the Configuration Editor. For more information, see the ios, Android, and Windows Phone 7 Features User Guide. 4. When the Configuration Editor opens, select ios Configuration. 5. Select Credentials. 6. Click to create a new credential. 7. Click Select cert file, browse to the location of the Root or Signing Certificate with Public Key, and open the file.

74 74 Set Up Profiles for ios Devices Create Security Credentials 8. Enter the Credential Name and Description. Make sure to use a descriptive name to make it easy to identify. 9. Click Save Changes. The Root credential is created and displays in the ios Configuration pane.

75 Set Up Profiles for ios Devices Create Security Credentials 75 Encryption A credential payload with the Encryption Certificate must be created if not using a commercial CA. To configure the Encryption credential: 1. In Configuration Manager, expand Site Database > Computer Management > Mobile Device Management > Symantec Mobile Management. 2. Expand Profiles. 3. Select Configuration Editor. 4. When the Configuration Editor opens, select ios Configuration. 5. Click Credentials. 6. Click to create a new credential. 7. Click Select cert file, browse to the location of the Encryption Certificate and open the file. 8. Enter the Credential Name and Description. 9. Enter a Password for the certificate. This is an optional entry. 10. Click Save Changes. The Encryption credential is created and displays in the ios Configuration pane. 11. Close the Configuration Editor.

76 76 Set Up Profiles for ios Devices Configure MDM Enrollment Profile Configure MDM Enrollment Profile The Enrollment MDM Profile identifies ios devices and allows enrollment in Configuration Manager. The Security Credentials that were configured in the Create Security Credentials procedure on page 72 will be added to this profile. To configure the MDM Enrollment Profile: 1. Expand Site Database > Computer Management > Mobile Device Management > Symantec Mobile Management. 2. Select Profiles. The Profiles list displays. 3. Right-click the Enrollment MDM Profile and click Edit.

77 Set Up Profiles for ios Devices Configure MDM Enrollment Profile 77 The following information displays: Profile Name, Description, and Organization. Push Certificate Subject- App ID Bundle Identifier or Topic which allows the use of MDM commands. This entry is not editable. 4. Select the configured SCEP Server credential or VPN for the Cryptographic credential used for authentication. 5. Select the Security Credentials payloads from Profile Content Items. 6. Click Save. The profile is now configured and will be assigned to ios devices during enrollment.

78 78 Set Up Profiles for ios Devices Configure MDM Enrollment Profile

79 Chapter 8 Enrolling Devices The Enrollment Process registers ios (iphone, ipad, ipod Touch), Android, or Windows Phone 7 devices in Configuration Manager. Once a device is enrolled, it can be viewed and managed using the Configuration Manager Console. See the ios, Android, and Windows Phone 7 Features User Guide for more information about using these devices in Configuration Manager. Authentication for Agent Enrollment For agent authentication to occur, the Enrollment Web Configuration file must be edited to enable authentication (ON). To turn on Agent Enrollment authentication: 1. Locate and open the C:\Program Files (x86)\odyssey Software\Athena\SCCM\Web\Enrollment\web.config file in a text editor. 2. Make the following changes to the values in the file: <add key="sccm-iosauthenticate" value="true" /> <add key="sccm-activedirectoryserver" value="servername" /> <add key="sccm-domainname" value="domainname" /> <add key="sccm-domainextension" value="local" /> <add key="sccm-requiredomain" value="false" /> <add key="sccm-androidauthenticate" value="true" />

80 80 Enrolling Devices ios Device ios Device Before enrollment can be done, the Symantec Mobile MGMT agent must be installed on devices. The Mobile MGMT agent for ios is available from the App Store. The Mobile MGMT agent for ios supports dynamic enrollment. The default setting is OFF. To enable dynamic enrollment, access Settings in the Mobile MGMT agent, and set the Dynamic Enrollment option to ON before enrolling the device. Note: Previous versions of the Symantec Mobile MGMT agent cannot be used with Symantec Mobile Management for Configuration Manager 7.2 and higher. Install Symantec Mobile MGMT Agent To install the Mobile MGMT agent on a device: 1. Open Safari from the device Home screen. 2. Enter the URL to download the Mobile MGMT agent (ios agent). 3. Touch the Install Symantec Mobile MGMT link. After the Symantec Mobile MGMT agent installation is completed successfully, the Mobile MGMT icon appears on the iphone, ipad or ipod Touch Home screen.

81 Enrolling Devices ios Device 81 Enroll ios Device To enroll an ios device: 1. Touch the Symantec Mobile MGMT agent icon to begin enrollment of the device. 2. Enter the following information on the Symantec Mobile MGMT agent screen: URL for initiating enrollmenthttp://<servername>/athena/enrollment/athenaiosenroll.html. Note: The URL is not case sensitive. OR Address- if DNS text records have been defined for ios enrollment, enter a company address, for example yourname@company.com. See DNS Text Record Setup on page 126 for more information. When finished, touch Enroll.

82 82 Enrolling Devices ios Device 3. Enter your username and password. Note: You may also be prompted to enter the domain. 4. Touch Yes if the device is company owned or No if it is a personal device. 5. When finished, touch Enroll.

83 Enrolling Devices ios Device If prompted, touch OK on the Current Location screen to enable tracking on the device. This allows the agent to send location data with inventory to the server. Note: After the device is enrolled, tracking can be disabled by accessing Settings > Location Services on the device. 7. Touch Accept to accept the End-User License Agreement (EULA).

84 84 Enrolling Devices ios Device 8. Touch Install to install the MDM Enrollment Profile or before installing, touch More Details to view more information about the MDM Enrollment Profile. 9. Touch Install on the warning screen to continue with the installation.

85 Enrolling Devices ios Device On the Profile Installed screen, click Done. After successful completion of MDM Enrollment and SCEP Profile installation on the device, the ios device checks in to the server. Additional profiles may be sent to the device such as VPN settings, restrictions, or Exchange server settings. The server also sends the schedule for when the Mobile MGMT agent will report device inventory to the server, the URL to which the Mobile MGMT agent reports, and a URL for the Mobile Library. When all of these steps are complete, the device is successfully enrolled. To view the Enrollment and Agent Provisioning Profiles, access Settings > Profiles on the ios device.

86 86 Enrolling Devices Android Device Android Device The Mobile MGMT agent for Android is available from Google Play. Note: Previous versions of the Symantec Mobile MGMT agent cannot be used with Symantec Mobile Management for Configuration Manager 7.2 and higher. To enroll an Android device: 1. On the device, access a browser. 2. Enter the URL to download and install the Symantec Mobile MGMT agent to the Android device. 3. Once installed, locate and touch the Mobile MGMT icon on the Android device screen to access the Symantec Mobile MGMT agent.

87 Enrolling Devices Android Device Enter and select the following information on the initial Mobile MGMT-Enroll Screen: URL for initiating enrollmenthttp://<servername>/athena/enrollment/athenaandroidenroll.a spx Note: The URL is not case sensitive. OR Address- if DNS text records have been defined for Android enrollment, enter a company address, for example yourname@company.com. Require SSL- select this option. Accept all SSL certificates- select this option. When finished, touch Submit.

88 88 Enrolling Devices Android Device 5. Enter Domain (if prompted), Username, and Password credentials. Note: The agent will attempt to automatically resolve the subdomain and.com. For example, if the domain is mobileserver.companyname.com, the companyname must be entered. When finished, touch OK. 6. Touch Corporate Device? to select this option if the device is company owned. 7. Click Submit.

89 Enrolling Devices Android Device At the prompt for accepting the End-User License Agreement (EULA), touch OK. 9. Touch Agree to EULA to select this option and touch Submit. Once the enrollment processing finishes successfully, the Android device is enrolled.

90 90 Enrolling Devices Android Device Authorizing the Symantec Mobile MGMT Agent for Device Administrator Privileges After Enrollment, a Security Action Required notification will display for activation. This occurs because administrator privileges are required for the Mobile MGMT agent to lock, wipe, reset password or set password policies on the Android device. Note: This screen only appears the first time the device is enrolled. To view the application notification and activate administrator privileges: 1. Select the icon in the upper right and drag down. 2. Select Security Action Required. 3. Select Activate. This will activate device administrator privileges for the Symantec Mobile MGMT agent.

91 Enrolling Devices Windows Phone 7 Device 91 Windows Phone 7 Device The Windows Phone 7 agent is available from the Microsoft Store. To enroll a Windows Phone 7 device: 1. On the device, access a browser. 2. Enter the URL to download and install the Symantec Mobile MGMT agent to the Windows Phone 7 device. 3. Once installed, locate and touch the Mobile MGMT icon on the Windows Phone 7 Start Screen to access the Symantec Mobile MGMT agent. 4. On the Enroll screen, enter the following URL for enrollment: 5. Touch Enroll. 6. Enter your Username and Password. 7. For Is this device owned by the company?, touch the bar icon on the right to toggle Yes (yellow) or No (black). 8. Touch Submit. 9. On the Eula screen, click Accept to accept the End User License Agreement. 10. At the confirm permissions prompt, click ok. Once the enrollment processing finishes successfully, the device is enrolled.

92 92 Enrolling Devices Windows Phone 7 Device

93 Chapter 9 Registering Devices Windows Mobile, Windows CE, and BlackBerry smartphone devices are registered to the server by accessing the Locate Site Server web page via Internet Explorer on the device. The registration process is automatic. ios and Android are registered during the enrollment process. See Enrolling Devices on page 79 for more information. Note: The screens and prompts for Locate Site Server and will vary between devices and operating systems. The following prerequisites are required for registering devices: Device connected to the network. Device communicating with a reachable Management Point that has Athena Services. Resolve the server by name with WINS and DNS. Note: Referencing the server by IP is not sufficient.

94 94 Registering Devices Windows Mobile and Windows CE Devices Windows Mobile and Windows CE Devices To register a Windows Mobile or Windows CE device: 1. On the device, access Internet Explorer. 2. Enter Server name>/deviceupdates to access the Locate Site Server web page. 3. Tap Continue. Note: For devices running Windows CE.Net, Windows Mobile.Net Compact Framework 2.0 (.NETCF) must be installed.

95 Registering Devices Windows Mobile and Windows CE Devices Tap Yes to download the LocateSiteServer.CAB file and install Symantec Mobile Management. 5. Select the location for the installation, then tap Install. In most cases, select the default location. The installation is finished and the device is registered when the device returns to the desktop screen. Note: This screen may vary depending on the device and available storage areas.

96 96 Registering Devices BlackBerry Smartphones BlackBerry Smartphones To register a BlackBerry smartphone: 1. On the device, access a browser. 2. Enter Server name>/deviceupdates to access the Locate Site Server web page. 3. Tap Download to download and install the Athena client. 4. Click OK to complete the registration procedure.

97 Chapter 10 Device Licensing Device licenses are initially obtained during the installation procedure of Symantec Mobile Management for Configuration Manager. The License Tool enables administrators to obtain more devices licenses directly from Symantec when required. The Device Licenses option in the Configuration Manager console provides an illustration of the site environment's current device license status, along with device license warning dialogs, to indicate licensing compliance. View License Information Device Licenses provides a graphic and chart that illustrates the site environment's deployed devices and indicates if the number of device licenses has exceeded the maximum number of available device licenses. To view device license information: 1. Select Site Database > Computer Management > Mobile Device Management > Symantec Mobile Management.

98 98 Device Licensing View License Information 2. Select Device Licenses. The current license information displays in the console. For example, Usage Status, License Availability, and if any devices are unlicensed.

99 Device Licensing License Warning Dialog 99 License Warning Dialog If device licenses are not valid or have expired (non-compliant), a warning message will display in the console when certain actions are done. For example when creating a new software package for Windows Mobile/CE devices. To dismiss the warning dialog, click OK.

100 100 Device Licensing License Tool License Tool Device licenses are initially obtained during the installation of Symantec Mobile Management for Configuration Manager. The License Tool enables administrators to obtain more devices licenses directly from Symantec when required. Access the License Tool To access the License Tool: 1. On the Central server in the site environment, access C:\Program Files (x86)\odyssey Software\Athena\SCCM\Tools. 2. Double-click SMM_CM_LicenseTool. The License Tool opens.

101 Device Licensing License Tool 101 Obtain Licenses There are two ways to obtain licenses. If the Central server has access to the internet, you can use the Download Entitlement tab and manually enter the product serial number and other required license information. If you have an SLF file (obtained when licenses are purchased) currently available on the server, you can use the Install License File tab to locate the SLF file and automatically install the license(s). Download Entitlement Tab Install License File Tab To obtain a license when the server has access to the internet: 1. On the Download Entitlement tab, enter all information (Serial Number, First and Last Name, , and Phone). 2. Click Download Entitlements to get the license information from the Symantec license server. If you have an SLF file available on the server: 1. On the Install License File tab, locate the SLF file by clicking the browse button. 2. Click InstallLicenseFile. The license is installed.

102 102 Device Licensing License Tool View Licenses View SMM for CM Licensing Tab To view the licensing information: Click Get License Data. Information about the device licenses is displayed in the tab. For example, License Type and how many licenses are available.

103 Chapter 11 View Devices in Collections After registration or enrollment, devices are automatically populated in the built-in collections available in the Configuration Manager Console. ios Device (iphone, ipad, ipod Touch) To view an ios device in the Configuration Manager Console: 1. Access the Configuration Manager Console and expand Site Database > Computer Management > Collections > All Apple Mobile Devices. 2. Click Update Collection Membership in the Actions pane. 3. On the dialog that displays, select Update subcollection membership, then click OK. The collection is updated and shows the newly registered ios devices.

104 104 View Devices in Collections Android Device Android Device To view an Android device in the Configuration Manager Console: 1. Access the Configuration Manager Console and expand Site Database > Computer Management > Collections > All Android Mobile Devices. 2. Click Update Collection Membership in the Actions pane. 3. On the dialog that displays, select Update subcollection membership, then click OK. The collection is updated and shows the newly registered Android devices.

105 View Devices in Collections Windows Phone Windows Phone 7 To view a Windows Phone 7 in the Configuration Manager Console: 1. Access the Configuration Manager Console and expand Site Database > Computer Management > Collections > All Windows Phone 7 Devices. 2. Click Update Collection Membership in the Actions pane. 3. On the dialog that displays, select Update subcollection membership, then click OK. The collection is updated and shows the newly registered Windows devices.

106 106 View Devices in Collections Windows Mobile or Windows CE Device Windows Mobile or Windows CE Device To view a Windows Mobile or CE device in the Configuration Manager Console: 1. Access the Configuration Manager Console and expand Site Database > Computer Management > Collections > All Windows Mobile Devices. Note: The All Windows Mobile collection is a built-in collection which automatically contains all types of devices (i.e. BlackBerry smartphone, Windows Mobile, ipad, etc.) by default. See Query for All Windows Mobile Devices Collection on page 119 for more information. 2. Click Update Collection Membership in the Actions pane. 3. On the dialog that displays, select Update subcollection membership, then click OK. The collection is updated and shows the newly registered Windows Mobile/CE devices.

107 View Devices in Collections BlackBerry Smartphone 107 BlackBerry Smartphone To view a BlackBerry smartphone in the Configuration Manager Console: 1. Access the Configuration Manager Console and expand Site Database > Computer Management > Collections > All BlackBerry Mobile Devices. 2. Click Update Collection Membership in the Actions pane. 3. On the dialog that displays, select Update subcollection membership, then click OK. The collection is updated and shows the newly registered Blackberry smartphones.

108 108 View Devices in Collections BlackBerry Smartphone

109 Chapter 12 Configuring Device Ownership Administrators can specify if an enrolled ios or Android device, or registered Windows Mobile/Windows CE device or BlackBerry smartphone is company owned (Corporate) or employee owned (Personal). This allows devices in the enterprise to be managed differently according to ownership. For example, some companies may not perform a wipe of a lost personal device or have different policies defined for a corporate device. Note: For ios, Android, and Windows Phone 7 devices, setting ownership using this method overrides the device ownership declaration that was made during enrollment. See the device ownership declaration steps in ios Enrollment on page 82, Android Enrollment on page 88, and Windows Phone 7 Enrollment on page 91 for more information. Set Ownership To set ownership for a device: 1. Access the Configuration Manager Console and expand Site Database > Computer Management > Collections. 2. Select a device collection type. For example, All Android Mobile Devices.

110 110 Configuring Device Ownership Set Ownership 3. Right-click a device in the collection and select Symantec Mobile Management > Set > Set Ownership. 4. Depending on the device owner, select either Corporate for a company owned device or Personal for an employee owned device. 5. Click OK to set the device ownership. Note: Depending on the site environment, the device ownership setting may take some time before it is updated in the Configuration Manager database.

111 Chapter 13 EAS Blocking You can limit Microsoft Exchange ActiveSync (EAS) access to only authorized ios and Android devices. EAS Blocking uses a default query, which allows only devices that are managed by MDM. These managed devices have a valid Device ID and an EAS ID (Exchange mail account ID). You can block unauthorized devices from accessing Exchange with the following server options, which are discussed in this chapter: Exchange ActiveSync (Exchange 2010 only)- allow, quarantine or block Exchange functions. To use this functionality, the server where the EAS Blocking (EAS Blocking Service) resides must have been configured during the Services installation procedure. See the Exchange Blocking installation step on page 63 for more information. F5 Rules- integration with F5 BIG-IP LTM server that is configured with F5 Exchange blocking rules. The Exchange ActiveSync and F5 server options that are specified perform the actual blocking of the devices. The EAS Blocking query generates a list of allowed devices, also called a whitelist of devices. Note: Consult the Microsoft website or documentation for more information about Exchange ActiveSync allow, quarantine or block Exchange functions, and the F5 Networks website or documentation for more information about F5 rules and rule files.

112 112 EAS Blocking Blocking Settings Blocking Settings The EAS Blocking Settings screen contains the options and queries to use. To access EAS Blocking Settings: 1. Expand Configuration Manager Console > Site Database > Computer Management > Mobile Device Management. 2. Right-click Symantec Mobile Management and select EAS Blocking Settings. The EAS Blocking Settings screen displays. Exchange ActiveSync Blocking Functionality To specify Exchange ActiveSync settings for blocking: 1. Select Enable Exchange ActiveSync Blocking functionality. 2. Select one of the following options from EAS Access Level: Allow All Devices- all devices are allowed access. Devices can connect to Exchange and access . Quarantine Unauthorized Devices- unauthorized devices will be quarantined. Devices can connect to Exchange, but cannot access . Block Unauthorized Devices- unauthorized devices will be blocked. Devices cannot connect to Exchange or access Define and run a new query. See New Query on page 114. Note: When devices are blocked or quarantined by Exchange, an is sent indicating the status. If this is not received due to timing of the block or quarantine, check the user webmail account (if enabled). An ios device user may also receive server timeout, cannot access mail server or an invalid password error message when attempting to access that has been blocked.

113 EAS Blocking Blocking Settings 113 F5 Rules To specify F5 server rules for blocking: 1. Select Use F5 rules to block communication from unauthorized device to enable EAS blocking using F5 server rules. 2. Enter the location of the F5 rule file in F5 RULE File Location. 3. One or more F5 servers can be configured. Click Add F5 Server and enter the following information: Big-IP LTM server- name of the F5 server in use. Port- server port. Use 443 if using SSL. User Name- account for access to the F5 server. Password- password for the account. 4. Click OK. Once configured, the F5 server is listed in the dialog box. 5. Optionally, select Only allow approved apps and enter the device name(s) and the application name in the Apps field. Use a comma to separate the entries. For example, an approved app could be the TouchDown app for Android devices. 6. Define and run a new query. See New Query on page 114. To remove an F5 server: Select a server in the dialog box, then click Remove F5. Query EAS Authorized Devices The Default and New queries produce a list of allowed devices (whitelist). The queries use parameters from the Device Table in the Athena database to produce this list. Note: To use this function, advanced knowledge of SQL queries, Athena database structure and data types is required.

114 114 EAS Blocking Blocking Settings Default Query The Default Query field contains the default SQL query string that is used for EAS Blocking. The default query allows all managed devices that have a valid Device ID and EAS ID to access Exchange . Click View Result to see the list of managed devices that have an EAS ID. The following is the default query: SELECT DeviceId, DeviceName, , Managed, EASId, UserId FROM [Athena].[dbo].[Device] Where Managed = 1 and EasId!= " New Query The New Query field is where you add the query conditions (parameters) to the displayed new query to filter or refine the allowed devices. To create a new query: 1. Enter specific query parameters in the text box below New Query. You only need to add the parameters in the text box. The parameters will be automatically appended to the query. The following is the new query that will be appended with your parameters: SELECT DeviceId, DeviceName, , Managed, EASId, UserId FROM [Athena].[dbo].[Device] Note: For certain non-boolean data types, 1 and 0 are used for true or false. For example, the Managed data type for managed devices. 2. Click View Result to list the results of the new query in the Device List window. The Device List Window will list the allowed devices. Use this list to check it for accuracy or test that an allowed device list is generated by the new query. A message will display if an error occurs. 3. When finished, click Save to save the new query values to the Athena database or click Done to save the changes and exit the screen. Note: The Save or Done options will overwrite the default query with the new query. All EAS Blocking and F5 settings are retained with the query.

115 EAS Blocking Blocking Settings 115 Example Queries The following basic queries illustrate how you can add parameters to the new query that will create specific device lists. Query to allow access to only managed devices: SELECT DeviceId, DeviceName, , Managed, EASId, UserId FROM [Athena].[dbo].[Device] Where Managed = 1 Query to allow access to only managed ios devices: SELECT DeviceId, DeviceName, , Managed, EASId, UserId FROM [Athena].[dbo].[Device] Where Managed = 1 and DeviceType = 4 Query to allow all devices except Android devices: SELECT DeviceId, DeviceName, , Managed, EASId, UserId FROM [Athena].[dbo].[Device] Where DeviceType!='5'

116 Chapter 14 Additional Procedures The procedures in this chapter include optional Microsoft Configuration Manager procedures that are used to configure the site environment after Symantec Mobile Management for Configuration has been successfully installed. The sections in this chapter discuss the following topics: Using a Non-Domain Admin Account for Installation Enabling ASP.Net in IIS Query for All Windows Mobile Devices Collection DNS Text Record Setup for Android and ios Services

117 Additional Procedures Using a Non-Domain Admin Account for Installation 117 Using a Non-Domain Admin Account for Installation This procedure is done during the Services Installation on page 65. If the current user performing the installation is not a domain or Configuration Manager administrator, have a domain or Configuration Manager administrator perform a re-installation or perform the following SQL server authentication steps on each Configuration Manager server. Note: This procedure is not recommended, as the best practice is to have a domain or Configuration Manager administrator perform the installation. When using SQL Server Logins, you must create a blank Athena database to properly assign the Athena SQL server. To configure SQL server authentication: 1. Log in with the appropriate authority to perform these database administration tasks. 2. Create the Athena database using all of the default settings. 3. Modify the Athena SQL Server Login on the Configuration Manager server: On the General tab (node), the Default Database should be Athena. On the Server Roles tab (node), select the Public and sysadmin role check boxes. The sysadmin role is needed by the installation to create the Athena_Purge job in the SQL Server agent. On the User Mappings tab (node), select the check box for Athena in the top section and check box for the role db_owner in the lower section. Note: Public should be selected. 4. Click OK. 5. Return to the server step on page 65 of the Services installation procedure and finish the installation.

118 118 Additional Procedures Enabling ASP.Net in IIS Enabling ASP.Net in IIS This procedure enables ASP.Net 2.0 in IIS. To enable ASP.Net in IIS: 1. Access the Windows command prompt. 2. Enter the following command: Windows\Microsoft.Net\Framework\V \aspnet_regiis.exe i 3. Access the IIS Console by selecting Start > Administrative Tools > Internet Information Services (IIS) Manager. 4. Expand the site and select Web Service Extensions. 5. Ensure that ASP.Net v2.0 is set to Allowed.

119 Additional Procedures Query for All Windows Mobile Devices Collection 119 Query for All Windows Mobile Devices Collection This procedure adds the query string for the All Windows Mobile Devices collection so that only Windows Mobile devices appear in the collection. The All Windows Mobile collection is a built-in collection which automatically contains all types of devices (i.e. BlackBerry smartphone, iphone, ipad, etc.) by default. To add the query string: 1. Access the Configuration Manager Console. 2. Expand Site Database > Computer Management > Collections. 3. Right-click the All Windows Mobile Devices collection and select Properties. 4. Click the Membership Rules tab. 5. Double click the All Windows Mobile Devices membership rule. OR Click.

120 120 Additional Procedures Query for All Windows Mobile Devices Collection 6. Click Edit Query Statement.

121 Additional Procedures Query for All Windows Mobile Devices Collection Click the Criteria tab.

122 122 Additional Procedures Query for All Windows Mobile Devices Collection 8. Click Show Query Language to display the current query.

123 Additional Procedures Query for All Windows Mobile Devices Collection Select or delete the displayed query.

124 124 Additional Procedures Query for All Windows Mobile Devices Collection 10. Enter the following query: select SMS_R_SYSTEM.ResourceID,SMS_R_SYSTEM.ResourceType, SMS_R_SYSTEM.Name,SMS_R_SYSTEM.SMSUniqueIdentifier, SMS_R_SYSTEM.ResourceDomainORWorkgroup,SMS_R_SYSTEM.Client from SMS_R_System where SMS_R_System.ResourceType = 5 and SMS_R_System.ClientType = 3 and SMS_R_System.OperatingSystemNameandVersion like "Windows%" 11. When finished, click OK.

125 Additional Procedures Query for All Windows Mobile Devices Collection Click OK to exit the Query Rule Properties dialog. 13. Click OK to exit the collection properties dialog and return to the Configuration Manager Console. To verify that the new query is working correctly: 1. In the Configuration Manager Console, click Update Collection Membership in the Actions pane. 2. Right-click Collections and then select Refresh or click Refresh in the Actions pane. 3. Open the Windows Mobile Devices collection. Only Windows Mobile devices should now appear in the collection.

126 126 Additional Procedures DNS Text Record Setup for Android and ios Services DNS Text Record Setup for Android and ios Services This procedure contains the steps for setting up the Text Tag (TXT record) in DNS which maps the Mobile MGMT agent for ios or Android enrollment URL. This allows users to enroll ios or Android devices using their individual addresses. To set up the Text record in DNS: 1. Log in to the Domain Controller. 2. Access Start > Administrative Tools > DNS to run the DNS utility.

127 Additional Procedures DNS Text Record Setup for Android and ios Services From the DNS Window, navigate to the domain folder.

128 128 Additional Procedures DNS Text Record Setup for Android and ios Services 4. Right-click the domain folder and select Other New Records.

129 Additional Procedures DNS Text Record Setup for Android and ios Services On the Resource Record Type dialog, select Text (TXT) from the list. 6. Click Create Record.

130 130 Additional Procedures DNS Text Record Setup for Android and ios Services 7. Leave the Record name field blank. 8. Enter the following entry in the Text field for either ios (following) or Android (next page). For ios: OSIAGENTREGURL= server IP address or FQDN servername>/athena/enrollment/athenaiosenroll.aspx Note: The best practice is to use the FQDN of the server and use SSL (HTTPS) for enrollment. Example:

131 Additional Procedures DNS Text Record Setup for Android and ios Services 131 For Android: android-mdm-enroll= server IP address or FQDN servername>/athena/enrollment/athenaandroidenroll.aspx Note: The best practice is to use the FQDN of the server and use SSL (HTTPS) for enrollment. Example: AthenaAndroidEnroll.aspx 9. Click OK to create the Text Record. The setup procedure is now complete.

Symantec Mobile Management 7.1 Implementation Guide

Symantec Mobile Management 7.1 Implementation Guide Symantec Mobile Management 7.1 Implementation Guide Symantec Mobile Management 7.1 Implementation Guide The software described in this book is furnished under a license agreement and may be used only in

More information

Symantec Mobile Management 7.2 MR1 Implementation Guide

Symantec Mobile Management 7.2 MR1 Implementation Guide Symantec Mobile Management 7.2 MR1 Implementation Guide Symantec Mobile Management 7.2 MR1 The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Red Hat Enterprise Linux 5 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Red Hat Enterprise Linux 5 Symantec ESM Baseline Policy Manual for CIS Benchmark for Red Hat Enterprise Linux 5 The software

More information

PGP Viewer for ios. Administrator s Guide 1.0

PGP Viewer for ios. Administrator s Guide 1.0 PGP Viewer for ios Administrator s Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.2.

More information

Symantec Enterprise Security Manager Baseline Policy Manual for Security Essentials. Solaris 10

Symantec Enterprise Security Manager Baseline Policy Manual for Security Essentials. Solaris 10 Symantec Enterprise Security Manager Baseline Policy Manual for Security Essentials Solaris 10 Symantec ESM Baseline Policy Manual for Security Essentials for Solaris 10 The software described in this

More information

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. AIX 5.3 and 6.1

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. AIX 5.3 and 6.1 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark AIX 5.3 and 6.1 Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark for AIX 5.3 and 6.1 The software

More information

Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide

Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Solution 7.1 MP1 Installation and Configuration Guide Symantec Workflow Installation and Configuration Guide The software described in this book is furnished under a license agreement

More information

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server

Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Veritas Cluster Server Application Note: High Availability for BlackBerry Enterprise Server Windows Server 2003, Windows Server 2008 5.1 Service Pack 2 Veritas Cluster Server Application Note: High Availability

More information

PGP Viewer for ios. User s Guide 1.0

PGP Viewer for ios. User s Guide 1.0 PGP Viewer for ios User s Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.2. Last updated:

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Deployment Scanner 10.0 Symantec Enterprise Vault: Deployment Scanner The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec PGP Viewer for ios

Symantec PGP Viewer for ios Symantec PGP Viewer for ios User's Guide 1.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Version 1.0.0.

More information

Veritas Storage Foundation and High Availability Solutions Getting Started Guide

Veritas Storage Foundation and High Availability Solutions Getting Started Guide Veritas Storage Foundation and High Availability Solutions Getting Started Guide Windows Server 2008 (x64), Windows Server 2008 R2 (x64) 6.0 21213723 (October 2011) Veritas Storage Foundation and High

More information

Symantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide

Symantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide Symantec Encryption Management Server and Symantec Data Loss Prevention Integration Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Altiris Software Management Solution 7.1 from Symantec User Guide

Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide Altiris Software Management Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement

More information

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint Server

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint Server Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Microsoft SharePoint Server Windows Server 2003, Windows Server 2008 5.1 Service Pack 1 Veritas Storage

More information

Veritas Storage Foundation and High Availability Solutions Getting Started Guide

Veritas Storage Foundation and High Availability Solutions Getting Started Guide Veritas Storage Foundation and High Availability Solutions Getting Started Guide Windows Server 2008 (x64), Windows Server 2008 R2 (x64) 6.0.1 21271162 (October 2012) Veritas Storage Foundation and High

More information

Symantec Mobile Management for Configuration Manager 7.2 MR1 Release Notes

Symantec Mobile Management for Configuration Manager 7.2 MR1 Release Notes Symantec Mobile Management for Configuration Manager 7.2 MR1 Release Notes Symantec Mobile Management for Configuration Manager 7.2 MR1 Release Notes This document includes the following topics: About

More information

Veritas CommandCentral Enterprise Reporter Release Notes

Veritas CommandCentral Enterprise Reporter Release Notes Veritas CommandCentral Enterprise Reporter Release Notes for Microsoft Windows and Solaris 5.2 RU3 February 2012 CommandCentral Enterprise Reporter Release Notes The software described in this book is

More information

Symantec Enterprise Vault Technical Note

Symantec Enterprise Vault Technical Note Symantec Enterprise Vault Technical Note FSA Reporting deployment guidelines 8.0 Symantec Information Foundation Symantec Enterprise Vault: FSA Reporting deployment guidelines The software described in

More information

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0 Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

Symantec Enterprise Vault Technical Note

Symantec Enterprise Vault Technical Note Symantec Enterprise Vault Technical Note Migrating Enterprise Vault to 64-bit hardware 9.0 Symantec Enterprise Vault: Migrating Enterprise Vault to 64-bit hardware The software described in this book is

More information

Altiris IT Analytics Solution 7.1 from Symantec User Guide

Altiris IT Analytics Solution 7.1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide Altiris IT Analytics Solution 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and may

More information

Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007

Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007 Veritas Cluster Server Library Management Pack Guide for Microsoft System Center Operations Manager 2007 Windows VCS Library Management Pack Veritas Cluster Server Library Management Pack Guide for Microsoft

More information

Symantec Backup Exec System Recovery Granular Restore Option User's Guide

Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide Symantec Backup Exec System Recovery Granular Restore Option User's Guide The software described in this book is furnished under

More information

Symantec ServiceDesk 7.1 SP1 Implementation Guide

Symantec ServiceDesk 7.1 SP1 Implementation Guide Symantec ServiceDesk 7.1 SP1 Implementation Guide Symantec ServiceDesk 7.1 SP1 Implementation Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Veritas System Recovery 18 Management Solution Administrator's Guide

Veritas System Recovery 18 Management Solution Administrator's Guide Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

IM: Symantec Security Information Manager Patch 4 Resolved Issues

IM: Symantec Security Information Manager Patch 4 Resolved Issues IM: Symantec Security Information Manager 4.7.2 Patch 4 Resolved Symantec Security Information Manager 4.7.2 Patch 4 Resolved The software described in this book is furnished under a license agreement

More information

Configuring Symantec. device

Configuring Symantec. device Configuring Symantec AntiVirus for Hitachi File OS device Configuring Symantec AntiVirus for Hitachi File OS device The software described in this book is furnished under a license agreement and may be

More information

Symantec Security Information Manager FIPS Operational Mode Guide

Symantec Security Information Manager FIPS Operational Mode Guide Symantec Security Information Manager 4.7.3 FIPS 140-2 Operational Mode Guide Symantec Security Information Manager 4.7.3 FIPS 140-2 Operational Mode Guide The software described in this book is furnished

More information

Altiris Client Management Suite 7.1 from Symantec User Guide

Altiris Client Management Suite 7.1 from Symantec User Guide Altiris Client Management Suite 7.1 from Symantec User Guide Altiris Client Management Suite 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and

More information

Configuring Symantec Protection Engine for Network Attached Storage for Hitachi Unified and NAS Platforms

Configuring Symantec Protection Engine for Network Attached Storage for Hitachi Unified and NAS Platforms Configuring Symantec Protection Engine for Network Attached Storage 7.0.1 for Hitachi Unified and NAS Platforms Configuring Symantec Protection Engine for Network Attached Storage 7.0.1 for Hitachi Unified

More information

Symantec NetBackup Vault Operator's Guide

Symantec NetBackup Vault Operator's Guide Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.6 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may

More information

Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide

Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide 2 Symantec Enterprise Security Manager JRE Vulnerability Fix Update Guide The software described in this book is furnished under

More information

Symantec Enterprise Security Manager Modules for Oracle Release Notes

Symantec Enterprise Security Manager Modules for Oracle Release Notes Symantec Enterprise Security Manager Modules for Oracle Release Notes Release 5.0 for Symantec ESM 9.0 and 10.0 For Red Hat Enterprise Linux, HP-UX, AIX, Solaris, and Windows Symantec Enterprise Security

More information

Veritas System Recovery 16 Management Solution Administrator's Guide

Veritas System Recovery 16 Management Solution Administrator's Guide Veritas System Recovery 16 Management Solution Administrator's Guide Documentation version: 2017 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo

More information

Symantec System Recovery 2013 R2 Management Solution Administrator's Guide

Symantec System Recovery 2013 R2 Management Solution Administrator's Guide Symantec System Recovery 2013 R2 Management Solution Administrator's Guide Symantec System Recovery 2013 R2 Management Solution Administrator's Guide The software described in this book is furnished under

More information

Veritas Operations Manager Storage Insight Add-on for Deep Array Discovery and Mapping 4.0 User's Guide

Veritas Operations Manager Storage Insight Add-on for Deep Array Discovery and Mapping 4.0 User's Guide Veritas Operations Manager Storage Insight Add-on for Deep Array Discovery and Mapping 4.0 User's Guide Veritas Operations Manager Storage Insight Add-on for Deep Array Discovery and Mapping The software

More information

PGP(TM) Universal Server Version 3.2 Maintenance Pack Release Notes

PGP(TM) Universal Server Version 3.2 Maintenance Pack Release Notes PGP(TM) Universal Server Version 3.2 Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP

More information

Veritas Backup Exec Migration Assistant

Veritas Backup Exec Migration Assistant Veritas Backup Exec Migration Assistant Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies

More information

Configuring Symantec AntiVirus for BlueArc Storage System

Configuring Symantec AntiVirus for BlueArc Storage System Configuring Symantec AntiVirus for BlueArc Storage System Configuring Symantec AntiVirus for BlueArc Storage System The software described in this book is furnished under a license agreement and may be

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows Server 2003 Windows Server 2008 5.1 Service Pack 2 Veritas Cluster Server Database Agent for Microsoft SQL Configuration

More information

Symantec Enterprise Security Manager Modules for Microsoft SQL Server Databases Release Notes. Release 2.1 for Symantec ESM 6.0, 6.1, and 6.5.

Symantec Enterprise Security Manager Modules for Microsoft SQL Server Databases Release Notes. Release 2.1 for Symantec ESM 6.0, 6.1, and 6.5. Symantec Enterprise Security Manager Modules for Microsoft SQL Server Databases Release Notes Release 2.1 for Symantec ESM 6.0, 6.1, and 6.5.x For Windows 2000, Windows Server 2003, and Windows XP SQL

More information

Veritas SaaS Backup for Salesforce

Veritas SaaS Backup for Salesforce Veritas SaaS Backup for Salesforce Documentation version: 2.0 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks

More information

Symantec Endpoint Encryption Full Disk Maintenance Pack Release Notes

Symantec Endpoint Encryption Full Disk Maintenance Pack Release Notes Symantec Endpoint Encryption Full Disk Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of

More information

Veritas Desktop and Laptop Option 9.2. Disaster Recovery Scenarios

Veritas Desktop and Laptop Option 9.2. Disaster Recovery Scenarios Veritas Desktop and Laptop Option 9.2 Disaster Recovery Scenarios 2 Veritas Desktop and Laptop Option The software described in this document is furnished under a license agreement and may be used only

More information

Veritas SaaS Backup for Office 365

Veritas SaaS Backup for Office 365 Veritas SaaS Backup for Office 365 Documentation version: 1.0 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks

More information

Security Content Update Release Notes for CCS 12.x

Security Content Update Release Notes for CCS 12.x Security Content Update 2018-1 Release Notes for CCS 12.x SCU 2018-1 Release Notes for CCS 12.0 Documentation version: 1.0 Legal Notice Copyright 2018 Symantec Corporation. All rights reserved. Symantec,

More information

Symantec NetBackup for Enterprise Vault Agent Administrator's Guide

Symantec NetBackup for Enterprise Vault Agent Administrator's Guide Symantec NetBackup for Enterprise Vault Agent Administrator's Guide for Windows Release 7.1 Symantec NetBackup for Enterprise Vault Agent Administrator's Guide The software described in this book is furnished

More information

Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.2

Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.2 Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX Version 4.2 Symantec Enterprise Security Manager IBM DB2 Modules User Guide The software described in this book is furnished

More information

Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.6

Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX. Version 4.6 Symantec Enterprise Security Manager IBM DB2 Modules User Guide for Windows and UNIX Version 4.6 Symantec Enterprise Security Manager IBM DB2 Modules User Guide The software described in this book is furnished

More information

Symantec ApplicationHA Release Notes

Symantec ApplicationHA Release Notes Symantec ApplicationHA Release Notes Linux on KVM 6.0 December 2011 Symantec ApplicationHA Release Notes The software described in this book is furnished under a license agreement and may be used only

More information

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide

Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide Symantec ApplicationHA Agent for Microsoft Internet Information Services (IIS) Configuration Guide Windows Server 2003, Windows Server 2008 and 2008 R2 5.1 Service Pack 2 September 2011 Symantec ApplicationHA

More information

Symantec Encryption Desktop Version 10.2 for Mac OS X Release Notes. About Symantec Encryption Desktop

Symantec Encryption Desktop Version 10.2 for Mac OS X Release Notes. About Symantec Encryption Desktop Symantec Encryption Desktop Version 10.2 for Mac OS X Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of Encryption

More information

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution Symantec Managed PKI Integration Guide for AirWatch MDM Solution ii Symantec Managed PKI Integration Guide for AirWatch MDM Solution The software described in this book is furnished under a license agreement

More information

Veritas Dynamic Multi-Pathing readme

Veritas Dynamic Multi-Pathing readme Veritas Dynamic Multi-Pathing readme Linux DMP 5.1 Rolling Patch 1 Patch 0 Veritas Dynamic Multi-Pathing Readme The software described in this book is furnished under a license agreement and may be used

More information

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault

Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault Veritas Storage Foundation and High Availability Solutions HA and Disaster Recovery Solutions Guide for Enterprise Vault Windows Server 2003 Windows Server 2008 5.1 Service Pack 1 Veritas Storage Foundation

More information

Symantec NetBackup for Lotus Notes Administrator's Guide. Release 7.6

Symantec NetBackup for Lotus Notes Administrator's Guide. Release 7.6 Symantec NetBackup for Lotus Notes Administrator's Guide Release 7.6 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

More information

Symantec Mobile Management User Guide. Version 7.0 SP3

Symantec Mobile Management User Guide. Version 7.0 SP3 Symantec Mobile Management User Guide Version 7.0 SP3 Symantec Mobile Management User Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec Ghost Solution Suite Web Console - Getting Started Guide

Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console- Getting Started Guide Documentation version: 3.3 RU1 Legal Notice Copyright 2019 Symantec Corporation.

More information

Symantec ApplicationHA Agent for Microsoft SQL Server 2008 and 2008 R2 Configuration Guide

Symantec ApplicationHA Agent for Microsoft SQL Server 2008 and 2008 R2 Configuration Guide Symantec ApplicationHA Agent for Microsoft SQL Server 2008 and 2008 R2 Configuration Guide Windows Server 2003 (x64), Windows Server 2008 and 2008 R2 (x64) 5.1 Service Pack 2 06/13/2011 Symantec ApplicationHA

More information

Symantec NetBackup OpsCenter Reporting Guide. Release 7.7

Symantec NetBackup OpsCenter Reporting Guide. Release 7.7 Symantec NetBackup OpsCenter Reporting Guide Release 7.7 Symantec NetBackup OpsCenter Reporting Guide The software described in this book is furnished under a license agreement and may be used only in

More information

Altiris PC Transplant 6.8 SP4 from Symantec User Guide

Altiris PC Transplant 6.8 SP4 from Symantec User Guide Altiris PC Transplant 6.8 SP4 from Symantec User Guide Altiris PC Transplant 6.8 SP4 from Symantec User Guide The software described in this book is furnished under a license agreement and may be used

More information

Symantec NetBackup Appliance Fibre Channel Guide

Symantec NetBackup Appliance Fibre Channel Guide Symantec NetBackup Appliance Fibre Channel Guide Release 2.6.1.2 NetBackup 52xx and 5330 Symantec NetBackup Appliance Fibre Channel Guide Documentation version: 2.6.1.2 Legal Notice Copyright 2015 Symantec

More information

PGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes

PGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes PGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP

More information

Symantec NetBackup for Enterprise Vault Agent Administrator's Guide

Symantec NetBackup for Enterprise Vault Agent Administrator's Guide Symantec NetBackup for Enterprise Vault Agent Administrator's Guide for Windows Release 7.7 Symantec NetBackup for Enterprise Vault Agent Administrator's Guide Documentation version: 7.7 Legal Notice Copyright

More information

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3 Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice

More information

Veritas System Recovery 18 Linux Edition: Quick Installation Guide

Veritas System Recovery 18 Linux Edition: Quick Installation Guide Veritas System Recovery 18 Linux Edition: Quick Installation Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

Veritas Storage Foundation and High Availability Solutions Application Note: Support for HP-UX Integrity Virtual Machines

Veritas Storage Foundation and High Availability Solutions Application Note: Support for HP-UX Integrity Virtual Machines Veritas Storage Foundation and High Availability Solutions Application Note: Support for HP-UX Integrity Virtual Machines HP-UX 11i v3 5.0.1 Veritas Storage Foundation and High Availability Solutions Application

More information

Symantec ediscovery Platform

Symantec ediscovery Platform Symantec ediscovery Platform Native Viewer (ActiveX) Installation Guide 7.1.5 Symantec ediscovery Platform : Native Viewer (ActiveX) Installation Guide The software described in this book is furnished

More information

Partner Information. Integration Overview Authentication Methods Supported

Partner Information. Integration Overview Authentication Methods Supported Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration F5 Networks FirePass VPN User Name - Security Code User Name - Password - Security

More information

NetBackup Copilot for Oracle Configuration Guide. Release 2.7.1

NetBackup Copilot for Oracle Configuration Guide. Release 2.7.1 NetBackup Copilot for Oracle Configuration Guide Release 2.7.1 NetBackup Copilot for Oracle Configuration Guide Documentation version: 2.7.1 Legal Notice Copyright 2015 Symantec Corporation. All rights

More information

Veritas Desktop and Laptop Option 9.2. High Availability (HA) with DLO

Veritas Desktop and Laptop Option 9.2. High Availability (HA) with DLO Veritas Desktop and Laptop Option 9.2 High Availability (HA) with DLO 2 Veritas Desktop and Laptop Option The software described in this document is furnished under a license agreement and may be used

More information

Symantec Enterprise Vault Technical Note

Symantec Enterprise Vault Technical Note Symantec Enterprise Vault Technical Note Troubleshooting OWA Extensions 8.0 Symantec Information Foundation Symantec Enterprise Vault: Troubleshooting OWA Extensions The software described in this book

More information

Symantec Managed PKI. Integration Guide for ActiveSync

Symantec Managed PKI. Integration Guide for ActiveSync Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement

More information

Symantec ServiceDesk 7.1 SP2 Portal User Guide

Symantec ServiceDesk 7.1 SP2 Portal User Guide Symantec ServiceDesk 7.1 SP2 Portal User Guide Symantec ServiceDesk 7.1 SP2 Portal User Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault PST Migration 11.0 Symantec Enterprise Vault: PST Migration The software described in this book is furnished under a license agreement and may be used only in accordance with

More information

Enterprise Vault Requesting and Applying an SSL Certificate and later

Enterprise Vault Requesting and Applying an SSL Certificate and later Enterprise Vault Requesting and Applying an SSL Certificate 10.0.3 and later Enterprise Vault : Requesting and Applying an SSL Certificate Last updated: 2018-04-12. Legal Notice Copyright 2018 Veritas

More information

Veritas Enterprise Vault. NSF Migration

Veritas Enterprise Vault. NSF Migration Veritas Enterprise Vault NSF Migration 12 Veritas Enterprise Vault: NSF Migration Last updated: 2015-12-03. Legal Notice Copyright 2015 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas

More information

Veritas Storage Foundation and High Availability Solutions Getting Started Guide - Linux

Veritas Storage Foundation and High Availability Solutions Getting Started Guide - Linux Veritas Storage Foundation and High Availability Solutions 6.0.4 Getting Started Guide - Linux September 2013 Veritas Storage Foundation and High Availability Solutions Getting Started Guide The software

More information

Veritas NetBackup for SQLite Administrator's Guide

Veritas NetBackup for SQLite Administrator's Guide Veritas NetBackup for SQLite Administrator's Guide Windows and Linux Release 8.1.1 Documentation version: 8.1.1 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the

More information

Veritas NetBackup Copilot for Oracle Configuration Guide. Release 2.7.2

Veritas NetBackup Copilot for Oracle Configuration Guide. Release 2.7.2 Veritas NetBackup Copilot for Oracle Configuration Guide Release 2.7.2 Veritas NetBackup Copilot for Oracle Configuration Guide Documentation version: 2.7.2 Legal Notice Copyright 2016 Veritas Technologies

More information

Veritas Storage Foundation Add-on for Storage Provisioning User's Guide. 4.0 Release Update 1

Veritas Storage Foundation Add-on for Storage Provisioning User's Guide. 4.0 Release Update 1 Veritas Storage Foundation Add-on for Storage Provisioning User's Guide 4.0 Release Update 1 Veritas Storage Foundation Add-on for Storage Provisioning The software described in this book is furnished

More information

Veritas Desktop and Laptop Option 9.3 README

Veritas Desktop and Laptop Option 9.3 README Veritas Desktop and Laptop Option 9.3 README 2 Veritas Desktop and Laptop Option: README The software described in this document is furnished under a license agreement and may be used only in accordance

More information

Partner Information. Integration Overview. Remote Access Integration Architecture

Partner Information. Integration Overview. Remote Access Integration Architecture Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration OTP Barracuda Networks Barracuda SSL VPN User Name + Security Code VIP Enterprise

More information

Wise Mobile Device Package Editor Reference

Wise Mobile Device Package Editor Reference Wise Mobile Device Package Editor Reference Mobile Device Package Editor The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of

More information

Security Content Update Release Notes. Versions: CCS 11.1 and CCS 11.5

Security Content Update Release Notes. Versions: CCS 11.1 and CCS 11.5 Security Content Update 2016-1 Release Notes Versions: CCS 11.1 and CCS 11.5 SCU 2016-1 Release Notes for CCS 11.1 and CCS 11.5 Legal Notice Copyright 2016 Symantec Corporation. All rights reserved. Symantec,

More information

Symantec LiveUpdate Administrator 2.3 User's Guide

Symantec LiveUpdate Administrator 2.3 User's Guide Symantec LiveUpdate Administrator 2.3 User's Guide Symantec LiveUpdate Administrator 2.3 User's Guide The software described in this book is furnished under a license agreement and may be used only in

More information

Veritas Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft Exchange 2007

Veritas Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft Exchange 2007 Veritas Storage Foundation and High Availability Solutions Microsoft Clustering Solutions Guide for Microsoft Exchange 2007 Windows Server 2008 (x64), Windows Server 2008 R2 (x64) 6.0 October 2011 Veritas

More information

VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide

VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide The software described in this book is furnished

More information

Altiris Out of Band Management Component 7.1 SP1 from Symantec Implementation Guide

Altiris Out of Band Management Component 7.1 SP1 from Symantec Implementation Guide Altiris Out of Band Management Component 7.1 SP1 from Symantec Implementation Guide Altiris Out of Band Management Component 7.1 SP1 from Symantec Implementation Guide The software described in this book

More information

PGP(TM) Universal Server Version 3.2 Maintenance Pack Release Notes

PGP(TM) Universal Server Version 3.2 Maintenance Pack Release Notes PGP(TM) Universal Server Version 3.2 Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP

More information

Symantec Corporation NetBackup for Microsoft Exchange Server Administrator s Guide

Symantec Corporation NetBackup for Microsoft Exchange Server Administrator s Guide Symantec Corporation NetBackup for Microsoft Exchange Server Administrator s Guide for Windows Release 7.1 Symantec Corporation NetBackup for Microsoft Exchange Server Administrator s Guide The software

More information

Veritas Disaster Recovery Advisor Release Notes

Veritas Disaster Recovery Advisor Release Notes Veritas Disaster Recovery Advisor Release Notes AIX, ESX, HP-UX, Linux, Solaris, Windows Server 6.0 2 Veritas Disaster Recovery Advisor Release Notes Legal Notice Copyright 2012 Symantec Corporation. All

More information

Symantec Endpoint Encryption Full Disk Maintenance Pack Release Notes

Symantec Endpoint Encryption Full Disk Maintenance Pack Release Notes Symantec Endpoint Encryption Full Disk Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of

More information

PGP NetShare Quick Start Guide Version 10.2

PGP NetShare Quick Start Guide Version 10.2 PGP NetShare Quick Start Guide Version 10.2 What is PGP NetShare? The PGP NetShare product is a software tool that provides multiple ways to protect and share your data. Use PGP NetShare to: Let authorized

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Veritas Desktop Agent for Mac Getting Started Guide

Veritas Desktop Agent for Mac Getting Started Guide Veritas Desktop Agent for Mac Getting Started Guide The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation

More information

Symantec NetBackup for Microsoft Exchange Server Administrator s Guide

Symantec NetBackup for Microsoft Exchange Server Administrator s Guide Symantec NetBackup for Microsoft Exchange Server Administrator s Guide for Windows Release 7.6 Symantec NetBackup for Microsoft Exchange Server Administrator's Guide The software described in this book

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Veritas Storage Foundation and High Availability Solutions Application Note: Support for HP-UX Integrity Virtual Machines

Veritas Storage Foundation and High Availability Solutions Application Note: Support for HP-UX Integrity Virtual Machines Veritas Storage Foundation and High Availability Solutions Application Note: Support for HP-UX Integrity Virtual Machines HP-UX 11i v3 5.0.1 Veritas Storage Foundation and High Availability Solutions Application

More information