IBM MaaS360 Kiosk Mode Settings

Similar documents
ISAM Advanced Access Control

ISAM Federation STANDARDS AND MAPPINGS. Gabriel Bell IBM Security L2 Support Jack Yarborough IBM Security L2 Support.

MSS VSOC Portal Single Sign-On Using IBM id IBM Corporation

Junction SSL Debugging With Wireshark

Ponemon Institute s 2018 Cost of a Data Breach Study

How to Secure Your Cloud with...a Cloud?

Threat Intelligence to enhance Cyber Resiliency KEVIN ALBANO GLOBAL THREAT INTELLIGENCE LEAD IBM X-FORCE INCIDENT RESPONSE AND INTELLIGENCE SERVICES

Fabrizio Patriarca. Come creare valore dalla GDPR

Integrated, Intelligence driven Cyber Threat Hunting

Configuring zsecure To Send Data to QRadar

IBM Security Network Protection Open Mic - Thursday, 31 March 2016

Disk Space Management of ISAM Appliance

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation

IBM Threat Protection System: XGS - QRadar Integration

XGS & QRadar Integration

BigFix 101- Server Pricing

BigFix Query Unleashed!

SWD & SSA Updates 2018

IBM MaaS360 with Watson Evaluator s Guide. Version 2.2

XGS: Making use of Logs and Captures

May the (IBM) X-Force Be With You

The New Era of Cognitive Security

Security Support Open Mic: ISNP High Availability and Bypass

Security Support Open Mic Build Your Own POC Setup

IBM Security Access Manager v8.x Kerberos Part 1 Desktop Single Sign-on Solutions

Be effective in protecting against the cybercrime

GX vs XGS: An administrator s comparison of the two products

Security Support Open Mic Client Certificate Authentication

Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY

IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT

IBM Guardium Data Encryption

Understanding scan coverage in AppScan Standard

Predators are lurking in the Dark Web - is your network vulnerable?

Security Update PCI Compliance

Identity Governance Troubleshooting

IBM Security Directory Server: Utilizing the Audit.log

We will see how this Android SDK class. public class OpenSSLX509Certificate extends X509Certificate {

IBM Security Guardium: : Sniffer restart & High CPU correlation alerts

IBM Security Access Manager v8.x Kerberos Part 2

Le sfide di oggi, l evoluzione e le nuove opportunità: il punto di vista e la strategia IBM per la Sicurezza

IBM Application Security on Cloud

IBM BigFix Relays Part 2

Modern Realities of Securing Active Directory & the Need for AI

Let s Talk About Threat Intelligence

Securing global enterprise with innovation

Analyzing Hardware Inventory report and hardware scan files

We will see how this Android SDK class. public class OpenSSLX509Certificate extends X509Certificate {

Deploying Lookout with IBM MaaS360

Deploying BigFix Patches for Red Hat

IBM Security Network Protection Solutions

How to properly deploy, configure and upgrade the NAB

Introduction to IBM Security Network Protection Manager

Healthcare Cognitive Security

WebSphere Commerce Developer Professional

XGS Administration - Post Deployment Tasks

IBM Security Identity Manager New Features in 6.0 and 7.0

The McGill University Health Centre (MUHC)

How AppScan explores applications with ABE and RBE

IBM Security Guardium: Troubleshooting No Traffic Issues

Accelerating growth and digital adoption with seamless identity trust

Staying GDPR Ready with MaaS360. Ankur Acharya Offering Manager, IBM MaaS360

More on relevance checks in ILMT and BFI

SCREEN COMBINATION FEATURE IN HATS 7.0

What's new in AppScan Standard version

IBM Security Access Manager Single Sign-on with Federation

IBM SPSS Text Analytics for Surveys

GETTING STARTED GUIDE. Mobile Admin. Version 8.2

Remote Syslog Shipping IBM Security Guardium

IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR Leader VMware on IBM Cloud VMworld 2017 Content: Not for publicati

WebSphere Commerce Professional

HTTP Transformation Rules with IBM Security Access Manager

Using Buffer Usage Monitor Report & Sniffer must_gather for troubleshooting

Mobilize your corporate content and apps

IBM Security Access Manager

IBM Social Rendering Templates for Digital Data Connector

IBM Security Network Protection

Using Question/Answer Wizards and Process Slots to configure an RMC process/wbs

Service Description. IBM Aspera Files. 1. Cloud Service. 1.1 IBM Aspera Files Personal Edition. 1.2 IBM Aspera Files Business Edition

IBM Next Generation Intrusion Prevention System

IBM Security Identity Governance and Intelligence Clustering and High Availability

What's new in AppScan Standard/Enterprise/Source version

Outsmarting the Smart City DISCOVERING AND ATTACKING THE TECHNOLOGY THAT RUNS MODERN CITIES

Worrying About Your Whitelists

RHM Presentation. Maas 360 Mobile device management

Securing communication between SDS VA and its remote DB2 DB

Mobile Admin GETTING STARTED GUIDE. Version 8.2. Last Updated: Thursday, May 25, 2017

Innovate 2013 Automated Mobile Testing

Symantec Endpoint Protection Mobile - Admin Guide v3.2.1 May 2018

Integrate IBM Rational Application Developer and IBM Security AppScan Source Edition

Interpreting relevance conditions in commonly used ILMT/BFI fixlets

Notice on Names and Logos Used in This Presentation

IBM Cloud Lessons Learned: VMware Cloud Foundation on IBM Cloud VMworld 2017 We are a cognitive solutions and cloud platform company that leverages th

[CONFIGURE NEW PAYMENT METHOD IN STORE FRONT]

Setup domino admin client by providing username server name and then providing the id file.

WP710 Language: English Additional languages: None specified Product: WebSphere Portal Release: 6.0

Configuring your policy to prevent appliance problems

Penetration testing a building automation system

Lotus Technical Night School XPages and RDBMS

Developing Enterprise Services for Mobile Devices using Rational Software Architect / Worklight

QRadar Open Mic: Custom Properties

Transcription:

IBM MaaS360 Kiosk Mode Settings Configuration Settings for Kiosk Mode Operation IBM Security September 2017

Android Kiosk Mode IBM MaaS360 provides a range of Android device management including Samsung SAFE / Knox and Android Enterprise (for Work). MaaS360 can configure Android devices to operate in a Kiosk mode which restricts the user to a number of mobile applications. This guide details how the Kiosk mode is represented on Android and Samsung SAFE including the appropriate MaaS360 portal settings. For queries around these settings, you can contact MaaS360 support via support@maas360.ibm.com or via the 24x7 chat service 2 IBM Security

Manage Devices Secure & manage Manage Apps Curate & deploy Enable Content Enable & control access Protect Data Contain & prevent leaks Phone XP Win 10 CYOD BYOD Shared Contractors Seamless Identity Authenticate & authorise Establish Context Alert & analyze Provide Cognitive Sense & respond Mail systems Directories Certificates File shares 3 IBM Security

IBM MaaS360 Kiosk Mode The MaaS360 logo can be rebranded 4 IBM Security

Kiosk Mode Settings Apply the following Android Policy Settings: Device Settings - Device Management Do not allow user to disable device management Advanced Settings Kiosk Mode Restrictions Block Task Manager (Disables Task Manager) Select the list of allowed applications (do not include Settings app)* Enable Admin bypass for Kiosk mode Block Hardware Keys Enable Admin bypass for Kiosk mode *See the Appendix 5 IBM Security

Additional Samsung Kiosk Mode Settings Apply the following Android Policy Settings: Advanced Settings Kiosk Mode Restrictions Block Multi-Window Mode Hide Navigation Bar Hide Status Bar Hide System Bar 6 IBM Security

Customise the Kiosk Launcher Apply the Settings as required: 7 IBM Security

AppIDs The following are a list of Android AppID s you can use to list applications in Kiosk mode. Others can be found with applications such as APK Extractor Android Apps com.android.contacts* com.android.settings com.android.mms com.android.dialer and/or com.android.phone com.sec.android.app.camera MaaS360 Apps: com.fiberlink.maas360.android.control com.fiberlink.maas360.android.secureeditor com.fiberlink.maas360.android.securebrowser * S7 removed the dialer as an option under contacts, so doesn't have it's own app id. 8 IBM Security

Integrated Threat Protection Real-time Malware Protection Detect, analyse and remediate Mobile malware and compromised devices Near real-time compliance rules engine for automated remediation Over-the-air detection logic updates For more information - https://www.youtube.com/watch?v=t-qk-9mvr8i 9 IBM Security

THANK YOU FOLLOW US ON: ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANYSYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.