Mobileiron for Macos Security and Management

Total Page:16

File Type:pdf, Size:1020Kb

Mobileiron for Macos Security and Management macOS Datasheet MobileIron for macOS Security and Management The evolution of Macs in the Key benefits of MobileIron for macOS enterprise • Provide stronger security with advanced DLP capabilities. Today, more organizations are using macOS than ever before. • Simplify management with comprehensive visibility and control. To keep Mac endpoints secure and up-to-date with the latest • Deliver a better user experience with seamless, secure access to applications and configurations, IT can no longer manage them business resources. exclusively with third-party solutions. To ensure complete visibility and control across the entire mobile infrastructure, organizations should look to a comprehensive, unified MobileIron supports the entire endpoint management (UEM) platform like MobileIron to seamlessly manage multi-OS endpoints including macOS, macOS lifecycle Android, iOS, and Windows 10 devices. Provisioning Configuration Wi-Fi (user/dev) VPN (user/dev) DEP Enrollment Certificates Secure all your Macs through a Bulk Enrollment Restrictions iReg Labels / Device Groups single point of control Mobile@Work Reg Custom Attributes Account Creation OS Update Azure AD User Sync OS Update Delay MobileIron provides a single point of security and LDAP integration Kernel Extensions Sync, Error Notification management for macOS, as well as Android, iOS, and Active Dir Binding O365 Acct Creation Windows 10 endpoints. By leveraging a single engine to create and enforce policies across all user-owned and corporate- issued endpoints, organizations can reduce costs and complexity and provide a better admin and user experience Security Password Policies Application & control Security Settings deployment across all stages of the Mac lifecycle, including provisioning, VPP Apps Push Compliance Policies In-house Apps Disk Encryption configuration, security and control, application deployment, On-device Catalog Recovery Keys App Inventory Media Restrictions monitoring and compliance, and end-of-life. App Deployment Lock All Distribution Formats: Wipe Device PKG, DMG, APP Force Check-in Privacy Preference Monitoring End of life & compliance Track Device Check-in Interval Remove Enrollment App Compliance Remove UEM Security Compliance Configurations Wipe Device Wipe Device 1 macOS Datasheet Our unique approach to macOS security Better user experience Unlike separate Mac management products, MobileIron provides a Enable users to stay productive and happy on their favorite devices by unified, comprehensive security and management platform for complete supporting a seamless experience with these capabilities: multi-OS management. This gives IT seamless visibility across the entire mobile infrastructure, which helps eliminate security and management • Accelerate productivity by getting users up and running in minutes. blindspots that result from management siloes. We also provide • Support secure, flexible authentication options including ZSO or innovative capabilities such as passwordless authentication through zero multi-factor authentication (MFA). sign-on (ZSO) and built-in conditional access to ensure that only trusted • Instantly create and push configurations to Macs — no user action users can access critical business resources in the cloud. Customers can required. also leverage our best-of-breed partner ecosystem and world-class customer service organization to scale and optimize their entire mobile • Deliver the same intuitive MobileIron experience across all user infrastructure. devices, including smartphones, tablets, and desktops. • Enable a seamless experience across all devices enrolled in MobileIron capabilities MobileIron. Stronger security MobileIron UEM provides a comprehensive set of controls to protect About MobileIron data on macOS. These capabilities include: MobileIron is built on the foundation of award-winning and industry- • Set and enforce passcodes and activate disk encryption. leading UEM capabilities with additional zero trust-enabling • Restrict access to iTunes file sharing. technologies, including ZSO, MFA, and MobileIron Threat Defense (MTD). Over 19,000 customers, including the world’s largest financial • Prevent users from installing unauthorized apps. institutions, intelligence agencies, and other highly regulated companies • Provide a single, per-app VPN across all devices. rely on MobileIron to secure their critical resources. • Ensure only verified users can access Office 365, G Suite, Salesforce, and other cloud services. Learn more at www.mobileiron.com. Simplified management MobileIron reduces the cost and complexity of Mac management with these key capabilities: • Leverage our support for Apple Business Manager to easily provision macOS devices. • Configure Macs over the air with no manual intervention required. • Streamline app deployment and management through the public App Store or through MobileIron’s enterprise app store. • Separate business and personal apps on employee-owned Macs. • Easily retire devices by selectively wiping only corporate apps and data while leaving the user’s personal apps and content intact. 2.
Recommended publications
  • Sidecar Sidecar Lets You Expand Your Mac Workspace—And Your Creativity—With Ipad and Apple Pencil
    Sidecar Sidecar lets you expand your Mac workspace—and your creativity—with iPad and Apple Pencil. October 2019 Contents Overview ...............................................................................................................3 Easy setup ............................................................................................................4 iPad as second display ......................................................................................... 5 iPad as tablet input device ....................................................................................6 Additional features ...............................................................................................8 Sidecar | October 2019 2 Overview Key Features Adding a second display has been a popular way for Mac users to extend their desktop and spread out their work. With Sidecar, Extended desktop Mac users can now do the same thing with their iPad. iPad makes Expand your Mac workspace using your iPad as a second display. Place one app a gorgeous second display that is perfect in the office or on on each screen, or put your main canvas the go. Plus Sidecar enables using Apple Pencil for tablet input on one display and your tools and on Mac apps for the very first time. Convenient sidebar and palettes on the other. Touch Bar controls let users create without taking their hands off iPad. And they can interact using familiar Multi-Touch gestures Apple Pencil to pinch, swipe, and zoom; as well as new iPadOS text editing Use Apple Pencil for tablet input with your favorite creative professional gestures like copy, cut, paste, and more. Sidecar works equally Mac apps. well over a wired or wireless connection, so users can create while sitting at their desk or relaxing on the sofa. Sidebar The handy sidebar puts essential modifier keys like Command, Control, Shift, and Option right at your fingertips. Touch Bar Touch Bar provides app-specific controls at the bottom of the iPad screen, even if your Mac does not have Touch Bar.
    [Show full text]
  • Apple Music & Beyond
    EBOOK EXTRAS: v1.2 Downloads, Updates, Feedback TAKE CONTROL OF macOS MEDIA APPS Apple Music & Beyond Manage your audio and video content in the Music, Podcasts, TV, and Books apps for macOS by KIRK McELHEARN $14.99 Click here to buy the full 237-page “Take Control of macOS Media Apps” for only $14.99! Table of Contents Read Me First ............................................................... 5 Updates and More ............................................................. 5 What’s New in Version 1.2 .................................................. 6 A Note on Terminology ....................................................... 7 Introduction ................................................................ 9 Quick Start ................................................................ 11 A Brief Introduction to Apple’s Media Apps ................ 13 Play Music ................................................................. 15 Play Your Music ............................................................... 15 Control Music with the MiniPlayer ....................................... 22 View Lyrics for Your Songs ................................................ 25 Use the Full Screen Player ................................................ 27 Get Notifications as Your Music Changes ............................. 29 Search for Music .............................................................. 31 Let Genius Choose What to Play ........................................ 33 Use Playing Next to View and Manage a Music Queue ........... 38 Make
    [Show full text]
  • Apple at Work Deployment and Management White Paper
    Apple at Work Deployment and Management Simple to deploy. At any scale. Apple makes it easy for IT teams to administer devices, manage their configuration, distribute apps and content, and secure corporate data. With Apple Business Manager, devices can be distributed directly to employees and used right out of the box, all without manual configuration. And with flexible deployment models across all Apple platforms, IT can get employees up and running faster than ever with the best tools for the job. Management made easy Apple devices have a built-in mobile device management (MDM) framework, making it easy for IT to deploy devices, distribute apps and books, configure settings, and ensure the security of each device. Paired with a third-party MDM tool, IT teams can remotely manage and update devices over the air. And if devices ever go missing, IT teams can remotely and securely erase them. MDM supports configuration for apps, accounts, and data on each device. This includes integrated features such as password and policy enforcement. Controls remain transparent to employees while ensuring their personal information stays private. And IT maintains necessary oversight without disrupting the productivity employees need to succeed. Whether a business uses a cloud-based or on-premise server, MDM solutions are available from a wide range of vendors with a variety of features and pricing for ultimate flexibility. And each solution utilizes the Apple management framework in iOS, iPadOS, tvOS, and macOS to manage features and settings for each platform. Zero-touch deployment Apple Business Manager is a web-based portal for IT administrators to deploy iPhone, iPad, iPod touch, Apple TV, and Mac, all from one place.
    [Show full text]
  • What's New for Enterprise and Education-WWDC 2020
    What’s New for Enterprise and Education WWDC 2020 June 2020 (v1.0) Contents Introduction 3 Integration and Setup 4 Deployment and Provisioning 5 Configuration Management 6 Identity Management 13 Content Distribution 15 Security and Compliance 16 App Updates 21 AppleSeed for IT 23 Deprecated Services 24 Additional Resources 25 2 What’s New for Enterprise and Education June 2020 Introduction This document is for IT administrators who want to learn about the new security and deployment-related features across Apple platforms as of WWDC 2020. There are also updates to Apple School Manager, Apple Business Manager, and AppleSeed for IT, as well as changes to the Apple mobile device management (MDM) protocol and its associated payloads. This document supplements the Deployment Reference for iPhone and iPad, the Deployment Reference for Mac, and Mobile Device Management Settings for IT Administrators, all designed to help administrators understand the key technologies for deploying Apple devices at scale and providing an optimal experience for users. NOTE: This material is provided for information purposes only; Apple assumes no liability related to its use. The Apple software and services discussed hereunder are pre-release versions that may be incomplete and may contain inaccuracies or errors that could cause failures or loss of data. 3 What’s New for Enterprise and Education June 2020 Integration and Setup Apple School Manager and Apple Business Manager System for Cross-domain Identity Management (SCIM) Administrators can use SCIM to import users into Apple School Manager and Apple Business Manager. SCIM allows them to merge Apple School Manager and Apple Business Manager properties (such as SIS user name and grades in Apple School Manager, and roles in Apple School Manager and Apple Business Manager) over account data imported from Microsoft Azure Active Directory (Azure AD).
    [Show full text]
  • DRC INSIGHT System Requirements Table of Contents 2 UPDATE: What’S New, Ended, Ending and Coming 2 UPDATE: New Or Changing DRC Technology 4 Minimum Vs
    System Requirements Effective June 2021–October 2021 Current Update: June 25, 2021 Next Update: October 2021 This document is updated three times each calendar year. Table of Contents DRC INSIGHT System Requirements Table of Contents 2 UPDATE: What’s New, Ended, Ending and Coming 2 UPDATE: New or Changing DRC Technology 4 Minimum vs. Recommended 4 DRC INSIGHT Testing Device Requirements 5 DRC INSIGHT Testing Device Additional Notes 6 COS Service Device Requirements 8 DRC’s Device Support Policy 9 DRC’s Operating System Support Policy 10 DRC’s Operating System Version Support 11 Trademarks 13 UPDATE: What’s New, Ended, Ending and Coming The following is an overview of upcoming changes to the hardware and software supported for DRC INSIGHT and/or COS Service Devices. Operating System Support What’s New Windows 10 Spring Release (21H1) Microsoft released version 21H1 in spring of 2021. Support for this release will follow DRC’s Operating System Support Policy. Starting in July of 2021, DRC will only support the Microsoft supported versions of Windows 10. Support will be consistent with our Operating System Support Policy (see page 10). What’s Ended Windows 7 As a reminder, Microsoft ended support for Windows 7 in January of 2020. DRC no longer supports or allows Windows 7 for testing. Ubuntu 16.04 Support for Ubuntu 16.04 ended in April of 2021. DRC moved it to Best Effort Support in May of 2021 and will move it to End of Support in June of 2021. What’s Ending iPadOS 13 DRC anticipates Apple will discontinue support of iPadOS 13 in September with the introduction of iPadOS 15.
    [Show full text]
  • Apple Quicktime Player Audio Recording and Screencasts with Apple Quicktime Player for Macos #1 Launching
    Apple QuickTime Player Audio recording and screencasts with Apple QuickTime Player for macOS #1 Launching Launch QuickTime Player. The application is pre-installed on every Mac in the Applications folder. ©Screenshot, Apple #2 What kind of recording After launch, the application will ask if you want to open a pre-existing file. The relevant functions are found below the „File“ menu. ©Screenshot, Apple #3 Movie Recording If you want to record yourself and have no need to show content on your computer, choose the „New Movie Recording“ menu item. The small arrow next to the recording button lets you easily choose the integrated camera of your laptop or desktop computer. It is also possible to choose an external camera should you not want to use the internal camera. It is here that you also choose the microphone that you want to use. ©Screenshot, Apple Once you are finished with your recording you can press the red recording button again and the player will show you the resulting video. You can save and share the file twofold: You can use the „share“ icon in the player or you choose a location via the menu item „File > Save“. The video is now ready to be edited in another application or ready to be shared. ©Screenshot, Apple #4 Screen Recording Similar to the „Movie Recording“ option, QuickTime is able to record your entire screen or a selection of your screen with you able to talk over it. For that you navigate to „File > New Screen Recording“ and you will be presented with options in the translucent panel below.
    [Show full text]
  • Mac Os Versions in Order
    Mac Os Versions In Order Is Kirby separable or unconscious when unpins some kans sectionalise rightwards? Galeate and represented Meyer videotapes her altissimo booby-trapped or hunts electrometrically. Sander remains single-tax: she miscalculated her throe window-shopped too epexegetically? Fixed with security update it from the update the meeting with an infected with machine, keep your mac close pages with? Checking in macs being selected text messages, version of all sizes trust us, now became an easy unsubscribe links. Super user in os version number, smartphones that it is there were locked. Safe Recover-only Functionality for Lost Deleted Inaccessible Mac Files Download Now Lost grate on Mac Don't Panic Recover Your Mac FilesPhotosVideoMusic in 3 Steps. Flex your mac versions; it will factory reset will now allow users and usb drive not lower the macs. Why we continue work in mac version of the factory. More secure your mac os are subject is in os x does not apply video off by providing much more transparent and the fields below. Receive a deep dive into the plain screen with the technology tally your search. MacOS Big Sur A nutrition sheet TechRepublic. Safari was in order to. Where can be quit it straight from the order to everyone, which can we recommend it so we come with? MacOS Release Dates Features Updates AppleInsider. It in order of a version of what to safari when using an ssd and cookies to alter the mac versions. List of macOS version names OS X 10 beta Kodiak 13 September 2000 OS X 100 Cheetah 24 March 2001 OS X 101 Puma 25.
    [Show full text]
  • Basics of Apple Device Security
    AN OVERVIEW FOR MAC, IPAD AND IPHONE Basics of Apple Device Security SMALL BUSINESS A well-planned cyberattack or an accidental download of 2 malware can mean the difference between a productive day and all work grinding to a halt. As hackers get more sophisticated, organizations concerned about their bottom line and security of their customer, employee or student data must stay on top of security. This guide is for anyone that has been tasked with Apple security concerns, like all IT security concerns, are real. managing Apple devices in your organization and wants to get serious about their organizational While Apple has invested a great deal in its security features security of their Apple devices, and offers basic and has rapidly become the leader in device and data privacy information for newcomers or a simple refresher for and security, no operating system is immune to security Apple management veterans. challenges. This means that administrators must not only respond quickly to security issues, but also proactively guard against them. 3 The basic building blocks Several factors work together to ensure the security of your organization’s hardware and data, and you can break them down into six main areas: Securing devices Apple native security Data encryption Keeping your physical devices Security systems already built-in The basics of encrypting data at Introduction secure and protecting those to macOS, iOS and iPadOS rest and data in transit using them to Apple Page 4 Page 7 Page 6 Security Compliance Secure monitoring Application
    [Show full text]
  • Configurations, Troubleshooting, and Advanced Secure Browser Installation Guide for Macos and Ipados
    Configurations, Troubleshooting, and Advanced Secure Browser Installation Guide for macOS and iPadOS 2021–2022 Updated 9/2/2021 1 Table of Contents Configurations, Troubleshooting, and Secure Browser Installation for macOS and iPadOS ............. 3 How to Configure macOS Workstations for Online Testing .......................................................................... 3 Installing the Secure Profile for macOS ......................................................................................................... 4 Installing Secure Browser for macOS ............................................................................................................ 5 Installing the SecureTestBrowser App for iPadOS ........................................................................................ 5 Additional Instructions for Installing the Secure Browser for macOS ............................................................ 6 Cloning the Secure Browser Installation to Other macOS Machines ................................................... 6 Uninstalling the Secure Browser on macOS ......................................................................................... 6 Additional Configurations for macOS ............................................................................................................ 6 Disabling Updates to Third-Party Apps ................................................................................................. 7 Disabling Fast User Switching .............................................................................................................
    [Show full text]
  • Tips to Keep Connected Using Facetime, Zoom and Skype Contents
    Tips to keep connected Using FaceTime, Zoom and Skype Contents FaceTime on iPad or iPhone ................................................................ 2 FaceTime on macOS ........................................................................... 3 FaceTime on Andorid or Windows ....................................................... 3 Zoom on macOS, iPad or iPhone ........................................................ 4 Zoom on Android ............................................................................... 5 Zoom on Windows ............................................................................. 6 Skype on Windows ............................................................................. 7 Skype on macOS ................................................................................ 8 Skype on Android ............................................................................... 9 Skype on iPad and iPhone ................................................................ 10 2 FaceTime on iPad or iPhone In the FaceTime app , you can make video or audio calls to friends and family, whether they are using an iPhone, iPad, iPod touch, or a Mac. With the front camera, you can talk face-to-face; switch to the rear camera to share what you see around you. 1. Go to Settings > FaceTime, then turn on FaceTime. 2. If you want to be able to take Live Photos during FaceTime calls, turn on FaceTime Live Photos. 3. Enter your phone number, Apple ID, or email address to use with FaceTime. To make a FaceTime call 1. In the FaceTime app , click the + in the top right hand of your screen. 2. Type in the person’s name (from your address book on your phone/ iPad) 3. Click ‘audio’ or ‘video’ to start the call. Apple, iPad, iPhone, macOS, FaceTime: Copyright © 2020 Apple Inc. All rights reserved. 3 FaceTime on macOS In the FaceTime app , you can make video or audio calls to friends and family, whether they are using an iPhone, iPad, iPod touch, or a Mac. With the front camera, you can talk face-to-face; switch to the rear camera to share what you see around you.
    [Show full text]
  • Configurations, Troubleshooting, and Advanced Secure Browser Installation Guide for OS X/Macos and Ios/Ipados
    Configurations, Troubleshooting, and Advanced Secure Browser Installation Guide for OS X/macOS and iOS/iPadOS 2020–2021 Updated 4/20/2021 1 Table of Contents Configurations, Troubleshooting, and Secure Browser Installation for OS X/macOS and iOS/iPadOS .............................................................................................................................................3 How to Configure OS X/macOS Workstations for Online Testing .............................................................. 3 Installing the Secure Profile for OS X/macOS ...........................................................................................4 Installing Secure Browser for OS X/macOS ..............................................................................................5 Installing the SecureTestBrowser App for iOS/iPadOS ............................................................................. 5 Additional Instructions for Installing the Secure Browser for OS X/macOS ................................................ 6 Cloning the Secure Browser Installation to Other OS X/macOS Machines ........................................ 6 Uninstalling the Secure Browser on OS X/macOS ............................................................................ 7 Additional Configurations for OS X/macOS ...............................................................................................7 Disabling Updates to Third-Party Apps .............................................................................................7
    [Show full text]
  • Mac OS 8 Revealed
    •••••••••••••••••••••••••••••••••••••••••••• Mac OS 8 Revealed Tony Francis Addison-Wesley Developers Press Reading, Massachusetts • Menlo Park, California • New York Don Mills, Ontario • Harlow, England • Amsterdam Bonn • Sydney • Singapore • Tokyo • Madrid • San Juan Seoul • Milan • Mexico City • Taipei Apple, AppleScript, AppleTalk, Color LaserWriter, ColorSync, FireWire, LocalTalk, Macintosh, Mac, MacTCP, OpenDoc, Performa, PowerBook, PowerTalk, QuickTime, TrueType, and World- Script are trademarks of Apple Computer, Inc., registered in the United States and other countries. Apple Press, the Apple Press Signature, AOCE, Balloon Help, Cyberdog, Finder, Power Mac, and QuickDraw are trademarks of Apple Computer, Inc. Adobe™, Acrobat™, and PostScript™ are trademarks of Adobe Systems Incorporated or its sub- sidiaries and may be registered in certain jurisdictions. AIX® is a registered trademark of IBM Corp. and is being used under license. NuBus™ is a trademark of Texas Instruments. PowerPC™ is a trademark of International Business Machines Corporation, used under license therefrom. SOM, SOMobjects, and System Object Model are licensed trademarks of IBM Corporation. UNIX® is a registered trademark of Novell, Inc. in the United States and other countries, licensed exclusively through X/Open Company, Ltd. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and Addison-Wesley was aware of a trademark claim, the designations have been printed in initial capital letters or all capital letters. The author and publisher have taken care in the preparation of this book, but make no express or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein.
    [Show full text]