Secure Content Locker for Ios User Guide

Total Page:16

File Type:pdf, Size:1020Kb

Secure Content Locker for Ios User Guide Secure Content Locker for iOS v2.3 User Guide Using the Secure Content Locker to access your work-related and personal content © 2014 VMware, Inc. All rights reserved. This document, as well as the software described in it, is furnished under license. The information in this manual may only be used in accordance with the terms of the license. This document should not be reproduced, stored or transmitted in any form, except as permitted by the license or by the express permission of AirWatch, LLC. All other marks and names mentioned herein may be trademarks or trade names of their respective companies. Secure Content Locker for iOS v2.3 User Guide | v.2014.09 | September 2014 Copyright © 2014 VMware, Inc. All rights reserved. Proprietary & Confidential. Table of Contents Note for AirWatch Administrators 3 Introduction to the Secure Content Locker for iOS User Guide 4 Overview 4 In This Guide 4 Before You Begin 5 Disclaimer 5 Requirements 5 Supported File Types 5 Secure Content Locker Setup 6 Downloading and Installing the Secure Content Locker 6 Logging In to the Secure Content Locker 7 Secure Content Locker for iOS Functions 9 Navigating the Secure Content Locker 9 Downloading Content 12 iewing and Managing Content 13 Editing Content 15 Adding Content 25 Personal Content 30 Overview 30 Using the Secure Content Locker for iOS to Manage Personal Content 31 Using the Self-Service Portal to Manage Personal Content 35 Using Secure Content Locker Sync to Manage Personal Content 43 Appendix – Supported File Type by Platform Matrix 52 Secure Content Locker for iOS v2.3 User Guide | v.2014.09 | September 2014 Copyright © 2014 VMware, Inc. All rights reserved. Proprietary & Confidential. Page 2 Note for AirWatch Administrators Note for AirWatch Administrators This document is intended for use by your end-users and includes the full breadth of features and functionality for the latest versions of the Secure Content Locker application as well as the AirWatch Admin Console for the web-based Self- Service Portal. If you are not on the latest versions, or if you disable certain functionality from the AirWatch Admin Console, this document may differ from what your end-users see and experience. Because of this, you may wish to customize or tailor this PDF guide using your own tools before giving it to end-users. For example: This guide contains a section on using Personal Content. If you do not plan on enabling Personal Content for your end-users you may not want to include this section in the document. Secure Content Locker for iOS v2.3 User Guide | v.2014.09 | September 2014 Copyright © 2014 VMware, Inc. All rights reserved. Proprietary & Confidential. Page 3 Introduction to the Secure Content Locker for iOS User Guide Introduction to the Secure Content Locker for iOS User Guide Overview Welcome to the Secure Content Locker User Guide. The Secure Content Locker is a mobile application that your organization – whether it’s a company, school, or something else – has chosen to use to deliver content to your mobile device or laptop. The Secure Content Locker app allows you to access important content on your device while allowing your organization to ensure those files stay secure. Any content accessed through the Secure Content Locker opens inside the application, which ensures that it cannot be copied, saved, or shared without approval. The purpose of this guide is to help you use the application so you can access the content you need. It’s divided into a couple of sections, from simple explanations of each button and menu to in-depth instructions on how to access your content over the Internet through the AirWatch Self-Service Portal. In This Guide l Before You Begin – This is a section that includes important information you will need to use the Secure Content Locker app. l Secure Content Locker Setup – This section walks you through downloading, installing and logging into the Secure Content Locker app. l Secure Content Locker Functions – This section explains how to navigate through the app as well as downloading, viewing and managing content. l Personal Content – This section covers how to use the Self-Service Portal (SSP) and the Secure Content Locker app to view, use and manage Personal Content. l Appendix: – Supported File Types Matrix – This section displays the files that open within your Secure Content Locker app. If you have an issue opening a file, please ensure that it is supported before you contact your administrator. Secure Content Locker for iOS v2.3 User Guide | v.2014.09 | September 2014 Copyright © 2014 VMware, Inc. All rights reserved. Proprietary & Confidential. Page 4 Before You Begin Before You Begin Note the following important information and requirements that you will need to know before using the Secure Content Locker application. Disclaimer The screenshots used in this document may differ slightly from what you actually see on your device due to the way your organization’s AirWatch administrator specifically tailored your device's Secure Content Locker settings. In addition, since your administrator can configure the Secure Content Locker in a number of ways for different use cases, the instructions you should follow may vary. It is ultimately up to your AirWatch administrator to inform you of which methods to use or of any special steps that your organization may enforce. If you have any questions about what you should be seeing or how to perform an action described in this guide, please contact your AirWatch administrator. Requirements This section lists out and describes the different types of information you may need to access the Secure Content Locker. Access requirements depend on how your administrator set up the Secure Content Locker for your organization. Read the descriptions below to gain a better understanding of how to use the information your administrator gave you. l Username and Password – Your AirWatch administrator should provide you with the username and password you should use. These might be your normal credentials used to log in to a work computer, or they could be unique AirWatch credentials provided to you. If you are unsure of which to use, try your normal login credentials. If those do not work, check with your AirWatch administrator. l Group ID – A Group ID is a special code used to identify the group you belong to in the AirWatch system. l Server URL – The Server URL is the network location of your organization’s AirWatch instance. l Self-Service Portal URL – The Self-Service Portal is a website where you can go to view details about your device, content you have uploaded and more. l Single Sign On PIN – This PIN is applicable if your organization enables single sign on functionality or keep me signed in. Single sign on is available for the AirWatch Agent or the AirWatch Workspace applications. You will be prompted to create a PIN if you do not already have one. If you already have a PIN, simply use it when prompted. Supported File Types While the AirWatch Secure Content Locker supports several different file types, not all devices support the same file types. For a complete list of file types supported by your device, see the Appendix – Supported Files Type Matrix. Secure Content Locker for iOS v2.3 User Guide | v.2014.09 | September 2014 Copyright © 2014 VMware, Inc. All rights reserved. Proprietary & Confidential. Page 5 Secure Content Locker Setup Secure Content Locker Setup If you do not already have the Secure Content Locker downloaded and installed then you will need to do so before using it. After you have installed it, you will need to log in to the application using your credentials. Downloading and Installing the Secure Content Locker If your device is already enrolled in AirWatch, then you may have already installed the Secure Content Locker application. Check your device to see if it's installed. If it isn't, then you will be required to download it from the app store. Whether you must download it or not depends on how your AirWatch administrator configured the application. The following instructions detail how to search for and install the application from the app store. 1. On the device, tap the App Store icon. The App Store launches. 2. Use the Search field to search for "Secure Content Locker". Select the AirWatch Secure Content Locker from the results. The app displays in a results list, shown to the left. 3. Tap Free, then Install to download and install the application. Secure Content Locker for iOS v2.3 User Guide | v.2014.09 | September 2014 Copyright © 2014 VMware, Inc. All rights reserved. Proprietary & Confidential. Page 6 Secure Content Locker Setup Logging In to the Secure Content Locker When you first tap and launch the Secure Content Locker application, you will see a login screen. Before you can use the app, you will need to log in using your credentials, which your administrator should provide to you. Depending on the credentials you received, use one of the following methods to log in: Method A: Username and Password With this method, you will need your login credentials, server URL, and Group ID. See Requirements for more information. 1. Open the app by tapping the Secure Content Locker icon. You are prompted to authenticate the app to log in. 2. Enter the Server URL and Group ID that were used to enroll your device if this information is not automatically populated for you. If necessary, you can select the Settings icon to edit the URL and Group ID. Note: If you are using a Shared Device, then you must login to the Secure Content Locker as the same user who checked out the device.
Recommended publications
  • Openvms: an Introduction
    The Operating System Handbook or, Fake Your Way Through Minis and Mainframes by Bob DuCharme VMS Table of Contents Chapter 7 OpenVMS: An Introduction.............................................................................. 7.1 History..........................................................................................................................2 7.1.1 Today........................................................................................................................3 7.1.1.1 Popular VMS Software..........................................................................................4 7.1.2 VMS, DCL................................................................................................................4 Chapter 8 Getting Started with OpenVMS........................................................................ 8.1 Starting Up...................................................................................................................7 8.1.1 Finishing Your VMS Session...................................................................................7 8.1.1.1 Reconnecting..........................................................................................................7 8.1.2 Entering Commands..................................................................................................8 8.1.2.1 Retrieving Previous Commands............................................................................9 8.1.2.2 Aborting Screen Output.........................................................................................9
    [Show full text]
  • Credly Badge Earners Guide
    Badge Earner Guide Badge Earner Guide Table of Contents WELCOME TO CREDLY ................................................................................................................................... 3 WHAT IS A BADGE? ....................................................................................................................................... 3 GETTING STARTED ......................................................................................................................................... 4 Receive a Badge ........................................................................................................................................ 4 Accidental Badge Rejection ................................................................................................................... 5 Create an Account ..................................................................................................................................... 5 Claim Your Badge ...................................................................................................................................... 6 Personalize Your Profile ............................................................................................................................. 6 Share Your Badge ...................................................................................................................................... 7 Add Your Badge To Your Email Signature .................................................................................................
    [Show full text]
  • MS-DOS Basics.Pdf
    MS-DOS Basics The Command Prompt When you first turn on your computer, you will see some cryptic information flash by. MS-DOS displays this information to let you know how it is configuring your computer. You can ignore it for now. When the information stops scrolling past, you'll see the following: C:\> This is called the command prompt or DOS prompt. The flashing underscore next to the command prompt is called the cursor. The cursor shows where the command you type will appear. Type the following command at the command prompt: ver The following message appears on your screen: MS-DOS version 6.22 Viewing the Contents of a Directory To view the contents of a directory 1. Type the following at the command prompt: dir A list similar to the following appears: Changing Directories To change from the root directory to the WINDOWS directory To change directories, you will use the cd command. The cd command stands for "change directory." 1. Type the following at the command prompt: cd windows The command prompt changes. It should now look like the following: C:\WINDOWS> Next, you will use the dir command to view a list of the files in the DOS directory. Viewing the Contents of WINDOWS Directory To view a list of the files in the WINDOWS directory 1. Type the following at the command prompt: dir Changing Back to the Root Directory To change to the root directory 1. Type the following at the command prompt: cd \ Note that the slash you type in this command is a backslash (\), not a forward slash (/).
    [Show full text]
  • Itunes U Identity Guidelines September 2013 Contents
    iTunes U Identity Guidelines September 2013 Contents Overview 3 iTunes Badges Versions 4 Basics 5 Do’s and Don’ts 6 Linking to iTunes U Basics 7 Examples 8 Using the Name iTunes U Editorial Guidelines 9 Promoting iTunes U Do’s and Don’ts 10 Additional Tools 11 Apple Legal Requirements 12 iTunes U Identity Guidelines September 2013 2 Overview Hundreds of colleges, universities, schools, and cultural institutions use iTunes U to distribute educational content to their students and the public. To help your content get maximum exposure and awareness, and to help maintain the strength of the iTunes brand, it’s important to use the iTunes U identity in a consistent manner, as shown in these guidelines. These guidelines are for use by Apple-approved iTunes U content providers who have agreed to the terms of the iTunes U License Agreement. Follow the instructions in these guidelines to correctly promote iTunes U and maximize exposure and awareness of your iTunes U content in news announcements, websites, syllabi, and other communications. iTunes U Identity Guidelines September 2013 3 iTunes Badges Versions Only the versions of the iTunes badges shown here are approved by Apple to promote content on iTunes U. Available on iTunes badge Small iTunes badge Use the Available on iTunes Use the small iTunes badge badge to direct audiences to indicate that each title to your iTunes U content. in a list can be individually downloaded on iTunes U. Use this badge when layout space is limited. iTunes U Identity Guidelines September 2013 4 iTunes Badges Basics Minimum clear space and minimum size Backgrounds Localized badges • The minimum clear space is equal to one-quarter iTunes badges always appear in black and white as Apple provides badge artwork with the “Available on the height of the badge (one-half the height of shown here.
    [Show full text]
  • MS-DOS Lecture
    MS-DOS 2017 University of Babylon College of Engineering Electrical Department Learning Basics of MS-DOS Assis. Lec. Abeer Abd Alhameed | 1 MS-DOS 2017 Outcomes: By the end of this lecture, students are able to: Define the MS-DOS system Log in MS-DOS commands system Display MS-DOS information on your computer Type basic commands of MS-DOS system (view directory contents, change directory, make directory) Assis. Lec. Abeer Abd Alhameed | 2 MS-DOS 2017 Learning of MS-DOS Basics: Definition - What does Microsoft Disk Operating System (MS- DOS) mean? The Microsoft Disk Operating System (MS-DOS) is an operating system developed for PCs (personal computers) with x86 microprocessors. It was the first widely-installed operating system in personal computers. It is a command-line-based system, where all commands are entered in text form and there is no graphical user interface. The Command Prompt: When you first turn on your computer, you will see some information flash by. MS-DOS displays this information to let you know how it is configuring your computer. You can ignore it for now. When the information stops scrolling past, you'll see the following: C:\> This is called the command prompt or DOS prompt. The flashing underscore next to the command prompt is called the cursor. The cursor shows where the command you type will appear. Typing a Command: This section explains how to type a command at the command prompt and demonstrates the "Bad command or file name" message. • To type a command at the command prompt 1. Type the following at the command prompt (you can type the command in either uppercase or lowercase letters): nul If you make a typing mistake, press the BACKSPACE key to erase the mistake, and then try again.
    [Show full text]
  • CS 103 Lab 1 - Linux and Virtual Machines
    CS 103 Lab 1 - Linux and Virtual Machines 1 Introduction In this lab you will login to your Linux VM and write your first C/C++ program, compile it, and then execute it. 2 What you will learn In this lab you will learn the basic commands and navigation of Linux/Unix, its file system, the GNU C/C++ compiler and a few basic applications such as Gedit. Important: The Linux operating system and environment shares a vast majority of commands and methods with Unix. 3 Background Information and Notes 3.1 Software to Install on your PC Start by following the course virtual machine installation instructions found at the link below. http://cs103.usc.edu/tools-and-links/installing-course-vm/ Below is a list of recommended software you should install that will be helpful over multiple courses in CS and EE. These tools allow you to access remote servers, run GUI apps on those servers, and transfer files between your PC and those servers. For Windows: FileZilla FTP – Available from : https://software.usc.edu/index.aspx XWin-32 – Available from : https://software.usc.edu/index.aspx PuTTY – Available from : https://software.usc.edu/index.aspx For Mac: X Server: http://developer.apple.com/opensource/tools/runningx11.html Fetch FTP – Available from : https://software.usc.edu/index.aspx Reference: http://www.usc.edu/its/unix/ Last Revised: 8/29/2014 1 CS 103 Lab 1 - Linux and Virtual Machines 3.2 Getting Started with Unix1 and Accessing your Account Solaris vs. Unix vs. Linux UNIX was developed by AT&T Bell Labs in 1969.
    [Show full text]
  • How to Load Vista Or Windows 7 Onto a Bootable Thumb Drive
    STAR Watch Statewide Technology Assistance Resources Project A publication of the Western New York Law Center,Inc. Volume 15 Issue 5 Sept-Oct 2011 How to Load Vista or Windows 7 onto a Bootable Thumb Drive Ever since the capacity of USB thumb more robust. What happens when a drives rose into the multi-gigabyte range, DVD gets scratched? computer geeks have been trying to use them to create bootable devices that • Some of the latest computers don’t could be used in an emergency to boot have DVD drives, but they do have a up a failed computer. It was a wonderful USB port. idea, except for one detail: The driver • It takes less time to re-install needed to read the Windows install files Windows from a thumb drive could not be accessed. With the release of Vista and Windows 7 operating Find yourself a suitable thumb drive. It systems, the drivers needed to read the might be possible to shoehorn the files have been made more accessible. It Windows software onto a 4GB thumb is now possible to create a bootable drive, but that would leave no room for thumb drive that can be used to boot up anything else (It might be nice to have a computer and install Windows. copies of the install programs for things like printer drivers or other software that So, what is the big deal? Isn’t a DVD good enough? For many people, a DVD is quite adequate. Just store it in a safe In this issue… place and pull it out when it is needed.
    [Show full text]
  • Linux File System and Linux Commands
    Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Review of the Linux File System and Linux Commands 1. Introduction Becoming adept at using the Linux OS requires gaining familiarity with the Linux file system, file permissions, and a base set of Linux commands. In this activity, you will study how the Linux file system is organized and practice utilizing common Linux commands. Objectives • Describe the purpose of the /bin, /sbin, /etc, /var/log, /home, /proc, /root, /dev, /tmp, and /lib directories. • Describe the purpose of the /etc/shadow and /etc/passwd files. • Utilize a common set of Linux commands including ls, cat, and find. • Understand and manipulate file permissions, including rwx, binary and octal formats. • Change the group and owner of a file. Materials • Windows computer with access to an account with administrative rights The Air Force Cyber College thanks the Advanced Cyber Engineering program at the Air Force Research Laboratory in Rome, NY, for providing the information to assist in educating the general Air Force on the technical aspects of cyberspace. • VirtualBox • Ubuntu OS .iso File Assumptions • The provided instructions were tested on an Ubuntu 15.10 image running on a Windows 8 physical machine. Instructions may vary for other OS. • The student has administrative access to their system and possesses the right to install programs. • The student’s computer has Internet access. 2. Directories / The / directory or root directory is the mother of all Linux directories, containing all of the other directories and files. From a terminal users can type cd/ to move to the root directory.
    [Show full text]
  • Jailbreak Ios 12.1.1 As a Case Study
    OPEN ACCESS Ind. Journal on Computing ISSN 2460-9056 Vol. 4, Issue. 2, Sept 2019. pp. 205-218 socj.telkomuniversity.ac.id/indojc doi:10.21108/indojc.2019.4.2.349 Digital Forensic Analysis on iDevice: Jailbreak iOS 12.1.1 as a Case Study Amin Aenurahman Ali 1, Niken Dwi Wahyu Cahyani 2, Erwid Musthofa Jadied 3 1,2,3 Informatics, School of Computing, Telkom University Jl. Telekomunikasi No. 1 Terusan Buah Batu, Bandung, Indonesia 1 [email protected] 2 [email protected] 3 [email protected] Abstract Jailbreak has an issue in data alteration, as it modifies file(s) in the device to allow user to extract more data than without jailbreaking. This issue raises controversy of the use of jailbreaking in digital forensic investigation, as data integrity is a prominent requirement in a court proceeding. This study aims to analyze the process of jailbreak, what is actually done by the jailbreak code in a device, and what data is actually modified by the jailbreak code. By using the latest version of iOS system, this study uses the voucher_swap exploit as a representation of semi-tethered jailbreaking method to investigate the effects of jailbreak on data integrity on a idevice. The investigation is conducted based on to what extent data can be extracted from the jailbreak device, hash value comparison of the data, and source code analysis to scrutinize the effect of jailbreak to the system and user data inside the device. Results of this study suggest that jailbreak is acceptable to prepare idevice in digital forensic investigations to acquire more data, as it maintains the integrity of user data.
    [Show full text]
  • Cyber Security Guidelines for Securing Social Media Accounts
    Cyber Security Guidelines for Securing Social Media Accounts Version: 2.1 Author: Cyber Security Policy and Standards Document Classification: Public Published Date: June 2018 Document History: Version Description Date 1.0 Published V1.0 document October 2015 2.0 Branding Change (ICT to MOTC) + added November 2016 controls for other or changed social media platforms 2.1 MoTC logo changed + Format Change June 2018 Cyber Security Guidelines For Securing Social Media Accounts Version 2.1 Page 2 of 19 Classification: Public Table of Contents Legal Mandate(s) .................................................................................................................................... 4 Introduction ............................................................................................................................................ 5 Objective ................................................................................................................................................. 5 Scope ....................................................................................................................................................... 5 Intended Audience .................................................................................................................................. 5 Understand the Risks .............................................................................................................................. 6 General Recommendations ...................................................................................................................
    [Show full text]
  • Apple File System Reference
    Apple File System Reference Developer Contents About Apple File System 7 General-Purpose Types 9 paddr_t .................................................. 9 prange_t ................................................. 9 uuid_t ................................................... 9 Objects 10 obj_phys_t ................................................ 10 Supporting Data Types ........................................... 11 Object Identifier Constants ......................................... 12 Object Type Masks ............................................. 13 Object Types ................................................ 14 Object Type Flags .............................................. 20 EFI Jumpstart 22 Booting from an Apple File System Partition ................................. 22 nx_efi_jumpstart_t ........................................... 24 Partition UUIDs ............................................... 25 Container 26 Mounting an Apple File System Partition ................................... 26 nx_superblock_t ............................................. 27 Container Flags ............................................... 36 Optional Container Feature Flags ...................................... 37 Read-Only Compatible Container Feature Flags ............................... 38 Incompatible Container Feature Flags .................................... 38 Block and Container Sizes .......................................... 39 nx_counter_id_t ............................................. 39 checkpoint_mapping_t ........................................
    [Show full text]
  • File Systems
    File Systems CS 4410 Operating Systems [R. Agarwal, L. Alvisi, A. Bracy, M. George, E. Sirer, R. Van Renesse] The abstraction stack I/O systems are accessed Application through a series of layered Library abstractions File System File System API Block Cache& Performance Block Device Interface Device DriverDevice Access Memory-mapped I/O, DMA, Interrupts Physical Device The Block Cache Application Library • a cache for the disk File System File System API • caches recently read blocks Block Cache& Performance • buffers recently written blocks • serves as synchronization point Block Device Interface (ensures a block is only fetched Device DriverDevice Access once) Memory-mapped I/O, DMA, Interrupts Physical Device More Layers (not a 4410 focus) • allows data to be read or Application written in fixed-sized blocks Library • uniform interface to disparate devices File System File System API • translate between OS Block Cache& Performance abstractions and hw-specific Block Device Interface details of I/O devices Device DriverDevice Access • Control registers, bulk data Memory-mapped I/O, transfer, OS notifications DMA, Interrupts Physical Device Where shall we store our data? Process Memory? (why is this a bad idea?) 5 File Systems 101 Long-term Information Storage Needs • large amounts of information • information must survive processes • need concurrent access by multiple processes Solution: the File System Abstraction • Presents applications w/ persistent, named data • Two main components: • Files • Directories 6 The File Abstraction • File: a named collection of data • has two parts • data – what a user or application puts in it - array of untyped bytes • metadata – information added and managed by the OS - size, owner, security info, modification time 7 First things first: Name the File! 1.
    [Show full text]