Instant XenMobile MDM
()
About this ebook
XenMobile is the revolutionary new way to mobilize your business. The product offers security and compliance for IT while giving users mobile device, app, and data freedom. Users gain single-click access to all of their mobile, SaaS, and Windows apps from a unified corporate app store, including seamlessly-integrated email, browser, data sharing, and support apps.
A practical guide showing users how to implement XenMobile MDM, configure the software and server for provisioning and security policies, and deploy application stores. Readers will gain an understanding in how to manage a BYOD environment in organizations.
This book explores how mobile devices are used within organizations, and importantly identifies the common pain points that they experience. You will learn practical solutions on how address these concerns and use XenMobile to solve these problems. You will also learn how to install, configure, and optimize XenMobile MDM software. Finally, you will learn how to configure security policies to protect mobile devices, install custom applications, and configure device settings.
ApproachGet to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. Written in a user friendly style, this guide will get readers up and running with XenMobile MDM.
Who this book is forIf you want to run your mobile enterprises on XenMobile, or work on a BYOD strategy within your organization, then this is the ideal book for you. XenMobile MDM comprehensively explores how to set up and use XenMobile to provision, secure, and manage mobile devices.
Aamir Lakhani
"Aamir Lakhani is a leading Cyber Security and Cyber Counter Intelligence architect for World Wide Technology Inc. (WWT). Lakhani is responsible for WWT's efforts to provide IT security solutions to major commercial and federal enterprise organizations.Lakhani leads projects that implement security postures for Fortune 500 companies, the US Department of Defence, major healthcare providers, educational institutions, financial, and media organizations. Lakhani has designed offensive counter defence measures for defence and intelligence agencies, and has assisted organizations in defending themselves from active strike back attacks perpetrated by underground cyber groups. Lakhani is considered an industry leader in support of detailed architectural engagements and projects on topics related to cyber defence, mobile application threats, malware and Advanced Persistent Threat (APT) research, and Dark Security. Lakhani is the author of the soon to be released book Ultimate Web Penetration Testing with Kali Linux, in conjunction with Packt Publishing.Writing under the pseudonym Dr. Chaos, Lakhani also operates the DrChaos.com blog. In a recent list of 46 Federal Technology Experts to Follow on Twitter, Forbes magazine described Aamir Lakhani as ""a blogger, infosec specialist, super hero...and all around good guy."""
Read more from Aamir Lakhani
Web Penetration Testing with Kali Linux Rating: 5 out of 5 stars5/5Penetration Testing with Raspberry Pi Rating: 5 out of 5 stars5/5
Related to Instant XenMobile MDM
Related ebooks
Instant Microsoft Forefront UAG Mobile Configuration Starter Rating: 5 out of 5 stars5/5Mastering Kali Linux for Web Penetration Testing Rating: 4 out of 5 stars4/5Applied Network Security Rating: 0 out of 5 stars0 ratingsLearning iOS Security Rating: 0 out of 5 stars0 ratingsPenetration Testing with BackBox Rating: 0 out of 5 stars0 ratingsPhoneGap for Enterprise Rating: 0 out of 5 stars0 ratingsWildFly: New Features Rating: 0 out of 5 stars0 ratingsMetasploit Bootcamp Rating: 5 out of 5 stars5/5Getting Started with Flurry Analytics Rating: 0 out of 5 stars0 ratingsImplementing AppFog Rating: 0 out of 5 stars0 ratingsBackTrack: Testing Wireless Network Security Rating: 0 out of 5 stars0 ratingsRubyMotion iOS Develoment Essentials Rating: 0 out of 5 stars0 ratingsLearning zANTI2 for Android Pentesting Rating: 0 out of 5 stars0 ratingsThe TYPO3 Guidebook: Understand and Use TYPO3 CMS Rating: 0 out of 5 stars0 ratingsMastering Kali Linux for Advanced Penetration Testing - Second Edition Rating: 0 out of 5 stars0 ratingsMicrosoft System Center 2012 Endpoint Protection Cookbook Rating: 0 out of 5 stars0 ratingsCuckoo Malware Analysis Rating: 0 out of 5 stars0 ratingsBurp Suite Essentials Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5MDM: Fundamentals, Security, and the Modern Desktop: Using Intune, Autopilot, and Azure to Manage, Deploy, and Secure Windows 10 Rating: 0 out of 5 stars0 ratingsMastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks Rating: 0 out of 5 stars0 ratingsInstant .NET 4.5 Extension Methods How-to Rating: 0 out of 5 stars0 ratingsBuilding Web Applications with Flask Rating: 0 out of 5 stars0 ratingsProtect Your Personal Information Rating: 0 out of 5 stars0 ratingsProfessional Cocoa Application Security Rating: 0 out of 5 stars0 ratingsFlutter for Jobseekers: Learn Flutter and take your cross-platform app development skills to the next level (English Edition) Rating: 0 out of 5 stars0 ratingsMastering Xamarin.Forms Rating: 3 out of 5 stars3/5Instant Silverlight 5 Animation Rating: 0 out of 5 stars0 ratingsBuild Gamified Websites with PHP and jQuery Rating: 0 out of 5 stars0 ratingsInstant Apache ActiveMQ Messaging Application Development How-to Rating: 0 out of 5 stars0 ratings
Information Technology For You
Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5How to Write Effective Emails at Work Rating: 4 out of 5 stars4/5Personal Knowledge Graphs: Connected thinking to boost productivity, creativity and discovery Rating: 0 out of 5 stars0 ratingsUnity Game Development Essentials Rating: 5 out of 5 stars5/5Inkscape Beginner’s Guide Rating: 5 out of 5 stars5/5Health Informatics: Practical Guide Rating: 0 out of 5 stars0 ratingsData Analytics for Beginners: Introduction to Data Analytics Rating: 4 out of 5 stars4/5Computer Science: A Concise Introduction Rating: 4 out of 5 stars4/5How To Use Chatgpt: Using Chatgpt To Make Money Online Has Never Been This Simple Rating: 0 out of 5 stars0 ratingsCybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsData Governance For Dummies Rating: 0 out of 5 stars0 ratingsChatGPT: The Future of Intelligent Conversation Rating: 4 out of 5 stars4/5An Ultimate Guide to Kali Linux for Beginners Rating: 3 out of 5 stars3/5Learning Website Development with Django Rating: 0 out of 5 stars0 ratingsThe Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy Rating: 4 out of 5 stars4/5Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry Rating: 4 out of 5 stars4/5Investigating Child Exploitation and Pornography: The Internet, Law and Forensic Science Rating: 5 out of 5 stars5/5Hacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5Linux Command Line and Shell Scripting Bible Rating: 3 out of 5 stars3/5Supercommunicator: Explaining the Complicated So Anyone Can Understand Rating: 3 out of 5 stars3/5The iPadOS 17: The Complete User Manual to Quick Set Up and Mastering the iPadOS 17 with New Features, Pictures, Tips, and Tricks Rating: 0 out of 5 stars0 ratingsHandbook of Digital Forensics and Investigation Rating: 4 out of 5 stars4/5An Executive Guide to Identity Access Management - 2nd Edition Rating: 4 out of 5 stars4/5Summary of Super-Intelligence From Nick Bostrom Rating: 5 out of 5 stars5/5A Civic Technologist's Practice Guide Rating: 0 out of 5 stars0 ratingsCompTIA Network+ CertMike: Prepare. Practice. Pass the Test! Get Certified!: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCyber Security Consultants Playbook Rating: 0 out of 5 stars0 ratings
Reviews for Instant XenMobile MDM
0 ratings0 reviews
Book preview
Instant XenMobile MDM - Aamir Lakhani
Table of Contents
Instant XenMobile MDM
Credits
About the Author
About the Reviewers
www.packtpub.com
Support files, eBooks, discount offers and more
packtlib.packtpub.com
Why Subscribe?
Free Access for Packt account holders
1. Instant XenMobile
So, what is XenMobile?
Installation
Step 1 – what do I need?
Step 2 – obtaining XenMobile software
Step 3 – Java requirements
Step 4 – installing XenMobile
Step 5 – rebooting your server
And that's it
Quick start – setting up your XenMobile server
Step 1 – setting up XenMobile for the first time
Step 2 – setting up server options
Step 3 – blocking jailbroken and rooted devices
Step 4 – setting up role-based access
Step 5 – e-mail configurations
Step 6 – enrolling a mobile device
Step 7 – configuring a passcode policy
Step 8 – restriction-based policies
Step 9 – Android Samsung SAFE restrictions
Step 10 – deploying and activating a policy
Top 6 features you need to know about
Reporting
Application stores
Secure Mail Gateway
The XenMobile service manager
Dashboard management
Common management tasks
People and places you should get to know
Official sites
Articles and tutorials
Community
Blogs
Instant XenMobile MDM
Instant XenMobile MDM
Copyright © 2013 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.
First published: September 2013
Production Reference: 1230913
Published by Packt Publishing Ltd.
Livery Place
35 Livery Street
Birmingham B3 2PB, UK.
ISBN 978-1-84969-626-5
www.packtpub.com
Credits
Author
Aamir Lakhani
Reviewers
Joseph Muniz
Eran Kinsbruner
Acquisition Editor
Anthony Albuquerque
Commissioning Editor
Amit Ghodake
Technical Editor
Krishnaveni Haridas
Project Coordinator
Romal Karani
Proofreader
Linda Morris
Production Coordinator
Nilesh R. Mohite
Cover Work
Nilesh R. Mohite
Cover Image
Aditi Gajjar
About the Author
Aamir Lakhani is a leading cyber security and cyber counter intelligence architect for World