SlideShare uma empresa Scribd logo
1 de 23
Baixar para ler offline
Advanced Administration: BYOD
Jonathan Foulkes
VP of Mobile Product Management
Copyright ©2014 Kaseya 1
The information in this presentation is confidential and proprietary to Kaseya and may
not be disclosed or distributed without the prior written permission of Kaseya. This
document, and any related presentation, as well as Kaseya's strategy, possible future
developments, products, platforms, directions and/or functionality are all subject to
change without notice at Kaseya’s sole discretion. The information in this document
does not constitute a commitment, contract, promise or legal obligation to deliver any
material, code or functionality. This document is provided without warranty of any
kind, either express or implied, including but not limited to, the implied warranties of
merchantability, fitness for a particular purpose, and non-infringement. This document
is for informational purposes only and may not be incorporated into a contract.
All forward-looking statements, including those set forth in this presentation, are
subject to various assumptions, risks and uncertainties that could cause actual results
to differ materially from projections. Readers are cautioned not to place undue
reliance on such forward-looking statements, and specifically, not to rely upon such in
making purchasing decisions.
Copyright ©2014 Kaseya 2
BYOD Recap
 Add-on enabling secure mobile access to
enterprise resources
 Secure containers
 On-prem Gateway & Cloud Services
Copyright ©2014 Kaseya 3
Browser Docs Mail
BYOD Elements
Copyright ©2014 Kaseya 4
Setting up data sources
 Define the sources users may
reach
– For web-based systems
– For document sources
– For mail
 Segment based on AD groups
Copyright ©2014 Kaseya 5
Site Menu
Copyright ©2014 Kaseya 6
Tunneled Site Setup
Copyright ©2014 Kaseya 7
Segmenting with AD groups
Copyright ©2014 Kaseya 8
Mobile View
Copyright ©2014 Kaseya 9
Browser-related Tips
 Want to let them type their own URL?
– Add a page that shows a text field
– Redirect page to that URL on submit
 Leverage single-sign-on
– Set target sites to use NTLM auth as an option
– Reduce creds exposure, as not typed on mobile
Copyright ©2014 Kaseya 10
Working With The Proxy List
 Proxy list – white list of targets the Gateway
will route mobile requests to
– Enforced at both mobile and Gateway
 Auto-built via Site tab, but admin can edit
– Why?
• Site A (in proxy list) links site B (not there) – Fail
• Use wildcards (CIDR)
– Route locked-down public addresses
Copyright ©2014 Kaseya 11
Document Sources
 What sources?
– Most WebDAV-capable systems
• IIS, SharePoint
• Network Attached Storage systems
• Cloud CMS
 Ideally, NTLM auth set
– Single-sign-on
Copyright ©2014 Kaseya 12
Doc Source list
Copyright ©2014 Kaseya 13
Mobile View
Copyright ©2014 Kaseya 14
Defining A Doc Source
Copyright ©2014 Kaseya 15
Permissions
Copyright ©2014 Kaseya 16
Docs-related Tips
 Leverage IIS as WebDAV server to publish
shared folders
– Test access and config via Explorer
 KISS - Let the server do trimming
 Leverage single-sign-on
– Set target servers to use NTLM auth as an option
– Reduce creds exposure, as not typed on mobile
Copyright ©2014 Kaseya 17
Direct vs. Relay
 What is ‘Direct’ for?
– Typical DMZ-style deployment
– Bypass the relay
 How:
– Network tab - check direct
– Set external name and port
– Turn OFF relay
Copyright ©2014 Kaseya 18
Logs Are Your Friend
 Four primary logs
– Gateway – start, stop, auth, comms
– Panel– Local UI, not really interesting
– Portal – Siteinfo, policy, locally served content
– Proxy – proxied requests
Copyright ©2014 Kaseya 19
Log Content
 Standard Apache log format
– Consume in your favorite log-munger
 Determine who is accessing what
– Or if they are getting errors, rejections (auth?)
 Gateway log is a pretty good network line
monitor ;-)
Copyright ©2014 Kaseya 20
Log Levels
 Set in byodgateway.ini
– Only use Debug on test systems with limited
access – very verbose
# Logging level for gateway error log -
CRITICAL/ERROR/WARNING/INFO/DEBUG
service_loglevel = INFO
Copyright ©2014 Kaseya 21
Summary
 Connect the right users to the right sources
 Integrate with AD for security and simplicity
 Leverage logs for insight and troubleshooting
Copyright ©2014 Kaseya 22
Copyright ©2014 Kaseya 23
Questions and Answers
Thanks for Attending Kaseya Connect
#KaseyaConnect
Let's Share!

Mais conteúdo relacionado

Mais procurados

Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementKaseya
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationKaseya
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365Kaseya
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Kaseya
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Kaseya
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya
 
Protecting APIs from Mobile Threats- Beyond Oauth
Protecting APIs from Mobile Threats- Beyond OauthProtecting APIs from Mobile Threats- Beyond Oauth
Protecting APIs from Mobile Threats- Beyond OauthApigee | Google Cloud
 
DevOps & Apps - Building and Operating Successful Mobile Apps
DevOps & Apps - Building and Operating Successful Mobile AppsDevOps & Apps - Building and Operating Successful Mobile Apps
DevOps & Apps - Building and Operating Successful Mobile AppsApigee | Google Cloud
 
Securing the Elastic Stack for free
Securing the Elastic Stack for freeSecuring the Elastic Stack for free
Securing the Elastic Stack for freeElasticsearch
 
Get involved with the security community at Elastic
Get involved with the security community at ElasticGet involved with the security community at Elastic
Get involved with the security community at ElasticElasticsearch
 
Gluu server for educational institutions
Gluu server for educational institutionsGluu server for educational institutions
Gluu server for educational institutionsGluu
 
Faster business decisions and collaboration with Elastic Workplace Search
Faster business decisions and collaboration with Elastic Workplace SearchFaster business decisions and collaboration with Elastic Workplace Search
Faster business decisions and collaboration with Elastic Workplace SearchElasticsearch
 
eFolder Expert Series Webinar — Cinco Ways to Optimize File Sync for Security...
eFolder Expert Series Webinar — Cinco Ways to Optimize File Sync for Security...eFolder Expert Series Webinar — Cinco Ways to Optimize File Sync for Security...
eFolder Expert Series Webinar — Cinco Ways to Optimize File Sync for Security...eFolder
 
MuleSoft Meetup Dubai Anypoint security with api-led Connectivity
MuleSoft Meetup Dubai  Anypoint security with api-led ConnectivityMuleSoft Meetup Dubai  Anypoint security with api-led Connectivity
MuleSoft Meetup Dubai Anypoint security with api-led Connectivitysatyasekhar123
 
Managing the Elastic Stack at Scale
Managing the Elastic Stack at ScaleManaging the Elastic Stack at Scale
Managing the Elastic Stack at ScaleElasticsearch
 
Elastic Security under the hood
Elastic Security under the hoodElastic Security under the hood
Elastic Security under the hoodElasticsearch
 
SIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for freeSIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for freeElasticsearch
 
Elastic Security: Unified protection for everyone
Elastic Security: Unified protection for everyoneElastic Security: Unified protection for everyone
Elastic Security: Unified protection for everyoneElasticsearch
 

Mais procurados (20)

Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device Management
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite Overview
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner Landscape
 
Protecting APIs from Mobile Threats- Beyond Oauth
Protecting APIs from Mobile Threats- Beyond OauthProtecting APIs from Mobile Threats- Beyond Oauth
Protecting APIs from Mobile Threats- Beyond Oauth
 
DevOps & Apps - Building and Operating Successful Mobile Apps
DevOps & Apps - Building and Operating Successful Mobile AppsDevOps & Apps - Building and Operating Successful Mobile Apps
DevOps & Apps - Building and Operating Successful Mobile Apps
 
Securing the Elastic Stack for free
Securing the Elastic Stack for freeSecuring the Elastic Stack for free
Securing the Elastic Stack for free
 
Get involved with the security community at Elastic
Get involved with the security community at ElasticGet involved with the security community at Elastic
Get involved with the security community at Elastic
 
Gluu server for educational institutions
Gluu server for educational institutionsGluu server for educational institutions
Gluu server for educational institutions
 
Faster business decisions and collaboration with Elastic Workplace Search
Faster business decisions and collaboration with Elastic Workplace SearchFaster business decisions and collaboration with Elastic Workplace Search
Faster business decisions and collaboration with Elastic Workplace Search
 
eFolder Expert Series Webinar — Cinco Ways to Optimize File Sync for Security...
eFolder Expert Series Webinar — Cinco Ways to Optimize File Sync for Security...eFolder Expert Series Webinar — Cinco Ways to Optimize File Sync for Security...
eFolder Expert Series Webinar — Cinco Ways to Optimize File Sync for Security...
 
MuleSoft Meetup Dubai Anypoint security with api-led Connectivity
MuleSoft Meetup Dubai  Anypoint security with api-led ConnectivityMuleSoft Meetup Dubai  Anypoint security with api-led Connectivity
MuleSoft Meetup Dubai Anypoint security with api-led Connectivity
 
Managing the Elastic Stack at Scale
Managing the Elastic Stack at ScaleManaging the Elastic Stack at Scale
Managing the Elastic Stack at Scale
 
Elastic Security under the hood
Elastic Security under the hoodElastic Security under the hood
Elastic Security under the hood
 
SIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for freeSIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for free
 
Elastic Security: Unified protection for everyone
Elastic Security: Unified protection for everyoneElastic Security: Unified protection for everyone
Elastic Security: Unified protection for everyone
 
6 Reasons to Extend Guidewire
6 Reasons to Extend Guidewire 6 Reasons to Extend Guidewire
6 Reasons to Extend Guidewire
 

Semelhante a Advanced Administration: Kaseya BYOD Suite

Develop Deploy Scale
Develop Deploy ScaleDevelop Deploy Scale
Develop Deploy ScaleSeema Jethani
 
Cloud native Microservices using Spring Boot
Cloud native Microservices using Spring BootCloud native Microservices using Spring Boot
Cloud native Microservices using Spring BootSufyaan Kazi
 
What's New with Anypoint Platform? Unified Platform Management
What's New with Anypoint Platform? Unified Platform ManagementWhat's New with Anypoint Platform? Unified Platform Management
What's New with Anypoint Platform? Unified Platform ManagementMuleSoft
 
CIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to KnowCIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to KnowCloudIDSummit
 
PingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowPingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowCloudIDSummit
 
Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...Melanie Brandt
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceCA API Management
 
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesCASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesNowSecure
 
Wi-Fi Analytics Deployment at Multiple Locations - A CIO's Checklist
Wi-Fi Analytics Deployment at Multiple Locations - A CIO's ChecklistWi-Fi Analytics Deployment at Multiple Locations - A CIO's Checklist
Wi-Fi Analytics Deployment at Multiple Locations - A CIO's ChecklistJuly Systems
 
Progress Rollbase Powerpoint Presentation - Take Control of your Salesforce a...
Progress Rollbase Powerpoint Presentation - Take Control of your Salesforce a...Progress Rollbase Powerpoint Presentation - Take Control of your Salesforce a...
Progress Rollbase Powerpoint Presentation - Take Control of your Salesforce a...Ideba
 
SaaSfocus_Profile_s
SaaSfocus_Profile_sSaaSfocus_Profile_s
SaaSfocus_Profile_sShawn Murray
 
10 questions to ask your cloud provider
10 questions to ask your cloud provider10 questions to ask your cloud provider
10 questions to ask your cloud providerHighQ
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM Patrick Harding
 
Big Data Fundamentals 6.6.18
Big Data Fundamentals 6.6.18Big Data Fundamentals 6.6.18
Big Data Fundamentals 6.6.18Cloudera, Inc.
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationDelivery Centric
 
From Data To Insights
From Data To InsightsFrom Data To Insights
From Data To InsightsAbhishek Kant
 

Semelhante a Advanced Administration: Kaseya BYOD Suite (20)

Develop Deploy Scale
Develop Deploy ScaleDevelop Deploy Scale
Develop Deploy Scale
 
Cloud native Microservices using Spring Boot
Cloud native Microservices using Spring BootCloud native Microservices using Spring Boot
Cloud native Microservices using Spring Boot
 
What's New with Anypoint Platform? Unified Platform Management
What's New with Anypoint Platform? Unified Platform ManagementWhat's New with Anypoint Platform? Unified Platform Management
What's New with Anypoint Platform? Unified Platform Management
 
CIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to KnowCIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to Know
 
PingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowPingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to Know
 
Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail Experience
 
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesCASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
 
Wi-Fi Analytics Deployment at Multiple Locations - A CIO's Checklist
Wi-Fi Analytics Deployment at Multiple Locations - A CIO's ChecklistWi-Fi Analytics Deployment at Multiple Locations - A CIO's Checklist
Wi-Fi Analytics Deployment at Multiple Locations - A CIO's Checklist
 
Progress Rollbase Powerpoint Presentation - Take Control of your Salesforce a...
Progress Rollbase Powerpoint Presentation - Take Control of your Salesforce a...Progress Rollbase Powerpoint Presentation - Take Control of your Salesforce a...
Progress Rollbase Powerpoint Presentation - Take Control of your Salesforce a...
 
SaaSfocus_Profile_s
SaaSfocus_Profile_sSaaSfocus_Profile_s
SaaSfocus_Profile_s
 
Defining Advanced AAA Policies for Access Networks
Defining Advanced AAA Policies for Access NetworksDefining Advanced AAA Policies for Access Networks
Defining Advanced AAA Policies for Access Networks
 
10 questions to ask your cloud provider
10 questions to ask your cloud provider10 questions to ask your cloud provider
10 questions to ask your cloud provider
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM
 
Big Data Fundamentals 6.6.18
Big Data Fundamentals 6.6.18Big Data Fundamentals 6.6.18
Big Data Fundamentals 6.6.18
 
Big Data Fundamentals
Big Data FundamentalsBig Data Fundamentals
Big Data Fundamentals
 
Self-Registration, Policy & Branding for Guest Access #AirheadsConf Italy
Self-Registration, Policy & Branding for Guest Access #AirheadsConf ItalySelf-Registration, Policy & Branding for Guest Access #AirheadsConf Italy
Self-Registration, Policy & Branding for Guest Access #AirheadsConf Italy
 
Advanced Access Management with Aruba ClearPass #AirheadsConf Italy
Advanced Access Management with Aruba ClearPass #AirheadsConf ItalyAdvanced Access Management with Aruba ClearPass #AirheadsConf Italy
Advanced Access Management with Aruba ClearPass #AirheadsConf Italy
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer Presentation
 
From Data To Insights
From Data To InsightsFrom Data To Insights
From Data To Insights
 

Mais de Kaseya

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Kaseya
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...Kaseya
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorKaseya
 
Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014Kaseya
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management Kaseya
 
Kaseya BYOD Suite
Kaseya BYOD SuiteKaseya BYOD Suite
Kaseya BYOD SuiteKaseya
 
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...Kaseya
 
Making Money in the Cloud Part II…Is Your MSP Team Ready?
Making Money in the Cloud   Part II…Is Your MSP Team Ready?Making Money in the Cloud   Part II…Is Your MSP Team Ready?
Making Money in the Cloud Part II…Is Your MSP Team Ready?Kaseya
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD PolicyKaseya
 
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksSystems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksKaseya
 
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...Kaseya
 
Kaseya Connect 2013: Optimizing Your K Server - Best Practices in Kaseya Infr...
Kaseya Connect 2013: Optimizing Your K Server - Best Practices in Kaseya Infr...Kaseya Connect 2013: Optimizing Your K Server - Best Practices in Kaseya Infr...
Kaseya Connect 2013: Optimizing Your K Server - Best Practices in Kaseya Infr...Kaseya
 
Kaseya Connect 2013: Scaling Services for Profitability
Kaseya Connect 2013: Scaling Services for Profitability Kaseya Connect 2013: Scaling Services for Profitability
Kaseya Connect 2013: Scaling Services for Profitability Kaseya
 
Kaseya Connect 2013: Tried and True: Making Your Kaseya Investment Pay Off
Kaseya Connect 2013: Tried and True: Making Your Kaseya Investment Pay OffKaseya Connect 2013: Tried and True: Making Your Kaseya Investment Pay Off
Kaseya Connect 2013: Tried and True: Making Your Kaseya Investment Pay OffKaseya
 

Mais de Kaseya (15)

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual Administrator
 
Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
 
Kaseya BYOD Suite
Kaseya BYOD SuiteKaseya BYOD Suite
Kaseya BYOD Suite
 
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
 
Making Money in the Cloud Part II…Is Your MSP Team Ready?
Making Money in the Cloud   Part II…Is Your MSP Team Ready?Making Money in the Cloud   Part II…Is Your MSP Team Ready?
Making Money in the Cloud Part II…Is Your MSP Team Ready?
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
 
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksSystems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
 
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...
 
Kaseya Connect 2013: Optimizing Your K Server - Best Practices in Kaseya Infr...
Kaseya Connect 2013: Optimizing Your K Server - Best Practices in Kaseya Infr...Kaseya Connect 2013: Optimizing Your K Server - Best Practices in Kaseya Infr...
Kaseya Connect 2013: Optimizing Your K Server - Best Practices in Kaseya Infr...
 
Kaseya Connect 2013: Scaling Services for Profitability
Kaseya Connect 2013: Scaling Services for Profitability Kaseya Connect 2013: Scaling Services for Profitability
Kaseya Connect 2013: Scaling Services for Profitability
 
Kaseya Connect 2013: Tried and True: Making Your Kaseya Investment Pay Off
Kaseya Connect 2013: Tried and True: Making Your Kaseya Investment Pay OffKaseya Connect 2013: Tried and True: Making Your Kaseya Investment Pay Off
Kaseya Connect 2013: Tried and True: Making Your Kaseya Investment Pay Off
 

Último

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Último (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Advanced Administration: Kaseya BYOD Suite

  • 1. Advanced Administration: BYOD Jonathan Foulkes VP of Mobile Product Management Copyright ©2014 Kaseya 1
  • 2. The information in this presentation is confidential and proprietary to Kaseya and may not be disclosed or distributed without the prior written permission of Kaseya. This document, and any related presentation, as well as Kaseya's strategy, possible future developments, products, platforms, directions and/or functionality are all subject to change without notice at Kaseya’s sole discretion. The information in this document does not constitute a commitment, contract, promise or legal obligation to deliver any material, code or functionality. This document is provided without warranty of any kind, either express or implied, including but not limited to, the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. This document is for informational purposes only and may not be incorporated into a contract. All forward-looking statements, including those set forth in this presentation, are subject to various assumptions, risks and uncertainties that could cause actual results to differ materially from projections. Readers are cautioned not to place undue reliance on such forward-looking statements, and specifically, not to rely upon such in making purchasing decisions. Copyright ©2014 Kaseya 2
  • 3. BYOD Recap  Add-on enabling secure mobile access to enterprise resources  Secure containers  On-prem Gateway & Cloud Services Copyright ©2014 Kaseya 3 Browser Docs Mail
  • 5. Setting up data sources  Define the sources users may reach – For web-based systems – For document sources – For mail  Segment based on AD groups Copyright ©2014 Kaseya 5
  • 8. Segmenting with AD groups Copyright ©2014 Kaseya 8
  • 10. Browser-related Tips  Want to let them type their own URL? – Add a page that shows a text field – Redirect page to that URL on submit  Leverage single-sign-on – Set target sites to use NTLM auth as an option – Reduce creds exposure, as not typed on mobile Copyright ©2014 Kaseya 10
  • 11. Working With The Proxy List  Proxy list – white list of targets the Gateway will route mobile requests to – Enforced at both mobile and Gateway  Auto-built via Site tab, but admin can edit – Why? • Site A (in proxy list) links site B (not there) – Fail • Use wildcards (CIDR) – Route locked-down public addresses Copyright ©2014 Kaseya 11
  • 12. Document Sources  What sources? – Most WebDAV-capable systems • IIS, SharePoint • Network Attached Storage systems • Cloud CMS  Ideally, NTLM auth set – Single-sign-on Copyright ©2014 Kaseya 12
  • 13. Doc Source list Copyright ©2014 Kaseya 13
  • 15. Defining A Doc Source Copyright ©2014 Kaseya 15
  • 17. Docs-related Tips  Leverage IIS as WebDAV server to publish shared folders – Test access and config via Explorer  KISS - Let the server do trimming  Leverage single-sign-on – Set target servers to use NTLM auth as an option – Reduce creds exposure, as not typed on mobile Copyright ©2014 Kaseya 17
  • 18. Direct vs. Relay  What is ‘Direct’ for? – Typical DMZ-style deployment – Bypass the relay  How: – Network tab - check direct – Set external name and port – Turn OFF relay Copyright ©2014 Kaseya 18
  • 19. Logs Are Your Friend  Four primary logs – Gateway – start, stop, auth, comms – Panel– Local UI, not really interesting – Portal – Siteinfo, policy, locally served content – Proxy – proxied requests Copyright ©2014 Kaseya 19
  • 20. Log Content  Standard Apache log format – Consume in your favorite log-munger  Determine who is accessing what – Or if they are getting errors, rejections (auth?)  Gateway log is a pretty good network line monitor ;-) Copyright ©2014 Kaseya 20
  • 21. Log Levels  Set in byodgateway.ini – Only use Debug on test systems with limited access – very verbose # Logging level for gateway error log - CRITICAL/ERROR/WARNING/INFO/DEBUG service_loglevel = INFO Copyright ©2014 Kaseya 21
  • 22. Summary  Connect the right users to the right sources  Integrate with AD for security and simplicity  Leverage logs for insight and troubleshooting Copyright ©2014 Kaseya 22
  • 23. Copyright ©2014 Kaseya 23 Questions and Answers Thanks for Attending Kaseya Connect #KaseyaConnect Let's Share!