0
Advanced Administration: BYOD
Jonathan Foulkes
VP of Mobile Product Management
Copyright ©2014 Kaseya 1
The information in this presentation is confidential and proprietary to Kaseya and may
not be disclosed or distributed wit...
BYOD Recap
 Add-on enabling secure mobile access to
enterprise resources
 Secure containers
 On-prem Gateway & Cloud Se...
BYOD Elements
Copyright ©2014 Kaseya 4
Setting up data sources
 Define the sources users may
reach
– For web-based systems
– For document sources
– For mail
 S...
Site Menu
Copyright ©2014 Kaseya 6
Tunneled Site Setup
Copyright ©2014 Kaseya 7
Segmenting with AD groups
Copyright ©2014 Kaseya 8
Mobile View
Copyright ©2014 Kaseya 9
Browser-related Tips
 Want to let them type their own URL?
– Add a page that shows a text field
– Redirect page to that U...
Working With The Proxy List
 Proxy list – white list of targets the Gateway
will route mobile requests to
– Enforced at b...
Document Sources
 What sources?
– Most WebDAV-capable systems
• IIS, SharePoint
• Network Attached Storage systems
• Clou...
Doc Source list
Copyright ©2014 Kaseya 13
Mobile View
Copyright ©2014 Kaseya 14
Defining A Doc Source
Copyright ©2014 Kaseya 15
Permissions
Copyright ©2014 Kaseya 16
Docs-related Tips
 Leverage IIS as WebDAV server to publish
shared folders
– Test access and config via Explorer
 KISS -...
Direct vs. Relay
 What is ‘Direct’ for?
– Typical DMZ-style deployment
– Bypass the relay
 How:
– Network tab - check di...
Logs Are Your Friend
 Four primary logs
– Gateway – start, stop, auth, comms
– Panel– Local UI, not really interesting
– ...
Log Content
 Standard Apache log format
– Consume in your favorite log-munger
 Determine who is accessing what
– Or if t...
Log Levels
 Set in byodgateway.ini
– Only use Debug on test systems with limited
access – very verbose
# Logging level fo...
Summary
 Connect the right users to the right sources
 Integrate with AD for security and simplicity
 Leverage logs for...
Copyright ©2014 Kaseya 23
Questions and Answers
Thanks for Attending Kaseya Connect
#KaseyaConnect
Let's Share!
Upcoming SlideShare
Loading in...5
×

Advanced Administration: Kaseya BYOD Suite

228

Published on

It is a fact of life for companies large and small today – employees are using their personal devices to access corporate resources. Addressing BYOD enterprise mobile access is no longer a nice to have, it is an imperative. This session will cover the advanced capabilities available in the Kaseya BYOD suite, including support for multiple document data sources, partitioning access based on AD group membership and other advanced administration topics. With a focus on addressing real-world needs, you will learn how to extract the maximum value from this innovative solution.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
228
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
10
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Advanced Administration: Kaseya BYOD Suite"

  1. 1. Advanced Administration: BYOD Jonathan Foulkes VP of Mobile Product Management Copyright ©2014 Kaseya 1
  2. 2. The information in this presentation is confidential and proprietary to Kaseya and may not be disclosed or distributed without the prior written permission of Kaseya. This document, and any related presentation, as well as Kaseya's strategy, possible future developments, products, platforms, directions and/or functionality are all subject to change without notice at Kaseya’s sole discretion. The information in this document does not constitute a commitment, contract, promise or legal obligation to deliver any material, code or functionality. This document is provided without warranty of any kind, either express or implied, including but not limited to, the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. This document is for informational purposes only and may not be incorporated into a contract. All forward-looking statements, including those set forth in this presentation, are subject to various assumptions, risks and uncertainties that could cause actual results to differ materially from projections. Readers are cautioned not to place undue reliance on such forward-looking statements, and specifically, not to rely upon such in making purchasing decisions. Copyright ©2014 Kaseya 2
  3. 3. BYOD Recap  Add-on enabling secure mobile access to enterprise resources  Secure containers  On-prem Gateway & Cloud Services Copyright ©2014 Kaseya 3 Browser Docs Mail
  4. 4. BYOD Elements Copyright ©2014 Kaseya 4
  5. 5. Setting up data sources  Define the sources users may reach – For web-based systems – For document sources – For mail  Segment based on AD groups Copyright ©2014 Kaseya 5
  6. 6. Site Menu Copyright ©2014 Kaseya 6
  7. 7. Tunneled Site Setup Copyright ©2014 Kaseya 7
  8. 8. Segmenting with AD groups Copyright ©2014 Kaseya 8
  9. 9. Mobile View Copyright ©2014 Kaseya 9
  10. 10. Browser-related Tips  Want to let them type their own URL? – Add a page that shows a text field – Redirect page to that URL on submit  Leverage single-sign-on – Set target sites to use NTLM auth as an option – Reduce creds exposure, as not typed on mobile Copyright ©2014 Kaseya 10
  11. 11. Working With The Proxy List  Proxy list – white list of targets the Gateway will route mobile requests to – Enforced at both mobile and Gateway  Auto-built via Site tab, but admin can edit – Why? • Site A (in proxy list) links site B (not there) – Fail • Use wildcards (CIDR) – Route locked-down public addresses Copyright ©2014 Kaseya 11
  12. 12. Document Sources  What sources? – Most WebDAV-capable systems • IIS, SharePoint • Network Attached Storage systems • Cloud CMS  Ideally, NTLM auth set – Single-sign-on Copyright ©2014 Kaseya 12
  13. 13. Doc Source list Copyright ©2014 Kaseya 13
  14. 14. Mobile View Copyright ©2014 Kaseya 14
  15. 15. Defining A Doc Source Copyright ©2014 Kaseya 15
  16. 16. Permissions Copyright ©2014 Kaseya 16
  17. 17. Docs-related Tips  Leverage IIS as WebDAV server to publish shared folders – Test access and config via Explorer  KISS - Let the server do trimming  Leverage single-sign-on – Set target servers to use NTLM auth as an option – Reduce creds exposure, as not typed on mobile Copyright ©2014 Kaseya 17
  18. 18. Direct vs. Relay  What is ‘Direct’ for? – Typical DMZ-style deployment – Bypass the relay  How: – Network tab - check direct – Set external name and port – Turn OFF relay Copyright ©2014 Kaseya 18
  19. 19. Logs Are Your Friend  Four primary logs – Gateway – start, stop, auth, comms – Panel– Local UI, not really interesting – Portal – Siteinfo, policy, locally served content – Proxy – proxied requests Copyright ©2014 Kaseya 19
  20. 20. Log Content  Standard Apache log format – Consume in your favorite log-munger  Determine who is accessing what – Or if they are getting errors, rejections (auth?)  Gateway log is a pretty good network line monitor ;-) Copyright ©2014 Kaseya 20
  21. 21. Log Levels  Set in byodgateway.ini – Only use Debug on test systems with limited access – very verbose # Logging level for gateway error log - CRITICAL/ERROR/WARNING/INFO/DEBUG service_loglevel = INFO Copyright ©2014 Kaseya 21
  22. 22. Summary  Connect the right users to the right sources  Integrate with AD for security and simplicity  Leverage logs for insight and troubleshooting Copyright ©2014 Kaseya 22
  23. 23. Copyright ©2014 Kaseya 23 Questions and Answers Thanks for Attending Kaseya Connect #KaseyaConnect Let's Share!
  1. Gostou de algum slide específico?

    Recortar slides é uma maneira fácil de colecionar informações para acessar mais tarde.

×