Just received an email “Symantec Security Cloud News Article – Upgrade News”

I need a solution

In this email it states:

Impact

All Windows devices that are currently enrolled in SEP Cloud will automatically be updated in the background, using LiveUpdate. This update does not affect the security of your devices.

Action Required

Windows device restart
All users with Windows devices will be prompted to restart their devices after the update.

——————–

We cannot have client machines restarting themseles unless scheduled off hours, prompting would be bad too Can the restart be scheduled from the portal or the prompts, supressed? Since none of our new portal settingsconfig have worked on any clients since this large switch to endpoint protection cloud we cannot see if this is even an option.

Can others see if there is an option to schedule these restarts in the portal for issues like above? Perhaps we will be moving away from SEP. The transition between these 2 versions has been poor to say the least.

0

Related:

  • No Related Posts

SEP Mobile – provide options to disable “remove inactive devices” policy

I need a solution

Background:

My company have about 400 mobile devices & users registered in the SEP Mobile console. The SEP mobile agent and console works normally during our operation period from FEB to MAY this year. After our operation, we power-off all devices and stored them in the warehouse.

Problem:

All our devices and users records were removed by the system silently when we visited the SEP Mobile console again on July. 

We don’t know there is a policy to remove devices (including users) after the devices were inactive for 30 days.

Impact:

All devices and user were gone. We have to add back the user list and re-register all devices one by one again. 

Obviously, we will hit the policy again since our mobile devices will only active for 3 operatoin months every year. So, we need to re-do all the steps. 

Suggestion:

Provide a choice for customer to disable or configure the inactive device handling policy in [SEP Mobile Console >> Settings] . 

Some options like:

1. disable or enable the policy

2. set up the number of inactive days/months to determine the device is inactive

3. choose either removing the inactive devices directly or let the administrator to accept or decline the removal request by system via a confirmation email.

4. Allow to keep / not keep users when removing inactive devices

0

Related:

  • No Related Posts

FAQ : Enterprise Application Silent Installation

Question: Is it possible to upgrade Enterprise apps by using ‘silent installation’ on mobile devices?

Answer: The ‘silent installation’ of apps means that the user of the device does not receive any prompts to update or install the app. Instead, the app updates or installs itself automatically in the background. The default behaviour of mobile operating systems (iOS and Android) is to prompt the user of the device when an app install or upgrade is requested (in other words, the default behaviour is for the app installation to not be silent).

If the app installation prompt is to be hidden, then the use of ‘Supervised’ mode on iOS should be used. For Android devices, silent installation of apps is possible with Android Enterprise (when using an ‘Android Work’ profile) and also on Samsung KNOX (when using the KNOX app container).

Related:

  • No Related Posts

Removal of the Device Admin API for Android Devices

Vikram Derebail

In December 2017, Google announced that it will deprecate the Device Admin API in the next Android release (Android P), scheduled for 2018 and subsequently, it will be completely removed from the Android 2019 release (Android Q onwards). With the introduction of Android Enterprise features (work-managed device and work profile modes of management) since Android …

+read more

The post Removal of the Device Admin API for Android Devices appeared first on Cool Solutions. Vikram Derebail

Related:

  • No Related Posts

Certificate based Authentication.

I need a solution

Hi Team,

We are looking to implement certificate based authentication for our IOS devices. I could see the below KB which is related to this requirement but it for 6.2.X

https://support.symantec.com/en_US/article.TECH243…

Can we get latest one and new procedure and best practice for this requirement.

Customer depl: Explict deployment

Proxy version: 6.6.X.X

Thanks,

Ram.

0

Related:

  • No Related Posts

SD Times news digest: Hyperledger bug bounty program, Google Play Protect’s Safe Browsing …

The open-source collaborative effort dedicated to advancing blockchain technology has announced that a new bug bounty program is now open. The program is based off of a private bug bounty the organization has been running for the last six months with HackerOne. HackerOne will continue to lead the public bounty.

Currently, the bounty will solely be focused on Hyperledger Fabric, but the team has plans to add Sawtooth and other projects in the future.

“Security is always an ongoing process of improvement. Thanks to the commitment and professionalism and general good cheer of the Hyperledger community, we have made great strides in the last year. Now with our public bug bounty, we hope to further make good on the open source promise and to deserve the trust our users have in us,” Dave Huseby, Hyperledger Security Maven, wrote in a post.

Facebook reveals GDPR efforts

Coming off the heels of the Cambridge Analytica fallout, Facebook is introducing new privacy experiences for its users. The company says this is part of its effort to comply with the upcoming EU’s General Data Protection Regulation that goes into effect next month.

As part of its new experiences, Facebook will ask users about ads based on data from partners, information in their profile, and face recognition technology. The company will also ask people to agree to its updated terms of service and data policy as well as introduce new tools to access, delete and download information.

“We’re not asking for new rights to collect, use or share your data on Facebook, and we continue to commit that we do not sell information about you to advertisers or other partners. While the substance of our data policy is the same globally, people in the EU will see specific details relevant only to people who live there, like how to contact our Data Protection Officer under GDPR. We want to be clear that there is nothing different about the controls and protections we offer around the world,” the team wrote.

Safe Browsing comes to Android WebView

In an effort to protect users from phishing, malware attacks and other threats, Google has announced Google Play Protect is bringing Safe Browsing to WebView by default. This will go into effect this month with the release of WebView 66.

“Developers of Android apps using WebView no longer have to make any changes to benefit from this protection. Safe Browsing in WebView has been available since Android 8.0 (API level 26), using the same underlying technology as Chrome on Android. When Safe Browsing is triggered, the app will present a warning and receive a network error. Apps built for API level 27 and above can customize this behavior with new APIs for Safe Browsing,” Nate Fischer, software engineer for Google, wrote in a post.

Blazor 0.2.0 released

Microsoft’s experimental web UI framework Blazor is getting a number of new improvements and features in its latest release. Blazor 0.2.0 features the ability to build reusable component libraries, improved syntax for event handling and data binding, the ability to build on save in Visual Studio, conditional attributes and HttpClient improvements.

Since the company launched Blazor a few weeks ago, it says developers have started to use the tool to build real world web apps, integrate it with Raspberry Pi, and perform debugging services.

More information is available here.

Related:

  • No Related Posts

Android and iOS communication Flow with Xenmobile

App Enumeration for Android/iOS Devices

The App Enumeration process for both iOS and Android remains same.User-added image

1. Open Secure Hub , request from device to NS

2. NS authenticates and connects to MAM (XMS)

3. XMS enumerates list of applications sends the response to NSG

4. From NSG it goes to Secure Hub and Appstore shows the list of applications

App Flow for Android DevicesUser-added image

1. One the Applications are enumerated ,You click on +/add a particular application request it sent from device to NetScaler Gateway

2. NSG forwards request to XMS

3. For android the app is sent to NetScaler Gateway

4. from where it is forwarded to the device

App Flow for iOS DevicesUser-added image

1. Once the app is enumerated and You click on +/add a particular application request it sent from device to NSG

2. NetScaler Gateway forwards request to XMS

3. For ios it goes to APNS server with instructions of app install prompt

4. APNS server send the app install prompt to device

5. device again contacts NetScaler Gateway for app

6. this request it sent to XMS(MAM)

7. XMS forwards the application to NetScaler

8. and finally from NetScaler to the Device

Related:

  • No Related Posts