SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
Advanced Administration: BYOD
Jonathan Foulkes
VP of Mobile Product Management
Copyright ©2014 Kaseya 1
The information in this presentation is confidential and proprietary to Kaseya and may
not be disclosed or distributed without the prior written permission of Kaseya. This
document, and any related presentation, as well as Kaseya's strategy, possible future
developments, products, platforms, directions and/or functionality are all subject to
change without notice at Kaseya’s sole discretion. The information in this document
does not constitute a commitment, contract, promise or legal obligation to deliver any
material, code or functionality. This document is provided without warranty of any
kind, either express or implied, including but not limited to, the implied warranties of
merchantability, fitness for a particular purpose, and non-infringement. This document
is for informational purposes only and may not be incorporated into a contract.
All forward-looking statements, including those set forth in this presentation, are
subject to various assumptions, risks and uncertainties that could cause actual results
to differ materially from projections. Readers are cautioned not to place undue
reliance on such forward-looking statements, and specifically, not to rely upon such in
making purchasing decisions.
Copyright ©2014 Kaseya 2
BYOD Recap
 Add-on enabling secure mobile access to
enterprise resources
 Secure containers
 On-prem Gateway & Cloud Services
Copyright ©2014 Kaseya 3
Browser Docs Mail
BYOD Elements
Copyright ©2014 Kaseya 4
Setting up data sources
 Define the sources users may
reach
– For web-based systems
– For document sources
– For mail
 Segment based on AD groups
Copyright ©2014 Kaseya 5
Site Menu
Copyright ©2014 Kaseya 6
Tunneled Site Setup
Copyright ©2014 Kaseya 7
Segmenting with AD groups
Copyright ©2014 Kaseya 8
Mobile View
Copyright ©2014 Kaseya 9
Browser-related Tips
 Want to let them type their own URL?
– Add a page that shows a text field
– Redirect page to that URL on submit
 Leverage single-sign-on
– Set target sites to use NTLM auth as an option
– Reduce creds exposure, as not typed on mobile
Copyright ©2014 Kaseya 10
Working With The Proxy List
 Proxy list – white list of targets the Gateway
will route mobile requests to
– Enforced at both mobile and Gateway
 Auto-built via Site tab, but admin can edit
– Why?
• Site A (in proxy list) links site B (not there) – Fail
• Use wildcards (CIDR)
– Route locked-down public addresses
Copyright ©2014 Kaseya 11
Document Sources
 What sources?
– Most WebDAV-capable systems
• IIS, SharePoint
• Network Attached Storage systems
• Cloud CMS
 Ideally, NTLM auth set
– Single-sign-on
Copyright ©2014 Kaseya 12
Doc Source list
Copyright ©2014 Kaseya 13
Mobile View
Copyright ©2014 Kaseya 14
Defining A Doc Source
Copyright ©2014 Kaseya 15
Permissions
Copyright ©2014 Kaseya 16
Docs-related Tips
 Leverage IIS as WebDAV server to publish
shared folders
– Test access and config via Explorer
 KISS - Let the server do trimming
 Leverage single-sign-on
– Set target servers to use NTLM auth as an option
– Reduce creds exposure, as not typed on mobile
Copyright ©2014 Kaseya 17
Direct vs. Relay
 What is ‘Direct’ for?
– Typical DMZ-style deployment
– Bypass the relay
 How:
– Network tab - check direct
– Set external name and port
– Turn OFF relay
Copyright ©2014 Kaseya 18
Logs Are Your Friend
 Four primary logs
– Gateway – start, stop, auth, comms
– Panel– Local UI, not really interesting
– Portal – Siteinfo, policy, locally served content
– Proxy – proxied requests
Copyright ©2014 Kaseya 19
Log Content
 Standard Apache log format
– Consume in your favorite log-munger
 Determine who is accessing what
– Or if they are getting errors, rejections (auth?)
 Gateway log is a pretty good network line
monitor ;-)
Copyright ©2014 Kaseya 20
Log Levels
 Set in byodgateway.ini
– Only use Debug on test systems with limited
access – very verbose
# Logging level for gateway error log -
CRITICAL/ERROR/WARNING/INFO/DEBUG
service_loglevel = INFO
Copyright ©2014 Kaseya 21
Summary
 Connect the right users to the right sources
 Integrate with AD for security and simplicity
 Leverage logs for insight and troubleshooting
Copyright ©2014 Kaseya 22
Copyright ©2014 Kaseya 23
Questions and Answers
Thanks for Attending Kaseya Connect
#KaseyaConnect
Let's Share!

Más contenido relacionado

La actualidad más candente

DevOps & Apps - Building and Operating Successful Mobile Apps
DevOps & Apps - Building and Operating Successful Mobile AppsDevOps & Apps - Building and Operating Successful Mobile Apps
DevOps & Apps - Building and Operating Successful Mobile Apps
Apigee | Google Cloud
 
Gluu server for educational institutions
Gluu server for educational institutionsGluu server for educational institutions
Gluu server for educational institutions
Gluu
 

La actualidad más candente (20)

Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device Management
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite Overview
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner Landscape
 
Protecting APIs from Mobile Threats- Beyond Oauth
Protecting APIs from Mobile Threats- Beyond OauthProtecting APIs from Mobile Threats- Beyond Oauth
Protecting APIs from Mobile Threats- Beyond Oauth
 
DevOps & Apps - Building and Operating Successful Mobile Apps
DevOps & Apps - Building and Operating Successful Mobile AppsDevOps & Apps - Building and Operating Successful Mobile Apps
DevOps & Apps - Building and Operating Successful Mobile Apps
 
Securing the Elastic Stack for free
Securing the Elastic Stack for freeSecuring the Elastic Stack for free
Securing the Elastic Stack for free
 
Get involved with the security community at Elastic
Get involved with the security community at ElasticGet involved with the security community at Elastic
Get involved with the security community at Elastic
 
Gluu server for educational institutions
Gluu server for educational institutionsGluu server for educational institutions
Gluu server for educational institutions
 
Faster business decisions and collaboration with Elastic Workplace Search
Faster business decisions and collaboration with Elastic Workplace SearchFaster business decisions and collaboration with Elastic Workplace Search
Faster business decisions and collaboration with Elastic Workplace Search
 
eFolder Expert Series Webinar — Cinco Ways to Optimize File Sync for Security...
eFolder Expert Series Webinar — Cinco Ways to Optimize File Sync for Security...eFolder Expert Series Webinar — Cinco Ways to Optimize File Sync for Security...
eFolder Expert Series Webinar — Cinco Ways to Optimize File Sync for Security...
 
MuleSoft Meetup Dubai Anypoint security with api-led Connectivity
MuleSoft Meetup Dubai  Anypoint security with api-led ConnectivityMuleSoft Meetup Dubai  Anypoint security with api-led Connectivity
MuleSoft Meetup Dubai Anypoint security with api-led Connectivity
 
Managing the Elastic Stack at Scale
Managing the Elastic Stack at ScaleManaging the Elastic Stack at Scale
Managing the Elastic Stack at Scale
 
Elastic Security under the hood
Elastic Security under the hoodElastic Security under the hood
Elastic Security under the hood
 
SIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for freeSIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for free
 
Elastic Security: Unified protection for everyone
Elastic Security: Unified protection for everyoneElastic Security: Unified protection for everyone
Elastic Security: Unified protection for everyone
 
6 Reasons to Extend Guidewire
6 Reasons to Extend Guidewire 6 Reasons to Extend Guidewire
6 Reasons to Extend Guidewire
 

Similar a Advanced Administration: Kaseya BYOD Suite

SaaSfocus_Profile_s
SaaSfocus_Profile_sSaaSfocus_Profile_s
SaaSfocus_Profile_s
Shawn Murray
 

Similar a Advanced Administration: Kaseya BYOD Suite (20)

Develop Deploy Scale
Develop Deploy ScaleDevelop Deploy Scale
Develop Deploy Scale
 
Cloud native Microservices using Spring Boot
Cloud native Microservices using Spring BootCloud native Microservices using Spring Boot
Cloud native Microservices using Spring Boot
 
What's New with Anypoint Platform? Unified Platform Management
What's New with Anypoint Platform? Unified Platform ManagementWhat's New with Anypoint Platform? Unified Platform Management
What's New with Anypoint Platform? Unified Platform Management
 
CIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to KnowCIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to Know
 
PingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowPingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to Know
 
Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail Experience
 
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesCASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
 
Wi-Fi Analytics Deployment at Multiple Locations - A CIO's Checklist
Wi-Fi Analytics Deployment at Multiple Locations - A CIO's ChecklistWi-Fi Analytics Deployment at Multiple Locations - A CIO's Checklist
Wi-Fi Analytics Deployment at Multiple Locations - A CIO's Checklist
 
Progress Rollbase Powerpoint Presentation - Take Control of your Salesforce a...
Progress Rollbase Powerpoint Presentation - Take Control of your Salesforce a...Progress Rollbase Powerpoint Presentation - Take Control of your Salesforce a...
Progress Rollbase Powerpoint Presentation - Take Control of your Salesforce a...
 
SaaSfocus_Profile_s
SaaSfocus_Profile_sSaaSfocus_Profile_s
SaaSfocus_Profile_s
 
Defining Advanced AAA Policies for Access Networks
Defining Advanced AAA Policies for Access NetworksDefining Advanced AAA Policies for Access Networks
Defining Advanced AAA Policies for Access Networks
 
10 questions to ask your cloud provider
10 questions to ask your cloud provider10 questions to ask your cloud provider
10 questions to ask your cloud provider
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM
 
Big Data Fundamentals 6.6.18
Big Data Fundamentals 6.6.18Big Data Fundamentals 6.6.18
Big Data Fundamentals 6.6.18
 
Big Data Fundamentals
Big Data FundamentalsBig Data Fundamentals
Big Data Fundamentals
 
Self-Registration, Policy & Branding for Guest Access #AirheadsConf Italy
Self-Registration, Policy & Branding for Guest Access #AirheadsConf ItalySelf-Registration, Policy & Branding for Guest Access #AirheadsConf Italy
Self-Registration, Policy & Branding for Guest Access #AirheadsConf Italy
 
Advanced Access Management with Aruba ClearPass #AirheadsConf Italy
Advanced Access Management with Aruba ClearPass #AirheadsConf ItalyAdvanced Access Management with Aruba ClearPass #AirheadsConf Italy
Advanced Access Management with Aruba ClearPass #AirheadsConf Italy
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer Presentation
 
From Data To Insights
From Data To InsightsFrom Data To Insights
From Data To Insights
 

Más de Kaseya

Más de Kaseya (15)

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual Administrator
 
Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
 
Kaseya BYOD Suite
Kaseya BYOD SuiteKaseya BYOD Suite
Kaseya BYOD Suite
 
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
 
Making Money in the Cloud Part II…Is Your MSP Team Ready?
Making Money in the Cloud   Part II…Is Your MSP Team Ready?Making Money in the Cloud   Part II…Is Your MSP Team Ready?
Making Money in the Cloud Part II…Is Your MSP Team Ready?
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
 
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksSystems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
 
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...
 
Kaseya Connect 2013: Optimizing Your K Server - Best Practices in Kaseya Infr...
Kaseya Connect 2013: Optimizing Your K Server - Best Practices in Kaseya Infr...Kaseya Connect 2013: Optimizing Your K Server - Best Practices in Kaseya Infr...
Kaseya Connect 2013: Optimizing Your K Server - Best Practices in Kaseya Infr...
 
Kaseya Connect 2013: Scaling Services for Profitability
Kaseya Connect 2013: Scaling Services for Profitability Kaseya Connect 2013: Scaling Services for Profitability
Kaseya Connect 2013: Scaling Services for Profitability
 
Kaseya Connect 2013: Tried and True: Making Your Kaseya Investment Pay Off
Kaseya Connect 2013: Tried and True: Making Your Kaseya Investment Pay OffKaseya Connect 2013: Tried and True: Making Your Kaseya Investment Pay Off
Kaseya Connect 2013: Tried and True: Making Your Kaseya Investment Pay Off
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Advanced Administration: Kaseya BYOD Suite

  • 1. Advanced Administration: BYOD Jonathan Foulkes VP of Mobile Product Management Copyright ©2014 Kaseya 1
  • 2. The information in this presentation is confidential and proprietary to Kaseya and may not be disclosed or distributed without the prior written permission of Kaseya. This document, and any related presentation, as well as Kaseya's strategy, possible future developments, products, platforms, directions and/or functionality are all subject to change without notice at Kaseya’s sole discretion. The information in this document does not constitute a commitment, contract, promise or legal obligation to deliver any material, code or functionality. This document is provided without warranty of any kind, either express or implied, including but not limited to, the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. This document is for informational purposes only and may not be incorporated into a contract. All forward-looking statements, including those set forth in this presentation, are subject to various assumptions, risks and uncertainties that could cause actual results to differ materially from projections. Readers are cautioned not to place undue reliance on such forward-looking statements, and specifically, not to rely upon such in making purchasing decisions. Copyright ©2014 Kaseya 2
  • 3. BYOD Recap  Add-on enabling secure mobile access to enterprise resources  Secure containers  On-prem Gateway & Cloud Services Copyright ©2014 Kaseya 3 Browser Docs Mail
  • 5. Setting up data sources  Define the sources users may reach – For web-based systems – For document sources – For mail  Segment based on AD groups Copyright ©2014 Kaseya 5
  • 8. Segmenting with AD groups Copyright ©2014 Kaseya 8
  • 10. Browser-related Tips  Want to let them type their own URL? – Add a page that shows a text field – Redirect page to that URL on submit  Leverage single-sign-on – Set target sites to use NTLM auth as an option – Reduce creds exposure, as not typed on mobile Copyright ©2014 Kaseya 10
  • 11. Working With The Proxy List  Proxy list – white list of targets the Gateway will route mobile requests to – Enforced at both mobile and Gateway  Auto-built via Site tab, but admin can edit – Why? • Site A (in proxy list) links site B (not there) – Fail • Use wildcards (CIDR) – Route locked-down public addresses Copyright ©2014 Kaseya 11
  • 12. Document Sources  What sources? – Most WebDAV-capable systems • IIS, SharePoint • Network Attached Storage systems • Cloud CMS  Ideally, NTLM auth set – Single-sign-on Copyright ©2014 Kaseya 12
  • 13. Doc Source list Copyright ©2014 Kaseya 13
  • 15. Defining A Doc Source Copyright ©2014 Kaseya 15
  • 17. Docs-related Tips  Leverage IIS as WebDAV server to publish shared folders – Test access and config via Explorer  KISS - Let the server do trimming  Leverage single-sign-on – Set target servers to use NTLM auth as an option – Reduce creds exposure, as not typed on mobile Copyright ©2014 Kaseya 17
  • 18. Direct vs. Relay  What is ‘Direct’ for? – Typical DMZ-style deployment – Bypass the relay  How: – Network tab - check direct – Set external name and port – Turn OFF relay Copyright ©2014 Kaseya 18
  • 19. Logs Are Your Friend  Four primary logs – Gateway – start, stop, auth, comms – Panel– Local UI, not really interesting – Portal – Siteinfo, policy, locally served content – Proxy – proxied requests Copyright ©2014 Kaseya 19
  • 20. Log Content  Standard Apache log format – Consume in your favorite log-munger  Determine who is accessing what – Or if they are getting errors, rejections (auth?)  Gateway log is a pretty good network line monitor ;-) Copyright ©2014 Kaseya 20
  • 21. Log Levels  Set in byodgateway.ini – Only use Debug on test systems with limited access – very verbose # Logging level for gateway error log - CRITICAL/ERROR/WARNING/INFO/DEBUG service_loglevel = INFO Copyright ©2014 Kaseya 21
  • 22. Summary  Connect the right users to the right sources  Integrate with AD for security and simplicity  Leverage logs for insight and troubleshooting Copyright ©2014 Kaseya 22
  • 23. Copyright ©2014 Kaseya 23 Questions and Answers Thanks for Attending Kaseya Connect #KaseyaConnect Let's Share!