Home Page Icon
Home Page
Table of Contents for
About the Technical Reviewer
Close
About the Technical Reviewer
by Charles Edge
Enterprise iPhone and iPad Administrator's Guide
Copyright
About the Authors
About the Technical Reviewer
Acknowledgments
Introduction
1. The Inevitability of the iPhone in the Enterprise
1.1. Three Devices, One Platform
1.2. Welcoming Change While Protecting the Enterprise
1.2.1. Sandbox
1.2.2. Long-Term Implications
1.3. Mobile Integration Strategies
1.4. The Paradigm Shift
1.4.1. Impact to Infrastructure
1.4.2. Integration with the Enterprise
1.5. Summary
2. Purchasing and Activating
2.1. Making Large-Purchase Considerations
2.2. Preparing the Pilot
2.3. Purchasing Applications
2.3.1. Understanding the License Agreement
2.3.2. Purchasing in Bulk
2.4. Managing Activations
2.4.1. Using StoreActivationMode
2.4.2. Using StoreGeniusMode
2.5. Activating Devices
2.5.1. Getting Started
2.5.2. Synchronizing for the First Time
2.5.3. Choosing Synchronization Options
2.6. Developing Organizational Policies
2.7. Using the App Store
2.8. Managing iTunes
2.9. Registering Devices
2.10. Backing Up and Restoring Devices
2.11. Placing Devices Back into Production
2.12. Upgrading the Software
2.13. Summary
3. Applying Basic Configurations to Mobile Devices
3.1. Getting Familiar with iOS 4
3.2. Setting Wireless Network Connections
3.2.1. Configuring Wireless Network Settings
3.2.2. Joining a Wireless Network
3.3. Leveraging the Mobile Web Browser
3.3.1. Configuring the Browser (Mobile Safari)
3.3.2. Navigating Through the Browser Environment
3.4. Installing SSL Certificates
3.5. Setting up E-Mail Accounts
3.5.1. Leveraging the Cloud
3.5.2. Using IMAP, POP, and SMTP
3.6. Securing the Device
3.6.1. Restricting Access to Applications
3.6.2. Authenticating with Passcodes
3.7. Maintaining Devices
3.7.1. Performing Basic Startup Maintenance
3.7.2. Verifying Network Connectivity
3.7.3. Obtaining Updates
3.7.4. Leveraging the Logs
3.7.5. Performing Backup and Restoration
3.7.6. Bypassing the Passcode
3.8. Summary
4. Integrating with Groupware
4.1. Integrating with Microsoft Exchange Servers
4.1.1. Ensuring a Proper Exchange Environment
4.1.1.1. Using Exchange Server Remote Connectivity Analyzer
4.1.1.2. Looking at Paths in Exchange
4.1.1.3. Troubleshooting Exchange 2007 and 2010 Virtual Directories
4.1.2. Configuring iOS for ActiveSync
4.1.3. Using Exchange to Manage Policies
4.1.4. Managing Policies from PowerShell
4.1.5. Using Remote Wipe
4.2. Using Alternative Groupware Solutions
4.2.1. MobileMe
4.3. Leveraging the Cloud
4.4. Summary
5. Working with Documents and Files
5.1. Sharing Files Using iTunes
5.2. Building a File Sharing Environment
5.2.1. Selecting Your Service
5.2.2. AFP
5.2.2.1. Configuring AFP
5.2.2.2. Defining AFP Authentication
5.2.2.3. Setting Limits
5.2.2.4. Managing Idle User Handling
5.2.3. Setting up Share Points
5.3. Accessing Servers With Third-Party Software
5.3.1. EZSharePro
5.3.2. NetPortal and NetPortal Lite
5.3.3. FileBrowser
5.3.4. Using iWork
5.4. Leveraging Public Clouds
5.4.1. MobileMe
5.4.1.1. Configuring the Desktop
5.4.1.2. Connecting to the iDisk
5.4.2. Google Docs
5.4.3. Box.net
5.4.4. SharePoint
5.5. Summary
6. Remote Access for iOS
6.1. Introducing Mac OS X Server Services
6.2. Configuring the VPN Client
6.2.1. L2TP
6.2.2. PPTP
6.2.3. Using the Cisco VPN Client
6.2.4. Assigning a Proxy to a VPN Connection
6.3. Providing VPN Services
6.3.1. Setting Up a PPTP Server
6.3.2. Setting Up an L2TP Server
6.4. Installing Mobile Access and Push Notification
6.5. Setting Up Mobile Access
6.5.1. Planning Design Considerations
6.5.2. Configuring Mobile Access
6.5.2.1. Configuring the Address Book Proxy
6.5.2.2. Configuring the iCal Proxy
6.5.2.3. Configuring the Mail Proxy
6.5.2.4. Configuring Web Proxy Entries
6.5.3. Starting the Service and Checking the Status
6.5.4. Controlling Access
6.5.5. Connecting Clients
6.6. Setting Up Push Notification for the iPhone
6.7. Using the Command Line to Manage Mobile Access and Push Notification
6.8. Summary
7. Developing In-House Applications
7.1. Don't Develop If You Don't Have To
7.1.1. Additional Plug-ins
7.2. Understanding iPhone Developer Programs
7.2.1. The iPhone Developer Program
7.2.2. The iPhone Enterprise Developer Program
7.2.3. The iPhone Developer University Program
7.2.4. Getting a Developer Account
7.3. Xcode
7.3.1. Installing the Developer Tools
7.4. Using a Template
7.5. Planning Custom Applications
7.5.1. Training
7.5.2. Outsourcing Application Development
7.6. Distributing Custom Applications
7.7. Accessing Enterprise Databases with the iPhone
7.8. Additional Resources
7.9. Summary
8. Building Configuration Profiles
8.1. Setting Up the Tool
8.2. Building Configurations
8.2.1. General Tab
8.2.2. Passcode Tab
8.2.3. Restrictions Tab
8.2.4. Wi-Fi Tab
8.2.4.1. Hidden Network
8.2.4.2. Protocols
8.2.4.3. Authentication
8.2.4.4. Trust
8.2.5. VPN Tab
8.2.6. E-mail Tab
8.2.7. Exchange Tab
8.2.8. LDAP Tab
8.2.9. CalDAV Tab
8.2.10. Subscribed Calendars Tab
8.2.11. Web Clips Tab
8.2.12. Credentials Tab
8.2.13. The SCEP Tab
8.3. Deploying Configurations Using the iPhone Configuration Utility
8.3.1. Importing and Exporting Profiles
8.4. Summary
9. Mass-Deploying Devices
9.1. Deployment Terminology
9.2. Building Profiles from Scripts
9.2.1. Creating Devices
9.2.2. Creating Configuration Profiles
9.3. Apple's Sample Code
9.4. AirWatch
9.4.1. Managing Objects in the Portal
9.4.1.1. Setting Up Administrative Users
9.4.1.2. Configuring LDAP and SCEP
9.4.2. Creating a Profile
9.4.3. Enrolling a Device
9.5. JAMF's Casper Suite
9.5.1. Configuring Global Settings
9.5.2. Creating Configuration Profiles
9.5.3. Enrolling Devices
9.5.4. Managing Devices
9.5.5. Adding Applications to the Catalog
9.5.6. Providing Self-Service
9.6. KACE Appliances
9.7. MobileIron
9.8. Sybase Afaria
9.9. TARMAC
9.10. Removing the Profiles
9.11. Summary
10. Leveraging Third-Party Solutions for Productivity
10.1. The App Store
10.2. Integrating GroupWise
10.3. Security Applications
10.3.1. RSA
10.3.2. Good for Enterprise
10.4. Managing Thin Clients
10.4.1. Citrix
10.4.2. Remote Desktop
10.4.3. VNC
10.5. Contact Management Options
10.6. Tools for Public Speakers
10.6.1. Keynote
10.6.2. Teleprompters
10.7. Bridging the Gap
10.7.1. NetFlix
10.7.2. Facebook
10.7.3. Twitter
10.7.4. LinkedIn
10.8. Becoming the Informed Traveler
10.9. Summary
11. Developing A Program For Support
11.1. What Is Supported?
11.2. Preparing Support Staff
11.2.1. Training Considerations
11.2.2. Training Materials
11.3. Supporting End Users
11.4. Considering the Help Desk
11.5. The iPhone Simulator
11.6. Using the Software Update Server for Patch Management
11.6.1. Installing the Software Update Service
11.6.2. Managing Your Software Update Server
11.6.2.1. Configuring Updates for Clients
11.6.2.2. Using Software Update
11.6.2.3. Using the softwareupdate Command to Install Software Updates
11.6.2.4. Working with the Repository
11.7. Using the Command Line to Manage Software Update Server
11.7.1. serveradmin
11.8. Multiple Software Update Servers
11.9. Implementing a Process to Manage Patches
11.10. Summary
A. Acceptable Use Policy
A.1. InfoSec Acceptable Use Policy
A.2. 1.0 Overview
A.3. 2.0 Purpose
A.4. 3.0 Scope
A.5. 4.0 Policy
A.5.1. 4.1 General Use and Ownership
A.5.2. 4.2 Security and Proprietary Information
A.5.3. 4.3 Unacceptable Use
A.5.3.1. System and Network Activities
A.5.3.2. E-mail and Communications Activities
A.6. 5.0 Enforcement
A.7. 6.0 Definitions
A.7.1. Term Definition
A.8. 7.0 Revision History
B. Using Mac OS X Server for Groupware
B.1. iCal Server
B.1.1. Setting Up iCal Server
B.1.2. Managing Calendars
B.1.3. Subscribing to Calendars
B.1.4. Delegating Access
B.1.5. Backing Up Calendars
B.1.6. Clustering CalDAV
B.1.7. Web and Wiki Integration
B.1.8. Troubleshooting
B.2. Address Book Server
B.2.1. Setting up Address Book Server
B.2.2. Backing up Address Books
B.3. iChat Server
B.3.1.
B.3.1.1. Transcripts
B.4. Mac OS X Mail Server
B.4.1. Setting Up a Mail Server
B.4.2. Configuring Mail with ServerAdmin
B.4.3. Protecting the Mail Servers
B.4.3.1. Mailing Lists
B.4.3.2. Logging
B.4.3.3. The Command Line
B.4.4. Choosing Mailbox Locations
B.4.5. The Dovecot Mailstore
B.4.6. Setting Up Public folders
B.4.7. Backing Up Mail
B.4.8. Clustering Mail Services
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
About the Authors
Next
Next Chapter
Acknowledgments
About the Technical Reviewer
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset