eScan BlogeScan Blog    eScan WebsiteeScan Website    eScan ForumeScan Forum    eScan FeedseScan Feeds     
    
Languages:     

From eScan Wiki

(Difference between revisions)
Jump to: navigation, search
Revision as of 10:57, 23 April 2020
WikiSysop (Talk | contribs)

← Previous diff
Current revision
WikiSysop (Talk | contribs)

Line 465: Line 465:
Clicking Policy Templates displays Policy Template screen and lets you Clicking Policy Templates displays Policy Template screen and lets you
create, copy and assign template to specific group or devices. create, copy and assign template to specific group or devices.
-</p> 
-<h3> 
- Creating New Template 
-</h3> 
-<p> 
- To create a new template, follow the steps given below: 
-</p> 
-<ol start="1" type="1"> 
- <li> 
- Click <strong>New Template</strong>. Create Policy Template window 
- appears. 
- </li> 
- <li> 
- Enter a name for template. 
- </li> 
- <li> 
- Select appropriate group type. 
- </li> 
-</ol> 
-<p> 
- The Create Policy Template lets you create template for both Android and 
- iOS devices discussed below: 
-</p> 
-<h1> 
- Android Template 
-</h1> 
-<p> 
- The Android Template consists following policies: 
-</p> 
-<ul> 
- <li> 
- Anti-Virus Policy 
- </li> 
- <li> 
- Call &amp; SMS Filter Policy 
- </li> 
- <li> 
- Web and Application Control 
- </li> 
- <li> 
- App specific network blocking 
- </li> 
- <li> 
- Anti-Theft Policy 
- </li> 
- <li> 
- Additional Settings Policy 
- </li> 
- <li> 
- Password Policy 
- </li> 
- <li> 
- Device Oriented Policy 
- </li> 
- <li> 
- Required Applications Policy 
- </li> 
- <li> 
- Wi-Fi Settings Policy 
- </li> 
- <li> 
- Scheduled Backup (Contacts &amp; SMS) 
- </li> 
- <li> 
- Content Library Policy 
- </li> 
- <li> 
- Kiosk Mode Policy 
- </li> 
-</ul> 
-<h3> 
- Anti-Virus Policy 
-</h3> 
-<p> 
- Anti-Virus Policy lets you scan the device, schedule a scan and update the 
- virus signature database as per your requirement. 
-</p> 
-<p> 
- <strong>Scan Settings</strong> 
-</p> 
-<p> 
- Using the options present under the Anti-Virus Policy, the administrator 
- can define settings for enabling or disabling virus protection on devices 
- along with settings for file types to be scanned on managed devices. 
-</p> 
-<p> 
- <strong>Protection Scanning for files on installation is enabled</strong> 
-</p> 
-<p> 
- Select Enabled or Disabled to enable or disable protection on managed 
- devices in the group. 
-</p> 
-<p> 
- <strong>Scan Type</strong> 
-</p> 
-<p> 
- Select the Scan Type as All Files or Executable only files on managed 
- devices in the group. 
-</p> 
-<p> 
- <strong>Automatic Scan</strong> 
-</p> 
-<p> 
- Use options present under the Anti-Virus Policy to scan devices on startup 
- or schedule the scan as per requirement. 
-</p> 
-<p> 
- <strong>Startup Scan</strong> 
-</p> 
-<p> 
- Select from drop-down to enable or disable scanning on device startup, as 
- per your requirement. 
-</p> 
-<p> 
- <strong>Schedule Scan</strong> 
-</p> 
-<p> 
- Select a schedule to scan managed devices. You can conduct a weekly or 
- daily scan as required or even disable the scan schedules. 
-</p> 
-<p> 
- <strong>Scan Day</strong> 
-</p> 
-<p> 
- Select a particular day of the week to scan the managed devices present in 
- the group. This check box will be activated only if you select weekly scan. 
-</p> 
-<p> 
- <strong>Select Scan Time</strong> 
-</p> 
-<p> 
- Set time for scanning the managed devices in the group. 
-</p> 
-<p> 
- <strong>Schedule Update Settings</strong> 
-</p> 
-<p> 
- Define settings for updating eScan on managed devices. 
-</p> 
-<p> 
- <strong>Schedule Update</strong> 
-</p> 
-<p> 
- Define a schedule to update virus signature database on a daily or weekly 
- basis or disable the update schedule. 
-</p> 
-<p> 
- <strong>Update Day</strong> 
-</p> 
-<p> 
- Select a particular day of the week to update the managed devices present 
- in the group. This check box will be activated only if you select weekly 
- update. 
-</p> 
-<p> 
- <strong>Update Time</strong> 
-</p> 
-<p> 
- Set time for the devices to take virus signature database update from the 
- server. It will be helpful in saving network congestion where large numbers 
- of devices are added in the MDM Server. 
-</p> 
-<p> 
- <strong>Update from Internet server</strong> 
-</p> 
-<p> 
- Select this check box to update the virus signature database from the 
- Internet server. 
-</p> 
-<p> 
- <strong>Update only if Wi-Fi is available</strong> 
-</p> 
-<p> 
- Select this check box to update virus signature database only if the Wi-Fi 
- connection is available. 
-</p> 
-<h2> 
- Call &amp; SMS Filter Policy 
-</h2> 
-<p> 
- The Call &amp; SMS Filter Policy lets you set filter for incoming calls, 
- text messages and outgoing calls on managed devices. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<h3> 
- Call and SMS filter mode set to Off 
-</h3> 
-<p> 
- If the Call and SMS filter mode is set to <strong>Off</strong>, all calls 
- and text messages will be allowed. 
-</p> 
-<h3> 
- Call and SMS filter mode set to Blacklist 
-</h3> 
-<p> 
- Select Block Non-Numeric SMS and Calls check box to block SMS and calls 
- from non-numeric numbers. 
-</p> 
-<p> 
- To block incoming calls from known numbers and SMS consisting specific 
- keywords, click <strong>Blacklist</strong>. Call and SMS Blacklist window 
- appears. 
-</p> 
-<p> 
- Click <strong>Add</strong>. Block Incoming window appears. 
-</p> 
-<p> 
-Select whether to block <strong>SMS, Calls</strong> or both <strong>Calls &amp; SMS</strong>. Enter the Blocked Phone Number and 
-Forbidden Text in the fields and then click <strong>Add</strong>. <strong></strong> 
-</p> 
-<p> 
-To delete a specific number from the Blacklist, select the number and click <strong>Delete</strong>.<strong></strong> 
-</p> 
-<p> 
- The selected number will be deleted. 
-</p> 
-<h3> 
- Call and SMS filter mode set to Whitelist 
-</h3> 
-<p> 
- Check Allow Contacts check box and then click <strong>Whitelist</strong>. 
-</p> 
-<p> 
- Call and SMS Whitelist window appears. 
-</p> 
-<p> 
- Click <strong>Add</strong>. Allow Incoming window appears. 
-</p> 
-<p> 
-Select whether to allow <strong>SMS, Calls</strong> or both <strong>Calls &amp; SMS</strong>. Enter the Allowed Phone Number and 
-Forbidden Text in the fields and then click <strong>Add</strong>. <strong></strong> 
-</p> 
-<p> 
-To delete a specific number from whitelist, select the number and click <strong>Delete</strong>. 
-</p> 
-<p> 
-The number will be deleted. To remove all numbers in a single-click, click <strong>Remove All</strong>.<strong></strong> 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<h3> 
- Call and SMS filter mode set to Both List 
-</h3> 
-<p> 
- Check Allow Contacts and Block Non-Numeric SMS and Calls and you will be 
- able to access both Blacklist’s and Whitelist’s features. 
-</p> 
-<h3> 
- Call Filter (Outgoing) Mode set to Off 
-</h3> 
-<p> 
- If Call Filter Mode is set to Off, all outgoing calls will be allowed. 
-</p> 
-<h3> 
- Call Filter (Outgoing) Mode set to Whitelist 
-</h3> 
-<p> 
- If Call Filter Mode is set to Whitelist, a user can make outgoing calls 
- only to whitelisted numbers. 
-</p> 
-<p> 
- Click <strong>Whitelist</strong>.<strong> </strong>Outgoing calls window 
- appears. 
-</p> 
-<p> 
- Click <strong>Add</strong>. Allow outgoing window appears. 
-</p> 
-<p> 
- Enter the phone number and then click <strong>Add</strong>. 
-</p> 
-<p> 
- The number will be added to the Whitelist. 
-</p> 
-<p> 
-To delete a specific number, select a number and then click <strong>Delete</strong>. The number will be deleted. 
-</p> 
-<h2> 
- Web and Application Control 
-</h2> 
-<p> 
- Web and Application Control policy lets you allow and block applications 
- and websites 
-</p> 
-<p> 
- on managed devices. 
-</p> 
-<h3> 
- Control Mode 
-</h3> 
-<p> 
-Allow or Block <strong>Applications/Website </strong>or <strong> Both </strong>or<strong> Off</strong> based on your requirement 
- and Policies. 
-</p> 
-<h3> 
- Control mode set to Off 
-</h3> 
-<p> 
- If the Control Mode is set to <strong>Off</strong>, you cannot allow/block 
- websites or applications. 
-</p> 
-<h3> 
- Control mode set to Website 
-</h3> 
-<p> 
- Setting the Control Mode to <strong>Website</strong> lets you allow and 
- block website categories. 
-</p> 
-<p> 
- <strong>Allow List</strong> 
- : Websites added to this list can be accessed in browser. You can modify, 
- delete and also remove the list of websites. 
-</p> 
-<p> 
- Click <strong>Add</strong>. Add in allow list window appears. 
-</p> 
-<p> 
-Enter the URL in the field and then click <strong>Save</strong>. <strong></strong> 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Block List:</strong> 
- Websites added to this list will be blocked in browser. You can modify, 
- delete and remove the list of websites from the Block List. 
-</p> 
-<p> 
- Click <strong>Add</strong>. Add in block list window appears. 
-</p> 
-<p> 
- Enter the URL and then click <strong>Save</strong>.<strong></strong> 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<h3> 
- Control mode set to Application 
-</h3> 
-<p> 
- Setting the Control Mode to <strong>Application</strong> lets you allow or 
- block an application. 
-</p> 
-<p> 
- Click <strong>Allow/Block Application List</strong>. Allow/Block 
- Application List window appears. 
-</p> 
-<p> 
- Click <strong>Add</strong>. 
-</p> 
-<p> 
- <strong>Application List</strong> 
-</p> 
-<ol start="1" type="1"> 
- <li> 
- Applications added to this list will be allowed/blocked as per the 
- specified action. 
- </li> 
- <li> 
- System applications will be allowed by default unless explicitly added 
- to "Block" section. 
- </li> 
- <li> 
- User installed applications will be blocked by default unless 
- explicitly added to "Allow" section. 
- </li> 
- <li> 
- If the action is set to "Ask Uninstall" the device will prompt the user 
- to uninstall the application and will remain "Non-Compliant" until the 
- application is uninstalled. 
- </li> 
- <li> 
- If “Ask Uninstall” action is set for the system applications, the 
- applications will be blocked and will have no effect on the device 
- compliance. Allow/Block Application window appears. 
- </li> 
-</ol> 
-<p> 
-Enter the application’s package name in the field. Select whether to <strong>Allow, Block</strong> or <strong>Ask to Uninstall</strong> the 
-specific application and then click <strong>Add</strong> &gt; <strong>Save</strong>.<strong></strong> 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<table border="1" cellspacing="0" cellpadding="0"> 
- <tr> 
- <td width="49"> 
- <p align="center"> 
- <strong>Note</strong> 
- </p> 
- </td> 
- <td width="567"> 
- <p> 
- If Application is NOT in the "Available Applications" list 
- you can add the package name with the "Enter Package Name" 
- option. 
- </p> 
- </td> 
- </tr> 
-</table> 
-<h3> 
- Control mode set to Both 
-</h3> 
-<p> 
- Setting the Control Mode to <strong>Both </strong>lets you allow/block 
- website categories and applications. 
-</p> 
-<h2> 
- App Specific Network Blocking 
-</h2> 
-<p> 
- The App Specific Network Blocking Policy lets you block a particular 
- application from accessing the Internet. 
-</p> 
-<p> 
- In the Enter Package Name field, type the application’s package name and 
- then click <strong>Add</strong>. 
-</p> 
-<p> 
- The package will be added and displayed in <strong>Package Name</strong> 
- section below. 
-</p> 
-<p> 
- After a package is added, the respective application will be unable to 
- access the Internet. 
-</p> 
-<table border="1" cellspacing="0" cellpadding="0"> 
- <tr> 
- <td width="44" valign="top"> 
- <p> 
- <strong>Note</strong> 
- </p> 
- </td> 
- <td width="572" valign="top"> 
- <p> 
- VPN permission is needed for this functionality to work. 
- </p> 
- </td> 
- </tr> 
-</table> 
-<p> 
- To delete a package from the list, select the specific package and then 
- click <strong>Delete</strong>.<strong></strong> 
-</p> 
-<p> 
- To remove all packages, click <strong>Remove All</strong>. 
-</p> 
-<h2> 
- Anti-Theft Policy 
-</h2> 
-<p> 
- Anti-Theft Policy lets you keep track of a device’s location history, block 
- a device and send alert about SIM card change. 
-</p> 
-<p> 
- <strong>Enable Anti-Theft</strong> 
-</p> 
-<p> 
- By default, this check box is selected. 
-</p> 
-<p> 
- <strong>Enable Location History</strong> 
-</p> 
-<p> 
-Select Enable Location History check box to track the location history. <strong></strong> 
-</p> 
-<p> 
- <strong>Interval in Mins</strong> 
-</p> 
-<p> 
- Track the location history at a defined interval. 
-</p> 
-<p> 
- You can set the interval using Interval field. 
-</p> 
-<p> 
- <strong>Block Device</strong> 
-</p> 
-<p> 
- Select this check box to block the device before uninstallation of eScan 
- application. 
-</p> 
-<p> 
- <strong>Ask "Admin Access Password" (Do not block device)</strong> 
-</p> 
-<p> 
- Select this option if you don’t want the device to be blocked if a user 
- tries to uninstall the MDM application. The application will ask the user 
- to enter the Admin Access Password. 
-</p> 
-<p> 
- <strong>Delete all configured email accounts</strong> 
-</p> 
-<p> 
- Select this check box to delete all email accounts configured on the 
- managed device. 
-</p> 
-<p> 
- <strong>Delete specific domain account</strong> 
-</p> 
-<p> 
- Select this check box to delete email accounts of specific domain. After 
-selecting this check box, enter the domain name in <strong>Enter domain names </strong>field. 
-</p> 
-<p> 
- <strong>Send SMS notification on SIM card change</strong> 
-</p> 
-<p> 
- Select this check box to receive a text message informing about SIM card 
- change. The text message will be sent to the number added by you. 
-</p> 
-<p> 
- Add the desired number in <strong>To Mobile No</strong>. 
-</p> 
-<p> 
- <strong>Send Email notification on SIM card change</strong> 
-</p> 
-<p> 
- Select this check box to receive an email informing about SIM card change. 
- The notification email will be sent to the administrator’s email ID or the 
- custom email ID that the administrator has specified. 
-</p> 
-<h2> 
- Additional Settings Policy 
-</h2> 
-<p> 
- Use this option to enable or disable the above options on selected managed 
- devices. 
-</p> 
-<p> 
- <strong>Show Notification</strong> 
-</p> 
-<p> 
- Selecting this check box will display all notifications on devices. 
-</p> 
-<p> 
- <strong>Sound</strong> 
-</p> 
-<p> 
- Selecting this check box will play notification sound for eScan MDM 
- application events. 
-</p> 
-<p> 
- <strong>Write Logs</strong> 
-</p> 
-<p> 
- Selecting this check box will enable MDM application to write logs of user 
- actions on the eScan log file. 
-</p> 
-<p> 
- <strong>Disable Device Settings</strong> 
-</p> 
-<p> 
- Selecting this check box will block devices from accessing Device Settings. 
-</p> 
-<p> 
- <strong>Sync at Device Reboot</strong> 
-</p> 
-<p> 
- Selecting this check box will sync the device with the eScan server after 
- it reboots. 
-</p> 
-<p> 
- <strong>Sync Frequency</strong> 
-</p> 
-<p> 
- You can set the Sync Frequency in minutes and let the device sync with the 
- eScan server. 
-</p> 
-<h2> 
- Password Policy 
-</h2> 
-<p> 
- Password Policy lets you define Administrator Access Password that allows 
- an authorized user to configure settings of eScan Module on respective 
- Managed devices.<strong></strong> 
-</p> 
-<p> 
-Enter the password in <strong>Admin Access Password</strong> field. <strong></strong> 
-</p> 
-<table border="1" cellspacing="0" cellpadding="0"> 
- <tr> 
- <td width="43"> 
- <p align="center"> 
- <strong>Note</strong> 
- <strong></strong> 
- </p> 
- </td> 
- <td width="573"> 
- <p> 
- The password should be numeric and minimum of four digits 
- are required.<strong></strong> 
- </p> 
- </td> 
- </tr> 
-</table> 
-<h2> 
- Device Oriented Policy 
-</h2> 
-<p> 
- Device Oriented Policy lets you enable GPS and disable Camera, Bluetooth 
- and USB Connectivity on a device. 
-</p> 
-<p> 
- <strong>Enable GPS (For devices with Android version below 4</strong> 
- .<strong>0)</strong> 
-</p> 
-<p> 
- Select this check box to enable GPS. 
-</p> 
-<p> 
- <strong>Disable Camera (For device with Android version 4</strong> 
- .<strong>0 and Above)</strong> 
-</p> 
-<p> 
- Select this check box to disable the camera. 
-</p> 
-<p> 
- <strong>Disable Bluetooth &amp; Bluetooth Discovery</strong> 
-</p> 
-<p> 
- Select this check box to disable the Bluetooth and Bluetooth discoveries. 
-</p> 
-<p> 
- <strong> 
- Disable USB Connectivity (For devices with Android version below 4 
- </strong> 
- .<strong>0)</strong> 
-</p> 
-<p> 
- Select this check box to disable USB Connectivity. 
-</p> 
-<p> 
- <strong> 
- Send Call Details to server, including Call/SMS filter events 
- </strong> 
-</p> 
-<p> 
- Select this check box if you want device(s) to send their Call/SMS details 
- to the server. 
-</p> 
-<h2> 
- Required Applications Policy 
-</h2> 
-<p> 
- The Required Applications Policy lets you import applications from the App 
- Store module for installation on devices in the group through policy 
- deployment. 
-</p> 
-<h3> 
- Importing an application 
-</h3> 
-<ol start="1" type="1"> 
- <li> 
- Click <strong>Import</strong>. Import Application window appears. 
- </li> 
- <li> 
- Select the application(s). 
- </li> 
- <li> 
- Click <strong>Save</strong>. The selected application will be imported. 
- </li> 
-</ol> 
-<p> 
- A pop-up message appears displaying Applications added to the "Required 
- Applications Policy" will be automatically added to the "Allow List" under 
- "Parental Policy &gt;&gt; Allow/Block Application List". 
-</p> 
-<p> 
- Click <strong>Deploy</strong>. The policy will be deployed on the device 
- instantly if the device is connected to the Internet. The following prompt 
- appears after the successful policy deployment. 
-</p> 
-<table border="1" cellspacing="0" cellpadding="0"> 
- <tr> 
- <td width="48"> 
- <p> 
- <strong>Note</strong> 
- </p> 
- </td> 
- <td width="553" valign="top"> 
- <p> 
- If the device is not connected to Internet, the policy 
- changes will be applied on the next sync with the server. 
- By default, the device(s) sync with the server every 60 
- minutes. 
- </p> 
- <p> 
- If an application is deployed via the Required Application 
- Policy, the device(s) in the group receive a notification 
- to install the application. The user will be provided with 
- the option to start the installation process and install 
- the application. If the device user cancels the 
- installation, it will alert the user about application 
- installation on the next sync with the server. 
- </p> 
- <p> 
- If the deployed application with the same version number 
- already exists on device, the device user won't receive 
- notification. 
- </p> 
- <p> 
- <strong></strong> 
- </p> 
- </td> 
- </tr> 
-</table> 
-<p> 
- <strong></strong> 
-</p> 
-<h3> 
- Deleting an application from “Required Applications Policy” 
-</h3> 
-<p> 
-To delete an application, select the application and then click <strong>Delete</strong>. The selected application will be deleted. 
-</p> 
-<h2> 
- Wi-Fi Settings Policy 
-</h2> 
-<p> 
- The Wi-Fi Settings policy lets you define the settings for your Wi-Fi 
- connections. You can disable WLAN/Wi-Fi or restrict the usage of Wi-Fi by 
- allowing the device to connect only to the listed Wi-Fi networks. The 
- device can be automatically locked or raise a sound alarm if it is not 
- connected to any of the listed Wi-Fi connections. 
-</p> 
-<p> 
- <strong> 
- Enable Wi-Fi Restrictions (For devices with Android version below 6 
- </strong> 
- .<strong>0)</strong> 
-</p> 
-<h3> 
- Adding a Wi-Fi SSID 
-</h3> 
-<ol start="1" type="1"> 
- <li> 
-Select the check box Enable Wi-Fi Restrictions and then click <strong>Add</strong>. Add window appears. 
- </li> 
- <li> 
-Enter the Wi-Fi network name (SSID) in the field and then click <strong>Add</strong>. The Wi-Fi network will be added to the console. 
- </li> 
-</ol> 
-<p> 
- The devices will be allowed to connect only to the added Wi-Fi network 
- SSID. 
- <br clear="all"/> 
- <strong></strong> 
-</p> 
-<h3> 
- Locking/Sounding alarm on a device 
-</h3> 
-<ol start="1" type="1"> 
- <li> 
-Select the check boxes <strong>Lock Device</strong> or<strong>Sound Alarm</strong> as per your requirement and then click <strong>Add</strong>. Add Networks window appears. 
- </li> 
- <li> 
- Select the Wi-Fi networks you want the device to always be connected to 
- and then click <strong>Save</strong>. 
- </li> 
-</ol> 
-<p> 
- If the devices are not connected/disconnected from the added Wi-Fi network 
- SSID, they will be locked or raise a loud alarm as per the policy 
- configuration. 
-</p> 
-<h3> 
- Deleting a Wi-Fi network SSID 
-</h3> 
-<ol start="1" type="1"> 
- <li> 
- Select a Wi-Fi network SSID and then click <strong>Delete</strong>. A 
- confirmation prompt appears. 
- </li> 
- <li> 
- Click <strong>OK</strong>. The Wi-Fi network SSID will be deleted. 
- </li> 
-</ol> 
-<h2> 
- Scheduled Backup (Contacts &amp; SMS) 
-</h2> 
-<p> 
- The Schedule Backup policy lets you take a backup of all the contacts and 
- text messages on a device as per your requirements. The backup of contacts 
- and text messages can be saved in two different folders. The backup can be 
- scheduled for daily/weekly basis. 
-</p> 
-<h3> 
- Creating a schedule 
-</h3> 
-<ol start="1" type="1"> 
- <li> 
-Click <strong>Add</strong>. Add new job window appears. <strong></strong> 
- </li> 
- <li> 
- Enter a job name. 
- </li> 
- <li> 
- In Job Settings, select the preferred backup(s). 
- </li> 
- <li> 
- In Job Scheduler Settings, select whether you want to take a backup 
- daily or weekly. 
- </li> 
-</ol> 
-<p> 
-Set the specific time at which you want to take the backup and then click <strong>Save</strong>. 
-</p> 
-<h3> 
- Modifying a schedule 
-</h3> 
-<ol start="1" type="1"> 
- <li> 
-To modify a schedule, select the specific schedule and then click <strong>Modify</strong>. Modify backup job window appears. 
- </li> 
- <li> 
- Make the required changes and then click <strong>Save</strong>. The 
- schedule will be modified. 
- </li> 
-</ol> 
-<p> 
- As an Administrator, you can even disable a scheduled backup by selecting 
- the option <strong>Disable schedule</strong> &gt; <strong>Save</strong>. 
-</p> 
-<h3> 
- Deleting a schedule 
-</h3> 
-<p> 
- To delete a schedule, follow the steps given below:<strong></strong> 
-</p> 
-<ol start="1" type="1"> 
- <li> 
- Select a schedule and then click <strong>Delete</strong>. A 
- confirmation prompt appears. 
- </li> 
- <li> 
- Click <strong>OK</strong>. The schedule will be deleted. 
- </li> 
-</ol> 
-<h2> 
- Content Library Policy 
-</h2> 
-<p> 
- Content Library policy lets you deploy documents to the users’ devices. The 
- documents can be imported from the Content Library module and deployed to 
- the users. 
-</p> 
-<h3> 
- Import a file 
-</h3> 
-<p> 
-To import a file from Content Library, click <strong>Import</strong>.<strong> </strong>Select the file and then click <strong>Save</strong>. <strong></strong> 
-</p> 
-<p> 
-To delete a file, select the specific file and then click <strong>Delete</strong>. 
-</p> 
-<p> 
- <strong>Default, Deploy, or Cancel</strong> 
-</p> 
-<p> 
- <strong>Description</strong> 
-- You can select eScan <strong>Default</strong> settings or <strong>Deploy</strong> the setting defined by you for 
- implementing/deploying on specific groups. 
-</p> 
-<h2> 
- Kiosk Mode Policy 
-</h2> 
-<p> 
- To configure Kiosk Mode Policy, select <strong>Enable Kiosk Mode</strong> 
- check box. 
-</p> 
-<p> 
- To allow an application to be accessed in Kiosk mode, click the drop-down. 
- The drop-down displays a list of installed applications. Select an 
- application and then click <strong>Add</strong>. The application will be 
- added. 
-</p> 
-<p> 
- To delete the added application(s) from Kiosk mode, select the 
- application(s) and then click <strong>Delete</strong>. The application will 
- be deleted. 
-</p> 
-<h3> 
- Hardware Key Control 
-</h3> 
-<p> 
- Kiosk mode also lets you disable a device’s hardware keys. 
-</p> 
-<p> 
- <strong>Disable Power button</strong> 
- – Selecting this check box disables a device’s Power button. 
-</p> 
-<p> 
- <strong>Disable Volume buttons</strong> 
- – Selecting this check box disables a device’s Volume buttons. 
-</p> 
-<h3> 
- Allow User to Turn ON/OFF 
-</h3> 
-<p> 
- <strong>Wi-Fi</strong> 
- – Selecting this check box allows a user to turn device’s Wi-Fi ON/OFF 
- through Kiosk application. 
-</p> 
-<p> 
- <strong>Bluetooth</strong> 
- – Selecting this check box allows a user to turn device’s Bluetooth ON/OFF 
- through Kiosk application. 
-</p> 
-<p> 
- <strong>Volume</strong> 
- – Selecting this check box allows a user to increase/decrease the device’s 
- volume through Kiosk application. 
-</p> 
-<p> 
- <strong>Brightness</strong> 
- – Selecting this check box allows a user to increase/decrease the device’s 
- brightness through Kiosk application. 
-</p> 
-<table border="1" cellspacing="0" cellpadding="0"> 
- <tr> 
- <td width="44" valign="top"> 
- <p> 
- <strong>Note</strong> 
- </p> 
- </td> 
- <td width="572" valign="top"> 
- <p> 
- Unchecking options won’t display Control to the user on the 
- Kiosk application. 
- </p> 
- </td> 
- </tr> 
-</table> 
-<br clear="all"/> 
-<h1> 
- iOS Template 
-</h1> 
-<p> 
- The iOS Template consists following policies: 
-</p> 
-<ul type="disc"> 
- <li> 
- Device Passcode Policy 
- </li> 
- <li> 
- Restrictions Policy 
- </li> 
- <li> 
- Web Clip Policy 
- </li> 
- <li> 
- Email Policy 
- </li> 
- <li> 
- Wi-Fi Settings Policy 
- </li> 
- <li> 
- Content Library Policy 
- </li> 
- <li> 
- Required Applications 
- </li> 
-</ul> 
-<h2> 
- Device Passcode Policy 
-</h2> 
-<p> 
- The Device Passcode Policy lets you configure the passcode, auto-lock 
- duration, device lock grace period and data wipe in case of maximum 
- passcode fail attempts. 
-</p> 
-<p> 
- Select the <strong>Enable</strong> check box to enable all the fields in 
- this section. 
-</p> 
-<p> 
- You can set the Device passcode policy for the device using this policy. 
-</p> 
-<p> 
- <strong>Allow Simple Value:</strong> 
- Set this option to <strong>Yes</strong> if the passcode should be simple 
- value. 
-</p> 
-<p> 
- For example, 1234 or 0000 
-</p> 
-<p> 
- <strong>Require Alphanumeric Value:</strong> 
- Set this option to <strong>Yes</strong> if the passcode should be 
- alphanumeric. For example, abc123 or 123abc 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Minimum Passcode Length:</strong> 
- This option lets you set the minimum passcode length.<strong> </strong>The 
- numeric value can be set between 1 and 16. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Minimum Number of Special characters:</strong> 
- This option lets you set the count of special characters required to 
- construct a passcode. The count for special characters in 
-</p> 
-<p> 
- passcode can be set between 1 and 4. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Maximum Passcode Age (days 1-730, or blank): </strong> 
- This option lets you set the maximum number of days from 1 to 730 before 
- the password expires and asks the user to set a new one. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Allowed idle time, before Auto-Lock: </strong> 
- This option lets you set time for a device (in minutes), before it gets 
- auto-locked.<strong></strong> 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong> 
- Number of Passcodes to be maintained in the history (1-50, or blank): 
- </strong> 
- This option lets you set the number of passcodes to be maintained in the 
- history. 
-</p> 
-<p> 
- <strong>Grace Period for Device Lock: </strong> 
- Grace period is a time duration that ensures the device stays locked until 
- the next passcode entry. This option lets you set the grace period for a 
- device from 1 Minute to 4 Hours.<em></em> 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong> 
- Maximum Number of Failed Attempts (Before all data is erased): 
- </strong> 
- This option lets you set the maximum number of failed attempts allowed for 
- unlocking a device before all data on the device is erased. 
-</p> 
-<h2> 
- Restrictions Policy 
-</h2> 
-<p> 
- The Restrictions Policy lets you apply restrictions on a device. 
-</p> 
-<p> 
- • Device Functionality 
-</p> 
-<p> 
- • Application 
-</p> 
-<p> 
- • Safari Settings 
-</p> 
-<p> 
- • iCloud 
-</p> 
-<p> 
- • Security and Privacy 
-</p> 
-<p> 
- • Content Ratings 
-</p> 
-<p> 
- • Ratings by Region 
-</p> 
-<h3> 
- Device Functionality 
-</h3> 
-<p> 
- <strong>Allow Installing Apps:</strong> 
- Set this option to <strong>Yes</strong> to allow users to install 
- applications. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Allow Use of Camera:</strong> 
- Set this option to <strong>Yes</strong> to allow users to access device’s 
- camera. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Allow FaceTime:</strong> 
- <strong> </strong> 
- Set this option to <strong>Yes</strong> to allow users to access FaceTime. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Allow Screen Capture:</strong> 
- Set this option to <strong>Yes</strong> to allow users to take a screenshot 
- or record their screen. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Allow Siri:</strong> 
- Set this option to <strong>Yes</strong> to allow users to use Siri. 
-</p> 
-<p> 
- <strong>Allow Siri while </strong> 
- <strong>the </strong> 
- <strong>device</strong> 
- <strong> is </strong> 
- <strong>locked:</strong> 
- Set this option to <strong>Yes</strong> to allow users to use Siri while 
- the device is locked. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Allow usage of Touch ID to unlock device</strong> 
- <strong> </strong> 
- <strong>(iOS 7 and above):</strong> 
- Set this option to <strong>Yes</strong> to allow users to unlock their 
- devices with Touch ID. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Allow </strong> 
- <strong>Apple Wallet</strong> 
- <strong> while</strong> 
- <strong> the</strong> 
- <strong> device</strong> 
- <strong> is</strong> 
- <strong> locked</strong> 
- <strong> </strong> 
- <strong>(iOS 6 and above):</strong> 
- Set this option to <strong>Yes</strong> to allow use of Apple Wallet while 
- the device is locked. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Show Control Center in lock screen (iOS 7 and above):</strong> 
- <strong> </strong> 
- Set this option to <strong>Yes</strong> to allow users to access Control 
- Center in the lock screen. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Show Notification Center in lock screen (iOS 7 and above):</strong> 
- Notification Center is a feature in iOS that provides an overview of 
- application notifications. Set this option to <strong>Yes</strong> to allow 
- users to view Notification Center in lock screen. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Show Today view in lock screen (iOS 7 and above):</strong> 
- Set this option to <strong>Yes</strong> to allow users to view Today View 
- in lock screen. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Allow Voice Dialing:</strong> 
- Set this option to <strong>Yes</strong> to allow users to call their 
- contacts via voice. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Allow In</strong> 
- <strong>-</strong> 
- <strong>App Purchase:</strong> 
- Set this option to <strong>Yes</strong> to allow users to make in-app 
- purchases. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Force User to enter iTunes Store password:</strong> 
- Set this option to <strong>Yes</strong> to force a user to enter their 
- iTunes Store password. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Allow Multiplayer Gaming</strong> 
- <strong>:</strong> 
- Set this option to <strong>Yes</strong> to allow a user to play a 
- multiplayer game on their device. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Allow Adding Game Center Friends:</strong> 
- Set this option to <strong>Yes</strong> to allow a user to add Game Center 
- friends. 
-</p> 
-<h3> 
- Application 
-</h3> 
-<p> 
- <strong>Allow Use of YouTube:</strong> 
- Set this option to <strong>Yes</strong> to allow users to access YouTube. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Allow Use of</strong> 
- <strong> iTunes</strong> 
- <strong> Music Store:</strong> 
- Set this option to <strong>Yes</strong> allow users to access iTunes Music 
- Store. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Allow Use of Safari:</strong> 
- Set this option to <strong>Yes</strong> to allow users to access Safari. 
-</p> 
-<h3> 
- Safari Settings 
-</h3> 
-<p> 
- <strong>Enable Autofill:</strong> 
- Set this option to <strong>Yes </strong>if you want Safari to remember the 
- information users entered in the web forms. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Force Fraud Warning:</strong> 
- Set this option to <strong>Yes</strong> if you want Safari to prevent the 
- user from visiting websites identified as being fraudulent or compromised. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Enable JavaScript:</strong> 
- Set this option to <strong>Yes</strong> if you want Safari to accept all 
- JavaScript on websites. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Allow Pop-ups:</strong> 
- Set this option to <strong>Yes </strong>if you want Safari to allow all 
- pop-ups on a website. 
-</p> 
-<p> 
- <strong>Accept Cookies: </strong> 
- Select the appropriate option for Safari to accept cookies.<em></em> 
-</p> 
-<ul type="disc"> 
- <li> 
- Always 
- </li> 
- <li> 
- From Visited Sites 
- </li> 
- <li> 
- Never 
- </li> 
-</ul> 
-<h3> 
- iCloud 
-</h3> 
-<p> 
- <strong>Allow Backup:</strong> 
- Set this option to <strong>Yes</strong> to allow backup of device data to 
- iCloud. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Allow Document Sync:</strong> 
- Set this option to <strong>Yes</strong> to allow Document Sync on a device. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Allow Photo Stream:</strong> 
- Set this option to <strong>Yes</strong> to allow Photo Stream on a device. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Allow Shared Stream</strong> 
- <strong> </strong> 
- <strong>(iOS 6 and above):</strong> 
- Set this option to <strong>Yes</strong> to allow Shared Stream on a device. 
-</p> 
-<h3> 
- Security and Privacy 
-</h3> 
-<p> 
- <strong>Allow Diagnostic Data to be sent to Apple</strong> 
- <strong> </strong> 
- <strong>(iOS 6 and above):</strong> 
- <strong> </strong> 
- Set this option to <strong>Yes</strong> to allow a device’s diagnostic data 
- to be sent to Apple servers. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Allow User to accept untrusted TLS Certificates:</strong> 
- Set this option to <strong>Yes</strong> to allow user to accept untrusted 
- TLS Certificates. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Allow automatic updates to certificate trust settings</strong> 
- <strong> </strong> 
- <strong>(iOS 7 and above):</strong> 
- <strong> </strong> 
- Set this option to <strong>Yes</strong> to allow automatic updates to 
- certificate trust settings. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Force Encrypted Backups: </strong> 
- Set this option to <strong>Yes </strong>to force a device to take encrypted 
- backups. 
-</p> 
-<p> 
- <strong>Force limited ad tracking</strong> 
- <strong> </strong> 
- <strong>(iOS 7 and above)</strong> 
- : Set this option to <strong>Yes </strong>to stop receiving targeted 
- advertisements on a device. This feature does not block ads. The device 
- user may still receive random ads. 
-</p> 
-<p> 
- <strong>Allow documents from managed apps in unmanaged apps</strong> 
- <strong> </strong> 
- <strong>(iOS 7 and above):</strong> 
- <strong> </strong> 
- Set this option to <strong>Yes </strong>to allow documents from managed 
- applications to open in unmanaged applications. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Allow documents from unmanaged apps in managed apps</strong> 
- <strong> </strong> 
- <strong>(iOS 7 and above):</strong> 
- <strong> </strong> 
- Set this option to <strong>Yes </strong>to allow documents from unmanaged 
- applications to open in managed applications. 
-</p> 
-<h3> 
- Content Ratings 
-</h3> 
-<p> 
- <strong>Allow Explicit Music Podcasts</strong> 
- : Set this option to <strong>Yes</strong> to allow explicit music podcasts 
- to be played on a device. 
-</p> 
-<h3> 
- Ratings by Region 
-</h3> 
-<p> 
- <strong>Enable Ratings by Region</strong> 
- : Set this option to <strong>Yes</strong> to enable content ratings by 
- region. 
-</p> 
-<h2> 
- WebClip Policy 
-</h2> 
-<p> 
- The WebClip policy lets you get important websites on a device’s home 
- screen to let users access it quickly. 
-</p> 
-<h3> 
- Adding a WebClip 
-</h3> 
-<p> 
- Check <strong>Enable</strong> and then click <strong>Add</strong>. WebClip 
- Policy window appears. 
-</p> 
-<p> 
- <strong>WebClip Label: </strong> 
- Enter a name for the WebClip.<strong></strong> 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>URL to be Linked: </strong> 
- Enter the website URL. 
-</p> 
-<p> 
- <strong>Removal of WebClip: </strong> 
- Set the WebClip status as either Enable or Disable. If enabled, the user 
- can remove the WebClip from the device.<strong></strong> 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Allow Full Screen</strong> 
- : Select <strong>Yes</strong> to allow full screen and <strong>No</strong> 
- to disable full screen. 
-</p> 
-<p> 
- After entering all the details, click <strong>Save</strong>. The new web 
- clip policy will be added. 
-</p> 
-<h3> 
- Deleting a WebClip 
-</h3> 
-<p> 
- Select a WebClip and then click <strong>Delete</strong>. The WebClip will 
- be deleted. 
-</p> 
-<h2> 
- Email Policy 
-</h2> 
-<p> 
- The<strong> </strong>Email Policy<strong> </strong>lets you set up an email 
- account for the<strong> </strong>managed devices<strong> </strong>and 
- define the settings for incoming and outgoing emails. 
-</p> 
-<p> 
-Check <strong>Enable </strong>and then<strong> </strong>click <strong> Add</strong>. 
-</p> 
-<p> 
- Email Policy window appears. 
-</p> 
-<p> 
- <strong>Account Name: </strong> 
- Enter an account name.<strong></strong> 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Account Type: </strong> 
- Set the Account Type as <strong>IMAP</strong> or <strong>POP</strong>. 
-</p> 
-<p> 
- Choose <strong>POP</strong> if… 
-</p> 
-<ul type="disc"> 
- <li> 
- You need constant access to your email, regardless of the Internet 
- availability. 
- </li> 
- <li> 
- You have limited server storage. 
- </li> 
-</ul> 
-<p> 
- Choose <strong>IMAP</strong> if… 
-</p> 
-<ul type="disc"> 
- <li> 
- You have a reliable and active Internet connection. 
- </li> 
- <li> 
- You want to receive a quick overview of new emails on the server. 
- </li> 
- <li> 
- Your local storage space is limited.<strong></strong> 
- </li> 
-</ul> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Path Prefix:</strong> 
-In some cases, it is possible that you will not see the<strong>Sent</strong>,<strong> Trash</strong>,<strong> Drafts</strong>, and <strong>Junk</strong> folders. Typically, these folders are in your INBOX 
- and you'll have to set a prefix path for it to work correctly. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>User Display Name:</strong> 
- <em> </em> 
- Type in the prefix <em>"%username%" or "%email%". </em>It<em> </em>will 
- fetch the appropriate Username/Email mapped to the device.<strong></strong> 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Email Address: </strong> 
- Typing<strong> </strong>in the prefix %<em>email</em>%" will fetch the 
- appropriate email ID mapped to the device.<strong></strong> 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Allow Move: </strong> 
-Select the <strong>Yes</strong> option<strong> </strong>to <strong> Allow Move</strong>. Selecting <strong>No </strong>will prevent 
- email data from being opened in other applications. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Disable recent mail address sync (iOS 6 and above): </strong> 
- Selecting <strong>Yes </strong>will remove the mailbox from Recents address 
- syncing. 
-</p> 
-<h3> 
- Incoming Mail 
-</h3> 
-<p> 
- <strong>Mail Server: </strong> 
- Enter the hostname for Incoming Mail Server in this field.<strong></strong> 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Port: </strong> 
- Designates the incoming mail server port number. If no port number is 
- specified, the default port for a given protocol is used.<strong></strong> 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Username: </strong> 
- Add the<strong> prefixes</strong> “<em>%username</em>%" or "%<em>email</em> 
-%". It will fetch the<strong> </strong>appropriate Username/Email <strong> </strong>mapped to the device.<strong></strong> 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Authentication Type: </strong> 
-Select the<strong> </strong>appropriate authentication type <strong> </strong>from the following options 
-</p> 
-<ul type="disc"> 
- <li> 
- None 
- </li> 
- <li> 
- Password 
- </li> 
- <li> 
- MD5 Challenge Service-Response 
- </li> 
- <li> 
- NTLM 
- </li> 
- <li> 
- HTTP MD5 Digest 
- </li> 
-</ul> 
-<p> 
- <strong>Password: </strong> 
- Set a<strong> </strong>password for incoming emails.<strong></strong> 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Use SSL: </strong> 
- Designates whether or not the incoming mail server uses SSL certificate. 
- Select <strong>Yes</strong> to allow the mail server to use SSL. 
-</p> 
-<h3> 
- Outgoing Mail 
-</h3> 
-<p> 
- <strong>Mail Server:</strong> 
- <strong> </strong> 
- Enter the hostname for outgoing mail server.<strong></strong> 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Port:</strong> 
- Enter the outgoing mail server port number.<strong></strong> 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Username:</strong> 
- Add the prefixes “%username%" or "%email%". It will fetch the appropriate 
- Username/Email mapped to the device.<strong></strong> 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Authentication Type:</strong> 
- Select the appropriate authentication type from the drop-down. Following 
- authentication types are available.<strong></strong> 
-</p> 
-<ul type="disc"> 
- <li> 
- None 
- </li> 
- <li> 
- Password 
- </li> 
- <li> 
- MD5 Challenge Service-Response 
- </li> 
- <li> 
- NTLM 
- </li> 
- <li> 
- HTTP MD5 Digest 
- </li> 
-</ul> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Password:</strong> 
- Set a password for outgoing emails.<strong></strong> 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Use Outgoing Password Same as Incoming: </strong> 
- If you want to use the same password set for the incoming email server, 
- select <strong>Yes</strong>.<strong></strong> 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Use Only in Mail: </strong> 
- Prohibits sending messages from other applications, such as Safari or 
- Photos. If yes, configured account cannot be selected as default mail 
- account on the device. 
-</p> 
-<p> 
- <strong>Use SSL: </strong> 
- Determines whether or not the outgoing mail server uses SSL certificate. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<h2> 
- Wi-Fi Settings Policy 
-</h2> 
-<p> 
- The Wi-Fi Settings Policy lets you manage how a user connects their devices 
-to a Wi-Fi network. Check <strong>Enable</strong> and then click <strong>Add</strong>. Wi-Fi Settings Policy window appears. 
-</p> 
-<p> 
- <strong>Wireless Network Identification: </strong> 
- Enter a name for the Wireless Network Identification.<strong></strong> 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Automatically Join Network: </strong> 
- Set this option to <strong>Yes </strong>to automatically join a Wi-Fi 
- network.<strong></strong> 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Hidden Network: </strong> 
-Select this option to <strong>Yes</strong> to add a hidden network. <strong></strong> 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Security Type:</strong> 
- Select a Security type for Wi-Fi network from the following options. 
-</p> 
-<ul type="disc"> 
- <li> 
- None 
- </li> 
- <li> 
- WEP 
- </li> 
- <li> 
- WPA/WPA2 
- </li> 
- <li> 
- Any(Personal) 
- </li> 
- <li> 
- WEP Enterprise 
- </li> 
- <li> 
- WPA/WPA2 Enterprise 
- </li> 
- <li> 
- Any (Enterprise)<strong></strong> 
- </li> 
-</ul> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Password: </strong> 
- Enter the password to connect to the Wi-Fi network. 
-</p> 
-<p> 
- <strong>Configure Proxy:</strong> 
-Configure a proxy for Wi-Fi settings by selecting a Wireless <strong> </strong>Network Identification. 
-</p> 
-<ul> 
- <li> 
- None 
- </li> 
-</ul> 
-<ul type="disc"> 
- <li> 
- Manual 
- </li> 
- <li> 
- Automatic 
- </li> 
-</ul> 
-<p> 
-After entering the appropriate details, click <strong>Save</strong>. 
-</p> 
-<h2> 
- Content Library Policy 
-</h2> 
-<p> 
- The Content Library policy lets you share documents with the users. The 
- documents can be imported from the Content Library module and deployed to 
-multiple users at the same time. 
-</p> 
-<h3> 
- Importing a file 
-</h3> 
-<p> 
- Check <strong>Enable</strong> and then click <strong>Import</strong>. 
- Import Files window appears. 
-</p> 
-<p> 
- Select a file and then click <strong>Save</strong>. 
-</p> 
-<h3> 
- Deleting a file 
-</h3> 
-<p> 
- Select a file and then click <strong>Delete</strong>. The file will be 
- deleted. 
-</p> 
-<p> 
- <strong>Default, Deploy or Cancel</strong> 
-</p> 
-<p> 
-You can select eScan <strong>Default</strong> settings or <strong>Deploy</strong> the setting defined by you for 
- implementing/deploying on selected managed devices. 
-</p> 
-<h2> 
- Required Applications Policy 
-</h2> 
-<p> 
- The Required Applications policy lets you import applications from the App 
- Store module for installation on managed devices in the group through 
- policy deployment. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<h3> 
- Importing an application 
-</h3> 
-<p> 
- To import applications from the App Store, follow the steps given below: 
-</p> 
-<ol start="1" type="1"> 
- <li> 
-Select <strong>Enable</strong> check box and then click <strong>Import</strong>. Import Application window appears. 
- </li> 
- <li> 
- Select the application(s) to be installed on users’ devices and then 
- click <strong>Save</strong>. The application(s) will be imported. 
- </li> 
-</ol> 
-<h3> 
- Deleting an application 
-</h3> 
-<p> 
- Select an application and then click <strong>Delete</strong>. The selected 
- application will be deleted. 
-</p> 
-<h1> 
- Group Tasks 
-</h1> 
-<p> 
- The Group Tasks option lets you create and schedule tasks for the devices 
- in a group. 
-</p> 
-<h3> 
- Creating a New Group Task 
-</h3> 
-<ol start="1" type="1"> 
- <li> 
-Select a group and then click <strong>Group Tasks</strong> &gt; <strong>New Task</strong>. The New Task window appears. 
- </li> 
- <li> 
- Enter a task name. 
- </li> 
- <li> 
- In Task Settings, select the scan type to be run on a device. By 
- checking Update, you can also let the application update its virus 
- signature database.<strong></strong> 
- </li> 
- <li> 
- In Task Scheduling Settings, schedule the created task by selecting the 
- appropriate options. 
- </li> 
- <li> 
- Click <strong>Save</strong>. The task will be created instantly. 
- </li> 
-</ol> 
-<p> 
- <strong>Start Task</strong> 
-</p> 
-<p> 
- Click <strong>Start Task</strong> to run the selected task for the specific 
- group. 
-</p> 
-<p> 
- <strong>Properties</strong> 
-</p> 
-<p> 
- Click <strong>Properties</strong> to view properties and change settings of 
- the selected task. 
-</p> 
-<p> 
- <strong>Results</strong> 
-</p> 
-<p> 
- Click <strong>Results</strong> to view detailed results of the selected 
- task. 
-</p> 
-<p> 
- <strong>Delete Task</strong> 
-</p> 
-<p> 
- Click <strong>Delete Task</strong> to delete the selected task from the 
- list of tasks. 
-</p> 
-<h1> 
- Installation and Enrollment of Android Device for MDM Group 
-</h1> 
-<p> 
- The enrollment procedure for an Android device consists of two main steps: 
-</p> 
-<ol start="1" type="1"> 
- <li> 
- <strong>Adding a device to the console</strong> 
- </li> 
- <li> 
- <strong>Enrolling the added device</strong> 
- </li> 
-</ol> 
-<h3> 
- Adding a device to the console<em></em> 
-</h3> 
-<p> 
- To add a device to the console, perform the following steps: 
-</p> 
-<ol start="1" type="1"> 
- <li> 
-Click <strong>Managed Mobile Devices</strong> &gt; <strong>Action List </strong>&gt;<strong> New Group</strong>. 
- </li> 
- <li> 
-Enter a name for the group; select the group type as <strong>MDM</strong> and then click <strong>Save</strong>. 
- </li> 
- <li> 
- Select the group. 
- </li> 
- <li> 
- Click <strong>Action List</strong> &gt; <strong>Add New Device</strong> 
- . Add New Device window appears. 
- </li> 
- <li> 
- Enter the mandatory details, select the appropriate OS Type and then 
- click <strong>Add</strong>. 
- </li> 
-</ol> 
-<p> 
- The device will be added to the MDM group. 
-</p> 
-<p> 
- After adding a device to the group, you will see red android icon next to 
- the check box. This icon indicates that the added device is not enrolled. 
-</p> 
-<h3> 
- Enrolling the added device 
-</h3> 
-<p> 
- After a device is added to the console, an enrollment email is sent to the 
- specified email ID. This email contains enrollment details and steps to 
- download the MDM application. It also contains the QR code which directly 
- fetches the enrollment details by scanning it from the device. 
-</p> 
-<p> 
- In case a user did not receive the enrollment email at the time of adding 
-the device, you can resend it. Select the specific device and then click<strong>Client Action List</strong> &gt; <strong>Resend Enrollment Email</strong>. 
-</p> 
-<p> 
- After receiving the enrollment email, the user should perform the following 
- steps: 
-</p> 
-<ol start="1" type="1"> 
- <li> 
- Tap the shared URL in the email. A prompt appears asking you to 
- download the eScan MDM application. Tap <strong>DOWNLOAD</strong>. 
- </li> 
-</ol> 
-<p> 
- 2. Tap the downloaded file and read thoroughly about the permissions asked 
- by 
-</p> 
-<p> 
- the application. To proceed, tap <strong>NEXT</strong>. 
-</p> 
-<ol start="3" type="1"> 
- <li> 
-After reading the application’s access permissions, tap <strong>INSTALL</strong>. Welcome screen appears. 
- </li> 
- <li> 
- Tap <strong>Open Agreement </strong>and read the agreement completely. 
- </li> 
- <li> 
- After reading the agreement, tap <strong>Accept</strong>. Enrollment 
- Details form appears. 
- </li> 
- <li> 
- Enter the enrollment details mentioned in the email. To fetch the 
-details automatically by scanning QR code, tap <strong>Fill entries through QR Code</strong>. Doing so allows 
- application to access device’s camera. Match up the on-screen square 
- with the QR code and hold device steady till the application scans it. 
- After the details are filled, tap <strong>Enroll Device</strong>. 
- </li> 
- <li> 
- Device Enrollment begins. Wait till the device gets enrolled. Device 
- Administrator prompt appears. 
- </li> 
- <li> 
- It is recommended that you tap <strong>Next</strong>. Activate Device 
- Administrator prompt appears. 
- </li> 
- <li> 
-Read about the permissions completely and then tap <strong>ACTIVATE</strong>. VPN Service Permission dialog box appears. 
- </li> 
- <li> 
- It is recommended that you tap <strong>Next</strong> as VPN won’t work 
- if you tap <strong>Skip</strong>. This permission is required for the 
- proper functioning of the “App Specfic Network Blocking” feature. App 
- Lock Activity prompt appears. 
- </li> 
- <li> 
- It is recommended that you tap <strong>Next</strong>. The application 
- enrollment is completed after this step. 
- </li> 
-</ol> 
-<h1> 
- Installation and Enrollment of Android Device for COD and BYOD Group 
-</h1> 
-<p> 
- The Enrollment Procedure for Android Devices for COD and BYOD Group 
-</p> 
-<p> 
- The enrollment procedure for an Android device consists of two main steps: 
-</p> 
-<ol start="1" type="1"> 
- <li> 
- <strong>Adding a device to the console</strong> 
- </li> 
- <li> 
- <strong>Enrolling the added device</strong> 
- <strong></strong> 
- </li> 
-</ol> 
-<h3> 
- Adding a device to the console<em></em> 
-</h3> 
-<p> 
-To add a device in the <strong>eScan Mobility Management</strong> ( <strong>EMM</strong>) console, perform the following steps: 
-</p> 
-<ol start="1" type="1"> 
- <li> 
-Click <strong>Managed Mobile Devices</strong> &gt; <strong>Action List</strong> &gt; <strong>New Group</strong>. 
- </li> 
- <li> 
- Enter a name for the group and select the group Type as COD to create 
-COD<strong> </strong>group<strong> </strong>or<strong> </strong>BYOD <strong> </strong>to create BYOD Group. 
- </li> 
- <li> 
- Select a group. 
- </li> 
- <li> 
- Click <strong>Action List</strong> &gt; <strong>Add New Device</strong> 
- . Add New Device screen appears.<strong></strong> 
- </li> 
- <li> 
- Enter the required details, select the appropriate OS Type and then 
- click <strong>Add</strong>.<strong></strong> 
- </li> 
-</ol> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- The device will be added to the console in the COD or BYOD group. 
-</p> 
-<p> 
- You can see the device being added in the console. Notice the icon red 
- android in the <strong>Mobile Number</strong> column; this indicates that 
- the device is not enrolled. 
-</p> 
-<h3> 
- Enrolling the added device 
-</h3> 
-<p> 
- After a device is added to the console, an email containing the enrollment 
- procedure will be sent to the specified email ID. This email contains 
- enrollment details and steps to download MDM application. In addition to 
- this, it also contains the QR code which will directly fetch the enrollment 
- details by scanning it from the device. 
-</p> 
-<p> 
- In case a user didn’t receive the enrollment email at the time of adding 
- the device, you can resend the email by using Resend Enrollment Email 
- option. 
-</p> 
-<p> 
- <strong>Resend Enrollment email for Device in COD/BYOD Group</strong> 
-</p> 
-<p> 
-Select the specific device and then click<strong>Client Action List</strong> &gt; <strong> Resend Enrollment Email</strong>. 
-</p> 
-<p> 
- After receiving the enrollment email, the user should perform the following 
- steps: 
-</p> 
-<ol start="1" type="1"> 
- <li> 
- Tap the shared URL in the email. A prompt appears asking you to 
- download the eScan MDM application. Tap <strong>DOWNLOAD</strong>. 
- </li> 
- <li> 
- Tap the downloaded file and read thoroughly about the permissions asked 
- by the application. Tap <strong>NEXT</strong> to proceed. 
- </li> 
- <li> 
- The application will get access to your call logs, text messages and 
- USB storage. Tap <strong>INSTALL</strong>. Welcome screen appears. 
- </li> 
- <li> 
- Tap <strong>Open Agreement </strong>and read the agreement completely. 
- </li> 
- <li> 
- After reading the agreement completely, tap <strong>Accept</strong>. 
- Enrollment Details form appears. 
- </li> 
-</ol> 
-<p> 
- 6. Enter the details mentioned in the enrollment email or scan the QR code 
-to fetch the details automatically by tapping <strong>Fill entries through QR Code</strong>. Doing so will turn on your 
- device’s camera. Match up the on-screen square with the QR code and hold 
- your device steady till the application scans it. The details will be 
-automatically filled. After the details are filled, tap <strong>Enroll Device</strong>. Device Enrollment begins. Wait till the 
- device gets enrolled. Device Administrator prompt appears. 
-</p> 
-<ol start="7" type="1"> 
- <li> 
- It is recommended that you tap <strong>Next</strong>. Activate Device 
- Administrator prompt appears. 
- </li> 
- <li> 
- Read about the permissions asked by the application completely and then 
- tap <strong>ACTIVATE</strong>. 
- </li> 
-</ol> 
-<p> 
- VPN Service Permission dialog box appears. 
-</p> 
-<ol start="9" type="1"> 
- <li> 
- It is recommended that you tap <strong>Next</strong> as VPN won’t work 
- if you tap <strong>Skip</strong>. This permission is required for the 
- proper functioning of the “App Specfic Network Blocking” feature. App 
- Lock Activity prompt appears. 
- </li> 
- <li> 
- It is recommended that you tap <strong>Next</strong>. The application 
- enrollment is completed after this step. After the MDM application is 
- installed, install the Container Application. 
- </li> 
-</ol> 
-<h2> 
- Differences between COD and BYOD group 
-</h2> 
-<p> 
- Enterprises empower their employees by allowing the use of mobile devices 
- under Company Owned Devices (COD) policy or by implementing Bring Your Own 
- Device (BYOD) policy for work operations. This enhances employee 
- productivity and allows seamless business operations. It allows 
- organizations to have a comprehensive approach in safeguarding critical 
- applications and enterprise data accessed or residing in mobile devices. It 
- ensures that corporate data is secured from data loss, malware or 
- unauthorized access. 
- <br/> 
- <br/> 
- After the MDM application is successfully installed on a device, the 
- administrator can see the device details in the management console. Policy 
- deployment on the managed devices will be carried out under the MDM 
- Category. 
-</p> 
-<p> 
- Container deployment will provide you with a medium to allow users to use 
- their device for office work within the defined perimeter under BYOD 
- through geo-fencing policy deployment. 
-</p> 
-<p> 
- In case the device is provided by the enterprise, you can enroll the device 
- as COD (Company Owned Device) where the security policies for the container 
- will be applicable irrespective of the device location. 
-</p> 
-<table border="1" cellspacing="0" cellpadding="0"> 
- <tr> 
- <td width="36"> 
- <p> 
- <strong>Note</strong> 
- </p> 
- </td> 
- <td width="565" valign="top"> 
- <p> 
- By default, whenever an administrator adds mobile 
- device(s), it will be added in the MDM group. 
- </p> 
- <p> 
- The Container application can be accessed only after the 
- eScan MDM application is installed and enrolled on the 
- managed device. 
- </p> 
- </td> 
- </tr> 
-</table> 
-<h2> 
- Installing eScan Container app 
-</h2> 
-<p> 
- To install eScan Container app, follow the steps given below: 
-</p> 
-<ol start="1" type="1"> 
- <li> 
- Instruct the user to tap the installation notification. Tapping this 
- notification will initiate the download of eScan container application. 
- Tap the downloaded apk file. 
- </li> 
- <li> 
- Tap <strong>Package Installer</strong>. 
- </li> 
-</ol> 
-<table border="1" cellspacing="0" cellpadding="0"> 
- <tr> 
- <td width="48"> 
- <p align="center"> 
- <strong>Note</strong> 
- </p> 
- </td> 
- <td width="553"> 
- <p> 
- It is recommended that a user tap <strong>Install</strong> 
- and initiate the installation of the Container application. 
- </p> 
- </td> 
- </tr> 
-</table> 
-<p> 
- After tapping <strong>Install,</strong> an installation prompt appears. 
-</p> 
-<ol start="3" type="1"> 
- <li> 
- Tap <strong>INSTALL</strong>. The Container application will be 
- successfully installed on the user’s device. 
- </li> 
- <li> 
-Following screen appears after successful installation. Tap <strong>OPEN</strong>. 
- </li> 
-</ol> 
-<p> 
- 5. Launch the Container application. The application asks you to set up 
- your profile. Tap <strong>SET UP &gt;</strong>. 
-</p> 
-<p> 
- 6. A message informing about device information access to administrator is 
- displayed. Tap <strong>OK </strong>to proceed. 
-</p> 
-<p> 
- 7. To create a work profile, select one of the following three options. 
-</p> 
-<ul> 
- <li> 
- <strong>Add Account:</strong> 
- Enter your Gmail account details and tap <strong>ACCEPT</strong>. 
- </li> 
- <li> 
- <strong>Add account with name</strong> 
- : Enter your Gmail account details and name. 
- </li> 
- <li> 
- <strong>Skip: </strong> 
- Select this option to skip entering your login details. 
- </li> 
-</ul> 
-<p> 
- After selecting an option, tap <strong>NEXT &gt;</strong>. 
-</p> 
-<p> 
- 8. Finish setup screen appears, tap <strong>FINISH &gt;</strong>. 
-</p> 
-<p> 
- 9. Launch eScan Container and then tap <strong>ACCEPT</strong>. 
-</p> 
-<ol start="10" type="1"> 
- <li> 
- After the Container app is successfully installed, there will be two 
- eScan containers displayed on the device as follows. Uninstall the 
- eScan Container without the briefcase icon. 
- </li> 
-</ol> 
-<p> 
- 11. Launch eScan Container. 
-</p> 
-<h3> 
- Enrollment Process for container 
-</h3> 
-<p> 
- Tap <strong>Accept</strong> to proceed with the enrollment process, the 
- following screen will be displayed. 
-</p> 
-<p> 
- A user can fill up the enrollment details using any of the following 
- procedures: 
-</p> 
-<p> 
- <strong>Filling enrollment details manually</strong> 
-</p> 
-<p> 
- <strong>Filling enrollment details by scanning QR code</strong> 
-</p> 
-<h3> 
- Filling enrollment details manually 
-</h3> 
-<p> 
- 1. Open eScan Container app. Enrollment Details form appears. 
-</p> 
-<p> 
- 2. Fill in the required details from the enrollment email. 
-</p> 
-<p> 
- 3. After filling all the details, tap <strong>Enroll container</strong>. 
- The device will be enrolled instantly and a Device Administrator pop-up 
- message appears. 
-</p> 
-<p> 
- 4. Tap <strong>Next</strong> to activate device administrator permission to 
- enable Anti-theft, Parental Control and Uninstall Protection features on 
- the device. You will be forwarded to the information window for activating 
- Device Administrator. 
-</p> 
-<p> 
- 5. Tap <strong>Activate</strong> for activating Device Administrator. 
-</p> 
-<h3> 
- Filling enrollment details by scanning QR Code 
-</h3> 
-<p> 
- 1. Open the enrollment email containing QR code on your tablet/computer. 
-</p> 
-<p> 
- 2. Open the eScan Container app. Enrollment Details form appears. 
-</p> 
-<p> 
- 3. Tap <strong>Fill entries through QR Code</strong>. Doing so will turn on 
- your device’s camera. 
-</p> 
-<p> 
- 4. Match up the on-screen square with the QR code and hold your device 
- steady till the application scans it. After the successful scan, the 
- enrollment details will be automatically filled. 
-</p> 
-<p> 
- 5. Tap <strong>Enroll Device</strong>. 
-</p> 
-<p> 
- All the container applications will display a briefcase icon. 
-</p> 
-<table border="1" cellspacing="0" cellpadding="0"> 
- <tr> 
- <td width="49"> 
- <p align="center"> 
- <strong>Note</strong> 
- </p> 
- </td> 
- <td width="567"> 
- <p> 
- The application(s) added to the container by default will 
- vary from device to device. 
- </p> 
- </td> 
- </tr> 
-</table> 
-<p> 
-The administrator can deploy applications and content through <strong>App Store</strong> and <strong>Content Library</strong> modules. 
- The user will be able to access only selected applications and content that 
- the administrator has deployed based on the geo-fencing. The administrator 
- can add applications under the App Store and then deploy the application to 
- the managed device via the Required Applications policy. 
-</p> 
-<p> 
- The user will receive the following notification: 
-</p> 
-<p> 
- “Install following app- your administrator requested you to install the 
- following application – (Application name) 
-</p> 
-<p> 
- Tap <strong>OK</strong> to install the application. Go to the App Store 
- under application option on the device, the deployed application will be 
- displayed, click download and install. Tap <strong>Download</strong> to 
- install the app. 
-</p> 
-<h1> 
- Installation and Enrollment of iOS Device 
-</h1> 
-<p> 
- The enrollment procedure for an iOS device consists of two main steps: 
-</p> 
-<ol start="1" type="1"> 
- <li> 
- <strong>Adding a device to the console</strong> 
- </li> 
- <li> 
- <strong>Enrolling the added device</strong> 
- </li> 
-</ol> 
-<h3> 
- Adding a device to the console 
-</h3> 
-<p> 
-1. Click <strong>Managed Mobile Devices</strong> &gt; <strong>Action List</strong> &gt; <strong>Add New Device</strong>. Add New 
- Device window appears. 
-</p> 
-<p> 
-2. Enter the details, select the OS Type as <strong>iOS </strong>and<strong> </strong>then click <strong>Add</strong>. After clicking <strong>Add</strong>, the device will be added to the console. 
-</p> 
-<p> 
- Notice the red apple icon in the <strong>Mobile Number</strong> column; it 
- denotes that the device is not enrolled. 
-</p> 
-<h3> 
- Enrolling the added device 
-</h3> 
-<p> 
- After a device is added to the console, an email containing the enrollment 
- procedure will be sent to the specified email ID. This email will contain 
- steps to download MDM application and details such as Mobile No, Server, 
- and Port. In addition to this, it will also contain the QR code that will 
- fetch the above mentioned details by scanning it from the device. In case a 
- user didn’t receive the enrollment email at the time of adding the device, 
- you can resend the enrollment email. 
-</p> 
-<p> 
-Select the specific device and then click<strong>Client Action List</strong> &gt; <strong>Resend Enrollment Email</strong>. 
-</p> 
-<p> 
- After you’ve received the enrollment email, perform the following steps: 
-</p> 
-<p> 
- 1. Download and install the <strong>eScan MDM</strong> application from the 
- App Store. 
-</p> 
-<p> 
- 2. Read the eScan Agreement completely and then tap <strong>Accept</strong> 
- . 
-</p> 
-<p> 
- 3. Launch the eScan MDM application and enter the details mentioned in the 
- enrollment email, or fill in the details automatically via QR code by 
- tapping <strong>Read QR Code</strong>.<strong> </strong>Doing so will turn 
- on your device’s camera. Match up the on-screen square with the QR code and 
- hold your device steady till the application scans it. After the successful 
- scan, the details will be automatically filled. 
-</p> 
-<p> 
-4. After the enrollment details are filled, tap <strong>Enroll Device</strong>. iOS Config screen appears. 
-</p> 
-<p> 
- 5. Tap <strong>Install Profile</strong>. The application attempts to access 
- your device’s Settings. The following dialog box appears asking 
- confirmation. 
-</p> 
-<p> 
- 6. Tap <strong>Allow</strong>. Install Profile settings appear. 
-</p> 
-<p> 
- 7. Tap <strong>Install</strong>. Enter Passcode screen appears. 
-</p> 
-<p> 
- 8. Enter the device’s passcode to proceed with the installation. After 
- entering the passcode, a warning message appears stating that the 
- administrator will be able to remotely manage your device. 
-</p> 
-<p> 
- 9. To proceed with the installation, tap <strong>Install</strong>. A pop-up 
- message appears asking confirmation for remote management of your device. 
-</p> 
-<p> 
- 10. Tap <strong>Trust</strong>. 
-</p> 
-<p> 
- 11. The MDM profile will be installed on your device. To exit the 
- installation process, tap <strong>Done</strong>. The iOS Config screen 
- appears. 
-</p> 
-<p> 
- 12. Tap <strong>Open eScan App</strong>. A pop-up appears. 
-</p> 
-<p> 
- 13. Tap <strong>Open</strong>. Configure screen appears stating that the 
- Device Enrollment is in progress. 
-</p> 
-<p> 
- In the<strong> eScan Mobility Management</strong> (<strong>EMM</strong>) 
- console, you can see the icon change to green from red and the enrollment 
-status change to <strong>Enrolled</strong> from <strong>Not Enrolled</strong>. 
-</p> 
-<p> 
- For detailed policy description for following policies, refer Policies 
- section under Managed Mobile Device. 
-</p> 
-<ul type="disc"> 
- <li> 
- Anti-Virus Policy 
- </li> 
- <li> 
- Call &amp; SMS Filter Policy 
- </li> 
- <li> 
- Web and Application Control 
- </li> 
- <li> 
- App specific network blocking 
- </li> 
- <li> 
- Anti-Theft Policy 
- </li> 
- <li> 
- Additional Settings Policy 
- </li> 
- <li> 
- Password Policy 
- </li> 
- <li> 
- Device Oriented Policy 
- </li> 
- <li> 
- Required Applications Policy 
- </li> 
- <li> 
- Wi-Fi Settings Policy 
- </li> 
- <li> 
- Scheduled Backup (Contacts &amp; SMS) 
- </li> 
- <li> 
- Content Library Policy 
- </li> 
-</ul> 
-<p> 
- For more on <strong>Additional Features </strong>Policy<strong> </strong> 
-for COD and <strong>Location Fence<em> </em></strong>Policy <strong><em> </em></strong>for BYOD<strong><em> </em></strong>group refer 
- below. 
-</p> 
-<h2> 
- Restriction Policy 
-</h2> 
-<p> 
- The Restriction Policy lets you apply certain restrictions on a device that 
- prevents the device user from getting access to few device features. 
-</p> 
-<p> 
- <strong>Disable Screenshot</strong> 
- - Select this check box to disable a device from taking a screenshot. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Allow uninstalling applications</strong> 
- - Select this check box to allow a user to uninstall applications. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Disable Cross Profile Copy-Paste</strong> 
- - Select this check box to disable cross profile copy-paste on a device. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Disable Install App (From all sources)</strong> 
- - Select this check box to disable application installations from all 
- sources on a device. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Disable Incognito Mode</strong> 
- - Select this check box to disable web browsing in incognito mode on a 
- device. 
-</p> 
-<p> 
- <strong></strong> 
-</p> 
-<p> 
- <strong>Disable Install From Unknown Sources</strong> 
- - Select this check box to disable application installation from unknown 
- sources on a device. 
-</p> 
-<h3> 
- Location Fence 
-</h3> 
-<p> 
- Under Location Fence policy, restrictions as per the policy will be applied 
- only if the device is in the Geo/Wi-Fi location. If the device is out of 
- the Geo/Wi-Fi location, there will be no restrictions on the device. 
-</p> 
-<p> 
- To use Location Fence feature, check <strong>Enable Fencing</strong> check 
- box. 
-</p> 
-<p> 
- Select the appropriate type of fencing you want to use for devices. 
-</p> 
-<p> 
- To use Geo Fencing, it is necessary that a default location must be set 
- first. 
-</p> 
-<h3> 
- Geo fencing 
-</h3> 
-<p> 
- To enable Geo Fencing, check this check box. 
-</p> 
-<ol start="1" type="1"> 
- <li> 
- Click <strong>Import</strong>. 
- </li> 
-</ol> 
-<p> 
- Fencing Location(s) window appears. 
-</p> 
-<ol start="2" type="1"> 
- <li> 
-Select location to import location details and then click <strong>Save</strong>. 
- </li> 
-</ol> 
-<h3> 
- Wi-Fi Fencing 
-</h3> 
-<p> 
- To enable Wi-Fi Fencing, check Wi-Fi Fencing check box. 
-</p> 
-<ol start="1" type="1"> 
- <li> 
- Click <strong>Add</strong>. 
- </li> 
-</ol> 
-<p> 
- Add Networks window appears. 
-</p> 
-<ol start="2" type="1"> 
- <li> 
- Enter Wi-Fi network name (SSID) and then click <strong>Add</strong>. 
- </li> 
-</ol> 
-<p> 
- Select AND/OR option as per requirement. 
-</p> 
-<p> 
- In case you want to Import Geo Fencing location(s) and add Wi-Fi Fencing at 
- the same time. 
-</p> 
-<p> 
-Select the <strong>AND</strong> option otherwise select the <strong>OR</strong> option. 
</p> </p>

Current revision

Managed Mobile Devices

The Managed Mobile Devices module lets you take action related to a group and specific device(s). There are following buttons in this module:

  • Action List
  • Client Action List
  • Select/Add Columns
  • Policy Templates

Action List

This drop-down lets you take an action for a group.

New Group

This option lets you create a new group for categorizing/adding devices.

Add New Device

This option lets you add new devices to the selected groups.

Add Multiple Devices

This option lets you import (*.txt) file with device and user details in the following format for adding multiple devices at once.

Mobile no.1,Username1,Email ID1 for example: 9012345678,ABCD,abcd@xyz.com

Note: Do not put space before or after comma in the above format.

Remove Group

This option lets you remove a group from the Managed Devices.

Change Server IP

This option lets you change the server IP address on the managed device. The new server IP can be allotted to a particular group or list of devices.

Synchronize with LDAP/Active Directory

This option lets you synchronize the managed devices with the source active Directory Organization unit, the minimum sync interval is five minutes and you can also exclude ADS source files that are not required.

Properties

This option lets you view properties of the group such as Name, Parent Group, Group Type.

Group Type

MDM

In case the containerization benefits are not required, select the group type as MDM. The policies are applied to the Personal profile of the devices in the MDM group type. Web-blocking, Application Control etc. policies can be applied to the devices without creating a work profile (Container).

COD

In case the device belongs to a company and is given to an employee for company work/task purposes, select the group type as COD (Company Owned Device). As company is the device owner, the device will always be policy restricted irrespective of the Geo/Wi-Fi location. Containerization and its benefits are available for COD group type.

BYOD

In case the users are allowed to bring their own devices to company for work/task purposes, select the group type as BYOD (Bring Your Own Device). In this group type, policies will be applied within the Geo/Wi-Fi location. The restrictions as per the policy will be applied only if the device is in Geo/Wi-Fi location. If the device is out of the Geo/Wi-Fi location, the device will be free of restrictions. Containerization and its benefits are available for BYOD group type.

Creating a New Group

  1. Select a group to which the group is to be added.
  2. Click Action List > New Group. Create New Group window appears.
  3. Enter a name.
  4. Select a preferred group type.
  5. Click Save. A new group will be created.

Adding a New Device

After a group is created, you will be required to add devices to the respective groups for managing and securing them efficiently. To add a device, follow the steps given below:

1. Select a group.

2. Click Action List > Add New Device. Add New Device window appears.

3. Enter the mandatory details.

4. Select the appropriate OS type.

5. Click Add. An enrollment email with a link to download and install eScan Device Management (client) will be sent to the specified email address.

Note

The mobile number required here is only for indicative purposes and it need not be an actual mobile number.

Adding Multiple Devices

By using Add Multiple Devices option, you can add multiple devices to a group by importing details from a .csv or .txt file in the following format – Mobile no. 1, Username1, Email-id1

To add multiple devices, follow the steps given below:

  1. Select a group.
  2. Click Action list > Add Multiple Devices. Add Multiple Devices window appears.
  3. Click Browse and select the .txt and .csv file consisting required details.
  4. Click OK. All devices from the .txt and .csv file will be added to the group.

Note

Ensure there is no space before or after comma in the above format.

Use a line break to separate each device’s information.

Removing a group

To remove a group, follow the steps given below:

Group Removal is allowed only for empty groups. (Group(s) that contains no devices)

1. Select a group.

2. Click Action List > Remove Group. A confirmation prompt appears.

3. Click OK. The group will be removed.

Changing Server IP address

  1. Select a group.
  2. Click Action List > Change Server IP. Change Server IP Address window appears.
  3. Select the Change To check box and enter the new server IP address.
  4. In the Apply to section, select whether IP address change is forGroups or List of Devices.
  5. After you are done making changes, click Apply. The progress of the command is shown in the new window after some interval.

Synchronizing with Active Directory

To synchronize a group with Active Directory, follow the steps given below:

  1. Select a group and then click Action List > Synchronize with LDAP/Active Directory. Synchronize with LDAP/Active Directory window appears.
  2. If you want to change the target group for synchronization, clickBrowse and select a group or subgroup. (Skip this step if you don’t want to change the group).
  3. Select the Source LDAP/Active Directory Organization Unit by clickingBrowse. It takes you to LDAP/Active Directory; selection will depend upon which OU you want to synchronize. After selecting OU, click OK.
  4. Set the Synchronization Interval as per your requirement.
  5. Click OK.

To exclude group(s) from AD sync

  1. Check Excluded LDAP/Active Directory Sources. Click Exclude. Select OU to Exclude pop-up appears.
  2. Select the group you want to exclude and then click OK .

Client Action List

This drop-down lets you take action for the devices added in the console.

Select a device or devices and take the action of your preference.

Moving Devices from one group to the other group

After adding devices in a group, you can move a device or devices from one group to other as per your requirement.

To move device(s) from one group to other, follow the steps given below:

  1. Select the group in which the device(s) is already added and then click Client Devices.
  2. Select the device you want to move to another group and then click Client Action List > Move to Group . Select Group window appears.
  3. Select the group to which you wish to move the device(s) and then click OK.

Note

You can create a New Group by clicking New Group and move the device(s) to that group.

Checking a Device’s Properties

The Properties option lets you check a device’s general properties, anti-virus settings, protection status and miscellaneous properties.

1. Select a device.

2. Click Client Action List > Properties. The Properties window for the selected device appears.

Removing a device from group

The Remove from Group option lets you remove any device from a group.

  1. Select a device.
  2. Click Client Action List > Remove from Group. A confirmation prompt appears.
  3. Click OK. The device will be removed from the group.

NOTE

If a device is removed, all details related to that device are also deleted from the database.

Resending Enrollment Email

The Resend Enrollment Email option lets you resend the enrollment email to the user who didn’t receive it at the time of adding the device.

  1. Select the specific device.
  2. Click Client Action List > Resend Enrollment Email. A new enrollment email will be sent to the user.

Changing a User’s Name/Email ID

The Change Username/Email ID option lets you change the name/email ID of a user.

  1. Select the specific device.
  2. Click Client Action List > Change Username/Email ID. Change Details window appears.

3. Make the required changes and then click Save Details. The User details will be updated.

Disenrolling a device

The Disenroll option lets you disenroll a device.

1. Select a device.

2. Click Client Action List > Disenroll. A confirmation prompt appears.

3. Click OK. The selected device will be disenrolled.

Policy

Steps for Defining Policies for the Group

To define policies for a group, select a group and under the group, click Policy. Group Policy pane appears on the right side.

Clicking Select Template displays a list of available templates.

Clicking Policy Templates displays Policy Template screen and lets you create, copy and assign template to specific group or devices.


eScan Copyright © 2015 MicroWorld Technologies Inc.- AntiVirus & Content Security.       Send your feedback to solutions@escanav.com eScan Wiki

    Privacy policy  About eScan Wiki  Disclaimers   This page has been accessed 3,301 times.