+ All Categories
Home > Documents > 000AirWatch BYOD Guide v8_0.pdf

000AirWatch BYOD Guide v8_0.pdf

Date post: 06-Dec-2015
Category:
Upload: renan-silva
View: 30 times
Download: 1 times
Share this document with a friend
Popular Tags:
37
AirWatch Bring Your Own Device (BYOD) Guide Supporting Bring Your Own Device deployments AirWatch v8.0 AirWatch Bring Your Own Device (BYOD) Guide | v.2015.02 | February 2015 Copyright © 2015 VMware, Inc. All rights reserved. Proprietary & Confidential. © 2015 VMware, Inc. All rights reserved. This document, as well as the software described in it, is furnished under license. The information in this manual may only be used in accordance with the terms of the license. This document should not be reproduced, stored or transmitted in any form, except as permitted by the license or by the express permission of AirWatch, LLC. All other marks and names mentioned herein may be trademarks or trade names of their respective companies.
Transcript
Page 1: 000AirWatch BYOD Guide v8_0.pdf

AirWatch Bring Your Own Device (BYOD) GuideSupporting Bring Your Own Device deployments

AirWatch v8.0

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

©2015 VMware, Inc. All rights reserved.

This document, as well as the software described in it, is furnished under license. The information in this manualmay only be used in accordance with the terms of the license. Thisdocument should not be reproduced, stored or transmitted in any form, except as permitted by the license or by the express permission of AirWatch, LLC.

All othermarks and names mentioned hereinmay be trademarks or trade names of their respective companies.

Page 2: 000AirWatch BYOD Guide v8_0.pdf

Table of ContentsDisclaimer 4

Introduction to BYOD 5

Overview 5

In This Guide 5

Before You Begin 7

Overview 7

In This Section 7

Supported Platforms 7

Recommended Reading 7

Getting Started 8

BYOD Privacy Settings 9

Overview 9

In This Section 9

Configuring Privacy Settings 9

Privacy Best Practices 12

Terms of Use 15

Overview 15

Creating your Terms of Use 15

Disseminating the Terms of Use 15

In This Section 16

Configuring Terms of Use 16

BYOD Enrollment 19

Overview 19

Enrollment Considerations 19

In This Section 19

Workspace vs. Agent-based Enrollment 19

Configuring Device Ownership 20

Configuring Enrollment Restrictions 21

BYOD Devices (Using the Workspace) 24

Overview 24

In This Section 24

Automatic Features 24

Configurable Features 26

BYOD Devices (Using the Agent) 28

Overview 28

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 2

Page 3: 000AirWatch BYOD Guide v8_0.pdf

In This Section 28

Creating Restrictions for BYOD 28

Defining Compliance Policies for BYOD 29

Managing Access to Corporate Resources 29

Reclaiming Corporate Data upon Employee Departure 31

Self-Service Portal (SSP) Permissions 33

Overview 33

In This Section 33

Performing Remote Actions 33

Viewing Tabs 34

Defining User Roles 34

Finding Additional Documentation 36

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 3

Page 4: 000AirWatch BYOD Guide v8_0.pdf

DisclaimerWhile AirWatch strives to provide some level of direction for customers in terms of initially implementing a Bring YourOwn Device (BYOD) program, it is up to your organization’s legal, human resources and management teams to create adevicemanagement program that is right for your organization. The scenarios and issues in this document are providedas examples and are not meant to act as official guidance or recommendations regarding devicemanagement or liability.

References in this document to any specific service provider, manufacturer, company, product, service, setting, orsoftware do not constitute an endorsement or recommendation by AirWatch. Under no circumstances shall AirWatch beliable to you or any other person for any damages, including without limitation, any direct, indirect, incidental, special orconsequential damages, expenses, costs, profits, lost savings or earnings, lost or corrupted data or other liability arisingout of or related in any way to information, guidance or suggestions provided in this document.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 4

Disclaimer

Page 5: 000AirWatch BYOD Guide v8_0.pdf

Introduction to BYOD

OverviewYour organization can use AirWatch to secure employee-owned devices that have access to corporate resources as partof a Bring Your Own Device (BYOD) program. While BYOD programs offer benefits such as maximized employeeproductivity, reduced overhead costs, management flexibility and a simplified IT infrastructure, they also posechallenges. For example, you will need to balance the need for maximum security against an end user's privacyexpectations. You also must ensure end users completely understand your MDM Terms of Use agreement and what datayou will and won't collect. AirWatch MDM provides your organization's employees the privacy they need whilemaintaining the level of protection your corporate assets require. By asking employees to bring their own device andenabling those devices with corporate content, your organization gains the following valuable resources:

l Management flexibility – Eliminate the need to select and manage a provider and plan.

l Higher level of confidence – Allow employees to use one device for both business and personal purposes.

l Maximized employee performance – Allow employees to work with the device with which they aremostcomfortable.

l Cost savings – Reduce overhead costs in managing a corporate plan.

l Simplified IT infrastructure – Reduce the strain on IT help desks to support additional devices.

In This Guidel Before You Begin – This section covers topics and prerequisites you should familiarize yourself with so you can get

themost out of using this guide.

l BYOD Privacy Settings – Privacy is one of the biggest concerns for both administrators and end users when it comesto implementing a BYOD program. This section outlines how to configure the types of data AirWatch collects anddisplays.

l Terms of Use – Ensuring end users understand the extent of your BYOD program is important, and this sectionoutlines creating and enforcing your own BYOD terms of use agreements.

l BYOD Enrollment – BYOD devices can be enrolled multiple ways, which can have an affect on how they're managed.This section covers how to enroll BYOD devices.

l BYOD Devices (Using theWorkspace) – If your BYOD users will be using only the AirWatch Workspace application,then how you manage them will differ from if they were to also use the AirWatch Agent. This section explains what issupported within the AirWatch Workspace.

l BYOD Devices (Using the Agent) – If your BYOD users will be downloading the AirWatch Agent onto their devices youwill havemoremanagement capabilities you can perform. This section outlines some of themore importantconsiderations.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 5

Introduction to BYOD

Page 6: 000AirWatch BYOD Guide v8_0.pdf

l Self-Service Portal Permissions – The Self-Service Portal (SSP) empowers BYOD users to troubleshoot their own issuesand takematters into their own hands. Configuring SSP settings lets you define roles and decide what actions userscan perform.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 6

Introduction to BYOD

Page 7: 000AirWatch BYOD Guide v8_0.pdf

Before You Begin

OverviewThis section covers topics and prerequisites you should familiarize yourself with so you can get themost out of using thisguide.

In This Sectionl Supported Platforms – See a list of supported devices that can be enrolled into BYOD with AirWatch.

l Recommended Reading – See a list of guides you can reference to better your understanding of how to manageBYOD with AirWatch.

l Getting Started – See additional considerations you should know before you begin.

Supported PlatformsAirWatch supports the following platforms as part of a BYOD program:

l Android versions 2.3+ l Windows Mobile 5/6 and Windows CE 4/5/6

l BlackBerry versions 5+ l Windows Phone 7 and 7.5Mango

l BlackBerry 10 l Windows Phone 8

l iOS versions 4.0+ l Windows 8/8.1/RT

l Mac OS X 10.7+ l Win32

l Symbian OS ^3 and S60

However, at this time the AirWatch Workspace application is only available for Android Gingerbread 2.3+ and iOS 5.0+.

Recommended Readingl Mobile DeviceManagement Guide – Provides a general overview of the AirWatch solution.

l AirWatch Workspace Guide – Explains how to set up and use the AirWatch Workspace application.

l Mobile Application Management Guide – Gives details about how to deploy applications to your device fleet,including employee-owned devices.

l Mobile Content Management Guide – Tells you how to add and deploy content to end users.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 7

Before You Begin

Page 8: 000AirWatch BYOD Guide v8_0.pdf

Getting StartedBefore reading this guide it is beneficial if you are aware of the AirWatch Workspace and its capabilities. AirWatchWorkspace enables you to provide specific corporate resources to segments of BYOD users. For example, some usersmay only want access to corporate email, while others may only require access to a single enterprise app. With AirWatchWorkspace, your BYOD users can enroll in AirWatch and securely access containerized business applications andresources without receiving the same AirWatch MDM profile corporate-owned devices receive. AirWatch Workspaceaddresses privacy concerns users have about MDM by only giving administrators the ability to control managedenterprise apps instead of the entire device. See the BYOD Enrollment section for more information about the differencesbetween Workspace-based and Agent-based enrollment.

Note: For more information about configuring the AirWatch Workspace, refer to the AirWatch Workspace Guide,available via AirWatch Resources.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 8

Before You Begin

Page 9: 000AirWatch BYOD Guide v8_0.pdf

BYOD Privacy Settings

OverviewOne of the biggest concerns for many BYOD end users is the privacy of the personal content on their devices. Yourorganization must be able to assure employees their personal data cannot be threatened by any management actionsand is not subject to corporate oversight. With AirWatch MDM, you can help ensure the privacy of personal data bycreating privacy policies that do not collect personal data and customizing them based on device ownership type. Inaddition, you can define granular privacy settings to disable the collection of the personally identifiable information anddisallow certain remote actions for employee-owned devices to ensure employee privacy.

Note: Certain jurisdictions and countries have their own rules, laws, and regulations of what can be collected fromend users. These should be thoroughly researched before configuring your BYOD privacy policies.

In This Sectionl Configuring Privacy Settings – Covers the various privacy options available in the AirWatch Admin Console.

Configuring Privacy SettingsConfigure Privacy Settings to define how device and user information are handled in the AirWatch Admin Console. This isparticularly useful in bring your own device (BYOD) deployments.

The AirWatch Admin Console enables you to:

l Review and adjust privacy policies according to device ownership, which lets you easily adhere to data privacy laws inother countries or legally-defined restrictions.

l Ensure certain IT checks and balances are in place, preventing overload of servers and systems.

See Privacy Best Practices for tips about configuring data collection for GPS, Telecom and application usage.

To set up privacy settings:

1. Navigate to Devices ► Device Settings ► Devices & Users ► General ► Privacy.

2. Select one of the following options for the various settings for GPS, Telecom and Applications:

Collect and Display – Collect user data and display it in the AirWatch Admin Console.

Collect Do Not Display – Collect user data for use in reports but do not display it in the AirWatch AdminConsole.

Do Not Collect – Do not collect user data.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 9

BYOD Privacy Settings

Page 10: 000AirWatch BYOD Guide v8_0.pdf

1. For more information on privacy within AirWatch, see recommended best practices.

2. Select the Commands that can be performed on devices.

Consider disabling all remote commands for employee-owned devices – especially full wipe. This preventsinadvertent deletion or wiping of an end user's personal content.

If you are going to allow remote control, file manager, or registry manager access for Android/Windows Mobiledevices, you should consider using the Allow With User Permission option. This requires the end user to consent toadmin access on their device via message prompt before the action is performed. If you opt to allow use of anycommands, explicitly mention these in your Terms of Use agreement.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 10

BYOD Privacy Settings

Page 11: 000AirWatch BYOD Guide v8_0.pdf

3. Select the Commands that can be performed on devices.

Consider disabling all remote commands for employee-owned devices – especially full wipe. This preventsinadvertent deletion or wiping of an end user's personal content.

Note for iOS devices: If you disable full wipe as a command for select ownership types, then users who enrollunder that ownership type will not see the "Erase all content and settings" permission displayed duringMDM profile installation when enrolling with the AirWatch Agent.

If you are going to allow remote control, file manager, or registry manager access for Android/Windows Mobiledevices, you should consider using the Allow With User Permission option. This requires the end user to consent toadmin access on their device via message prompt before the action is performed. If you opt to allow use of anycommands, explicitly mention these in your Terms of Use agreement.

4. For User Information, select whether to Display or Do Not Display in the AirWatch Admin Console information forFirst Name, Last Name, Phone Number, and Email Accounts.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 11

BYOD Privacy Settings

Page 12: 000AirWatch BYOD Guide v8_0.pdf

If a field is set to Do Not Display, then it displays as "Private" wherever it appears in the AirWatch Admin Console.This means you are not be able to search for fields you set to Do Not Display.

Note: If desired, you can encrypt personally identifiable information, including first name, last name, emailaddress and telephone number. Navigate to Groups & Settings ► All Settings ► System ► Security ► DataSecurity from the Global or Customer-level Organization Group you want to configure encryption for. Enablingencryption, selecting which user data fields to encrypt, and clicking Save encrypts user data. Doing so limits somefeatures in the AirWatch Admin Console, such as search, sort and filter.

5. Click Savewhen finished.

For more information about leveraging bring your own device, please see the .AirWatch BYOD Guide document,available via AirWatch Resources.

Privacy Best PracticesAirWatch recommends a few simple best practices for managing Privacy Settings. Note, however, that every deploymentis different and you should consult with your own legal, human resource and management teams to tailor these settingsto best suit your organization.

GPS Coordinates

In general, it is not appropriate to collect GPS data for employee-owned devices. The following notes apply to corporate-owned devices:

l GPS Data – Information collected includes location data and a time-stamp indicating when this information was sentto AirWatch.

o For iOS devices, GPS data is reported automatically by opening any AirWatch application or internal applicationswith an AirWatch software development kit (SDK) set to capture GPS data.

When this happens, AirWatch defines a 1 kilometer region around this location and reports location informationwhenever the devicemoves outside this 1 kilometer region or whenever the user opens an AirWatch or internal

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 12

BYOD Privacy Settings

Page 13: 000AirWatch BYOD Guide v8_0.pdf

application. No newGPS data is reported unless one of these actions occurs.

o Location Services must be enabled on the iOS device. AirWatch cannot force this setting.

l While GPS data is typically used for lost or stolen devices, it can also be used for any situation where knowing adevice’s location is useful.

User Information

In general, you will display user information such as first name and last name for both employee-owned and corporate-owned devices, since you need to knowwho you aremanaging. This information includes First Name, Last Name, PhoneNumber and Email Address.

Telecom Data

In general, it is only appropriate to collect telecom data for employee-owned devices that are a part of a stipend programwhere you subsidize an end user's cellphone plan. In this case, or for corporate-owned devices, the following notesapply:

l Carrier/Country Code – Carrier and Country Code are recorded and can be used for telecom tracking purposes.Telecom plans can be set up and devices can be assigned to the appropriate plan based on their carrier and country.This information can also be used to track devices by home carrier and home country or by current country andcurrent carrier if the device is traveling.

l Roaming Status – Roaming Status is either “Roaming” or “Not Roaming” in AirWatch. This can be used to track whichdevices are in a roaming state. Compliance policies can be set up to disable voice and data usage while the device isroaming or perform other compliance actions. Additionally, if the device is assigned to a telecom plan, AirWatch cantrack data usage while roaming. Collecting and monitoring roaming status can be helpful in preventing large carriercharges due to roaming.

l Cellular Data Usage – Cellular Data Usage refers to data usage in terms of total bytes sent and received. This data canbe collected for each cellular device. If the device is assigned to a telecom plan within AirWatch, you can monitor datausage based on a percentage of a total amount of data for a billing cycle. This allows you to create compliancepolicies based on the percentage of data used. This can be helpful in preventing large carrier overage charges.

l Cell Usage – Cell Usage refers to the voiceminutes that can be collected for each cellular device. Similar to DataUsage, if the device is assigned to a telecom plan within AirWatch, you can monitor voice usage based on apercentage of a total amount ofminutes for a billing cycle. This allows you to create compliance policies based on thepercentage ofminutes used. This can be helpful in preventing large carrier overage charges.

l SMS Usage – SMS Usage refers to the short message service data that can be collected for each cellular device.Similar to Data Usage, if the device is assigned to a telecom plan within AirWatch, you can monitor SMS usage basedon a percentage of a total amount ofmessages for a billing cycle. This allows you to create compliance policies basedon the percentage ofmessages used. This can be helpful in preventing large carrier overage charges.

Application Information

In general, it is appropriate to set the collection of application information to either do not collect or collect and do notdisplay for employee-owned devices. This is because public apps installed on a device, if viewed, can be consideredpersonally identifiable information. For corporate-owned devices, all installed applications on the device will be reportedto AirWatch.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 13

BYOD Privacy Settings

Page 14: 000AirWatch BYOD Guide v8_0.pdf

If “Do Not Collect” is selected, only personal application information will not be collected. All managed applications,whether public, internal or purchased will still be collected by AirWatch.

Remote Commands

Consider disabling all remote commands for employee-owned devices. However, if you are going to allow remote actionsor commands, you will want to explicitly mention these in your Terms of Use agreement.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 14

BYOD Privacy Settings

Page 15: 000AirWatch BYOD Guide v8_0.pdf

Terms of Use

OverviewFor legal and liability reasons it is important to inform employees who use their own devices about the data that iscaptured and the actions that are allowed on them when enrolled in AirWatch MDM. You can do this by creating Termsof Use agreements in the AirWatch Admin Console, which users are prompted to read and accept before enablingMDM on their personal devices. By assigning Terms of Use agreements based on ownership type, you can create anddistribute different agreements for corporate and BYOD users.

Creating your Terms of UseYour organization's legal team should carefully consider how to tailor your Terms of Use for personal devices. A commonpractice is to reference a more extensive document hosted elsewhere, which details your legal agreements at length.However, a few items you might want to include in the Terms of Use agreement are: 

l Highlight key MDM allowances (such as administrator permissions).

l Address user obligations in the event of a lost or stolen device.

l List the devices (platforms, operating systems, versions) you will allow to have access to corporate resources.

l Define the corporate resources (email and calendars, for example) that users can access via their personal devices.

l Acknowledge that the device will be enabled with proprietary corporate data and is subject to enterprise securitypolicies regarding sensitive information. For example, you may want to include details such as a passcode profile youcreate that sets a maximum number of failed passcode attempts before a device is wiped.

l Detail any inappropriate behaviors that will not be tolerated per your normal business standards, such as using thedevice to harass others.

l Outline the reimbursement policies for telecom and other costs. For example, whether you have a stipend programfor telecom usage, the cost of apps (personal vs. work-related), and roaming charges.

Note: One option is to take any Terms of Use employees sign for computer usage/access and tailor that to BYOD bymentioning specifically what information is collected.

Disseminating the Terms of UseAfter your organization has written its Terms of Use agreement, consider giving it to end users in a one to two-pagewhitepaper form that omits legalese. This will not be the official Terms of Use end users agree to, but instead serve as adocument they can read to better understand what using their own devices means. Ideally, end users should not beseeing the Terms of Use for employee-owned devices for the first timewhen they enroll their device. Consider beingupfront about what end-user information you will collect and how your BYOD program will affect them.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 15

Terms of Use

Page 16: 000AirWatch BYOD Guide v8_0.pdf

In This Sectionl Configuring Terms of Use – Details how to customize Terms of Use presented to users upon enrolling their device,

logging into the AirWatch Admin Console and using applications.

Configuring Terms of UseDefine and enforce Terms of Use to ensure all users with managed devices agree to the policy. If required, users mustaccept the Terms of Use before proceeding with enrollment, installing apps, or accessing the AirWatch Admin Console.The AirWatch Admin Console allows you to fully customize and assign a unique Terms of Use to each Organization Groupand Child Organization Group.

Creating Enrollment Terms of Use

The Terms of Use displays during each device's enrollment. Set version numbers, set platforms to receive the Terms ofUse, set to notify users by email if the Terms of Use is updated and create language-specific copies of the Terms of Use.

You can createmultiple Terms of Use agreements and assign them to Organization Groups based on ownership type orplatform. This lets you tailor each agreement to meet the legal and liability requirements of specific groups, includingusers enrolled in your BYOD program.

1. Ensure your current active Organization Group is the correct one for the terms of use you are creating.

2. Navigate to Devices ► Device Settings ► Devices & Users ► General ► Enrollment and select the Terms of Use tab.

3. Select Add New Enrollment Terms of Use.

4. Set the Terms of Use to trigger depending on platform type by toggling the Platforms option from Any to SelectedPlatform and checking each desired platform.

5. Set the Terms of Use to trigger depending on ownership type by toggling theDevice Ownership option from Any toSelected Ownership Types and checking each desired type of ownership.

6. Set the Terms of Use to trigger depending on enrollment type by toggling the Enrollment Type option from Any toSelected Enrollment Types and checking the desired type of enrollment.

7. Enter your Terms of Use in the text field provided.

This is where you may want to mention any specific privacy settings and any applicable restrictions or compliancepolicies. The editor provides a basic text entry tool to create a new Terms of Use or paste in an existing Terms of Use.If pasting in text from external content, right-click the text box and choose Paste as plain text to prevent any HTMLor formatting errors.

8. Select Save.

Note: You can enforceMDM Terms of Use acceptance by creating a compliance policy forMDM Terms of UseAcceptance.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 16

Terms of Use

Page 17: 000AirWatch BYOD Guide v8_0.pdf

Creating Application or Console Terms of Use

You can also create application-based Terms of Use to notify end users when a specific application collects data or when itimposes restrictions. When users launch these applications from your enterprise App Catalog, they must accept theagreement to access the application. For applications, you can set Terms of Use version numbers, create language-specific copies of the Terms of Use, and set a grace period to remove associated apps if the Terms of Use isn't accepted.

Console Terms of Use display when an administrator logs in to the AirWatch Admin Console for the first time. For theAirWatch Admin Console, you can set Terms of Use version numbers and create language-specific copies of the Terms ofUse.

1. Navigate to Groups & Settings ► All Settings ► System ► Terms of Use.

2. Select Add Terms of Use.

3. Enter a Name for the Terms of Use and select the Type, which can be Console, Enrollment or Application.

4. Configure settings such as Version number and Grace Period, depending on the Type you selected.

5. Enter your Terms of Use in the text field provided. The editor provides a basic text entry tool to create a new Terms ofUse or paste in an existing Terms of Use. If pasting in text from external content, right-click the text box and choosePaste as plain text to prevent any HTML or formatting errors.

6. Select Save.

For Applications, assign the Terms of Use when adding or editing an application using the Terms of Use tab. For moreinformation, please see theMobile Application Management Guide document, available via AirWatch Resources.

View Terms of Use Acceptance

While compliance policies can be set up to help enforce Terms of Use acceptance, you can also view a summary page ofexactly who has and has not accepted the agreement. Then, if necessary, you can contact those individuals directly.

1. Navigate to Groups & Settings ► All Settings ► System ► Terms of Use. A list of Terms of Use agreements displays.

2. Use the Type drop-down list to filter based on agreement type, for example, Enrollment. TheUsers / Devices columndisplays devices that have accepted/not accepted/been assigned the Terms of Use.

3. Select the appropriate number in theDevices column for the applicable Terms of Use row to see device informationpertaining to that agreement. Optionally, access the drop-down menu for the row and click one of the following:

l View Devices or Users – Display a complete list of devices and their acceptance statuses. You can filter byOrganization Group.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 17

Terms of Use

Page 18: 000AirWatch BYOD Guide v8_0.pdf

l View Previous Versions – View previous iterations of the agreement.

l View Terms of Use – View the Terms of Use agreement.

Tracking Terms of Use Acceptance via Reports

Track user acceptance for each Terms of Use by accessing theHub ► Reports & Analytics ► Reports ► List View page andgenerating the Terms of Use Acceptance Detail report. View details regarding specific Organization Groups and drilldown to viewAirWatch Admin Console acceptances or Device Enrollment acceptances. View the acceptances directly inthe Admin Console or export the report in either PDF, CSV and Excel formats.

Note: AirWatch does not provide legally binding sample text and any text examples provided must be reviewed byyour own company/legal team.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 18

Terms of Use

Page 19: 000AirWatch BYOD Guide v8_0.pdf

BYOD Enrollment

OverviewAmajor challenge in managing employees' personal devices is recognizing and distinguishing employee-owned devicesand limiting enrollment to only approved devices. AirWatch helps address end-user concerns about privacy andadministrator concerns about security by providing two types of enrollment for BYOD users, which are outlined below.

Enrollment ConsiderationsAirWatch enables you to configure a variety of options that customize the end-user experience of enrolling a personaldevice. Before you begin, however, you need to consider how you plan to manage employee-owned devices. Forexample, are you:

l Allowing employee-owned devices to enroll through the AirWatch Workspace app or requiring them to enrollthrough the AirWatch Agent? 

l Allowing employees who enroll their own devices to select their Group ID and/or ownership type? Or will youmanually add corporate-owned whitelisted devices, then automatically setting all other devices that enroll toemployee-owned?

l Allowing or blocking certain platforms or operating systems based on your organization's security requirements?

The following sections detail these considerations and will help you determine the best enrollment configuration for yourenvironment.

In This Sectionl Workspace vs. Agent-based Enrollment – Compare the differences between Workspace vs. Agent-based enrollment.

l Configuring Device Ownership – Ensure that employee-owned devices receive the proper Ownership Type in theAirWatch Admin Console.

l Configuring Enrollment Restrictions – Restrict enrollment to specific devices based on various parameters.

Workspace vs. Agent-based EnrollmentBYOD users can enroll their devices via either the AirWatch Workspace app or the AirWatch Agent app, both of which canbe downloaded from the iOS or Android app stores. The differences between the two are outlined below: 

l Workspace-based enrollment takes place when an end user enrolls through the AirWatch Workspace app, whichmeans they do not receive an MDM profile on their device. You can think of this as a containerized approach, asopposed to trueMDM. Those with supported platforms will still have access to email, content, and apps, but certainother settings, such as Wi-Fi and VPN profiles, and remote actions, such as full device wipes, are not supported withthis method. For more information about what security features and functionality are supported, see theConfiguring BYOD Devices (Workspace) section and the AirWatch Workspace Guide.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 19

BYOD Enrollment

Page 20: 000AirWatch BYOD Guide v8_0.pdf

l Agent-based enrollment follows the same enrollment process corporate-owned devices use with the AirWatch Agentand lets you deploy corporate accounts, profiles, apps, and content based on the ownership type identified duringenrollment. You can think of this as trueMDM, since it installs an MDM profile on the device and allows you toperform more devicemanagement functions.

For deployments where you might want to fully manage some BYOD users while selectively managing others, these twoenrollment methods can be combined to form a hybrid approach. Using a hybrid approach, you can manage some BYODusers under MDM (using the AirWatch Agent), which gives full access to internal resources, and others under thecontainerized method (using the AirWatch Workspace), which selectively gives access to content, apps, email, etc. on anindividual basis.

Note: While you can install the AirWatch Workspace and AirWatch Agent together on the same device, the apps aremutually exclusive. The user will be prompted to unenroll from the one before enrolling into the other.

Enrollment Flow

With Workspace-based enrollment, the end user: 

l Will download the AirWatchWorkspace app and launch it to perform enrollment using either their work emailaddress (for auto discovery) or their credentials, server URL, and Group ID.

l Will access AirWatch apps, wrapped apps, and other internal apps, from the AirWatch Workspace application.

With Agent-based enrollment, the end user: 

l Will download the AirWatch Agent app (or navigate to awmdm.com for simplified enrollment) and launch it toperform enrollment using either a work email address (for auto discovery) or credentials, server URL, and Group ID.

l Will access AirWatch apps, deployed internal apps, etc. from the native device launch screens.

Configuring Device OwnershipEvery device enrolled into AirWatch MDM, either via the Agent or theWorkspace app, has an assigned device ownershiptype: corporate dedicated, corporate shared or employee-owned. Employees' personal devices fall under the employee-owned type and are subject to the specific privacy settings and restrictions you configure for that type.

For both Workspace-based and Agent-based enrollment, you have the following options: 

l Upload a list of corporate devices and configure AirWatch to apply a default ownership type during enrollment.(Recommended)

l Allow users to choose the appropriate ownership type themselves.

Upload a List of Corporate Devices and Specify Default Device Ownership

You can identify a set list of your organization's corporate devices, which is useful if you have a mix of corporate-owneddevices that you give to certain employees and employee-owned devices that employees are allowed to enrollthemselves. As devices are enrolled, those you identified as corporate-owned as part of a pre-approved list willautomatically have their ownership type configured based on the ownership type you selected for the list (eitherCorporate Owned or Corporate Shared). Then you can configure all other devices, which would only be end-userpersonal devices, to automatically have their ownership type set as Employee Owned.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 20

BYOD Enrollment

Page 21: 000AirWatch BYOD Guide v8_0.pdf

1. Navigate to Devices ► Lifecycle ► Enrollment Status and select Add, then Batch Import.

Alternatively, you can selectWhitelisted Devices to enter up to 30whitelisted devices at a time by IMEI, UDID orSerial Number. Additionally, select either Corporate Owned or Corporate Shared as the Ownership Type.

2. Enter a Batch Name and Batch Description, then select Add Whitelisted Device as the Batch Type.

3. Click Choose File to upload a file or select the Information icon to download a sample template. If saving a template,proceed to fill out the necessary information.

4. Click Save.

From here, you can either set theDefault Device Ownership type to Employee Owned, or you can create a restrictionthat only allows Employee Owned as the ownership type during open enrollment. This ensures any device enrolling intothis applicable Organization Group will be Employee Owned by default. However, this does not mean corporate deviceswill then display as Employee Owned, since those devices will be updated post-enrollment to reflect their CorporateOwned ownership type status.

To set the default ownership type as Employee Owned:

1. Navigate to Devices ► Device Settings ► Devices & Users ► General ► Enrollment. Click theGrouping tab.

2. Select Employee Owned as theDefault Device Ownership.

3. Select theDefault Role assigned to enrolled users, which will determine the level of access the user has to the Self-Service Portal.

4. Select theDefault Action for Inactive Users, which determines what to do if the user is marked as inactive.

5. Click Save.

Prompt Users to Identify Ownership Type

If your organization has Organization Groups with multiple ownership types, such as a mix of corporate and employee-owned, you can prompt users to identify their ownership type during enrollment. You can always update the ownershiptype later, if necessary.

1. Navigate to Devices ► Device Settings ► Devices & Users ► General ► Enrollment. Click theOptional Prompt tab.

2. Select Prompt for Device Ownership Type. During enrollment, users will be prompted to select their ownershiptype.

3. Click Save.

While simple, this approach assumes every user will select the appropriate ownership type that applies to their device. Ifa user with a personal device chooses the Corporate-Owned ownership type, their device will be subject to a number ofpolicies and profiles that normally would not affect an employee-owned device. This can have serious legal implicationsregarding user privacy. While you can always update the ownership type later, if necessary, it is safer and more secure toinstead identify a list of corporate devices and then set the default ownership type to Employee Owned.

Configuring Enrollment RestrictionsYou can set up additional enrollment restrictions to further control who can enroll and which device types are allowed.For example, you could create a restriction to only allow Android OS 4.0+ to enroll, which would be useful if you wanted

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 21

BYOD Enrollment

Page 22: 000AirWatch BYOD Guide v8_0.pdf

to ensure email containerization for all Android devices with the AirWatch Email Container, which requires Android 4.0and higher.

After your organization evaluates the number and kinds of devices your employees own and determines which onesmake sense to use in your work environment, you can configure the following settings.

Enrollment Restrictions

When integrating AirWatch with directory services, you can choose whether or not to restrict enrollment to only knownusers or configured groups. Known users refers to users that already exist in the AirWatch Admin Console, whileconfigured groups refers to users associated to directory service groups if you chose to integrate with user groups. Theseoptions are available by navigating to Groups & Settings ► All Settings ► Devices & Users ► General ► Enrollment andchoosing the Restrictions tab.

l Restrict Enrollment to Known Users – Enable this option to restrict enrollment only to users that already exist in theAirWatch Admin Console. This applies to directory users you manually have added to the AirWatch Admin Consoleone by one or via batch import. It can also be used to lock down enrollment after an initial deployment that allowedanyone to enroll. This lets you to selectively allow only certain users to enroll.

Leave this option unchecked to allow all directory users to create newAirWatch user accounts during enrollment.Since they do not already have an active AirWatch user account, they will use their directory service credentials toenroll.

l Restrict Enrollment to Configured Groups – Enable this option to restrict enrollment and only allow users belongingto All Groups or Selected Groups (if you have integrated with user groups) to enroll devices. You should not selectthis option if you have not integrated with your directory service user groups. Leave this option unchecked to allowall directory users to create newAirWatch user accounts during enrollment. In addition, you can select the EnterpriseWipe devices of users not belonging to configured groups option to automatically enterprise wipe any devices notbelonging to any user group (ifAll Groups is selected) or a particular user group (if Selected Groups is selected).

Note: One option for integrating with user groups is to create an "MDM Approved" directory service group, import itto AirWatch, then add existing directory service user groups to the "MDM Approved" group as they become eligiblefor AirWatch MDM.

Note: For information about integrating your directory service groups with AirWatch, refer to the AirWatchDirectory Services Guide document, available via AirWatch Resources.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 22

BYOD Enrollment

Page 23: 000AirWatch BYOD Guide v8_0.pdf

Policy Settings

Save your enrollment restrictions as a policy by taking the following steps:

1. Navigate to Devices ► Device Settings ► Devices & Users ► General ► Enrollment and choose the Restrictions tab,then Add Policy located in the Policy Settings section. The Add / Edit Enrollment Restriction Policy screen willdisplay.

2. Enter an Enrollment Restriction Policy Name for your policy and select theOrganization Group it should apply to.

3. Select the Policy Type, which can be eitherOrganization Group Default to apply to the selected Organization Group,or User Group Policy to apply to specific User Groups via Group Assignment Settings on the Restrictions tab.

4. Identify the Allowed Ownership Types, which indicates whether you will permit or prevent bring your own device(BYOD).

5. Identify the Allowed Enrollment Types, which indicates whether you will permit or prevent enrollment througheither the AirWatch Agent or AirWatch Workspace (for iOS/Android) apps.

6. Select theUnlimited check box for Device Limit to allow users to enroll as many devices as they want. Leave this boxunchecked to enter values for theMaximum Devices Per User total or maximum devices per ownership type.

7. Select the Limit enrollment to specific platforms, models or operating systems option to add additional devicerestrictions based on device platform, devicemodel, operating system version and, if applicable, enterprise version.You can also set a device limit. Choose one of two Device Level Restriction Modes:

l Only allow listed device types (Whitelist) – Select this option to explicitly allow only devices matching theparameters you enter and to block everything else.

l Block listed device types (Blacklist) – Select this option to explicitly block devices matching the parameters youenter and to allow everything else.

Note: You can also block specific devices based on their IMEI, Serial Number or UDID by navigating to Devices► Lifecycle ► Enrollment Status and selecting Add. This is an effective way to block a single device andprevent it from re-enrolling without affecting other users' devices. Preventing re-enrollment is also availableas an option when performing an EnterpriseWipe.

8. Select Save and the Add / Edit Enrollment Restriction Policy screen will save your changes and close, taking youback to theDevices & Users / General / Enrollment screen.

9. Use theGroup Assignment Settings section (scroll past the Policy Settings section) to assign customized policies touser groups. Set the rank of precedence and select a policy for each user group. This can be particularly useful if youare integrating with directory services.

10. Select Save.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 23

BYOD Enrollment

Page 24: 000AirWatch BYOD Guide v8_0.pdf

BYOD Devices (Using the Workspace)

OverviewThis section details configuring BYOD devices that are enrolled through the AirWatch Workspace. As described in BYODEnrollment, Workspace-based enrollment does not install an MDM profile on the device and therefore limits the overalllevel ofmanagement you have. These settings and features are split into two types: automatic and configurable.Automatic items are enabled at all times and streamline the tracking and access features of the AirWatch Workspace.Configurable items provide specific options to custom-tailor your AirWatch Workspace deployment according to yourorganization’s needs.

For more information on the features listed below please refer to the AirWatch Workspace Guide, available via AirWatchResources.

In This Sectionl Automatic Features – See a list of features that require no prior setup or configuration.

l Configurable Features – See a list of features you can customize to meet your organization's needs.

Automatic FeaturesAutomatic features require no additional setup or configuration and work as soon as you download and start using theAirWatch Workspace app.

Feature Description

Security

Encryption Full device encryption or SD card encryption cannot be enforced.

Encryption is supported at the individual application level only for wrapped apps, SDK-enabledapps and AirWatch apps. These apps do not allow enterprise data to be exported outside of theWorkspace.

On iOS devices (only), all corporate data within theWorkspace is secured with FIPS 140-2encryption.

Apps

App Tracking AirWatch Workspace only tracks enterprise apps that are installed.

App Security Application security and compliance is enforced for Workspace-enabled apps.

Content

AirWatch ContentLocker

Content management is supported using the AirWatch Content Locker.

Asset Tracking

Asset Tracking Only device platform, model and OS are tracked.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 24

BYOD Devices (Using the Workspace)

Page 25: 000AirWatch BYOD Guide v8_0.pdf

Feature Description

Location Location data is not tracked.

Support

Notifications Notifications are supported. Push messages from the AirWatch Admin Console to theWorkspace.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 25

BYOD Devices (Using the Workspace)

Page 26: 000AirWatch BYOD Guide v8_0.pdf

Configurable FeaturesConfigurable features can be controlled from Settings and Policies in the AirWatch Admin Console.

Feature Description

Security

Passcode Policy Containerized AirWatch and wrapped apps within AirWatch Workspace leverage single sign on(SSO) to share the same SSO Passcode across applications. Configure SSO Passcode complexity inthe AirWatch Admin Console. This SSO Passcode is set when the user initially enrolls using theirusername and password.

CompromisedDetection

Compromised device detection is supported to control access to enterprise apps. A compromiseddevice check occurs when an AirWatch app or wrapped app is launched. If the app detects that adevice is compromised, the app wipes its data and blocks access.

Clear SSOPasscode

Clear the current passcode used to sign in to apps and prompt the user to enter a new one.

SSO PasscodeLock

Sign the user out of all activeWorkspace-enabled apps and require the use of an SSO Passcodewhen any of the apps are opened again.

EnterpriseWipe Perform an enterprise wipe on aWorkspace-enabled device, which clears all enterprise data withinAirWatch Workspace, AirWatch apps and wrapped apps and revokes all access the next time auser opens an enterprise app.

Configure

Terms of Use(TOU)

Generate a fully customizable and enforceable Terms of Use policy.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 26

BYOD Devices (Using the Workspace)

Page 27: 000AirWatch BYOD Guide v8_0.pdf

Feature Description

Email Set up email configuration through AirWatch Workspace using AirWatch Inbox or Lotus Notes forAndroid.

Workspace integration is currently only available for the Android and iOS platforms.

Wi-Fi UseWi-Fi to connect devices to corporate networks, even if they are hidden, encrypted orpassword protected. Available on Android (7.1 HF6+). Available on iOS as an unmanaged profile.

Apps

DeployingApps/App Catalog

Internal, public/purchased, and web apps can all be deployed to the AirWatch Workspace. Certainlimitations may apply for apps that are not app wrapped or integrated with the AirWatch SDK.

Branding Format AirWatch Workspacemenu options, backgrounds, and fonts to match your organization'sbrand and aesthetic.

Single Sign On(SSO)

Single sign on allows a user to access all Workspace-enabled and wrapped applications with asingle SSO Passcode without having to enter login credentials for each app. SSO may also allowaccess to SharePoint and external file shares.

App Tunnel Create a secure tunnel, such as the AirWatch Mobile Access Gateway, fromWorkspace-enabledapps and wrapped apps to your internal systems.

Note: Any of the profiles detailed abovemay be overridden at the app-level. For example, set a Passcode profile thataffects all Workspace-related applications. Then, configure a AirWatch Content Locker-specific passcode on theAirWatch Content Locker app configuration page (Content ► Applications ► Content Locker) by switching theApplication Profile from Default to Custom and selecting the alternate profile.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 27

BYOD Devices (Using the Workspace)

Page 28: 000AirWatch BYOD Guide v8_0.pdf

BYOD Devices (Using the Agent)

OverviewThis section details configuring BYOD devices that are enrolled through the AirWatch Agent. As described in BYODEnrollment, Agent-based enrollment installs an MDM profile on the device and lets you manage employee-owneddevices with the same level ofMDM functionality you use for corporate ones.

Comprehensive security is an integral part ofMDM, and AirWatch lets you maintain a high level of security for bothemployee-owned and corporate devices. In addition to providing full administrative visibility over the security status of adevice, AirWatch also continuously works in the background and proactively alerts you to any potential issues. Withflexible management options, you can deploy one set of security policies and restrictions to employee-owned deviceswhile simultaneously provisioning a greater level of restrictions to corporate-dedicated devices.

In This Sectionl Creating Restrictions for BYOD – Deploy restrictions profiles meant specifically for employee-owned devices.

l Defining Compliance Policies for BYOD – Create compliance policies that will apply to BYOD users.

l Managing Access to Corporate Resources – Ensure BYOD users can access the applications and content necessary toperform work.

l Reclaiming Corporate Data upon Employee Departure – Remove traces of corporate content from the device whenan employee leaves your organization.

Creating Restrictions for BYODAirWatch offers a number of restriction profiles through over-the-air profile provisioning and a range of related customsettings. This enables you to set very tight restrictions for corporate-dedicated devices while applying looser restrictionsto employee-owned devices. For example, while some restrictions prohibit the use of certain features on the device, suchas the iTunes store or YouTube, these restrictions are not typically deployed to employee-owned devices. Instead, youcan create security profiles and restrictions that increase the level of device security without having a negative impact onfunctionality. AirWatch includes the following options, which are excellent examples of restriction policies for BYODdevices:

l Encrypted backups – Protect all backups with data encryption for BYOD devices with access to corporate content.

l Force fraud warning in supported browsers – Require users to acknowledge all warnings issued by the browserwhen it detects a suspicious site.

l Disable moving emails – Prohibit the exposure of sensitive corporate data by disabling the ability to forward acorporate email to a personal account or open it in third party applications.

l Platform-specific restrictions – Each platform, most notably Android and iOS, have their own list of restrictions youcan enforce. You should evaluate these individually to determine whether or not they would be appropriate to yourorganization's deployment. For example, evaluating specific end user's job functions and their level of access to

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 28

BYOD Devices (Using the Agent)

Page 29: 000AirWatch BYOD Guide v8_0.pdf

sensitive information. Some, like iOS restrictions limited to supervised devices, do not apply, since employee-owneddevices will not be enrolled with Apple Configurator.

You can create security profiles and restrictions by navigating to Devices ► Profiles ► List View and selecting Add, thenthe appropriate platform. If you create profiles for employee-owned devices specifically, be sure to select it as theOwnership type on theGeneral tab. For more information about creating security profiles and restrictions, refer to thespecific platform guides and the AirWatch Mobile Device Management Guide, available via AirWatch Resources.

Defining Compliance Policies for BYODIn addition to provisioning device restrictions, you can use compliance policies to monitor the security status of alldevices in your fleet and respond to any policy violations. AirWatch contains a robust and highly customizablecompliance policy engine to help you create and enforce custom policies for employee-owned devices. For example, youcan define specific rules for employee-owned devices and then configure escalating actions that occur over time, such asrestricting access to corporate content, if they do not comply. For additional information on creating compliance policies,refer to the AirWatch Mobile Device Management Guide, available via AirWatch Resources.

The following options are prime examples of compliance policies for employee-owned devices:

l Encryption Enforcement – Require full device and SD card encryption.

l Passcode Policies – Require that a passcode should be present and enforced. For example, you could apply apasscode policy for any devices that have access to corporate content. This provides hardware-level encryption andprotects information in the event of a lost or stolen device. Note that if you decide to set a maximum number offailed attempts before a device is wiped, then you may want to explicitly inform the user of this in your Terms of Useagreement.

l Compromised Detection –Detect devices that have been modified to remove security limitations imposed bymanufacturers. Such devices are known as “jailbroken” or “rooted” devices and are deemed compromised byAirWatch. Because of the security vulnerabilities these devices can be exposed to, it is recommended they not begranted access to corporate content. As soon as devices are detected as compromised, AirWatch can automaticallyremove access to all corporate content enabled through MDM.

l MDM Terms of Use Acceptance – Ensure users accept your Terms of Use agreement by performing escalatingactions that increasingly restrict access to corporate content the longer users go without accepting.

You can create compliance policies by navigating to Devices ► Compliance Policies ► List View and selecting Add. If youcreate policies for employee-owned devices specifically, be sure to select it as theOwnership type on the Assignmenttab. For more information about creating compliance policies, refer to the specific platform guides and the AirWatchMobile Device Management Guide, available via AirWatch Resources.

Managing Access to Corporate ResourcesEnsuring employee-owned devices are secure should not come at the cost of convenience to employees. With AirWatchMDM you can provide convenient access to email, VPN, Wi-Fi, apps and content.

Provide Access to Email, VPN andWi-Fi

By creating configuration profiles you can configure employee-owned devices to access and automatically authenticateemail, VPN and Wi-Fi settings while they are enrolled in AirWatch MDM. Since these aremanaged profiles on the devices,

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 29

BYOD Devices (Using the Agent)

Page 30: 000AirWatch BYOD Guide v8_0.pdf

you can remove access to these resources at any time. To add configuration profiles, navigate to Devices ► Profiles ListView and select Add, then the platform. Configure a single payload, such as email, VPN or Wi-Fi per profile. EnsureOwnership is set to Employee Owned under theGeneral tab if this profile should only apply to employee-owneddevices.

For more information about creating configuration profiles, refer to the specific platform guides and the AirWatchMobile Device Management Guide, available via AirWatch Resources.

Email Containerization

For employee-owned devices, you can utilize the NitroDesk TouchDown email client for iOS and Android or the AirWatchInbox to further secure access to corporate email. These containerized solutions allow you to require a passcode toaccess email while not forcing end users to have a passcode to access their devices. It also provides additional separationbetween their personal and work-related content. Refer to the specific platform guides, the AirWatch Inbox Guide andthe AirWatch Mobile Email Management Guide, available via AirWatch Resources.

Enable Secure Access to Internal Apps

In addition to deploying your organization's internal apps to your device fleet, AirWatch can filter which device typesreceive certain apps. For example, your organization may have certain proprietary apps that do not belong on personaldevices. By leveraging device ownership types in AirWatch, you can protect sensitive applications from employee-owneddevices. To modify application assignments, navigate to Apps & Books ► Applications ► List View, select the Internaltab, then select an application from the list. Click the Assignment tab and select or create a Smart Group. When creatingor editing Smart Groups, you can modify theOwnership to include or exclude Employee Owned devices.

For more information about Smart Groups and managing application access, refer to the AirWatch Mobile ApplicationManagement Guide.

Ensure Secure Access to Content

The AirWatch Content Locker enables your employees to securely access organization resources on-the-go from theirmobile devices. Similar to managing the deployment of applications, you can configure which device ownership typeshave access to sensitive documents. To maximize content security as part of your BYOD program, you can enforce thefollowing criteria:

l Require the device to be enrolled in MDM order to access content. This ensures employee-owned devices are subjectto the security profiles and compliance policies you define before having access to sensitive content.

o Navigate to Groups & Settings ► All Settings ► Content ► Applications ► Content Locker and select RequireMDM Enrollment.

l Prevent content access if the device is compromised. This maximizes security by preventing potentially vulnerabledevices from accessing content.

o Navigate to Groups & Settings ► All Settings ► Content ► Applications ► Content Locker to determine if you areusing a Default or Custom Application Profile. If using a Default application profile, you can configure this settingat Groups & Settings ► All Settings ► Apps ► Settings and Policies ► Security Policies by enablingCompromised Detection. If using a Custom profile, the Prevent Compromised Devices setting will be an optionyou can enable from this page.

l Allow access to content only while online. This ensures the device is compliant with your AirWatch policies, whichmay not be true if the device is offline and cannot report in.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 30

BYOD Devices (Using the Agent)

Page 31: 000AirWatch BYOD Guide v8_0.pdf

o Navigate to Content ► List View and select a content entry from the list. Click the Security tab and set the AccessControl for allowing offline viewing.

l Edit the Assignment criteria for specific content, for example, if certain content should not bemade available toemployee-owned devices.

o Navigate to Content ► List View and select a content entry from the list. Click the Assignment tab and set theDevice Ownership type orOrganization Group that applies.

For more information about securing access to sensitive content, refer to the AirWatch Mobile Content ManagementGuide, available via AirWatch Resources.

Reclaiming Corporate Data upon Employee DepartureAn essential aspect of your BYOD program is removing corporate content when an employee leaves or when a device islost or stolen. With AirWatch you can easily perform an EnterpriseWipe on devices to remove all corporate content andaccess while leaving personal files and settings untouched. This command also un-enrolls the device from AirWatch andstrips it of all content enabled through MDM. This includes email accounts, VPN settings, Wi-Fi profiles, secure contentand enterprise apps. Consider the following when an employee-owned device should no longer be a part of your BYODprogram:

l To perform an EnterpriseWipe to ensure a device is fully unenrolled and no longer has access to content and settingsenabled through MDM:

1. Select the appropriate Organization Group, then navigate to Devices ► List View and search for and select adevice from the list. The device details view displays, with a list of actions you can perform under theMore drop-down in the top right.

2. Select Enterprise Wipe . A confirmation screen displays asking you to confirm the action. Select Prevent Re-Enrollment if you wish to prevent this device from enrolling again. Enter a Security PIN if applicable and thenselect Enterprise Wipe to complete the action.

l AirWatch lets you decide how an EnterpriseWipe applies to public and purchased VPP applications that sit in a grayarea between corporate and employee-owned devices. To require that an application be removed:

1. Navigate to Apps & Books ► Applications ► List View, select whether to view Public, Internal, or Purchasedapps, and click the app name from the list. The application screen displays. Click Edit.

2. For public apps, select theDeployment tab, if it displays. Check the Remove on Unenroll check box.

For purchased VPP apps, check the Remove on Unenroll check box under theDeployment section.

Note: Even if you opt to remove an app purchased through Apple's Volume Purchase Program, you cannotreclaim any redeemed licenses for that app if you used redemption codes for iOS 6 and earlier devices. This isbecause when installed, the app is associated to the user's App Store account. On the other hand, licensecodes used for iOS 7 and later devices can be redeemed. Refer to the AirWatch Mobile ApplicationManagement Guide for more details.

l While EnterpriseWipes may be appropriate for employee-owned devices, you may want to eliminate the chance ofissuing a full device wipe on personal devices. To disable this command as an option for employee-owned devices:

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 31

BYOD Devices (Using the Agent)

Page 32: 000AirWatch BYOD Guide v8_0.pdf

1. Navigate to Devices ► Device Settings ► Devices & Users ► General ► Privacy.

2. Scroll down to the Commands section and under the Employee Owned column set Full Wipe to Prevent.Click Save.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 32

BYOD Devices (Using the Agent)

Page 33: 000AirWatch BYOD Guide v8_0.pdf

Self-Service Portal (SSP) Permissions

OverviewThe AirWatch Self-Service Portal (SSP) is a useful online tool used to remotely monitor and manage smart devices andcan help reduce the overall "hidden cost" ofmanaging a device fleet. By empowering and educating device users on howto perform basic devicemanagement tasks, investigate issues and fix problems, your organization may be able to reducethe number of help desk tickets and support issues.

In This Sectionl Performing Remote Actions – See the various remote actions you can perform on managed devices as an

administrator.

l Viewing Tabs – See the various tabs users can utilize to view information about their devices.

l Defining User Roles – See how to define the user roles that determine who has access to the Self-Service Portal.

Performing Remote ActionsAirWatch gives you as an administrator several remote actions and options to perform on managed devices. However,when devices are employee-owned, those employees may want to access similar management tools for their own use.The AirWatch SSP provides a means for employees to utilize some key MDM tools without any IT involvement. If youenable it, end users can launch the SSP in a web browser and access key MDM support tools. You can also enable ordisable the displays of information and the ability to perform remote actions from the SSP.

Note: For information on deploying, accessing and using the SSP, refer to the appropriate platform guides, availablevia AirWatch Resources.

Here are some examples of information you can let end users view and actions you can allow them to perform:

The Remote Actionsmenu, if enabled, allows users to perform the following remote actions over-the-air to their selecteddevices:

l Device Query –Manually requests the device to send a comprehensive set ofMDM information to the AirWatchServer.

l Lock Device – Locks the selected device so that an unauthorized user cannot access it. This feature is useful if thedevice is lost or stolen. If using AirWatch Workspace, it signs the end user out ofWorkspace-enabled apps andrequires them to enter their PIN the next time they access them.

l Clear Passcode – Clears the passcode on the selected device and will prompt for a new passcode. This is useful if youforget your device passcode and are locked out of your device. If using AirWatch Workspace, it clears the PIN used tosign in to Workspace-enabled apps.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 33

Self-Service Portal (SSP) Permissions

Page 34: 000AirWatch BYOD Guide v8_0.pdf

l Device Wipe –Wipes all data from the selected device, including all data, Email, profiles and MDM capabilities andreturns the device to factory default settings. If using AirWatch Workspace, this remote command is not available.

l Enterprise Wipe –Wipes all corporate data from the selected device and removes the device from AirWatch MDM.All of the enterprise data contained on the device is removed, including MDM profiles, policies and internalapplications. The device will return to the state it was in prior to the installation of AirWatch MDM.

l Send Message – Sends a message via email, phone notification or SMS to the device.

l Find Device – Plays an audible tone on the device in the event it is nearby but hard to locate.

Viewing TabsThe Self Service Portal automatically matches the browser's default language, however, you may opt to override thisdefault setting by choosing from the Select Language drop-down field directly from the login screen.

Upon logging in to the SSP, by default, the first device appears in themain viewer displaying basic information such asEnrollment Date, the Last Seen date and the device's Status.

TheGo to Details button, when selected, displays the following tabs containing information about the selected deviceunder the selected user account:

l Security – This tab shows the following general security information about a particular device enrolled under youruser account.

l Compliance – This tab shows the compliance status of the device, including the name and level of all compliancepolicies that apply to the device. It is important for end users to take note of these policies to ensure devices remaincompliant and operate as intended.

l Profiles – This tab shows all of theMDM profiles that have been sent to the devices enrolled under your useraccount and the status of each profile.

l Apps – This tab displays all applications that have been installed on the selected device and provides basicapplication information.

l Location – This tab displays the coordinates of the selected device.

l Event Log – This tab contains a comprehensive log of all interactions between the AirWatch Admin Console and thedevice.

l Support – This tab contains detailed device information and contact information for your organization's supportrepresentatives.

Defining User RolesBy defining user roles on the Add/Edit Role page you can set who has access to the Self Service Portal (SSP), what theinitial SSP landing page will be and what actions logged-in users can perform. Creating multiple user roles is a time savingmeasure; making comprehensive configurations across different Organization Groups or changing the user role for aspecific user at any time.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 34

Self-Service Portal (SSP) Permissions

Page 35: 000AirWatch BYOD Guide v8_0.pdf

Define a User Role

In addition to the preset Basic Access and Full Access roles, you can also create customizable roles.

1. Navigate to Accounts ► Users ► Roles and click Add. Enter a Name, Description and select the Initial Landing Pageof the SSP for users with this new role.

Note: For existing User Roles, the default Initial Landing Page is theMy Devices page.

2. Select from a list of options the level of access and control end users of this assigned role should have in the SSP.

3. Select Savewhen you are finished.

Configure a Default Role

A default role is the baseline role from which all user roles begin. Configuring a default role enables you to set thepermissions and privileges users will automatically receive upon enrollment.

1. Navigate to Devices ► Device Settings ► Devices & Users ► General ► Enrollment and select theGrouping tab.

2. Select a Default Role to configure a default level of access end users should have in the SSP. These role settings arecustomizable by Organization Group.

3. Select Save.

Set a Role for a Specific User

You can also edit the role for a specific user, for example, to grant or restrict access.

1. Select the appropriate Organization Group, navigate to Accounts ► Users ► List View and search for and select auser from the list. The Edit User screen displays.

2. Select Edit. Scroll down and select a User Role to set a role for this specific user.

3. Select Save.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 35

Self-Service Portal (SSP) Permissions

Page 36: 000AirWatch BYOD Guide v8_0.pdf

Finding Additional DocumentationWhile reading through this documentation you may encounter topics that reference other documents that are notincluded here. You may also be looking for separate documentation that is not a part of this resource. You can access thisadditional documentation through the AirWatch Resources page (https://resources.air-watch.com) on myAirWatch.

Note: It is always recommended you pull the document from AirWatch Resources each time you need to reference it.

To search for and access additional documentation via the AirWatch Resources page, perform the following step-by-stepinstructions: 

1. Navigate to http://my.air-watch.com and log in using your AirWatch ID credentials.

2. Select AirWatch Resources from the navigation bar or home screen. The AirWatch Resources page displays with a listof recent documentation and a list of Resources Categories on the left.

3. Select your AirWatch Version from the drop-down list in the search parameters to filter a displayed list of documents.Once selected, you will only see documentation that pertains to your particular version of AirWatch.

4. Access documentation using the following methods:

l Select a resource category on the left to view all documents belonging to that category. For example, selectingDocumentation filters your search to include the entire technical documentation set. Selecting Platform filtersyour search to only include platform guides.

l Search for a particular resource using the search box in the top-right by entering keywords or document names.

l Add a document to your favorites and it will be added toMy Resources. Access documents you have favoritedby selectingmyAirWatch from the navigation bar and then selected My Resources from the toolbar.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 36

Finding Additional Documentation

Page 37: 000AirWatch BYOD Guide v8_0.pdf

l Download a PDF of a document by selecting the button. Note, however, that documentation is frequentlyupdated with the latest bug fixes and feature enhancements. Therefore, it is always recommended you pull thedocument from AirWatch Resources each time you need to reference it.

Having trouble finding a document? Make sure a specific AirWatch Version is selected. All Versions will typicallyreturn many results. Make sure you select Documentation from the category list, at a minimum. If you knowwhichcategory you want to search (e.g., Platform, Install & Architecture, Email Management) then selecting that will alsofurther narrow your search and provide better results. Filtering by PDF as a File Typewill also narrow your searcheven further to only include technical documentation manuals.

AirWatch Bring Your OwnDevice (BYOD) Guide | v.2015.02 | February 2015

Copyright©2015 VMware, Inc. All rights reserved. Proprietary & Confidential.

Page 37

Finding Additional Documentation


Recommended