General Overview
Explanation of Android Enterprise
Requirements and Installation
Requirements
General Settings
Account Overview
Account Information
Global Configuration
Privacy
Role Based Access
Apple Configuration
Android Configuration
Windows Configuration
ContentBox
LDAP Configuration
App Management
In-House App DB
App Settings
App Store Settings
Remote Control
Sim Card Management
Subscription Management
General Audit Log
Mobile Management
iOS Configuration
General
Device Log (only on device level)
Asset Management (only on device level)
Asset Management (only on device level)
Security Management
Anti Theft (only on device level)
Security Configuration
End of Life (only on device level)
Restriction Settings
BYOD
Connection Management
Web Management
App Management
Android Enterprise – Fully Managed Device Configuration
General
Device Log (only on device level)
Device Settings
Asset Management (only on device level)
Security Management
Anti Theft (only on device level)
Security Configuration
End of Life (only on device level)
Restriction Settings
Connection Management
PIM Management
App Management
Enterprise App Manager
Restrictions & Settings
Enterprise App Store
Enterprise Play Store
Kiosk Mode & Launcher
Remote Control
Content Management
Additional API
Samsung KNOX
Android Enterprise - Fully Managed Device with-Work Profile (COPE)
Android Enterprise – Container Configuration
General
Asset Management (only on device level)
Security Management
Anti Theft (only on device level)
Security Configuration
End of Life (only on device level)
Restriction Settings
Connection Management
PIM Management
App Management
Enterprise App Manager
Restrictions & Settings
Enterprise App Store
Enterprise Play Store
Content Management
Android Configuration
General
Device Log (only on device level)
Device Settings
Asset Management (only on device level)
Security Management
Anti Theft (only on device level)
Security Configuration
End of Life (only on device level)
Restriction Settings
BYOD Container
Connection Management
PIM Management
App Management
Enterprise App Manager
Restrictions & Settings
Kiosk Mode & Launcher
Remote Control
Content Management
Configuration Windows 10 PC
General
Device Log (only on device level)
Asset Management (only on device level)
Security Management
Anti Theft (only on device level)
Security Configuration
Restriction Settings
BitLocker
Certificate Management
Connection Management
PIM Management
App Management
Enterprise App Manager
MacOS Configuration
General
Asset Management (only on device level)
Update Management (only on device level)
Security Management
Anti Theft
Security Configuration
Restriction Settings
Connection Management
PIM Management
Dashboard & Reporting
Multitenant Management
Additional views
Security Type
Establish AP security type
WEP Open System |
|
Password | Password for the AP |
WPA PSK |
|
Password | Password for the AP |
WPA EAP |
|
Authentication Type | Authentication type, only possible with “PEAP-MSCAHPv2” |
Fast Reconnect | Devices can switch between Access Points, without having to authenticate itself again |
Guest Access | The user does not have an account and should therefor register as a guest |
Quarantine Checks | The client must perform NAP (Network Access Protection) Checks and share the results with the system, that then decides, if the client can connect |
Require Crypto Binding | Authentication is only possible via Crypto Binding |
Server Validation | The client checks, if the server certificate is valid. If this is the case, a connection will be established |
Prompt for Certificates | Allows the user to accept non-trusted certificates |
Server Names | Offers the option to display the name of the RADIUS-Server, that offers the network authentication and authorization |
WPA2-PSK |
|
Password | AP password |
WPA2 EAP |
|
Authentication Type | Authentication Type, only possible with “PEAP-MSCAHPv2” |
Fast Reconnect | |
Guest Access | |
Quarantine Checks | Activates the network access protection NAP |
Require Crypto Binding | Authentication is only possible via Crypto Binding |
Server Validation | |
Prompt for Certificates | Prompts for a validated server certificate, name or a Root certificate authentication (CA) |
Server Names | Listing of the servers that should be trusted by the devices |
None | No established security |
Use Proxy Server | Use of a proxy server |
Server Address | Proxy server address |
Server Port | Proxy Server’s Server Port |