Apple VPP now available in other countries (including Australia)

Rick's picture
No votes yet

Not before time. Fantastic news.

https://developer.apple.com/programs/volume/

Anyone using Silverback MDM?

wazza_b's picture
No votes yet

What do you guys think of this product? anyone used it or is looking into it?

UDID

No votes yet

Apple's Unique Device Identifier, or UDID, is an alphanumeric string uniquely identifying each Apple iOS device. According to SecurityLearn.net, the UDID is calculated based on unique hardware properties:

UDID = SHA1(Serial Number + ECID + LOWERCASE(WiFi Address) + LOWERCASE(Bluetooth Address))

As discussed in a paper by Eric Smith, hardware-locked device identifiers can be used to "track" a user across various sites and services. They are therefore considered a bad idea.

Apple deprecated developer access to UDIDs in iOS 5, and is removing access in iOS 6.

On September 4, 2012, the hacker group AntiSec released a file containing UDIDs, APNS keys, and device names for 1,000,001 iOS devices. AntiSec says these were liberated from an FBI laptop, and the original file contained around 12 million devices and personal information. (TheNextWeb has a tool for checking if your device is in the leaked list.)

How to restrict Viber?

brlx's picture
No votes yet

Most of you are probably aware the security concerns about Viber (and WhatsApp, and who knows what else), regarding contacts and call logs (e.g. this and this). But regardless of this, users love these apps, and honestly, I installed it too on my iPhone when it came out earlier.
The question is simple: how do you prevent your users using these apps, without completely blocking the whole AppStore on their devices? Because, as far as I know, it is not possible to prevent the user to install any single app, it is only possible to turn off the whole AppStore via the restriction profiles. I don't think they would like that, and their rage would be completely understandable.
Our MDM solution raises alerts about blacklisted apps on iOS (and it even blocks them on android), but by the time you call the user and ask them to uninstall Viber - because do you have any other choice? - it will have already uploaded all the data you wanted to prevent to be uploaded.

Any solution or idea would be appreciated.

Apple Configurator 1.1.2 fixes one bug; Tech Recess on Configurator backups

No votes yet

According to the brief release notes:

  • Fixes an issue that could prevent Apple Configurator v1.1.1 from opening.

Download the update from the Mac App Store.

Also today, Randy from the edh tech site Tech Recess has posted a new video in his series on using Configurator. This one is all about creating Configurator backup images.

Shared Apple TVs in a big office building

brlx's picture
No votes yet

We would like to deploy some Apple TVs in our building for meetings and presentations. First, only in top managers' meeting rooms, but later maybe in much more meeting rooms.
Honestly, we did not find a good solution how to solve the access to them. As you probably now, if an Apple TV is not password protected and is available on the network, anybody can connect to it, kicking out the previous presenter. If multiple users know the password, they also can kick out each other. We came up with multiple ideas, but each of them has it's own issues.

  1. If we simply leave them freely available on the main network/wifi, then anybody can connect to any of them from anywhere, which is problematic at least, even if assume that the users are benign, ie. they will only connect if they are presenting, since they might select the wrong one. Also problematic, if you have to select the right one from 30 Apple TVs.
  2. If we would create a separate network for them, then the users would have to connect to a different wifi every time, and most probably, they would forget to connect back to the main one, so that we are back at the first solution.
  3. If we make the AppleTVs available on the main network, but protect them with a password, then it would only protect them until some users save those passwords in their devices, than we are again almost back to the first solution.
  4. Creating a separate network for each of the Apple TVs is rather a lot of work, might require some infrastructure investments too (since our APs already provide a lot of SSIDs), and there is the problem again with switching wifi before connecting to the Apple TV.

Any better idea than these? (It might be relevant that we do not use Macs officially, only some users did buy them, but we do have more and more iOs devices.)

iPad not mobile enough? Give yours a pair of robotic wheels.

No votes yet

iPad-based teleprescence by Double Robotics. Bring your own iPad. (Sold out through 2013.)

Best Practices for Vetting In-House Apps?

jackharris's picture
No votes yet

I am looking into the details of the enterprise iOS developer program and was wondering if anyone has any experience with it here.

What I am interested in learning about, for the moment, is the distribution of in-house apps. Specifically, what procedures do you follow to vet the apps that go into your in-house app store? Are there any good, public, resources out there that discuss this topic as to what tests / procedures to follow to make sure an app being placed in the App Store, for example, doesn't use any private APIs, does not send data when it also claims it won't, etc...?

Thank you.

Sandboxed email

ZaneT's picture
No votes yet

I do not understand one parameter in mdm comparison list. iOS5 features – sandboxed email.
I can not find on any mdm (except Goods, Excitor that offer sandboxed solutions) site info about such a feature. Probably I misunderstand this feature due to my lack of knowledge of iOS. Could somebody explain me what is ment by sandboxed email?

Locking iOS device name

pkartheiser's picture
No votes yet

Is there a way to lock an iOS device name so it cannot be changed?

Apple Configurator 1.1.1 Fixes VPP Spreadsheets

No votes yet

Apple has updated Configurator to version 1.1.1. Apple Configurator is Apple's tool for mass configuration and deployment of iPhones and iPads.

The release notes mention only one change:

Fixes additional issues with importing Volume Purchase Program spreadsheets and installing paid store apps

Read more about Apple Configurator in our wiki.

Stronger Cryptography for You, Courtesy of Apple

No votes yet

On technologyreview.com, Simson L. Garfinkel has posted a look at the cryptographic features built into iOS. Over the last few years, Apple has successfully introduced strong encryption to the general public, causing all sorts of bellyaches for forensic analysts.

Now, with Apple's more sophisticated approach to encryption, investigators who want to examine data on a phone have to try every possible PIN. Examiners perform these so-called brute-force attacks with special software, because the iPhone can be programmed to wipe itself if the wrong PIN is provided more than 10 times in a row. This software must be run on the iPhone itself, limiting the guessing speed to 80 milliseconds per PIN. Trying all four-digit PINs therefore requires no more than 800 seconds, a little more than 13 minutes. However, if the user chooses a six-digit PIN, the maximum time required would be 22 hours; a nine-digit PIN would require 2.5 years, and a 10-digit pin would take 25 years. That's good enough for most corporate secrets—and probably good enough for most criminals as well.

This is a good time to remind you that with Mobile Device Management, you can set policies for minimum PIN length and complexity.

Multiple iTunes accounts?

Enterprisegk's picture
No votes yet

Thinking about letting employees sign into their personal itunes accounts on Company Issued iPads as a fringe benefit. I use NotifyMDM and each employee has their own company itunes account (created by me). I don't see any conflict, in theory, however there may be issues that I am not predicting (like would Find my iphone still work?) Anyone do this? I am trying to gather information from real world experiences.

Thanks.

Lockdown MDM profile?

dleven's picture
No votes yet

Hi,
I'm currently using Mobileiron as my MDM solution and have deployed to about 200 iPad users. The most annoying thing is when users go ahead and uninstall the the MI agent then I get notified and have to contact them to get their iOS device back in compliance. I thought to myself that there has to be a way to lock this down which sounds simple especially since coming from the BES environment which allowed you to do so. Looking deeper into this, a profile pushed via MDM, cannot be locked. Apple's thinking here is that if you have the device in your possession, the user must have given you permission to install a locked profile, so it's allowed. In the MDM scenario, the user has no warning that a locked profile will be installed, and Apple is concerned a user will be locked-into a behavior which they cannot opt-out of. So removing MDM profile with password is not option in our environment since we are using MDM certificate. The configuration profile created in the iPhone Configuration Utility which is pushed to the device over USB, can be locked so that it cannot be removed. Any thoughts? Anyone running into the same situation?

Thanks! Smile

What MDM will not do??

rohanparakh's picture
No votes yet

There is lot of confusion about what MDM solution cannot/will not do.
Why not compile such points and put across one article.
Your views??

About This Site

  • Enterprise iOS is a community for administrators of the iPad, iPhone, and related devices. All content is available to browse. We encourage you to create an account to submit stories, edit wiki pages, and post to our forum.

Comparison of MDM Providers

Recent Activity

Who's New