RE: Mobile Device Management

2013-01-31 Thread Ziots, Edward
WTMI :)

Z

Edward E. Ziots, CISSP, Security +, Network +
Security Engineer
Lifespan Organization
ezi...@lifespan.org

This electronic message and any attachments may be privileged and confidential 
and protected from disclosure. If you are reading this message, but are not the 
intended recipient, nor an employee or agent responsible for delivering this 
message to the intended recipient, you are hereby notified that you are 
strictly prohibited from copying, printing, forwarding or otherwise 
disseminating this communication. If you have received this communication in 
error, please immediately notify the sender by replying to the message. Then, 
delete the message from your computer. Thank you.
[Description: Description: Lifespan]


From: Kat Aylward Langan [mailto:messagel...@gmail.com]
Sent: Wednesday, January 30, 2013 5:26 PM
To: NT System Admin Issues
Subject: Re: Mobile Device Management

LOL My house is MUCH mo' attractive to me now that it has been completely 
remodeled AND has my new hubby living in it with me

On Wed, Jan 30, 2013 at 1:24 PM, Webster 
webs...@carlwebster.commailto:webs...@carlwebster.com wrote:
Your house was very attractive at the time?  What is it now? :)

Thanks


Webster

From: Kat Aylward Langan 
[mailto:messagel...@gmail.commailto:messagel...@gmail.com]
Subject: Re: Mobile Device Management

Damn - almost went to work for them many years ago - I could have been rich 
from the buyout!  They were less than 2 miles from my house at the time, which 
was very attractive at the time!


~ Finally, powerful endpoint security that ISN'T a resource hog! ~

~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin



--
Kat Aylward Langan

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmininline: image001.jpg

RE: Mobile Device Management

2013-01-31 Thread Steve Burkett
When's Microsoft going to throw in some Tracking and Remote-Wipe capabilities 
on Direct Access connected devices?   Should be able to kinda do what LoJack 
does easy enough?



-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com]
Sent: 31 January 2013 01:22
To: NT System Admin Issues
Subject: Re: Mobile Device Management

I'm guessing (I haven't tried) that this is not a problem if you have
Win7 Enterprise and BitLocker - it'll boot up without a password just fine, and 
still be protected.

Might have to try it out on one of my lab machines, to see if it works.

Kurt

On Wed, Jan 30, 2013 at 1:48 PM, Angus Scott-Fleming angu...@geoapps.com 
wrote:
 On 30 Jan 2013 at 20:24, Cameron Cooper  wrote:

 In light of one of our company laptops being stolen (from the user's
 car), we've been tasked to look for a mobile solution that would
 allow us to track, recover and remote wipe a laptop, tablet and
 smartphone and would like some recommendations on what some are
 currently using. So far we've looked at LoJack for Laptops and Prey
 (PreyProjects). Thanks, Cameron

 Whole-disk-encryption on laptops is an absolute must IMHO.  That way
 you're only out hardware no matter what.

 The biggest problem with most tracking-and-wiping solutions like Prey
 is that the laptop has to be booted and the OS loaded for them to
 work. Since I use Truecrypt whole-disk-encryption and the password is
 required to boot or to awake after hibernation I don't use Prey.

 LoJack has a version which installs in the BIOS (installed at the
 factory on many bigger brands now, but you have to activate it $$$).
 This version phones home if there is an active network connection no
 matter how the computer is booted.  But security flaws in the BIOS
 implementation of LoJack for Laptops were documented at a 2009
 BlackHat session.  Don't know if they're still there.

 This might be of interest:

 Intel® Anti-Theft Technology — What is Intel® Anti-Theft Technology?
 http://www.intel.com/support/services/antitheft/sb/CS-030335.htm

 More info:

 LoJack - Wikipedia, the free encyclopedia
 https://en.wikipedia.org/wiki/LoJack#for_Laptops

 At the Black Hat Briefings conference in 2009, researchers Anibal
 Sacco[15] and Alfredo Ortega showed that the implementation of the
 Computrace/LoJack agent embedded in the BIOS has vulnerabilities and
 that this available control of the anti-theft agent allows a highly
 dangerous form of BIOS-enhanced rootkit that can bypass all chipset or
 installation restrictions and reutilize many existing features offered
 in this kind of software.[16][17] Absolute Software rejected the
 claims made in the research, stating that the presence of the
 Computrace module in no way weakens the security of the BIOS. Another
 independent analyst confirmed the flaws, noted that a malware
 hijacking attack would be a highly exotic one, and suggested that
 the larger concern was that savvy thieves could disable the phone home
 feature.[18]

 Core Security Technologies
 http://www.coresecurity.com/content/Deactivate-the-Rootkit
 Deactivate the Rootkit - Black Hat USA 2009 Link to paper:
 http://www.coresecurity.com/files/attachments/Paper-Deactivate-the-Roo
 tkit-AOrtega-ASacco.pdf

 Share your findings back here please.

 HTH


 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
 http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

=== STEMCOR CONFIDENTIALITY AND DISCLAIMER NOTICE This e-mail is intended only 
for the addressees named in it. The contents should not be disclosed to any 
other person nor copies taken. Any views or opinions presented are solely those 
of the sender and do not necessarily represent those of Stemcor unless 
otherwise specifically stated. Stemcor does not accept legal responsibility for 
the contents of this message nor responsibility for any change made to it after 
it was sent by the original sender. You are advised to carry out a virus check 
before opening any attachment as Stemcor does not accept liability for any 
damage sustained as a result of any software viruses. You should be aware that 
Stemcor reserves the right to read incoming and outgoing emails. ===

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body

Re: Mobile Device Management

2013-01-31 Thread Kurt Buff
BitLocker is only available on Win7 Enterprise.

Betcha they're using Win7 Pro.

On Thu, Jan 31, 2013 at 7:56 AM, John Cook john.c...@pfsf.org wrote:
 Just curious as to why not Bitlocker?



  John W. Cook

 Network Operations Manager

 Partnership For Strong Families

 5950 NW 1st Place

 Gainesville, Fl 32607

 Office (352) 244-1610

 Cell (352) 215-6944

 MCSE, MCP+I, MCTS, CompTIA A+, N+, VSP4, VTSP4



 From: Chinnery, Paul [mailto:pa...@mmcwm.com]
 Sent: Thursday, January 31, 2013 8:28 AM
 To: NT System Admin Issues
 Subject: RE: Mobile Device Management



 +1 on that.  All of our laptops (even ones secured to Medsurg carts) are
 encrypted with Truecrypt.



 From: Cameron Cooper [mailto:ccoo...@aurico.com]
 Sent: Wednesday, January 30, 2013 6:02 PM
 To: NT System Admin Issues
 Subject: RE: Mobile Device Management



 Thanks for the info below.  Since we’ve deployed more laptops recently,
 we’ve encrypted the entire drive with TrueCrypt.



 Regards,



 Cameron



 ___

 Cameron Cooper | IT Manager | Aurico
 Direct: 847.890.4021 | Cell: 224.688.2854 | Fax: 847.255.1896
 ccoo...@aurico.com | www.aurico.com



 From: Angus Scott-Fleming [mailto:angu...@geoapps.com]
 Sent: Wednesday, January 30, 2013 3:49 PM
 To: NT System Admin Issues
 Subject: Re: Mobile Device Management



 On 30 Jan 2013 at 20:24, Cameron Cooper  wrote:



 In light of one of our company laptops being stolen (from the user's car),

 we've been tasked to look for a mobile solution that would allow us to
 track,

 recover and remote wipe a laptop, tablet and smartphone and would like
 some

 recommendations on what some are currently using. So far we've looked at

 LoJack for Laptops and Prey (PreyProjects). Thanks, Cameron



 Whole-disk-encryption on laptops is an absolute must IMHO.  That way you're
 only out hardware no matter what.



 The biggest problem with most tracking-and-wiping solutions like Prey is
 that the laptop has to be booted and the OS loaded for them to work. Since I
 use Truecrypt whole-disk-encryption and the password is required to boot or
 to awake after hibernation I don't use Prey.



 LoJack has a version which installs in the BIOS (installed at the factory on
 many bigger brands now, but you have to activate it $$$).  This version
 phones home if there is an active network connection no matter how the
 computer is booted.  But security flaws in the BIOS implementation of LoJack
 for Laptops were documented at a 2009 BlackHat session.  Don't know if
 they're still there.



 This might be of interest:



 Intel® Anti-Theft Technology — What is Intel® Anti-Theft Technology?

 http://www.intel.com/support/services/antitheft/sb/CS-030335.htm



 More info:



 LoJack - Wikipedia, the free encyclopedia

 https://en.wikipedia.org/wiki/LoJack#for_Laptops



 At the Black Hat Briefings conference in 2009, researchers Anibal Sacco[15]
 and Alfredo Ortega showed that the implementation of the Computrace/LoJack
 agent embedded in the BIOS has vulnerabilities and that this available
 control of the anti-theft agent allows a highly dangerous form of
 BIOS-enhanced rootkit that can bypass all chipset or installation
 restrictions and reutilize many existing features offered in this kind of
 software.[16][17] Absolute Software rejected the claims made in the
 research, stating that the presence of the Computrace module in no way
 weakens the security of the BIOS. Another independent analyst confirmed the
 flaws, noted that a malware hijacking attack would be a highly exotic one,
 and suggested that the larger concern was that savvy thieves could disable
 the phone home feature.[18]



 Core Security Technologies

 http://www.coresecurity.com/content/Deactivate-the-Rootkit

 Deactivate the Rootkit - Black Hat USA 2009

 Link to paper:

 http://www.coresecurity.com/files/attachments/Paper-Deactivate-the-Rootkit-AOrtega-ASacco.pdf



 Share your findings back here please.



 HTH



 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

 



 CONFIDENTIALITY NOTICE: This email message is intended only for the person
 or entity to which it is addressed and may contain confidential material.
 Any unauthorized review, use, disclosure, downloading, copying or
 distribution is prohibited. If you are not the intended recipient, please
 contact the sender by reply email and permanently delete all copies of the
 original message. If you are the intended recipient but do not wish to
 receive communications through this medium, please advise the sender
 immediately.

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business

RE: Mobile Device Management

2013-01-31 Thread John Cook
Or XP

 John W. Cook
Network Operations Manager
Partnership For Strong Families
5950 NW 1st Place
Gainesville, Fl 32607
Office (352) 244-1610
Cell (352) 215-6944
MCSE, MCP+I, MCTS, CompTIA A+, N+, VSP4, VTSP4


-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com]
Sent: Thursday, January 31, 2013 3:04 PM
To: NT System Admin Issues
Subject: Re: Mobile Device Management

BitLocker is only available on Win7 Enterprise.

Betcha they're using Win7 Pro.

On Thu, Jan 31, 2013 at 7:56 AM, John Cook john.c...@pfsf.org wrote:
 Just curious as to why not Bitlocker?



  John W. Cook

 Network Operations Manager

 Partnership For Strong Families

 5950 NW 1st Place

 Gainesville, Fl 32607

 Office (352) 244-1610

 Cell (352) 215-6944

 MCSE, MCP+I, MCTS, CompTIA A+, N+, VSP4, VTSP4



 From: Chinnery, Paul [mailto:pa...@mmcwm.com]
 Sent: Thursday, January 31, 2013 8:28 AM
 To: NT System Admin Issues
 Subject: RE: Mobile Device Management



 +1 on that.  All of our laptops (even ones secured to Medsurg carts)
 +are
 encrypted with Truecrypt.



 From: Cameron Cooper [mailto:ccoo...@aurico.com]
 Sent: Wednesday, January 30, 2013 6:02 PM
 To: NT System Admin Issues
 Subject: RE: Mobile Device Management



 Thanks for the info below.  Since we’ve deployed more laptops
 recently, we’ve encrypted the entire drive with TrueCrypt.



 Regards,



 Cameron



 ___

 Cameron Cooper | IT Manager | Aurico
 Direct: 847.890.4021 | Cell: 224.688.2854 | Fax: 847.255.1896
 ccoo...@aurico.com | www.aurico.com



 From: Angus Scott-Fleming [mailto:angu...@geoapps.com]
 Sent: Wednesday, January 30, 2013 3:49 PM
 To: NT System Admin Issues
 Subject: Re: Mobile Device Management



 On 30 Jan 2013 at 20:24, Cameron Cooper  wrote:



 In light of one of our company laptops being stolen (from the user's
 car),

 we've been tasked to look for a mobile solution that would allow us
 to track,

 recover and remote wipe a laptop, tablet and smartphone and would
 like some

 recommendations on what some are currently using. So far we've looked
 at

 LoJack for Laptops and Prey (PreyProjects). Thanks, Cameron



 Whole-disk-encryption on laptops is an absolute must IMHO.  That way
 you're only out hardware no matter what.



 The biggest problem with most tracking-and-wiping solutions like Prey
 is that the laptop has to be booted and the OS loaded for them to
 work. Since I use Truecrypt whole-disk-encryption and the password is
 required to boot or to awake after hibernation I don't use Prey.



 LoJack has a version which installs in the BIOS (installed at the
 factory on many bigger brands now, but you have to activate it $$$).
 This version phones home if there is an active network connection no
 matter how the computer is booted.  But security flaws in the BIOS
 implementation of LoJack for Laptops were documented at a 2009
 BlackHat session.  Don't know if they're still there.



 This might be of interest:



 Intel® Anti-Theft Technology — What is Intel® Anti-Theft Technology?

 http://www.intel.com/support/services/antitheft/sb/CS-030335.htm



 More info:



 LoJack - Wikipedia, the free encyclopedia

 https://en.wikipedia.org/wiki/LoJack#for_Laptops



 At the Black Hat Briefings conference in 2009, researchers Anibal
 Sacco[15] and Alfredo Ortega showed that the implementation of the
 Computrace/LoJack agent embedded in the BIOS has vulnerabilities and
 that this available control of the anti-theft agent allows a highly
 dangerous form of BIOS-enhanced rootkit that can bypass all chipset or
 installation restrictions and reutilize many existing features offered
 in this kind of software.[16][17] Absolute Software rejected the
 claims made in the research, stating that the presence of the
 Computrace module in no way weakens the security of the BIOS. Another
 independent analyst confirmed the flaws, noted that a malware
 hijacking attack would be a highly exotic one, and suggested that
 the larger concern was that savvy thieves could disable the phone home
 feature.[18]



 Core Security Technologies

 http://www.coresecurity.com/content/Deactivate-the-Rootkit

 Deactivate the Rootkit - Black Hat USA 2009

 Link to paper:

 http://www.coresecurity.com/files/attachments/Paper-Deactivate-the-Roo
 tkit-AOrtega-ASacco.pdf



 Share your findings back here please.



 HTH



 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
 http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

 



 CONFIDENTIALITY NOTICE: This email message is intended only for the
 person or entity to which it is addressed and may contain confidential 
 material.
 Any unauthorized review, use, disclosure, downloading, copying or
 distribution

Re: Mobile Device Management

2013-01-31 Thread Kurt Buff
Ugh - yes, that.

On Thu, Jan 31, 2013 at 12:07 PM, John Cook john.c...@pfsf.org wrote:
 Or XP

  John W. Cook
 Network Operations Manager
 Partnership For Strong Families
 5950 NW 1st Place
 Gainesville, Fl 32607
 Office (352) 244-1610
 Cell (352) 215-6944
 MCSE, MCP+I, MCTS, CompTIA A+, N+, VSP4, VTSP4


 -Original Message-
 From: Kurt Buff [mailto:kurt.b...@gmail.com]
 Sent: Thursday, January 31, 2013 3:04 PM
 To: NT System Admin Issues
 Subject: Re: Mobile Device Management

 BitLocker is only available on Win7 Enterprise.

 Betcha they're using Win7 Pro.

 On Thu, Jan 31, 2013 at 7:56 AM, John Cook john.c...@pfsf.org wrote:
 Just curious as to why not Bitlocker?



  John W. Cook

 Network Operations Manager

 Partnership For Strong Families

 5950 NW 1st Place

 Gainesville, Fl 32607

 Office (352) 244-1610

 Cell (352) 215-6944

 MCSE, MCP+I, MCTS, CompTIA A+, N+, VSP4, VTSP4



 From: Chinnery, Paul [mailto:pa...@mmcwm.com]
 Sent: Thursday, January 31, 2013 8:28 AM
 To: NT System Admin Issues
 Subject: RE: Mobile Device Management



 +1 on that.  All of our laptops (even ones secured to Medsurg carts)
 +are
 encrypted with Truecrypt.



 From: Cameron Cooper [mailto:ccoo...@aurico.com]
 Sent: Wednesday, January 30, 2013 6:02 PM
 To: NT System Admin Issues
 Subject: RE: Mobile Device Management



 Thanks for the info below.  Since we’ve deployed more laptops
 recently, we’ve encrypted the entire drive with TrueCrypt.



 Regards,



 Cameron



 ___

 Cameron Cooper | IT Manager | Aurico
 Direct: 847.890.4021 | Cell: 224.688.2854 | Fax: 847.255.1896
 ccoo...@aurico.com | www.aurico.com



 From: Angus Scott-Fleming [mailto:angu...@geoapps.com]
 Sent: Wednesday, January 30, 2013 3:49 PM
 To: NT System Admin Issues
 Subject: Re: Mobile Device Management



 On 30 Jan 2013 at 20:24, Cameron Cooper  wrote:



 In light of one of our company laptops being stolen (from the user's
 car),

 we've been tasked to look for a mobile solution that would allow us
 to track,

 recover and remote wipe a laptop, tablet and smartphone and would
 like some

 recommendations on what some are currently using. So far we've looked
 at

 LoJack for Laptops and Prey (PreyProjects). Thanks, Cameron



 Whole-disk-encryption on laptops is an absolute must IMHO.  That way
 you're only out hardware no matter what.



 The biggest problem with most tracking-and-wiping solutions like Prey
 is that the laptop has to be booted and the OS loaded for them to
 work. Since I use Truecrypt whole-disk-encryption and the password is
 required to boot or to awake after hibernation I don't use Prey.



 LoJack has a version which installs in the BIOS (installed at the
 factory on many bigger brands now, but you have to activate it $$$).
 This version phones home if there is an active network connection no
 matter how the computer is booted.  But security flaws in the BIOS
 implementation of LoJack for Laptops were documented at a 2009
 BlackHat session.  Don't know if they're still there.



 This might be of interest:



 Intel® Anti-Theft Technology — What is Intel® Anti-Theft Technology?

 http://www.intel.com/support/services/antitheft/sb/CS-030335.htm



 More info:



 LoJack - Wikipedia, the free encyclopedia

 https://en.wikipedia.org/wiki/LoJack#for_Laptops



 At the Black Hat Briefings conference in 2009, researchers Anibal
 Sacco[15] and Alfredo Ortega showed that the implementation of the
 Computrace/LoJack agent embedded in the BIOS has vulnerabilities and
 that this available control of the anti-theft agent allows a highly
 dangerous form of BIOS-enhanced rootkit that can bypass all chipset or
 installation restrictions and reutilize many existing features offered
 in this kind of software.[16][17] Absolute Software rejected the
 claims made in the research, stating that the presence of the
 Computrace module in no way weakens the security of the BIOS. Another
 independent analyst confirmed the flaws, noted that a malware
 hijacking attack would be a highly exotic one, and suggested that
 the larger concern was that savvy thieves could disable the phone home
 feature.[18]



 Core Security Technologies

 http://www.coresecurity.com/content/Deactivate-the-Rootkit

 Deactivate the Rootkit - Black Hat USA 2009

 Link to paper:

 http://www.coresecurity.com/files/attachments/Paper-Deactivate-the-Roo
 tkit-AOrtega-ASacco.pdf



 Share your findings back here please.



 HTH



 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
 http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

 



 CONFIDENTIALITY NOTICE: This email message is intended only for the
 person or entity to which it is addressed and may contain

Re: Mobile Device Management

2013-01-30 Thread kz20fl
MobileNow from AppSense can handle the phone and tablet piece, the demos I saw 
looked very good and it has just been released. I can get some more info on it 
for you in a little while - not sure whether it is specifically MAM or MDM 
though.

Sent from my Blackberry, which may be an antique but delivers email RELIABLY

-Original Message-
From: Cameron Cooper ccoo...@aurico.com
Date: Wed, 30 Jan 2013 20:24:43 
To: NT System Admin Issuesntsysadmin@lyris.sunbelt-software.com
Reply-To: NT System Admin Issues 
ntsysadmin@lyris.sunbelt-software.comSubject: Mobile Device Management

All,

In light of one of our company laptops being stolen (from the user's car), 
we've been tasked to look for a mobile solution that would allow us to track, 
recover and remote wipe a laptop, tablet and smartphone and would like some 
recommendations on what some are currently using.

So far we've looked at LoJack for Laptops and Prey (PreyProjects).

Thanks,

Cameron


CONFIDENTIALITY NOTICE: This email message is intended only for the person or 
entity to which it is addressed and may contain confidential material. Any 
unauthorized review, use, disclosure, downloading, copying or distribution is 
prohibited. If you are not the intended recipient, please contact the sender by 
reply email and permanently delete all copies of the original message. If you 
are the intended recipient but do not wish to receive communications through 
this medium, please advise the sender immediately.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin


RE: Mobile Device Management

2013-01-30 Thread Guyer, Don
We use Zenprise. Adds device policy management to your list of requirements.

Regards,

Don Guyer
Catholic Health East - Information Technology
Enterprise Directory  Messaging Services
3805 West Chester Pike, Suite 100, Newtown Square, Pa  19073
email: dgu...@che.orgmailto:dgu...@che.org
Office:  610.550.3595 | Cell: 610.955.6528 | Fax: 610.271.9440
For immediate assistance, please open a Service Desk ticket or call the 
helpdesk @ 610-492-3839.
[cid:image001.jpg@01CDFEFF.7E4F1540]

From: Cameron Cooper [mailto:ccoo...@aurico.com]
Sent: Wednesday, January 30, 2013 3:25 PM
To: NT System Admin Issues
Subject: Mobile Device Management

All,

In light of one of our company laptops being stolen (from the user's car), 
we've been tasked to look for a mobile solution that would allow us to track, 
recover and remote wipe a laptop, tablet and smartphone and would like some 
recommendations on what some are currently using.

So far we've looked at LoJack for Laptops and Prey (PreyProjects).

Thanks,

Cameron


CONFIDENTIALITY NOTICE: This email message is intended only for the person or 
entity to which it is addressed and may contain confidential material. Any 
unauthorized review, use, disclosure, downloading, copying or distribution is 
prohibited. If you are not the intended recipient, please contact the sender by 
reply email and permanently delete all copies of the original message. If you 
are the intended recipient but do not wish to receive communications through 
this medium, please advise the sender immediately.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin
Confidentiality Notice:
This e-mail, including any attachments is the 
property of Catholic Health East and is intended 
for the sole use of the intended recipient(s).  
It may contain information that is privileged and 
confidential.  Any unauthorized review, use,
disclosure, or distribution is prohibited. If you are 
not the intended recipient, please delete this message, and 
reply to the sender regarding the error in a separate email.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmininline: image001.jpg

RE: Mobile Device Management

2013-01-30 Thread Guyer, Don
Interesting, Web, interesting...

:)

Regards,

Don Guyer
Catholic Health East - Information Technology
Enterprise Directory  Messaging Services
3805 West Chester Pike, Suite 100, Newtown Square, Pa  19073
email: dgu...@che.orgmailto:dgu...@che.org
Office:  610.550.3595 | Cell: 610.955.6528 | Fax: 610.271.9440
For immediate assistance, please open a Service Desk ticket or call the 
helpdesk @ 610-492-3839.
[cid:image001.jpg@01CDFF02.76D15460]

From: Webster [mailto:webs...@carlwebster.com]
Sent: Wednesday, January 30, 2013 3:55 PM
To: NT System Admin Issues
Subject: RE: Mobile Device Management

Now part of Citrix. :)

Thanks


Webster

From: Guyer, Don [mailto:dgu...@che.org]
Subject: RE: Mobile Device Management

We use Zenprise. Adds device policy management to your list of requirements.

Regards,


From: Cameron Cooper [mailto:ccoo...@aurico.com]
Subject: Mobile Device Management

All,

In light of one of our company laptops being stolen (from the user's car), 
we've been tasked to look for a mobile solution that would allow us to track, 
recover and remote wipe a laptop, tablet and smartphone and would like some 
recommendations on what some are currently using.

So far we've looked at LoJack for Laptops and Prey (PreyProjects).


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to 
listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin
Confidentiality Notice:
This e-mail, including any attachments is the 
property of Catholic Health East and is intended 
for the sole use of the intended recipient(s).  
It may contain information that is privileged and 
confidential.  Any unauthorized review, use,
disclosure, or distribution is prohibited. If you are 
not the intended recipient, please delete this message, and 
reply to the sender regarding the error in a separate email. 
 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmininline: image001.jpg

Re: Mobile Device Management

2013-01-30 Thread Kat Aylward Langan
Damn - almost went to work for them many years ago - I could have been rich
from the buyout!  They were less than 2 miles from my house at the time,
which was very attractive at the time!


On Wed, Jan 30, 2013 at 12:57 PM, Guyer, Don dgu...@che.org wrote:

 Interesting, Web, interesting…

 ** **

 J

 ** **

 Regards,

 * *

 *Don Guyer**
 **Catholic Health East - Information Technology*

 Enterprise Directory  Messaging Services
 3805 West Chester Pike, Suite 100, Newtown Square, Pa  19073

 email: *dgu...@che.org*

 Office:  610.550.3595 | Cell: 610.955.6528 | Fax: 610.271.9440

 *For immediate assistance, please open a Service Desk ticket or call the
 helpdesk @ 610-492-3839.*

 [image: Description: Description: Description: InfoService-Logo240]

 ** **

 *From:* Webster [mailto:webs...@carlwebster.com]
 *Sent:* Wednesday, January 30, 2013 3:55 PM

 *To:* NT System Admin Issues
 *Subject:* RE: Mobile Device Management

 ** **

 Now part of Citrix. J

 ** **

 Thanks

 ** **

 ** **

 Webster

 ** **

 *From:* Guyer, Don [mailto:dgu...@che.org]
 *Subject:* RE: Mobile Device Management

 ** **

 We use Zenprise. Adds device policy management to your list of
 requirements.

 ** **

 Regards,

 * *

 ** **

 *From:* Cameron Cooper [mailto:ccoo...@aurico.com ccoo...@aurico.com]
 *Subject:* Mobile Device Management

 ** **

 All,

  

 In light of one of our company laptops being stolen (from the user’s car),
 we’ve been tasked to look for a mobile solution that would allow us to
 track, recover and remote wipe a laptop, tablet and smartphone and would
 like some recommendations on what some are currently using.

  

 So far we’ve looked at LoJack for Laptops and Prey (PreyProjects).

  

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin
 Confidentiality Notice:

 This e-mail, including any attachments is the
 property of Catholic Health East and is intended
 for the sole use of the intended recipient(s).
 It may contain information that is privileged and
 confidential.  Any unauthorized review, use,
 disclosure, or distribution is prohibited. If you are
 not the intended recipient, please delete this message, and
 reply to the sender regarding the error in a separate email.

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin




-- 
Kat Aylward Langan

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadminimage001.jpg

Re: Mobile Device Management

2013-01-30 Thread Kurt Buff
I'm guessing (I haven't tried) that this is not a problem if you have
Win7 Enterprise and BitLocker - it'll boot up without a password just
fine, and still be protected.

Might have to try it out on one of my lab machines, to see if it works.

Kurt

On Wed, Jan 30, 2013 at 1:48 PM, Angus Scott-Fleming
angu...@geoapps.com wrote:
 On 30 Jan 2013 at 20:24, Cameron Cooper  wrote:

 In light of one of our company laptops being stolen (from the user's car),
 we've been tasked to look for a mobile solution that would allow us to
 track,
 recover and remote wipe a laptop, tablet and smartphone and would like
 some
 recommendations on what some are currently using. So far we've looked at
 LoJack for Laptops and Prey (PreyProjects). Thanks, Cameron

 Whole-disk-encryption on laptops is an absolute must IMHO.  That way you're
 only out hardware no matter what.

 The biggest problem with most tracking-and-wiping solutions like Prey is
 that the laptop has to be booted and the OS loaded for them to work. Since I
 use Truecrypt whole-disk-encryption and the password is required to boot or
 to awake after hibernation I don't use Prey.

 LoJack has a version which installs in the BIOS (installed at the factory on
 many bigger brands now, but you have to activate it $$$).  This version
 phones home if there is an active network connection no matter how the
 computer is booted.  But security flaws in the BIOS implementation of LoJack
 for Laptops were documented at a 2009 BlackHat session.  Don't know if
 they're still there.

 This might be of interest:

 Intel® Anti-Theft Technology — What is Intel® Anti-Theft Technology?
 http://www.intel.com/support/services/antitheft/sb/CS-030335.htm

 More info:

 LoJack - Wikipedia, the free encyclopedia
 https://en.wikipedia.org/wiki/LoJack#for_Laptops

 At the Black Hat Briefings conference in 2009, researchers Anibal Sacco[15]
 and Alfredo Ortega showed that the implementation of the Computrace/LoJack
 agent embedded in the BIOS has vulnerabilities and that this available
 control of the anti-theft agent allows a highly dangerous form of
 BIOS-enhanced rootkit that can bypass all chipset or installation
 restrictions and reutilize many existing features offered in this kind of
 software.[16][17] Absolute Software rejected the claims made in the
 research, stating that the presence of the Computrace module in no way
 weakens the security of the BIOS. Another independent analyst confirmed the
 flaws, noted that a malware hijacking attack would be a highly exotic one,
 and suggested that the larger concern was that savvy thieves could disable
 the phone home feature.[18]

 Core Security Technologies
 http://www.coresecurity.com/content/Deactivate-the-Rootkit
 Deactivate the Rootkit - Black Hat USA 2009
 Link to paper:
 http://www.coresecurity.com/files/attachments/Paper-Deactivate-the-Rootkit-AOrtega-ASacco.pdf

 Share your findings back here please.

 HTH


 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ---
 To manage subscriptions click here:
 http://lyris.sunbelt-software.com/read/my_forums/
 or send an email to listmana...@lyris.sunbeltsoftware.com
 with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin