RE: Mobile Device Management
WTMI :) Z Edward E. Ziots, CISSP, Security +, Network + Security Engineer Lifespan Organization ezi...@lifespan.org This electronic message and any attachments may be privileged and confidential and protected from disclosure. If you are reading this message, but are not the intended recipient, nor an employee or agent responsible for delivering this message to the intended recipient, you are hereby notified that you are strictly prohibited from copying, printing, forwarding or otherwise disseminating this communication. If you have received this communication in error, please immediately notify the sender by replying to the message. Then, delete the message from your computer. Thank you. [Description: Description: Lifespan] From: Kat Aylward Langan [mailto:messagel...@gmail.com] Sent: Wednesday, January 30, 2013 5:26 PM To: NT System Admin Issues Subject: Re: Mobile Device Management LOL My house is MUCH mo' attractive to me now that it has been completely remodeled AND has my new hubby living in it with me On Wed, Jan 30, 2013 at 1:24 PM, Webster webs...@carlwebster.commailto:webs...@carlwebster.com wrote: Your house was very attractive at the time? What is it now? :) Thanks Webster From: Kat Aylward Langan [mailto:messagel...@gmail.commailto:messagel...@gmail.com] Subject: Re: Mobile Device Management Damn - almost went to work for them many years ago - I could have been rich from the buyout! They were less than 2 miles from my house at the time, which was very attractive at the time! ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin -- Kat Aylward Langan ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmininline: image001.jpg
RE: Mobile Device Management
When's Microsoft going to throw in some Tracking and Remote-Wipe capabilities on Direct Access connected devices? Should be able to kinda do what LoJack does easy enough? -Original Message- From: Kurt Buff [mailto:kurt.b...@gmail.com] Sent: 31 January 2013 01:22 To: NT System Admin Issues Subject: Re: Mobile Device Management I'm guessing (I haven't tried) that this is not a problem if you have Win7 Enterprise and BitLocker - it'll boot up without a password just fine, and still be protected. Might have to try it out on one of my lab machines, to see if it works. Kurt On Wed, Jan 30, 2013 at 1:48 PM, Angus Scott-Fleming angu...@geoapps.com wrote: On 30 Jan 2013 at 20:24, Cameron Cooper wrote: In light of one of our company laptops being stolen (from the user's car), we've been tasked to look for a mobile solution that would allow us to track, recover and remote wipe a laptop, tablet and smartphone and would like some recommendations on what some are currently using. So far we've looked at LoJack for Laptops and Prey (PreyProjects). Thanks, Cameron Whole-disk-encryption on laptops is an absolute must IMHO. That way you're only out hardware no matter what. The biggest problem with most tracking-and-wiping solutions like Prey is that the laptop has to be booted and the OS loaded for them to work. Since I use Truecrypt whole-disk-encryption and the password is required to boot or to awake after hibernation I don't use Prey. LoJack has a version which installs in the BIOS (installed at the factory on many bigger brands now, but you have to activate it $$$). This version phones home if there is an active network connection no matter how the computer is booted. But security flaws in the BIOS implementation of LoJack for Laptops were documented at a 2009 BlackHat session. Don't know if they're still there. This might be of interest: Intel® Anti-Theft Technology — What is Intel® Anti-Theft Technology? http://www.intel.com/support/services/antitheft/sb/CS-030335.htm More info: LoJack - Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/LoJack#for_Laptops At the Black Hat Briefings conference in 2009, researchers Anibal Sacco[15] and Alfredo Ortega showed that the implementation of the Computrace/LoJack agent embedded in the BIOS has vulnerabilities and that this available control of the anti-theft agent allows a highly dangerous form of BIOS-enhanced rootkit that can bypass all chipset or installation restrictions and reutilize many existing features offered in this kind of software.[16][17] Absolute Software rejected the claims made in the research, stating that the presence of the Computrace module in no way weakens the security of the BIOS. Another independent analyst confirmed the flaws, noted that a malware hijacking attack would be a highly exotic one, and suggested that the larger concern was that savvy thieves could disable the phone home feature.[18] Core Security Technologies http://www.coresecurity.com/content/Deactivate-the-Rootkit Deactivate the Rootkit - Black Hat USA 2009 Link to paper: http://www.coresecurity.com/files/attachments/Paper-Deactivate-the-Roo tkit-AOrtega-ASacco.pdf Share your findings back here please. HTH ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin === STEMCOR CONFIDENTIALITY AND DISCLAIMER NOTICE This e-mail is intended only for the addressees named in it. The contents should not be disclosed to any other person nor copies taken. Any views or opinions presented are solely those of the sender and do not necessarily represent those of Stemcor unless otherwise specifically stated. Stemcor does not accept legal responsibility for the contents of this message nor responsibility for any change made to it after it was sent by the original sender. You are advised to carry out a virus check before opening any attachment as Stemcor does not accept liability for any damage sustained as a result of any software viruses. You should be aware that Stemcor reserves the right to read incoming and outgoing emails. === ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body
Re: Mobile Device Management
BitLocker is only available on Win7 Enterprise. Betcha they're using Win7 Pro. On Thu, Jan 31, 2013 at 7:56 AM, John Cook john.c...@pfsf.org wrote: Just curious as to why not Bitlocker? John W. Cook Network Operations Manager Partnership For Strong Families 5950 NW 1st Place Gainesville, Fl 32607 Office (352) 244-1610 Cell (352) 215-6944 MCSE, MCP+I, MCTS, CompTIA A+, N+, VSP4, VTSP4 From: Chinnery, Paul [mailto:pa...@mmcwm.com] Sent: Thursday, January 31, 2013 8:28 AM To: NT System Admin Issues Subject: RE: Mobile Device Management +1 on that. All of our laptops (even ones secured to Medsurg carts) are encrypted with Truecrypt. From: Cameron Cooper [mailto:ccoo...@aurico.com] Sent: Wednesday, January 30, 2013 6:02 PM To: NT System Admin Issues Subject: RE: Mobile Device Management Thanks for the info below. Since we’ve deployed more laptops recently, we’ve encrypted the entire drive with TrueCrypt. Regards, Cameron ___ Cameron Cooper | IT Manager | Aurico Direct: 847.890.4021 | Cell: 224.688.2854 | Fax: 847.255.1896 ccoo...@aurico.com | www.aurico.com From: Angus Scott-Fleming [mailto:angu...@geoapps.com] Sent: Wednesday, January 30, 2013 3:49 PM To: NT System Admin Issues Subject: Re: Mobile Device Management On 30 Jan 2013 at 20:24, Cameron Cooper wrote: In light of one of our company laptops being stolen (from the user's car), we've been tasked to look for a mobile solution that would allow us to track, recover and remote wipe a laptop, tablet and smartphone and would like some recommendations on what some are currently using. So far we've looked at LoJack for Laptops and Prey (PreyProjects). Thanks, Cameron Whole-disk-encryption on laptops is an absolute must IMHO. That way you're only out hardware no matter what. The biggest problem with most tracking-and-wiping solutions like Prey is that the laptop has to be booted and the OS loaded for them to work. Since I use Truecrypt whole-disk-encryption and the password is required to boot or to awake after hibernation I don't use Prey. LoJack has a version which installs in the BIOS (installed at the factory on many bigger brands now, but you have to activate it $$$). This version phones home if there is an active network connection no matter how the computer is booted. But security flaws in the BIOS implementation of LoJack for Laptops were documented at a 2009 BlackHat session. Don't know if they're still there. This might be of interest: Intel® Anti-Theft Technology — What is Intel® Anti-Theft Technology? http://www.intel.com/support/services/antitheft/sb/CS-030335.htm More info: LoJack - Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/LoJack#for_Laptops At the Black Hat Briefings conference in 2009, researchers Anibal Sacco[15] and Alfredo Ortega showed that the implementation of the Computrace/LoJack agent embedded in the BIOS has vulnerabilities and that this available control of the anti-theft agent allows a highly dangerous form of BIOS-enhanced rootkit that can bypass all chipset or installation restrictions and reutilize many existing features offered in this kind of software.[16][17] Absolute Software rejected the claims made in the research, stating that the presence of the Computrace module in no way weakens the security of the BIOS. Another independent analyst confirmed the flaws, noted that a malware hijacking attack would be a highly exotic one, and suggested that the larger concern was that savvy thieves could disable the phone home feature.[18] Core Security Technologies http://www.coresecurity.com/content/Deactivate-the-Rootkit Deactivate the Rootkit - Black Hat USA 2009 Link to paper: http://www.coresecurity.com/files/attachments/Paper-Deactivate-the-Rootkit-AOrtega-ASacco.pdf Share your findings back here please. HTH ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin CONFIDENTIALITY NOTICE: This email message is intended only for the person or entity to which it is addressed and may contain confidential material. Any unauthorized review, use, disclosure, downloading, copying or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply email and permanently delete all copies of the original message. If you are the intended recipient but do not wish to receive communications through this medium, please advise the sender immediately. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business
RE: Mobile Device Management
Or XP John W. Cook Network Operations Manager Partnership For Strong Families 5950 NW 1st Place Gainesville, Fl 32607 Office (352) 244-1610 Cell (352) 215-6944 MCSE, MCP+I, MCTS, CompTIA A+, N+, VSP4, VTSP4 -Original Message- From: Kurt Buff [mailto:kurt.b...@gmail.com] Sent: Thursday, January 31, 2013 3:04 PM To: NT System Admin Issues Subject: Re: Mobile Device Management BitLocker is only available on Win7 Enterprise. Betcha they're using Win7 Pro. On Thu, Jan 31, 2013 at 7:56 AM, John Cook john.c...@pfsf.org wrote: Just curious as to why not Bitlocker? John W. Cook Network Operations Manager Partnership For Strong Families 5950 NW 1st Place Gainesville, Fl 32607 Office (352) 244-1610 Cell (352) 215-6944 MCSE, MCP+I, MCTS, CompTIA A+, N+, VSP4, VTSP4 From: Chinnery, Paul [mailto:pa...@mmcwm.com] Sent: Thursday, January 31, 2013 8:28 AM To: NT System Admin Issues Subject: RE: Mobile Device Management +1 on that. All of our laptops (even ones secured to Medsurg carts) +are encrypted with Truecrypt. From: Cameron Cooper [mailto:ccoo...@aurico.com] Sent: Wednesday, January 30, 2013 6:02 PM To: NT System Admin Issues Subject: RE: Mobile Device Management Thanks for the info below. Since we’ve deployed more laptops recently, we’ve encrypted the entire drive with TrueCrypt. Regards, Cameron ___ Cameron Cooper | IT Manager | Aurico Direct: 847.890.4021 | Cell: 224.688.2854 | Fax: 847.255.1896 ccoo...@aurico.com | www.aurico.com From: Angus Scott-Fleming [mailto:angu...@geoapps.com] Sent: Wednesday, January 30, 2013 3:49 PM To: NT System Admin Issues Subject: Re: Mobile Device Management On 30 Jan 2013 at 20:24, Cameron Cooper wrote: In light of one of our company laptops being stolen (from the user's car), we've been tasked to look for a mobile solution that would allow us to track, recover and remote wipe a laptop, tablet and smartphone and would like some recommendations on what some are currently using. So far we've looked at LoJack for Laptops and Prey (PreyProjects). Thanks, Cameron Whole-disk-encryption on laptops is an absolute must IMHO. That way you're only out hardware no matter what. The biggest problem with most tracking-and-wiping solutions like Prey is that the laptop has to be booted and the OS loaded for them to work. Since I use Truecrypt whole-disk-encryption and the password is required to boot or to awake after hibernation I don't use Prey. LoJack has a version which installs in the BIOS (installed at the factory on many bigger brands now, but you have to activate it $$$). This version phones home if there is an active network connection no matter how the computer is booted. But security flaws in the BIOS implementation of LoJack for Laptops were documented at a 2009 BlackHat session. Don't know if they're still there. This might be of interest: Intel® Anti-Theft Technology — What is Intel® Anti-Theft Technology? http://www.intel.com/support/services/antitheft/sb/CS-030335.htm More info: LoJack - Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/LoJack#for_Laptops At the Black Hat Briefings conference in 2009, researchers Anibal Sacco[15] and Alfredo Ortega showed that the implementation of the Computrace/LoJack agent embedded in the BIOS has vulnerabilities and that this available control of the anti-theft agent allows a highly dangerous form of BIOS-enhanced rootkit that can bypass all chipset or installation restrictions and reutilize many existing features offered in this kind of software.[16][17] Absolute Software rejected the claims made in the research, stating that the presence of the Computrace module in no way weakens the security of the BIOS. Another independent analyst confirmed the flaws, noted that a malware hijacking attack would be a highly exotic one, and suggested that the larger concern was that savvy thieves could disable the phone home feature.[18] Core Security Technologies http://www.coresecurity.com/content/Deactivate-the-Rootkit Deactivate the Rootkit - Black Hat USA 2009 Link to paper: http://www.coresecurity.com/files/attachments/Paper-Deactivate-the-Roo tkit-AOrtega-ASacco.pdf Share your findings back here please. HTH ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin CONFIDENTIALITY NOTICE: This email message is intended only for the person or entity to which it is addressed and may contain confidential material. Any unauthorized review, use, disclosure, downloading, copying or distribution
Re: Mobile Device Management
Ugh - yes, that. On Thu, Jan 31, 2013 at 12:07 PM, John Cook john.c...@pfsf.org wrote: Or XP John W. Cook Network Operations Manager Partnership For Strong Families 5950 NW 1st Place Gainesville, Fl 32607 Office (352) 244-1610 Cell (352) 215-6944 MCSE, MCP+I, MCTS, CompTIA A+, N+, VSP4, VTSP4 -Original Message- From: Kurt Buff [mailto:kurt.b...@gmail.com] Sent: Thursday, January 31, 2013 3:04 PM To: NT System Admin Issues Subject: Re: Mobile Device Management BitLocker is only available on Win7 Enterprise. Betcha they're using Win7 Pro. On Thu, Jan 31, 2013 at 7:56 AM, John Cook john.c...@pfsf.org wrote: Just curious as to why not Bitlocker? John W. Cook Network Operations Manager Partnership For Strong Families 5950 NW 1st Place Gainesville, Fl 32607 Office (352) 244-1610 Cell (352) 215-6944 MCSE, MCP+I, MCTS, CompTIA A+, N+, VSP4, VTSP4 From: Chinnery, Paul [mailto:pa...@mmcwm.com] Sent: Thursday, January 31, 2013 8:28 AM To: NT System Admin Issues Subject: RE: Mobile Device Management +1 on that. All of our laptops (even ones secured to Medsurg carts) +are encrypted with Truecrypt. From: Cameron Cooper [mailto:ccoo...@aurico.com] Sent: Wednesday, January 30, 2013 6:02 PM To: NT System Admin Issues Subject: RE: Mobile Device Management Thanks for the info below. Since we’ve deployed more laptops recently, we’ve encrypted the entire drive with TrueCrypt. Regards, Cameron ___ Cameron Cooper | IT Manager | Aurico Direct: 847.890.4021 | Cell: 224.688.2854 | Fax: 847.255.1896 ccoo...@aurico.com | www.aurico.com From: Angus Scott-Fleming [mailto:angu...@geoapps.com] Sent: Wednesday, January 30, 2013 3:49 PM To: NT System Admin Issues Subject: Re: Mobile Device Management On 30 Jan 2013 at 20:24, Cameron Cooper wrote: In light of one of our company laptops being stolen (from the user's car), we've been tasked to look for a mobile solution that would allow us to track, recover and remote wipe a laptop, tablet and smartphone and would like some recommendations on what some are currently using. So far we've looked at LoJack for Laptops and Prey (PreyProjects). Thanks, Cameron Whole-disk-encryption on laptops is an absolute must IMHO. That way you're only out hardware no matter what. The biggest problem with most tracking-and-wiping solutions like Prey is that the laptop has to be booted and the OS loaded for them to work. Since I use Truecrypt whole-disk-encryption and the password is required to boot or to awake after hibernation I don't use Prey. LoJack has a version which installs in the BIOS (installed at the factory on many bigger brands now, but you have to activate it $$$). This version phones home if there is an active network connection no matter how the computer is booted. But security flaws in the BIOS implementation of LoJack for Laptops were documented at a 2009 BlackHat session. Don't know if they're still there. This might be of interest: Intel® Anti-Theft Technology — What is Intel® Anti-Theft Technology? http://www.intel.com/support/services/antitheft/sb/CS-030335.htm More info: LoJack - Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/LoJack#for_Laptops At the Black Hat Briefings conference in 2009, researchers Anibal Sacco[15] and Alfredo Ortega showed that the implementation of the Computrace/LoJack agent embedded in the BIOS has vulnerabilities and that this available control of the anti-theft agent allows a highly dangerous form of BIOS-enhanced rootkit that can bypass all chipset or installation restrictions and reutilize many existing features offered in this kind of software.[16][17] Absolute Software rejected the claims made in the research, stating that the presence of the Computrace module in no way weakens the security of the BIOS. Another independent analyst confirmed the flaws, noted that a malware hijacking attack would be a highly exotic one, and suggested that the larger concern was that savvy thieves could disable the phone home feature.[18] Core Security Technologies http://www.coresecurity.com/content/Deactivate-the-Rootkit Deactivate the Rootkit - Black Hat USA 2009 Link to paper: http://www.coresecurity.com/files/attachments/Paper-Deactivate-the-Roo tkit-AOrtega-ASacco.pdf Share your findings back here please. HTH ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin CONFIDENTIALITY NOTICE: This email message is intended only for the person or entity to which it is addressed and may contain
Re: Mobile Device Management
MobileNow from AppSense can handle the phone and tablet piece, the demos I saw looked very good and it has just been released. I can get some more info on it for you in a little while - not sure whether it is specifically MAM or MDM though. Sent from my Blackberry, which may be an antique but delivers email RELIABLY -Original Message- From: Cameron Cooper ccoo...@aurico.com Date: Wed, 30 Jan 2013 20:24:43 To: NT System Admin Issuesntsysadmin@lyris.sunbelt-software.com Reply-To: NT System Admin Issues ntsysadmin@lyris.sunbelt-software.comSubject: Mobile Device Management All, In light of one of our company laptops being stolen (from the user's car), we've been tasked to look for a mobile solution that would allow us to track, recover and remote wipe a laptop, tablet and smartphone and would like some recommendations on what some are currently using. So far we've looked at LoJack for Laptops and Prey (PreyProjects). Thanks, Cameron CONFIDENTIALITY NOTICE: This email message is intended only for the person or entity to which it is addressed and may contain confidential material. Any unauthorized review, use, disclosure, downloading, copying or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply email and permanently delete all copies of the original message. If you are the intended recipient but do not wish to receive communications through this medium, please advise the sender immediately. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
RE: Mobile Device Management
We use Zenprise. Adds device policy management to your list of requirements. Regards, Don Guyer Catholic Health East - Information Technology Enterprise Directory Messaging Services 3805 West Chester Pike, Suite 100, Newtown Square, Pa 19073 email: dgu...@che.orgmailto:dgu...@che.org Office: 610.550.3595 | Cell: 610.955.6528 | Fax: 610.271.9440 For immediate assistance, please open a Service Desk ticket or call the helpdesk @ 610-492-3839. [cid:image001.jpg@01CDFEFF.7E4F1540] From: Cameron Cooper [mailto:ccoo...@aurico.com] Sent: Wednesday, January 30, 2013 3:25 PM To: NT System Admin Issues Subject: Mobile Device Management All, In light of one of our company laptops being stolen (from the user's car), we've been tasked to look for a mobile solution that would allow us to track, recover and remote wipe a laptop, tablet and smartphone and would like some recommendations on what some are currently using. So far we've looked at LoJack for Laptops and Prey (PreyProjects). Thanks, Cameron CONFIDENTIALITY NOTICE: This email message is intended only for the person or entity to which it is addressed and may contain confidential material. Any unauthorized review, use, disclosure, downloading, copying or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply email and permanently delete all copies of the original message. If you are the intended recipient but do not wish to receive communications through this medium, please advise the sender immediately. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin Confidentiality Notice: This e-mail, including any attachments is the property of Catholic Health East and is intended for the sole use of the intended recipient(s). It may contain information that is privileged and confidential. Any unauthorized review, use, disclosure, or distribution is prohibited. If you are not the intended recipient, please delete this message, and reply to the sender regarding the error in a separate email. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmininline: image001.jpg
RE: Mobile Device Management
Interesting, Web, interesting... :) Regards, Don Guyer Catholic Health East - Information Technology Enterprise Directory Messaging Services 3805 West Chester Pike, Suite 100, Newtown Square, Pa 19073 email: dgu...@che.orgmailto:dgu...@che.org Office: 610.550.3595 | Cell: 610.955.6528 | Fax: 610.271.9440 For immediate assistance, please open a Service Desk ticket or call the helpdesk @ 610-492-3839. [cid:image001.jpg@01CDFF02.76D15460] From: Webster [mailto:webs...@carlwebster.com] Sent: Wednesday, January 30, 2013 3:55 PM To: NT System Admin Issues Subject: RE: Mobile Device Management Now part of Citrix. :) Thanks Webster From: Guyer, Don [mailto:dgu...@che.org] Subject: RE: Mobile Device Management We use Zenprise. Adds device policy management to your list of requirements. Regards, From: Cameron Cooper [mailto:ccoo...@aurico.com] Subject: Mobile Device Management All, In light of one of our company laptops being stolen (from the user's car), we've been tasked to look for a mobile solution that would allow us to track, recover and remote wipe a laptop, tablet and smartphone and would like some recommendations on what some are currently using. So far we've looked at LoJack for Laptops and Prey (PreyProjects). ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin Confidentiality Notice: This e-mail, including any attachments is the property of Catholic Health East and is intended for the sole use of the intended recipient(s). It may contain information that is privileged and confidential. Any unauthorized review, use, disclosure, or distribution is prohibited. If you are not the intended recipient, please delete this message, and reply to the sender regarding the error in a separate email. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmininline: image001.jpg
Re: Mobile Device Management
Damn - almost went to work for them many years ago - I could have been rich from the buyout! They were less than 2 miles from my house at the time, which was very attractive at the time! On Wed, Jan 30, 2013 at 12:57 PM, Guyer, Don dgu...@che.org wrote: Interesting, Web, interesting… ** ** J ** ** Regards, * * *Don Guyer** **Catholic Health East - Information Technology* Enterprise Directory Messaging Services 3805 West Chester Pike, Suite 100, Newtown Square, Pa 19073 email: *dgu...@che.org* Office: 610.550.3595 | Cell: 610.955.6528 | Fax: 610.271.9440 *For immediate assistance, please open a Service Desk ticket or call the helpdesk @ 610-492-3839.* [image: Description: Description: Description: InfoService-Logo240] ** ** *From:* Webster [mailto:webs...@carlwebster.com] *Sent:* Wednesday, January 30, 2013 3:55 PM *To:* NT System Admin Issues *Subject:* RE: Mobile Device Management ** ** Now part of Citrix. J ** ** Thanks ** ** ** ** Webster ** ** *From:* Guyer, Don [mailto:dgu...@che.org] *Subject:* RE: Mobile Device Management ** ** We use Zenprise. Adds device policy management to your list of requirements. ** ** Regards, * * ** ** *From:* Cameron Cooper [mailto:ccoo...@aurico.com ccoo...@aurico.com] *Subject:* Mobile Device Management ** ** All, In light of one of our company laptops being stolen (from the user’s car), we’ve been tasked to look for a mobile solution that would allow us to track, recover and remote wipe a laptop, tablet and smartphone and would like some recommendations on what some are currently using. So far we’ve looked at LoJack for Laptops and Prey (PreyProjects). ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin Confidentiality Notice: This e-mail, including any attachments is the property of Catholic Health East and is intended for the sole use of the intended recipient(s). It may contain information that is privileged and confidential. Any unauthorized review, use, disclosure, or distribution is prohibited. If you are not the intended recipient, please delete this message, and reply to the sender regarding the error in a separate email. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin -- Kat Aylward Langan ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadminimage001.jpg
Re: Mobile Device Management
I'm guessing (I haven't tried) that this is not a problem if you have Win7 Enterprise and BitLocker - it'll boot up without a password just fine, and still be protected. Might have to try it out on one of my lab machines, to see if it works. Kurt On Wed, Jan 30, 2013 at 1:48 PM, Angus Scott-Fleming angu...@geoapps.com wrote: On 30 Jan 2013 at 20:24, Cameron Cooper wrote: In light of one of our company laptops being stolen (from the user's car), we've been tasked to look for a mobile solution that would allow us to track, recover and remote wipe a laptop, tablet and smartphone and would like some recommendations on what some are currently using. So far we've looked at LoJack for Laptops and Prey (PreyProjects). Thanks, Cameron Whole-disk-encryption on laptops is an absolute must IMHO. That way you're only out hardware no matter what. The biggest problem with most tracking-and-wiping solutions like Prey is that the laptop has to be booted and the OS loaded for them to work. Since I use Truecrypt whole-disk-encryption and the password is required to boot or to awake after hibernation I don't use Prey. LoJack has a version which installs in the BIOS (installed at the factory on many bigger brands now, but you have to activate it $$$). This version phones home if there is an active network connection no matter how the computer is booted. But security flaws in the BIOS implementation of LoJack for Laptops were documented at a 2009 BlackHat session. Don't know if they're still there. This might be of interest: Intel® Anti-Theft Technology — What is Intel® Anti-Theft Technology? http://www.intel.com/support/services/antitheft/sb/CS-030335.htm More info: LoJack - Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/LoJack#for_Laptops At the Black Hat Briefings conference in 2009, researchers Anibal Sacco[15] and Alfredo Ortega showed that the implementation of the Computrace/LoJack agent embedded in the BIOS has vulnerabilities and that this available control of the anti-theft agent allows a highly dangerous form of BIOS-enhanced rootkit that can bypass all chipset or installation restrictions and reutilize many existing features offered in this kind of software.[16][17] Absolute Software rejected the claims made in the research, stating that the presence of the Computrace module in no way weakens the security of the BIOS. Another independent analyst confirmed the flaws, noted that a malware hijacking attack would be a highly exotic one, and suggested that the larger concern was that savvy thieves could disable the phone home feature.[18] Core Security Technologies http://www.coresecurity.com/content/Deactivate-the-Rootkit Deactivate the Rootkit - Black Hat USA 2009 Link to paper: http://www.coresecurity.com/files/attachments/Paper-Deactivate-the-Rootkit-AOrtega-ASacco.pdf Share your findings back here please. HTH ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin