Step 7 - Create Configuration Profiles
-
A configuration profile is a collection of settings which are applied to iOS, Android, Windows, Linux and Mac devices.
-
Each profile lets you specify a device's network access rights, security settings, antivirus scan schedule, and other details.
-
There are two main types of profile - 'Custom' and 'Default'. You can create custom profiles for users, user groups, devices and device groups.
-
Default profiles are those that are applied if no custom profile exists. Default profiles are applied on a per- operating system basis. There are default profiles for all supported operating systems (Windows, Mac, iOS, Android and Linux).
-
This ensures all devices have a working profile installed. If you remove a custom profile then the default profile is automatically installed to take its place.
-
You can designate any profile you want as a 'default' profile. You can have multiple default profiles per operating system.
-
Profiles are applied at the time a device connects to the network. Profiles remain in effect unless the communication client is uninstalled from the device, or the profile itself is removed/disabled.
Profile specifications differ between Android, iOS, Mac OS, Windows and Linux Devices:
-
Click 'ITSM' > 'Profile Management' > 'Profiles'
-
Click the 'Create' button > 'Create Android Profile':
-
Enter a name and description for the profile and click 'Create'.
The profile opens at the 'General Settings' screen:
-
Click the 'Make Default' button if you want to apply this profile to all devices with the target operating system.
-
Alternatively, click the 'Edit' button and enable the 'Is Default' check box.
-
Click 'Save'.
The next step is to add components to the profile.
-
Click the 'Add Profile Section' button and select a component that you want to add to the profile.
-
The settings screen for the selected component will open. After saving, the new section will be available as a link when you open the profile.
-
You can add as many sections as you require. Example sections include antivirus settings, feature restrictions and Wi-Fi settings.
-
Click 'Save' in each configuration screen for the parameters and options selected in that screen to be added to the profile.
See Profiles for Android Devices in the full guide for more information on these settings. In brief:
-
General - Profile name, description and whether or not this is a default profile. These were configured in the previous step. The 'Default' profiles are applied to every device which matches their operating system.
-
Antivirus Settings - Schedule and configure antivirus scans on the device.
-
Bluetooth Restrictions - Specify Bluetooth restrictions such as to allow device discovery via Bluetooth, allow outgoing calls and more. This profile is supported for KNOX devices only.
-
Browser Restrictions - Configure browser restrictions such as to allow pop-ups, javascript and cookies. This profile is supported for KNOX devices only.
-
Certificate - Upload certificates to Xcitium Enterprise. You can then choose these certificates when configuring specific features in Xcitium. Examples include Wi-Fi, Exchange Active Sync and VPN.
-
Email - Configure email account, connection and security details for users accessing incoming and outgoing mails from their devices. This profile is supported for KNOX devices only.
-
Active Sync Settings - Specify account name, host, domain and other settings to facilitate connections from devices under this profile to Microsoft Exchange Active Sync servers. This profile is supported for KNOX devices only.
-
Kiosk - Enable and configure Kiosk Mode for SAFE devices like the Samsung Galaxy range. Kiosk Mode allows administrators to control how applications run on managed devices and whether SMS/MMS are allowed. This profile is supported for KNOX devices only.
-
Native App Restrictions - Configure which native applications should be accessible to users. Native applications are those that ship with the device OS and include apps like Gmail, YouTube, the default Email client and the Gallery. This feature is supported for Android 4.0+ and Samsung for Enterprise (KNOX) devices such as Galaxy smartphones, Galaxy Note devices and Galaxy tablets.
-
Network Restrictions - Specify network permissions such as minimum level of Wi-Fi security required to access that Wi-Fi network, allow user to add more Wi-Fi networks in their devices, type of text and multimedia messages to be allowed and configure whitelist/blacklisted Wi-Fi networks. This profile is supported for KNOX devices only.
-
Passcode - Specify passcode complexity, minimum length, timeout-before-lock, failed logins before wipe (0=unlimited/never wipe), failed logins before capturing the photo of the possessor and location to recover lost or mislaid device, maximum lifetime of passcode in days and number of previous passcodes from which the new passcode should be unique.
-
Restrictions - Configure default device settings for Wi-Fi connection and cellular network connection, whether users should be able to disable app verification, background traffic, bluetooth on/off, whether camera use is allowed, whether the user is allowed to encrypt data stored on the device and whether or not they are allowed to install applications from unknown sources.
-
VPN - Configure directory user-name, VPN host, connection type and method of authentication for users wishing to connect to your internal network from an external location, whether to forcibly maintain VPN connection and more. This profile is supported for KNOX devices only.
-
Wi-Fi - Specify the name (SSID), security configuration type and password (if required) of your wireless network to which the devices are to be connected. You can add other wireless networks by clicking 'Add new Wi-Fi section'.
-
Other Restrictions - Configure a host of other permissions such as use of microphone, SD card, allow screen capture and more. This profile is supported for KNOX devices only.
-
Updates - The updates section of a Android profile lets you configure when managed devices should check for new version updates.
-
Applications - Specify mobile applications to be installed or uninstalled for users.
-
Click 'ITSM' > 'Profile Management' > 'Profiles'
-
Click 'Create' > 'Create iOS Profile'
-
Enter a name and description for the profile and click 'Create'.
-
The profile is created and the 'General Settings' for the profile is shown:
-
If you want this profile to be a default policy, click the 'Make default' button at the top. Alternatively, click the 'Edit' button on the right of the 'General' settings screen and enable the 'Is Default' check box.
-
Click 'Save'.
The next step is to add profile sections.
-
Each profile section contains a range of settings for a specific management feature.
-
For example, there are profile sections for 'Email', 'Single Sign-On', 'LDAP', 'Cellular Networks' and so on.
-
You can add as many different sections as you want when building your device profile.
-
To get started:
-
Click 'Add Profile Section'
-
Select the component that you want to add to the profile:
-
General - Profile name, description and whether or not this is a default profile. These were configured in the previous step. Default profiles are automatically applied upon device enrollment.
-
Airplay - Allows you to whitelist devices so they can take advantage of Apple Airplay functionality (iOS 7 +)
-
Airprint - Specify the location of Airprint printers so they can be reached by devices under this profile (iOS 7 +)
-
APN - Specify an Access Point Name for devices on this profile. APN settings define the network path for all cellular data. This area allows you to configure a new APN name (GPRS access point), username/password and the address/port of the poxy host server. The APN setting is replaced by the 'Cellulars' setting in iOS7 and over.
-
Calendar - Configure CalDAV server and connection settings which will allow device integration with corporate scheduling and calendar services.
-
Cellular Networks - Configure cellular network settings. The 'cellulars' setting performs fulfills a similar role to the APN setting and actually replaces it in iOS 7 and above.
-
Certificate - Upload certificates to Xcitium Enterprise. You can then choose these certificates when configuring specific features in Xcitium. Examples include Wi-Fi, Exchange Active Sync and VPN.
-
Contacts - Configure CardDAV account, host and user-settings to enable contact synchronization between different address book providers (for example, to synchronize iOS contacts and Google contacts).
-
Active Sync Settings- Specify account name, host, domain and other settings to facilitate connections from devices under this profile to Microsoft Exchange Active Sync servers.
-
Global HTTP Proxy - Global HTTP proxies are used to ensure that all traffic going to and coming from an iOS device is routed through a specific proxy server. This, for example, allows the traffic to be packet-filtered regardless of the network that the user is connected through.
-
LDAP - Configure LDAP account settings for devices under this profile so users can connect to company address books and contact lists.
-
E-mail - Configure general mail server settings including incoming and outgoing servers, connection protocol (IMAP/POP), user-name/password and SMIME/SSL preferences.
-
Passcode - Specify passcode complexity, minimum length, timeout-before-lock, failed logins before wipe (0=unlimited/never wipe), failed logins before capturing the photo of the possessor and location to recover lost or mislaid device, maximum lifetime of passcode in days and number of previous passcodes from which the new passcode should be unique.
-
Proxy - Allows you to specify the proxy server, and their credentials, to be used by the device for network connections.
-
Restrictions - Configure default device settings for Wi-Fi connection and cellular network connection, whether users should be able to disable app verification, background traffic, bluetooth on/off, whether camera use is allowed, whether the user is allowed to encrypt data stored on the device and whether or not they are allowed to install applications from unknown sources.
-
Single Sign-On - iOS 7 +. Configure user credentials that can be used to authenticate user permissions for multiple enterprise resources. This removes the need for a user to re-enter passwords. In this area, you will configure Kerberos principal name, realm and the URLs and apps that are permitted to use Kerberos credentials for authentication.
-
Subscribed Calendars - Specify one or more calendar services which you wish to push notifications to devices under this profile.
-
VPN - Configure directory user-name, VPN host, connection type and method of authentication for users wishing to connect to your internal network from an external location. This profile is supported for iOS 7 and above.
-
VPN Per App - Configure VPN as above but on a per-application basis. This profile is supported for iOS 7 and above.
-
Web Clip - Allows you to push a shortcut to a website onto the home-screen of target devices. This section allows you to choose an icon, label and target URL for the web-clip.
-
Wi-Fi - Specify the name (SSID), security configuration type and password (if required) of your wireless network to which the devices are to be connected.
-
App Lock - Configure restrictions on usage of device resources for selected applications.
See Profiles for iOS Devices in the main guide for more details on this area. In brief, iOS device profiles are more detailed than Android profiles.
-
Click 'ITSM' > 'Profile Management' > 'Profiles'
-
Click 'Create' > 'Create Mac OS Profile'
-
Name - Enter a label for the profile
-
Description - Enter appropriate short notes for the profile
-
Click the 'Create' button
The new profile will open at the general settings page:
-
'Make Default' - A 'default' profile is one that is applied automatically to any newly added device which matches its operating system. Click this button if you want all MAC OS devices to receive this profile.
-
Click 'Save'.
The next step is to add sections to the profile. Each section lets you define settings for a particular security or management feature.
-
Click 'Add Profile Section' then select the section you want to add from the list:
The new section will appear as a tab under the profile name. You can add as many sections as required to a profile.
-
Configure the settings and click 'Save'.
The new section will become available as a tab. You can configure antivirus settings, certificate settings, device restrictions, VPN connection parameters, Wi-Fi connection parameters and more. If a component is not configured, the device will continue to use existing settings, or settings that have been applied by another Xcitium profile.
-
Click 'Save' in each configuration screen for the parameters and options selected in that screen to be added to the profile.
See Profiles for Mac OS Devices in the main guide for more details on this area. In brief:
-
Antivirus - Enable on-access scanning of files, configure scan and alert options, set alert time out period, maximum size for files to be scanned, files to be excluded and more.
-
Certificates - Upload certificates to Xcitium Enterprise. You can then choose these certificates when configuring specific features in Xcitium Enterprise. Examples include Wi-Fi, Exchange Active Sync and VPN.
-
Restrictions - Configure restrictions on device functionality and features, iCloud access and so on.
-
VPN - Configure directory user-name, VPN host, connection type and method of authentication for users wishing to connect to your internal network from an external location and more.
-
Wi-Fi - Specify the name (SSID), security configuration type and password (if required) of your wireless network to which the devices are to be connected.
-
Remote Control - Allows you to configure settings for remote takeover and notifications which are shown to end-users before and during a remote control session.
-
Xcitium Verdict Cloud - Xcitium Verdict Cloud is a cloud-based file verdict service that subjects unknown files to a range of tests in order to identify those that are malicious. Configure settings for Xcitium Verdict Cloud look up service.
-
Procedures - A procedure is a script designed to accomplish a specific task on target devices. For example, you can run procedures to change the permissions on specific folders on multiple devices, or lock a device after a certain period of time.
-
Monitors - Configure performance and availability conditions for various events. An alert is triggered if the conditions are breached. For example, you can monitor free disk space, CPU/RAM usage, device online status and more.
-
External Devices Control - External Devices Control blocks devices of a client computer from accessing, such as USB drives, Bluetooth devices, printers, and serial and parallel ports.
-
Containment - Containment protects your computer against unknown malware by auto-containing and blocking the actions in such a way that these applications can not harm your computer. All Apple system applications and Xcitium applications will continue to run without any restriction.
-
Thumbnails - Thumbnails Settings allows Admin to understand if the device is currently used or not and make sure users are not disturbed before connecting.
-
Click 'ITSM' > 'Profile Management' > 'Profiles' > 'Create' > 'Create Windows Profile':
-
Enter a name and description for the profile
-
Click the 'Create' button
Your profile will open at its configuration page:
-
Click 'Edit' if you wish to modify basic profile settings:
-
'Is Default?' - A 'default' profile is one that is applied automatically to any device which matches its operating system. You can have multiple 'default' profiles per operating system.
-
Click 'Save'.
The next step is to add profile sections.
-
Each profile section contains a range of settings for a specific security or management feature.
-
For example, there are profile sections for 'Antivirus', 'External Device Control', 'Firewall', 'Procedures' and so on.
-
You can add as many different sections as you want when building your profile.
To get started:
-
Click 'Add Profile Section'
-
Select the component that you want to add to the profile:
The settings screen for the selected component will open.
-
Configure the settings and parameters and click 'Save'
The new profile section will become available as a tab in this interface.
If a component is not configured, the device will continue to use existing, user-defined settings or settings that have been applied by another Xcitium profile.
-
Click 'Save' in each configuration screen for the parameters and options selected in that screen to be added to the profile.
See Profiles for Windows Devices in the full guide for more information on these settings. In brief:
-
Remote Control - Configure remote access settings.
-
Client Access Control - Password-protect Xcitium communication client (CC) on managed endpoints.
-
Client Proxy - Specify proxy servers through which Xcitium Communication Clients should connect to Xcitium Enterprise and other Xcitium services.
-
Client Updates - Set the conditions for Xcitium Communication Client (CC) to automatically download and install program.
-
Client UI Settings - Configure the appearance of the communication client tray icon and configure departments which can submit tickets through tray icon.
-
Remote Tools - Enable/disable remote access to endpoint files and processes. You can also configure how notifications are shown during a remote session.
-
Thumbnails - Thumbnails Settings allows Admin to understand if the device is currently used or not and make sure users are not disturbed before connecting.
-
Chat - Chat Settings allows Users with Administrator or Account Admin role to communicate with other end users.
-
Monitors - Configure performance and availability conditions for various events and services. An alert will be triggered if the conditions are breached. For example, you can monitor free disk space, service and web page availability, CPU/RAM usage, device online status and more.
-
Procedures - Allows you to add, view, delete and prioritize procedures which have been added to a profile.
-
Patch Management - Enable / disable patch operations on endpoints. The settings affect on-demand patch operations, scheduled patch operations and patch installations via procedures.
-
Maintenance Window - A maintenance window (MW) is a scheduled time-slot when admins can run important tasks on target devices. Admins can enable a warning if somebody attempts to run a task outside of a maintenance window.
-
Global Proxy - Specify a proxy server through which endpoints should connect to external networks like the internet.
-
Client Rebranding - You can re-brand Communication Client with your own company name, logo, product name and product logo which should be visible to end-users.
-
Client Logging Settings - Enable event logs, configure max. log file size and other settings for Communication Client.
-
Applications - Ability to assign Windows software packages to profiles, if software not installed it is auto installed.
-
Antivirus - Enable on-access scanning of files, configure scan and alert options, set alert time out period, maximum size for files to be scanned, files to be excluded and more.
-
Firewall - Enable/Disable the Firewall component, configure Firewall behavior, add and manage Application and Global Firewall rules and more. See help page explaining Firewall Settings in Xcitium Enterprise online help guide, for more details.
-
HIPS - Enable Host Intrusion Prevention System (HIPS) and its behavior, configure HIPS rules and define Protected Objects at the endpoints. See help page explaining HIPS Settings in Xcitium Enterprise online help guide for more details.
-
File Rating - Enable cloud lookup for checking reputation of files accessed in real-time, configure options for files to be trusted and detecting potentially unwanted applications. For more details on file ratings, see the help page explaining File rating Settings in Xcitium Enterprise online help guide.
-
Containment - Enable auto-containment of unknown files, add exclusions, configure containment behavior, view and manage auto-containment rules and configure the Virtual Desktop. See the help page explaining Containment settings in Xcitium Enterprise online help guide, for more details.
-
VirusScope - Enable VirusScope that monitors the activities of processes running at the endpoints and generates alerts if they take actions that could potentially threaten your privacy and/or security and configure options for alert generation. See thehelp page explaining VirusScope in Xcitium Enterprise online help guide for more details.
-
Xcitium Verdict Cloud - Xcitium Verdict Cloud is a cloud based file analysis system, look-up system. It uses a range of static and dynamic detectors including heuristics, file look-up, real-time behavior analysis and human expert to analyze the submitted files and determine if the file is good or bad (malicious). You can enable Xcitium Verdict Cloud and its components and set a schedule for submitting unknown files identified from the endpoints.
-
Agent Discovery Settings - Specify whether or not communication client should send logs to Xcitium about antivirus and containment events.
-
External Device Control - Block or permit specific types of device from connecting to managed endpoints. Example devices you may want to control are USB storage devices and Bluetooth devices.
-
Miscellaneous - Monitor the registry for changes to auto-run items, services, and scheduled tasks by unrecognized files.
-
Script Analysis settings - Enable / disable Heuristic command line analysis and embedded Code Detection and select programs to be monitored.
-
Data Loss Prevention settings - Xcitium is capable of scanning managed Windows devices and identify files containing sensitive information. For example, the scans find credit card numbers, social security numbers, bank account numbers, etc. You can then take actions to secure that data where required.
-
XCS Access Control - XCS access control lets you password-protect Xcitium Client Security (XCS) on managed endpoints.
-
XCS Proxy - Specify proxy servers through which Xcitium Client Security should connect to Xcitium Enterprise and other Xcitium services.
-
XCS Updates - Set the conditions for Xcitium Client Security (XCS) to automatically download and install program and virus database updates.
-
XCS UI Settings - Configure the appearance of the Xcitium Client Security (XCS). You can re-brand CC and XCS with your own company name, logo, product name and product logo and select which components of XCS should be visible to end-users.
-
XCS Logging settings - Enable event logs, configure max. log file size and other settings for Xcitium Client Security (XCS).
-
Performance - The Performance section lets you to restrict the resource usage of the Xcitium Client Security processes and able to customize your usage on the endpoints.
-
Click 'ITSM' > 'Profile Management' > 'Profiles'
-
Click 'Create' > 'Create Linux Profile'
-
Enter a name and description for the profile
-
Click the 'Create' button
The Linux profile will be created and the 'General Settings' section will be displayed. The new profile is not a 'Default Profile' by default.
-
If you want this profile to be a default policy, click the 'Make Default' button at the top. Alternatively, click the 'Edit' button on the right of the 'General' settings screen and enable the 'Is Default'.check box.
-
Click 'Save'.
The next step is to add the components for the profile.
-
Click the 'Add Profile Section' drop-down button and select the component from the list that you want to include for the profile.
The settings screen for the selected component will be displayed. An example is shown below:
-
Configure the settings and click 'Save'.
The new section will become available as a tab. You can configure antivirus settings, interface language settings, logging settings, password protection to the XCS application on the endpoint and more. If a component is not configured, the device will continue to use existing, user-defined settings or settings that have been applied by another Xcitium profile.
-
Click 'Save' in each configuration screen for the parameters and options selected in that screen to be added to the profile.
See Profiles for Linux Devices in the main guide for more details on this area. In brief:
-
Antivirus - Enable on-access scanning of files, configure scan profiles, timetable scheduled scans, set maximum size for files to be scanned, files to be excluded and more.
-
Updates - Enable/disable program and virus signature database updates, configure the server from which the updates are to be downloaded and more.
-
UI Settings- Select the interface language for XCS on the endpoint.
-
Logging Settings - Enable event logs, configure max. log file size and other settings.
-
Client Access Control - Password protect access to the XCS application on the endpoint.
-
Xcitium Verdict Cloud - Xcitium Verdict Cloud is a cloud-based file verdict service that subjects unknown files to a range of tests in order to identify those that are malicious. Configure settings for Xcitium Verdict cloud look up service.
-
Remote tools - Enable remote tools option to run command lines and power shell commands on remote devices' command prompt.