VMware AirWatch unified endpoint management (UEM) empowers the digital workspace to meet business needs. By unifying endpoint management into a single point of reference, the solution delivers a premium user experience that doesn’t compromise enterprise security.
What’s New in AirWatch 9.2 UEM |
|
Today’s post covers the new AirWatch 9.2 release and feature pack (FP01) of unified endpoint management features. The green headers separate the features by platform. The features display in the relevant platform section. Each feature is listed with its own title, which specifies the release version. Where applicable, click arrows at the bottom of the feature’s section to view more information. ![]() AirWatch UEM technology powers the integrated VMware Workspace ONE platform. |
|
New! Windows 10 Management Features |
|
Dell Auto Enrollment for Windows 10Eliminate manual configuration of PCs, and drop-ship devices that auto-configure upon first boot straight to end users.
How Dell Auto-Enrollment Works
Dell Auto-Enrollment for Windows 10 Requirements
Configure Dell Auto-Enrollment for Windows 10
Troubleshoot Dell Auto-Enrollment for Windows 10Logging Location: C:ProgramDataAirwatchUnifiedAgentLogs
AirWatch 9.2: Windows 10 Local Account Password ResetReset local Windows account passwords to maximize employee productivity without compromising endpoint security. Password reset provides a quick solution for employees locked-out out of their accounts, and enables IT to reset passwords for security purposes.
AirWatch 9.2: Collect & Display Windows 10 IP & MAC AddressesCollect and display Windows devices’ IP and MAC address in the AirWatch console. Once collected, use these values to create asset data reports, validate device data during troubleshooting and perform other key tasks.
|
|
AirWatch 9.2: BitLocker Enhancements for Windows 10Manage the full encryption lifecycle for Windows 10 devices. To secure Windows 10 device data with BitLocker, create an Encryption profile. Then, enforce it by configuring a compliance policy that includes encryption status as part of the device’s general security posture. [Related: Consumer Simple, Enterprise Secure: BitLocker Encryption Lifecycle Management] Troubleshoot Bitlocker for Windows 10To troubleshoot, check the logs from the most likely, to the least likely source of error.
AirWatch 9.2: Dell BIOS for Windows 10Enable over-the-air configuration and modification of BIOS settings without requiring physical access to the computer. Dell BIOS for Windows 10 Requirements
Configure a Dell BIOS Profile for Windows 10
Troubleshoot Dell BIOS for Windows 10
AirWatch 9.2 FP01: Peer-to-Peer Distribution for Windows 10 UEMAirWatch offers a peer distribution system to deploy Win32 applications to enterprise networks. Peer distribution can reduce the time to download large applications to multiple devices in deployments that use a branch office structure.
SaaS Architecture for Windows 10 Peer DistributionPeer-to-peer distribution (peer distribution) modernizes enterprise-wide software deployments for PCs. Here’s an overview of how it works:
Windows 10 Peer Distribution Core Components
Important Considerations for Windows 10 Peer Distribution
Windows 10 Peer Distribution Configuration OverviewThe deployment of applications with the peer-to-peer distribution system requires you to set the listed configurations in the AirWatch console and on devices.
Windows 10 Peer Distribution Requirements
Activate Windows 10 Peer DistributionAfter the configurations save, the system activates the peer-to-peer server and clients with a license key. During activation, existing Win32 application content publishes to the peer-to-peer server. From this point on, devices that belong to the peer distribution network begin to receive the application download. By default, if a client fails to check in after 21 days, it is purged from the Adaptiva database and a license is reclaimed. To change the purge threshold:
Client Logs for Windows 10 Peer Distribution%WINDIR%AdaptivaSetupLogsClientAdaptivaClientMSISetup.log %WINDIR%AdaptivaSetupLogsClientAdaptivaClientSetup.log Network Topology for Windows 10 Peer Distribution
Rendezvous Points (RVPs)Representing your network as a hierarchy of offices enables the peer distribution system to deploy applications more efficiently. The hierarchy controls the clients and the order downloads occur. It uses devices called rendezvous points, or RVPs, as master clients in an office. The RVP receives downloads and disseminates the applications to peer clients.
RVP Election ProcessWhen an RVP is shut down, a new one gets elected using the following criteria:
Offices and SubnetsOffices contain one or more subnets, can retrieve content from their parent offices, and can distribute to their child offices. Office Types are designated based on the way the office shares data.
Data Transport in OfficesThe system distributes content from a parent to child office once. This behavior limits data sent across wide area network (WAN) links.
AirWatch 9.2 FP01: Active Directory to Azure Active Directory Integration for Windows 10Configure custom LDAP attributes that map active directory users to Azure Active Directory for hybrid use cases. The LDAP attribute searches AirWatch for a match with the Azure ImmutableID. By default, this value is “ObjectGUID” and in binary format. However, this can be customized for organizations with forest domains syncing to Azure as well as other, non-standard configurations. Configure AD to AAD Integration for Windows 10
AirWatch 9.2 FP01: Enterprise Wipe Protection for Windows 10Protect managed and unmanaged Windows devices from unintended enterprise wipes. This provides Windows devices with the same wipe protections as iOS and Android mobile devices.
AirWatch 9.2 FP01: BitLocker Enhancements for Local EnforcementIn Windows Protection Agent 9.2.0.1 and above, BitLocker enforcement no longer depends on network connection or sample intervals. Instead, BitLocker continually enforces encryption, preventing anyone from locally disabling the encryption.
|
|
New! Chrome OS Management Features |
|
AirWatch 9.2: UEM for Chrome OS
How UEM for Chrome OS WorksIn AirWatch UEM for Chrome OS, physical communication to devices gets handled by Google’s Chrome OS device management infrastructure. This differs from other platforms, such as iOS and Android, where devices communicate directly to the AirWatch Device Services server. However, for all platforms, VMware AirWatch manages the device.
UEM for Chrome OS Requirements
Request a Google Service Account
Setup Google Admin Console
Integrate Google’s Chrome OS Device Management Infrastructure with AirWatchUEM Enrollment Workflow for Chrome OS
AirWatch Profiles for Chrome OS UEMThere are two types of profiles that apply to Chrome OS devices – device profiles and user profiles. Device profile assignment is based on the Smart Group the device belongs to. The user profiles assigned to Chrome OS devices are based on the User Group the logged on user belongs to. The following diagram outlines the available profiles: How User Profiles WorkUser Profile assignment kicks off when a user gets added to the User Group in the AirWatch Console. Adding a user triggers AirWatch APIs to send the assigned User Profiles to the appropriate user account in Google’s Chrome OS device management infrastructure. Once sent, these profiles and settings simply exist within the device management infrastructure until that user logs into a Chrome OS device. Upon login, Google’s Chrome OS device management infrastructure applies the AirWatch user profile to the device. BEST PRACTICE: Due to the sequence of operations, publish AirWatch User Profiles before allowing users to log into Chrome OS devices.
Application Management for Chrome OSApplication management does not get configured under Apps & Books in the AirWatch Console. Instead, to add apps from the Google Play Store and Chrome Webstore, configure the Application Control profile.
AirWatch 9.2 FP01: Network Profile for Chrome OSThe Network profile determines network connection settings for all Chrome OS devices. Configure this profile to establish password based Wi-Fi for device policies and user policies on Chrome OS devices. To configure the Network profile:
|
|
New! Android Management Features |
|
AirWatch 9.2: Granular Device Assignment for Android
Configure Granular Device Assignment for Android
AirWatch 9.2 FP01: Samsung EFOTAUse Samsung Enterprise Firmware Over the Air (EFOTA) to review and push Android device updates. With AirWatch Unified Endpoint Management, the updates are managed in the AirWatch Console. Here’s a quick look at how the AirWatch Console, the device, and the EFOTA server communicate: EFOTA for Samsung Requirements
Configure EFOTA for Samsung
|
New! iOS Management Features |
|
AirWatch 9.2: Support for iOS 11AirWatch 9.2 supports iOS 11 and its features. iOS 11 Requirements
|
|
New! macOS Management Features |
|
AirWatch 9.2: Bootstrap Package Support for macOSCustomize the onboarding experience for macOS using bootstrap packages, which deliver installer packages immediately upon enrollment (during the setup assistant in DEP).
Requirements for macOS Bootstrap Package
Configure macOS Bootstrap Packages
|
|
New! UEM for IPC Rugged Devices |
|
|
|
|
Related:
- AirWatch 9.2 Console Deep Dive, Part 1
- AirWatch 9.2 Feature Spotlight: Bootstrap Packages for macOS
- VMware & Dell Empower the Digital Workspace
The post VMware AirWatch 9.2 Deep Dive, Part 2 + FP01 appeared first on VMware End-User Computing Blog.