<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Syste Manager in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/syste-manager/m-p/5446711#M13189</link>
    <description>&lt;P&gt;Hi Team, can system manager meet all the below requirements&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;A secure portal for BYOD users to enroll and provision their devices&lt;/LI&gt;&lt;LI&gt;Centralized security policy enforcement.&lt;/LI&gt;&lt;LI&gt;Remotely lock and wipe data and installed apps - Inventory devices, operating systems (OSs), patch levels, organization and third-party apps, and  revision levels.&lt;/LI&gt;&lt;LI&gt;Distribution whitelists and blacklists.&lt;/LI&gt;&lt;LI&gt;Permission-based access controls for access to the organization’s networks and data.&lt;/LI&gt;&lt;LI&gt;Selective wipe and privacy policies for organization apps and data, i.e., sandboxing.&lt;/LI&gt;&lt;LI&gt;Distribution and management of digital certificates (to encrypt and digitally sign emails and sensitive documents).&lt;/LI&gt;&lt;LI&gt;Role-based access groups with fine-grained access control policies and enforcement.&lt;/LI&gt;&lt;LI&gt;Over-the-air (OTA) distribution of software (apps, patches, updates) and policy changes.&lt;/LI&gt;&lt;LI&gt;Postpone automatic updates from Internet service providers (ISPs), e.g., in cases where an automatic OS update may cause critical apps to fail&lt;BR /&gt;Secure logs and audit trails of all sensitive BYOD activities&lt;/LI&gt;&lt;LI&gt;Capability to locate and map lost devices for recovery.&lt;/LI&gt;&lt;LI&gt;Backup and restore BYOD device data.&lt;/LI&gt;&lt;LI&gt;Remove or install profiles based on geographic location, to ensure compliance with relevant foreign legislation, e.g., data privacy and security&lt;/LI&gt;&lt;/OL&gt;</description>
    <pubDate>Thu, 20 Aug 2020 13:36:15 GMT</pubDate>
    <dc:creator>LSA4</dc:creator>
    <dc:date>2020-08-20T13:36:15Z</dc:date>
    <item>
      <title>Syste Manager</title>
      <link>https://community.cisco.com/t5/endpoint-security/syste-manager/m-p/5446711#M13189</link>
      <description>&lt;P&gt;Hi Team, can system manager meet all the below requirements&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;A secure portal for BYOD users to enroll and provision their devices&lt;/LI&gt;&lt;LI&gt;Centralized security policy enforcement.&lt;/LI&gt;&lt;LI&gt;Remotely lock and wipe data and installed apps - Inventory devices, operating systems (OSs), patch levels, organization and third-party apps, and  revision levels.&lt;/LI&gt;&lt;LI&gt;Distribution whitelists and blacklists.&lt;/LI&gt;&lt;LI&gt;Permission-based access controls for access to the organization’s networks and data.&lt;/LI&gt;&lt;LI&gt;Selective wipe and privacy policies for organization apps and data, i.e., sandboxing.&lt;/LI&gt;&lt;LI&gt;Distribution and management of digital certificates (to encrypt and digitally sign emails and sensitive documents).&lt;/LI&gt;&lt;LI&gt;Role-based access groups with fine-grained access control policies and enforcement.&lt;/LI&gt;&lt;LI&gt;Over-the-air (OTA) distribution of software (apps, patches, updates) and policy changes.&lt;/LI&gt;&lt;LI&gt;Postpone automatic updates from Internet service providers (ISPs), e.g., in cases where an automatic OS update may cause critical apps to fail&lt;BR /&gt;Secure logs and audit trails of all sensitive BYOD activities&lt;/LI&gt;&lt;LI&gt;Capability to locate and map lost devices for recovery.&lt;/LI&gt;&lt;LI&gt;Backup and restore BYOD device data.&lt;/LI&gt;&lt;LI&gt;Remove or install profiles based on geographic location, to ensure compliance with relevant foreign legislation, e.g., data privacy and security&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Thu, 20 Aug 2020 13:36:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/syste-manager/m-p/5446711#M13189</guid>
      <dc:creator>LSA4</dc:creator>
      <dc:date>2020-08-20T13:36:15Z</dc:date>
    </item>
    <item>
      <title>Re: Syste Manager</title>
      <link>https://community.cisco.com/t5/endpoint-security/syste-manager/m-p/5446712#M13190</link>
      <description>&lt;P&gt;Hi &lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/2002"&gt;@LSA4&lt;/A&gt;! Let me try to answer at least a few of your questions. Guess the guys who are more into Systems Manager will chime in later.&lt;/P&gt;&lt;P&gt;1. Yes, that‘s what Sentry is being used for &lt;A href="https://documentation.meraki.com/SM/Deployment_Guides/Systems_Manager_Sentry_Overview" target="_blank" rel="noopener nofollow noreferrer"&gt;https://documentation.meraki.com/SM/Deployment_Guides/Systems_Manager_Sentry_Overview&lt;/A&gt;&lt;/P&gt;&lt;P&gt;2. Yes, e.g. by using Policies&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/SM/Profiles_and_Settings/Configuration_Profiles" target="_blank" rel="noopener nofollow noreferrer"&gt;https://documentation.meraki.com/SM/Profiles_and_Settings/Configuration_Profiles&lt;/A&gt;&lt;/P&gt;&lt;P&gt;3. Yes (depending on the type of device / enrollment)&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/SM/Monitoring_and_Reporting/Selective_Wipe_and_Device_Quarantine_in_Systems_Manager" target="_blank" rel="noopener nofollow noreferrer"&gt;https://documentation.meraki.com/SM/Monitoring_and_Reporting/Selective_Wipe_and_Device_Quarantine_in_Systems_Manager&lt;/A&gt;&lt;/P&gt;&lt;P&gt;4. I don‘t quite understand&lt;/P&gt;&lt;P&gt;5. See Sentry&lt;/P&gt;&lt;P&gt;6. See 3.&lt;/P&gt;&lt;P&gt;7. You can push certificates &lt;A href="https://documentation.meraki.com/SM/Profiles_and_Settings/Certificates_Payload_(Pushing_Certificates)" target="_blank" rel="noopener nofollow noreferrer"&gt;https://documentation.meraki.com/SM/Profiles_and_Settings/Certificates_Payload_(Pushing_Certificates)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;8. RBAC from a management perspective?&lt;/P&gt;&lt;P&gt;9. Yes, see 2. and &lt;A href="https://documentation.meraki.com/SM/Apps_and_Software" target="_blank" rel="noopener nofollow noreferrer"&gt;https://documentation.meraki.com/SM/Apps_and_Software&lt;/A&gt;&lt;/P&gt;&lt;P&gt;10. I don‘t have an answer for that question&lt;/P&gt;&lt;P&gt;11. Yes &lt;A href="https://documentation.meraki.com/SM/Tags_and_Policies/Geofencing_with_Managed_Devices" target="_blank" rel="noopener nofollow noreferrer"&gt;https://documentation.meraki.com/SM/Tags_and_Policies/Geofencing_with_Managed_Devices&lt;/A&gt;&lt;/P&gt;&lt;P&gt;12. I don‘t have an answer for that question&lt;/P&gt;&lt;P&gt;13. Yes, via Geofencing and Policy (see 11. as a start)&lt;/P&gt;&lt;P&gt;Hope that helps. You‘ll find additional (high level) information in the data sheet: &lt;A href="https://meraki.cisco.com/lib/pdf/meraki_datasheet_sm.pdf" target="_blank" rel="nofollow noopener noreferrer"&gt;https://meraki.cisco.com/lib/pdf/meraki_datasheet_sm.pdf&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Aug 2020 18:09:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/syste-manager/m-p/5446712#M13190</guid>
      <dc:creator>Christian_Ney</dc:creator>
      <dc:date>2020-08-20T18:09:03Z</dc:date>
    </item>
  </channel>
</rss>

