<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: device control in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/device-control/m-p/5454227#M13872</link>
    <description>&lt;P&gt;&lt;A href="https://documentation.meraki.com/SM/Deployment_Guides/Enterprise_Deployment_Guide_and_Best_Practices" target="_blank" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/SM/Deployment_Guides/Enterprise_Deployment_Guide_and_Best_Practices&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 14 Jul 2021 08:42:40 GMT</pubDate>
    <dc:creator>SAM222</dc:creator>
    <dc:date>2021-07-14T08:42:40Z</dc:date>
    <item>
      <title>device control</title>
      <link>https://community.cisco.com/t5/endpoint-security/device-control/m-p/5454224#M13869</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Cisco Meraki best practice for device control:&lt;/P&gt;&lt;P&gt;enroll&amp;gt;create profile&amp;gt; add settings profile &amp;gt; define tags &amp;gt;apply profile&lt;/P&gt;&lt;P&gt;It's true?&lt;/P&gt;&lt;P&gt;TKS&lt;/P&gt;</description>
      <pubDate>Sat, 10 Jul 2021 16:01:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/device-control/m-p/5454224#M13869</guid>
      <dc:creator>SAM222</dc:creator>
      <dc:date>2021-07-10T16:01:43Z</dc:date>
    </item>
    <item>
      <title>Re: device control</title>
      <link>https://community.cisco.com/t5/endpoint-security/device-control/m-p/5454225#M13870</link>
      <description>&lt;P&gt;&lt;A href="https://documentation.meraki.com/Architectures_and_Best_Practices/Cisco_Meraki_Best_Practice_Design/Best_Practice_Design_-_Endpoint_Management/General_Systems_Manager_Deployment_Guide" target="_self" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/Architectures_and_Best_Practices/Cisco_Meraki_Best_Practice_Design/Best_Practice_Design_-_Endpoint_Management/General_Systems_Manager_Deployment_Guide&lt;/A&gt; &lt;/P&gt;</description>
      <pubDate>Sat, 10 Jul 2021 22:41:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/device-control/m-p/5454225#M13870</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2021-07-10T22:41:03Z</dc:date>
    </item>
    <item>
      <title>Re: device control</title>
      <link>https://community.cisco.com/t5/endpoint-security/device-control/m-p/5454226#M13871</link>
      <description>&lt;P&gt;isn't clear what are the steps to take&lt;SPAN class="lia-unicode-emoji" title=":frowning_face:"&gt;&lt;span class="lia-unicode-emoji" title=":frowning_face:"&gt;☹️&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 11 Jul 2021 08:02:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/device-control/m-p/5454226#M13871</guid>
      <dc:creator>SAM222</dc:creator>
      <dc:date>2021-07-11T08:02:51Z</dc:date>
    </item>
    <item>
      <title>Re: device control</title>
      <link>https://community.cisco.com/t5/endpoint-security/device-control/m-p/5454227#M13872</link>
      <description>&lt;P&gt;&lt;A href="https://documentation.meraki.com/SM/Deployment_Guides/Enterprise_Deployment_Guide_and_Best_Practices" target="_blank" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/SM/Deployment_Guides/Enterprise_Deployment_Guide_and_Best_Practices&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jul 2021 08:42:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/device-control/m-p/5454227#M13872</guid>
      <dc:creator>SAM222</dc:creator>
      <dc:date>2021-07-14T08:42:40Z</dc:date>
    </item>
    <item>
      <title>Re: device control</title>
      <link>https://community.cisco.com/t5/endpoint-security/device-control/m-p/5454228#M13873</link>
      <description>&lt;P&gt;if I`d understood the documentation (linked by &lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/340"&gt;@Philip D'Ath&lt;/A&gt;) correct, than the order should be...&lt;BR /&gt;&lt;BR /&gt;enroll -&amp;gt; &lt;SPAN&gt;define tags -&amp;gt; create profile -&amp;gt; add settings profile -&amp;gt; apply profile&lt;/SPAN&gt;&lt;/P&gt;&lt;H4 id="toc-hId-1252721757"&gt;&lt;STRONG&gt;Solution Deployment Concepts&lt;/STRONG&gt;&lt;/H4&gt;&lt;P&gt;The following key concepts will be helpful in understanding how to set up your Cisco Meraki Systems Manager environment. Thinking about these steps beforehand will simplify initial deployment and ongoing management.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Enrollment:&lt;/STRONG&gt; When devices enroll into Systems Manager, they give you full device access for setting user restrictions, managing applications, and enabling device visibility and management.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Tags:&lt;/STRONG&gt; Systems Manager uses tags to verify that the right devices get the right applications, profiles, and restrictions. Tags can be applied manually, automatically, and even dynamically, based on a device’s status.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Profiles:&lt;/STRONG&gt; Profiles control device configurations and enable or restrict device access, depending on the use case.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Applications:&lt;/STRONG&gt; Systems Manager enables application delivery and management through public app stores and custom applications hosted in a cloud-based repository.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Security:&lt;/STRONG&gt; Security-solution sets within Systems Manager include securing the device itself, verifying that only secure corporate applications are installed, and processes to wipe data in the case a device is lost or stolen.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Troubleshooting:&lt;/STRONG&gt; Systems Manager has built-in tools to troubleshoot mobile and desktop devices.&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Sun, 10 Dec 2023 08:31:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/device-control/m-p/5454228#M13873</guid>
      <dc:creator>whistleblower14</dc:creator>
      <dc:date>2023-12-10T08:31:18Z</dc:date>
    </item>
  </channel>
</rss>

