VMware Hands-on Labs - Getting Started with VMware AirWatch


Lab Overview - HOL-1857-01-UEM - Workspace ONE UEM - Getting Started

Lab Guidance


NOTE - It will take more than 90 minutes to complete this lab. You should expect to only finish 2-3 of the modules during your time.  The modules are independent of each other so you can start at the beginning of any module and proceed from there. You can use the Table of Contents to access any module of your choosing.

The Table of Contents can be accessed in the upper right-hand corner of the Lab Manual.

The introduction to AirWatch lab is designed to introduce you to many of the features of AirWatch Enterprise Mobility Management and Administration. Each Module can be taken independently or you can start at the beginning and work your way through each module in sequence. In most cases, a unique "sandbox" instance of AirWatch will be created just for you when you begin a Module. When the Module has ended, this sandbox will be deleted and the device that you are enrolling in the lab will be returned to the state that it was in prior to the lab. The approximate time it will take to go through all the modules is around 2.5 hours.

Lab Module List:

 

This lab manual can be downloaded from the Hands-on Labs Document site found here:

http://docs.hol.vmware.com

This lab may be available in other languages.  To set your language preference and have a localized manual deployed with your lab, you may utilize this document to help guide you through the process:

http://docs.hol.vmware.com/announcements/nee-default-language.pdf


 

Location of the Main Console

 

  1. The area in the RED box contains the Main Console.  The Lab Manual is on the tab to the Right of the Main Console.
  2. A particular lab may have additional consoles found on separate tabs in the upper left. You will be directed to open another specific console if needed.
  3. Your lab starts with 90 minutes on the timer.  The lab can not be saved.  All your work must be done during the lab session.  But you can click the EXTEND to increase your time.  If you are at a VMware event, you can extend your lab time twice, for up to 30 minutes.  Each click gives you an additional 15 minutes.  Outside of VMware events, you can extend your lab time up to 9 hours and 30 minutes. Each click gives you an additional hour.

 

 

Alternate Methods of Keyboard Data Entry

During this module, you will input text into the Main Console. Besides directly typing it in, there are two very helpful methods of entering data which make it easier to enter complex data.

 

 

Click and Drag Lab Manual Content Into Console Active Window

You can also click and drag text and Command Line Interface (CLI) commands directly from the Lab Manual into the active window in the Main Console.  

 

 

Accessing the Online International Keyboard

 

You can also use the Online International Keyboard found in the Main Console.

  1. Click on the Keyboard Icon found on the Windows Quick Launch Task Bar.

 

 

Activation Prompt or Watermark

 

When you first start your lab, you may notice a watermark on the desktop indicating that Windows is not activated.  

One of the major benefits of virtualization is that virtual machines can be moved and run on any platform.  The Hands-on Labs utilizes this benefit and we are able to run the labs out of multiple datacenters.  However, these datacenters may not have identical processors, which triggers a Microsoft activation check through the Internet.

Rest assured, VMware and the Hands-on Labs are in full compliance with Microsoft licensing requirements.  The lab that you are using is a self-contained pod and does not have full access to the Internet, which is required for Windows to verify the activation.  Without full access to the Internet, this automated process fails and you see this watermark.

This cosmetic issue has no effect on your lab.  

 

 

Look at the lower right portion of the screen

 

Please check to see that your lab is finished all the startup routines and is ready for you to start. If you see anything other than "Ready", please wait a few minutes.  If after 5 minutes you lab has not changed to "Ready", please ask for assistance.

 

Module 1 - Introduction to Workspace ONE UEM (30 min)

Introduction


This lab module will focus on introducing the concepts of Enterprise Mobility Management (EMM) with AirWatch, using the AirWatch Console, and how to enroll an iOS device into AirWatch.  By the end of this lab, you should have a better understanding of why Enterprise Mobility Management (EMM) is important and how AirWatch can manage your devices.


Login to the AirWatch Console


To perform most of the lab you will need to login to the AirWatch Management Console.


 

Launch Chrome Browser

 

Double-click the Chrome Browser on the lab desktop.

 

 

Authenticate to the AirWatch Administration Console

 

The default home page for the browser is https://hol.awmdm.com. Enter your AirWatch Admin Account information and click the Login button.

NOTE - If you see a Captcha, please be aware that it is case sensitive!

  1. Enter your Username. This is you email address that you have associated with your VMware Learning Platform (VLP) account.
  2. Enter "VMware1!" for the Password field.
  3. Click the Login button.

NOTE - Due to lab restrictions, you may need to wait here for a minute or so while the Hands On Lab contacts the AirWatch Hands On Labs server.

 

 

Accept the End User License Agreement

 

NOTE - The following steps of logging into the Administration Console will only need to be done during the initial login to the console.

You will be presented with the AirWatch Terms of Use. Click the Accept button.

 

 

Address the Initial Security Settings

 

After accepting the Terms of Use, you will be presented with a Security Settings pop-up.  The Password Recovery Question is in case you forget your admin password and the Security PIN is to protect certain administrative functionality in the console.  

  1. You may need to scroll down to see the Password Recovery Questions and Security PIN sections.
  2. Select a question from the Password Recovery Question drop-down (default selected question is ok here).
  3. Enter "VMware1!" in the Password Recovery Answer field.
  4. Enter "VMware1!" in the Confirm Password Recovery Answer field.
  5. Enter "1234" in the Security PIN field.
  6. Enter "1234" in the Confirm Security PIN field.
  7. Click the Save button when finished.

 

 

Close the Welcome Message

 

After completing the Security Settings, you will be presented with the AirWatch Console Welcome pop-up.

  1. Click on the Don't show this message again check box.
  2. Close the pop-up by clicking on the X in the upper-right corner.

 

Add A Basic User Account


Basic accounts are the accounts which are created locally in the AirWatch admin console, as opposed to the accounts which are imported from an active directory. In this section, we will create a Basic User account which we will use for enrollment in the following section.


 

Click on Add / User

 

In the top right corner of the AirWatch console,

  1. Click Add.
  2. Click User.

 

 

Add User information

 

In the pop-up window,

  1. Ensure that security type is Basic
  2. Enter the username as "basicuser"
  3. Enter the password as "VMware1!"
  4. Confirm the password as "VMware1!"
  5. Enter the first name as "basic"
  6. Enter the last name as "user"
  7. Enter the e-mail address as "basicuser@corp.local"
    NOTE - Use the scroll bar if you don't see the option to enter email address
  8. Click on Save

You should see a confirmation that user is created successfully. If the user is already created with the same username then you can use the existing user in the following section.

 

Create a Device Restriction Profile


In this section, we will create a restriction profile that will disable the camera on the device. We will set the profile for auto-deployment, so that the profile to disable the camera will install automatically when the device is enrolled.


 

Add A Profile

 

In the top right corner of the AirWatch console,

  1. Click Add.
  2. Click Profile.

 

 

Select Platform as Apple iOS

 

Click Apple iOS.

 

 

Configure General Payload

 

  1. Select General if not selected already.
  2. Enter "iOS Restriction Profile" for the Name field.
  3. Click the Assigned Groups dropdown field to view all available assignment groups.
    NOTE - You may need to scroll down to find the Assigned Groups dropdown.
  4. Select "All Devices (your@email.shown.here)" from the list.

 

 

Configure Restriction Payload

 

  1. Click on the Restrictions payload in the left panel.
  2. Click Configure.

 

 

Disable Allow use of camera

 

  1. Uncheck the Allow use of Camera checkbox.
  2. Click Save & Publish.

 

 

Publish the Profile

 

Click Publish.

 

 

Validate profile creation

 

  1. Click Devices.
  2. Expand Profiles & Resources.
  3. Click Profiles.
  4. Validate that you see iOS Restriction Profile in the Profiles List View.

 

Validate Device Before Restriction Profile


Before enrolling your device, confirm that the Camera app is available on your iOS device.


 

Find the Camera App

 

Press the Home button on your device and find the Camera app.  Take note of the location of the app, as we will confirm the removal of the app in a later step after enrollment.

 

 

Search for the Camera App (Optional)

 

  1. Swipe down to show the Search bar.
  2. Enter "camera" in the Search bar.
  3. Ensure the Camera app displays, confirming the app exists on the device.

 

iOS Device Enrollment using basicuser


In this section, we are going to enroll an iOS device to complete the steps on the device side.


 

Download/Install AirWatch MDM Agent Application from App Store - IF NEEDED

 

NOTE - Checked out devices will likely have the AirWatch MDM Agent already installed. You may skip this step if your device has the AirWatch MDM agent installed.

At this point, if using your own iOS device or if the device you are using does NOT have the AirWatch MDM Agent Application installed, then install the AirWatch Application.

To Install the AirWatch MDM Agent application from the App Store, open the App Store application and download the free AirWatch MDM Agent application.

 

 

Launching the AirWatch MDM Agent

 

Launch the AirWatch Agent app on the device.  

NOTE - If you have your own iOS device and would like to test you will need to download the agent first.

 

 

Choose the Enrollment Method

 

Click on the Server Details button.

 

 

Find your Group ID from AirWatch Console

 

 

  1. To find the Group ID, hover your mouse over the Organization Group tab at the top of the screen. Look for the email address you used to log in to the lab portal.
  2. Your Group ID is displayed at the bottom of the Organization Group pop up.

NOTE - The Group ID is required when enrolling your device in the following steps.

 

 

Attach the AirWatch MDM Agent to the HOL Sandbox

 

Once the Agent has launched you can enroll the device.  To do so, follow the below steps.

  1. Enter "hol.awmdm.com" for the Server field.
  2. Enter your Group ID for your Organization Group for the Group ID field.  Your Group ID was noted previously in the Finding your Group ID step.
  3. Tap the Go button.

NOTE - If on an iPhone, you may have to close the keyboard by clicking Done in order to click the Continue button.

 

 

Authenticate the AirWatch MDM Agent

 

On this screen, enter the Username and Password for the basic user account.

  1. Enter "basicuser" in the Username field.
  2. Enter "VMware1!" in the Password field.
  3. Tap the Go button.

 

 

Redirect to Safari and Enable MDM Enrollment in Settings

 

The AirWatch Agent will now redirect you to Safari and start the process of enabling MDM in the device settings.

Tap on Redirect & Enable at the bottom of the screen.

 

 

Allow Website to Open Settings (IF NEEDED)

 

If you prompted to allow the website to open Settings to show you a configuration profile, tap Allow.

NOTE - If you do not see this prompt, ignore this and continue to the next step.  This prompt will only occur for iOS Devices on iOS 10.3.3 or later

 

 

Install the MDM Profile

 

Tap Install in the upper right corner of the Install Profile dialog box.

 

 

Install and Verify the AirWatch MDM Profile

 

Tap Install when prompted at the Install Profile dialog.

NOTE - If a PIN is requested, it is the current device PIN. Provided VMware devices should not have a PIN.

 

 

iOS MDM Profile Warning

 

You should now see the iOS Profile Installation warning explaining what this profile installation will allow on the iOS device.

Tap Install in the upper-right corner of the screen.

 

 

Trust the Remote Management Profile.

 

You should now see the iOS request to trust the source of the MDM profile.

Tap Trust when prompted at the Remote Management dialog.

 

 

iOS Profile Installation Complete

 

You should now see the iOS Profile successfully installed.

Tap Done in the upper right corner of the prompt.

 

 

AirWatch Enrollment Success

 

Your enrollment is now completed. Tap Open to navigate to the AirWatch Agent.

 

 

Accept the Authentication Complete Prompt

 

Click on Done to continue.

 

 

Accept Notification Prompt (IF NEEDED)

 

Tap Allow if you get a prompt for Notifications.

 

 

Accept the App Installation (IF NEEDED)

 

You may be prompted to install a series of applications depending on which Module you are taking. If prompted, tap Install to accept the application installation.

 

Validate the Restriction Profile


Now that the device is enrolled, the restriction profile we created will be installed on the device and the Camera app will be disabled.  Continue to the next steps to verify that the Camera app is successfully disabled.


 

Return to the Camera App

If you located the Camera app on the device earlier, return to your device and navigate back to where the Camera app previously was.  Notice that the Camera app is now disabled and is no longer displayed on the device.

 

 

Search for the Camera App (Optional)

 

  1. Swipe down to show the Search bar.
  2. Enter "camera" in the Search bar.
  3. Notice that the Camera app is disabled and no longer displays in the search results.

 

Un-enrolling Your Device


You are now going to un-enroll the iOS device from AirWatch.

NOTE - The term "Enterprise Wipe" does not mean reset or completely wipe your device. This only removes the MDM Profiles, Policies, and content which the AirWatch MDM Agent controls.

It will NOT remove the AirWatch MDM Agent application from the device as this was downloaded manually before AirWatch had control of the device.


 

Enterprise Wipe (un-enroll) your iOS device

 

Enterprise Wipe will remove all the settings and content that were pushed to the device when it was enrolled.  It will not affect anything that was on the device prior to enrollment.

To Enterprise Wipe your device you will first bring up the AirWatch Console in a web browser. You may need to re-authenticate with your credentials (VLP registered email address and "VMware1!" as the password).

  1. Click Devices on the left column.
  2. Click List View.
  3. Click the checkbox next to the device you want to Enterprise Wipe.

NOTE - Your Device Friendly Name will very likely be different than what is shown. It will, however, be in the same location as shown on image in this step.

 

 

Find the Enterprise Wipe Option

 

  1. Click More Actions. NOTE - If you do not see this option, ensure you have a device selected by clicking the checkbox next to the device.
  2. Click Enterprise Wipe under Management.

 

 

Enter your security PIN

 

After selecting Enterprise Wipe, you will be prompted to enter your Security PIN which you set after your logged into the console ("1234").

  1. Enter "1234" for the Security PIN. You will not need to press enter or continue, the console will confirm your PIN showing "Successful" below the Security PIN input field to indicate that an Enterprise Wipe has been requested.  NOTE: If "1234" does not work, then you provided a different Security PIN when you first logged into the AirWatch Console.  Use the value you specified for your Security PIN.

NOTE - If the Enterprise Wipe does not immediately occur, follow the below steps to force a device sync:

  1. On your device, open the AirWatch Agent application.
  2. Tap the Device section (under Status) in the middle of the screen.
  3. Tap Send Data near the top of the screen.  If this does not make the device check in and immediately un-enroll, continue to Step #4.
  4. If the above doesn't make it immediately un-enroll, then tap Connectivity [Status] under Diagnostics.
  5. Tap Test Connectivity at the top of the screen.

NOTE - Depending upon Internet connectivity of the device and responsiveness of the lab infrastructure, this could take a couple of minutes or more if there is excessive traffic occurring within the Hands On Lab environment.

Feel free to continue to the "Force the Wipe" step to manually uninstall the AirWatch services from the device if network connectivity is failing.

 

 

Verify the Un-Enrollment

 

Press the Home button on the device to go back to the home screen. The applications pushed through AirWatch should have been removed from the device.

NOTE - The applications and settings pushed through AirWatch management should have been removed. The Agent will still be on the device because that was downloaded manually from the App Store. Due to lab environment settings, it may take some time for the signal to traverse through the various networks out and back to your device. Continue on to the next step to force the wipe if the needed.

 

 

Force the Wipe - IF NECESSARY

 

If your device did not wipe, follow these instructions to ensure the wipe is forced immediately. Start by opening the iOS Settings app.

  1. Tap General in the left column.
  2. Scroll down to view the Device Management option.
  3. Tap Device Management at the bottom of the list of General settings.

 

 

Force the Wipe - IF NECESSARY

 

Tap the Workspace Services profile that was pushed to the device.

 

 

Force the Wipe - IF NECESSARY

 

  1. Tap Remove Management on the Workspace Services profile.  
    NOTE - If prompted for a device PIN, enter it to continue.  VMware provisioned devices should not have a device PIN enabled.
  2. Tap Remove on the Remove Management prompt.

After removing the Workspace Services profile, the device will be un-enrolled.  Feel free to return to the "Verify the Un-Enrollment" step to confirm the successful un-enrollment of the device.

 

Conclusion


Managing your devices with AirWatch empowers your administrators to ensure devices are operating and accessing corporate resources securely without violating user privacy.  Now that you know how to enroll a device a push a profile, consider exploring the other lab topics available in this module to further expand your AirWatch knowledge.

This concludes the Introduction to AirWatch module.  


Module 2 - Basic Apple macOS Management (45 min)

Introduction


In this lab module, we will explore some AirWatch administration features and concepts available for the macOS platform.  This lab will give you a better understanding of how macOS devices are enrolled, what management options you have available, and how these options can improve and impact the user experience by configuring macOS and publishing applications.

Before you can start the lab, make sure you review the next page ensure you can successfully complete the lab.


 

Pre-Requisites

To successfully complete this Hands-On Lab, you'll need to ensure you have the following pre-requisites:

 

Login to the AirWatch Console


To perform most of the lab you will need to login to the AirWatch Management Console.


 

Launch Chrome Browser

 

Double-click the Chrome Browser on the lab desktop.

 

 

Authenticate to the AirWatch Administration Console

 

The default home page for the browser is https://hol.awmdm.com. Enter your AirWatch Admin Account information and click the Login button.

NOTE - If you see a Captcha, please be aware that it is case sensitive!

  1. Enter your Username. This is you email address that you have associated with your VMware Learning Platform (VLP) account.
  2. Enter "VMware1!" for the Password field.
  3. Click the Login button.

NOTE - Due to lab restrictions, you may need to wait here for a minute or so while the Hands On Lab contacts the AirWatch Hands On Labs server.

 

 

Accept the End User License Agreement

 

NOTE - The following steps of logging into the Administration Console will only need to be done during the initial login to the console.

You will be presented with the AirWatch Terms of Use. Click the Accept button.

 

 

Address the Initial Security Settings

 

After accepting the Terms of Use, you will be presented with a Security Settings pop-up.  The Password Recovery Question is in case you forget your admin password and the Security PIN is to protect certain administrative functionality in the console.  

  1. You may need to scroll down to see the Password Recovery Questions and Security PIN sections.
  2. Select a question from the Password Recovery Question drop-down (default selected question is ok here).
  3. Enter "VMware1!" in the Password Recovery Answer field.
  4. Enter "VMware1!" in the Confirm Password Recovery Answer field.
  5. Enter "1234" in the Security PIN field.
  6. Enter "1234" in the Confirm Security PIN field.
  7. Click the Save button when finished.

 

 

Close the Welcome Message

 

After completing the Security Settings, you will be presented with the AirWatch Console Welcome pop-up.

  1. Click on the Don't show this message again check box.
  2. Close the pop-up by clicking on the X in the upper-right corner.

 

macOS Enrollment


In this section you will enroll a macOS device into AirWatch.  Enrollment is the action that brings a device under management and control by AirWatch.   There are a number of ways to enroll the various platforms (macOS included), but for this lab we cover just a basic enrollment scenario.  


 

Download the AirWatch Agent

In this exercise, you will enroll using the AirWatch Agent to begin the staging process. 

 

 

Install the AirWatch Agent

In these steps you'll install the AirWatch Agent on the macOS device so that you can later begin the Enrollment process.

 

 

Enroll the macOS Device

In these next steps you'll enroll the macOS device, bringing it under control and management by AirWatch.

 

 

Enable Location Services

In these next few steps we'll enable location services on macOS so that the device can report its location to AirWatch.

 

 

Validate Mac Enrollment

Follow the next steps to see how to verify that the Mac has been successfully enrolled.

 

 

Key Takeaways

 

macOS Device and Application Management (MDM and MAM)


This chapter will explore the basics of modifying the macOS device behavior by using Profiles and how to easily distribute applications.


 

Configure macOS Profiles

Profiles are the mechanism by which AirWatch manages settings on a macOS device.  macOS profile management is done in two ways: device level and enrollment-user level. You can set appropriate restrictions and apply appropriate settings regardless of the logged-on user. You can also apply settings specific to the logged-on user on the device.

 

 

Configure App Catalog and Publish Internal Apps

The Application catalog is a website in your AirWatch instance that provides a user and device specific list of managed applications available for installation.  This provides a self-service method for end-users to select the software and applications they would like deployed to their device.

AirWatch also provides multiple methods to manage applications on a macOS device.  Applications can be delivered as self-contained *.app files (what AirWatch labels an Internal Application).  Applications can also be delivered as detailed manifests which allow step-by-step execution of multiple scripts and/or software packages.  This second method, which AirWatch refers to as Product Provisioning, is outside the scope of this exercise.  

In this exercise, you will enable the application catalog and deploy an Internal Application to your device.

NOTE - All AirWatch Management Console work should be done on the server in the VLP (VMware Learning Platform), not on the Mac.

 

 

Configure Device Lock

Device lock for macOS devices causes the machine to reboot into a firmware-lock screen.  This lock screen occurs at the firmware level prior to OS boot.

 

Intro to Custom Attributes


Custom attributes enable administrators to extract particular values from a managed device and return it to the AirWatch Admin Console.  This can be particularly useful for device configuration auditing and Product sequencing.


 

Custom Attributes

Custom Attributes are key-value pairs.  These key value pairs are generated by scripting/commands which execute on the device and whose values are returned to the console via the AirWatch Agent.  The scripts/commands are delivered to the device via a Custom Attributes payload in a profile.  The profile also allows scheduling of the script/command to re-occur on a schedule or based on an event.  Additionally, Custom Attribute payloads execute in the root context on the device, which allows you to gather information about the device without requiring the enrolled user to have Administrative permissions.

 

 

Custom Attribute Profiles

Previously, Custom Attributes were sent to the console by creating a shell script to write values to a specific Plist file monitored by the AirWatch Agent.  With AirWatch 8.2 and above, this functionality is now included as a profile and adds additional features such as scheduling.

 

 

Locating Custom Attributes

Once AirWatch delivers a Custom Attributes profile/payload to a device, the Agent will report the initial value of the Custom Attribute back to AirWatch and begin the Schedule or Event monitoring.  Custom Attribute values that have been reported back to the console can be viewed in the device details.

 

Enterprise Wipe


An Enterprise Wipe removes corporate data that was added to the device while leaving personal data intact.


 

View Device List

 

From within the AirWatch console,

  1. Click on Devices
  2. Click on List View.
  3. Click on your macOS device in the List View to view details.

 

 

Initiate Enterprise Wipe

 

  1. From the toolbar in the device details header, click More Actions.
  2. Click Enterprise Wipe under the "Management" header in the menu that drops down.

 

 

Enter Security PIN to Confirm Wipe

 

  1. Scroll down until you see the section to Enter Security PIN.
  2. Enter your security PIN "1234" to initiate the Enterprise Wipe.

 

 

Access macOS System Preferences

 

  1. On your device, click on the Apple icon in the top left corner
  2. Click System Preferences.  

 

 

Verify Removal of System Preference Restrictions

 

  1. Note you are now able to make modifications to iCloud and Bluetooth since the restriction you created earlier has been removed.

 

 

Verify Removal of Deployed Internal Application

 

  1. Open Finder (Smiley Face) on the dock and click Go.
  2. Click on Applications.
  3. Confirm that Feedly has been removed from your device.

On your device, also note that the dock preferences have been removed and the dock has returned to its original position.

NOTE - Due to the limitations of the lab network, you may need to wait several minutes after un-enrolling before the Feedly application is removed and the dock is returned to the original position.

 

Conclusion


This lab covered basic macOS administration using AirWatch.  You enrolled your macOS device, created profiles, deployed an application, locked the device, used Custom Attributes and then enterprise wiped the content and settings from the device.  

For more information, please register for a free account at https://my.air-watch.com (My AirWatch) in order to access AirWatch Academy and our Resources page.  There you will find courses and documentation that can help you with advanced topics in macOS management, such as:

This concludes the Basic Apple macOS Management module.


Module 3 - Basic Windows 10 Management (30 minutes)

Introduction


In this lab module, you will learn how to enroll a Windows 10 device into AirWatch and how to configure and deploy restriction profiles and applications to your enroll device.


 

Pre-Requisites

To successfully complete this Hands-On Lab, you'll need to ensure you have the following pre-requisites:

As a reminder, DO NOT access the Hands-On lab from the same machine you plan to enroll & manage as part of the HOL exercise. As part of the HOL, you will be rebooting this machine and will temporarily lose access to the lab documentation if you run the lab from the machine you enroll.

 

Login to the AirWatch Console


To perform most of the lab you will need to login to the AirWatch Management Console.


 

Launch Chrome Browser

 

Double-click the Chrome Browser on the lab desktop.

 

 

Authenticate to the AirWatch Administration Console

 

The default home page for the browser is https://hol.awmdm.com. Enter your AirWatch Admin Account information and click the Login button.

NOTE - If you see a Captcha, please be aware that it is case sensitive!

  1. Enter your Username. This is you email address that you have associated with your VMware Learning Platform (VLP) account.
  2. Enter "VMware1!" for the Password field.
  3. Click the Login button.

NOTE - Due to lab restrictions, you may need to wait here for a minute or so while the Hands On Lab contacts the AirWatch Hands On Labs server.

 

 

Accept the End User License Agreement

 

NOTE - The following steps of logging into the Administration Console will only need to be done during the initial login to the console.

You will be presented with the AirWatch Terms of Use. Click the Accept button.

 

 

Address the Initial Security Settings

 

After accepting the Terms of Use, you will be presented with a Security Settings pop-up.  The Password Recovery Question is in case you forget your admin password and the Security PIN is to protect certain administrative functionality in the console.  

  1. You may need to scroll down to see the Password Recovery Questions and Security PIN sections.
  2. Select a question from the Password Recovery Question drop-down (default selected question is ok here).
  3. Enter "VMware1!" in the Password Recovery Answer field.
  4. Enter "VMware1!" in the Confirm Password Recovery Answer field.
  5. Enter "1234" in the Security PIN field.
  6. Enter "1234" in the Confirm Security PIN field.
  7. Click the Save button when finished.

 

 

Close the Welcome Message

 

After completing the Security Settings, you will be presented with the AirWatch Console Welcome pop-up.

  1. Click on the Don't show this message again check box.
  2. Close the pop-up by clicking on the X in the upper-right corner.

 

Windows 10 Restriction Profile


Profiles allow you to modify how the enrolled devices behave.  This section will walk you through how to configure and deploy a restriction profile that we can verify has applied to the device later in the module.

Continue to the next step.


 

Create a Restriction Profile

 

In the top right corner of AirWatch console,

  1. Click Add.
  2. Click Profile.

 

Windows 10 App Delivery


You can also distribute applications to Windows 10 devices, allowing for a seamless user experience.  Continue to explore the process of creating and distributing an application to your Windows 10 device.


 

Create an Internal Application Profile

This exercise requires the 7-Zip installation program which is already downloaded and stored for you in the Documents folder.

 

Windows 10 Work Access Enrollment


Device enrollment establishes the initial communication with AirWatch to enable Enterprise Mobility Management (EMM). The enrollment methods for Windows Desktop focus on adding features and functionality depending on how devices are enrolled.

All Windows Desktop enrollments use the native enterprise management app to complete the enrollment process. Windows Auto-Discovery is an optional method of enrolling devices that only requires the end-user's email address to begin the enrollment process.

Enrollment can also require the enabling (console checkbox) of the AirWatch Protection Agent. This agent adds endpoint security to your Windows Desktop devices to ensure your data and devices remain secure wherever the device may go. The AirWatch Protection Agent for Windows Desktop co-opts the native Windows Desktop functionality such as BitLocker encryption, Windows Firewall, and Windows Automatic Updates to keep devices secure and up-to-date.


 

Work Access Enrollment

This section will guide you through how to enroll your Windows 10 device through work access enrollment.

 

 

Confirm MDM Enrollment

Once your Windows 10 device is enrolled, the restriction profile you created earlier will be installed on the device.  Continue to confirm enrollment was successful and that the profile installed correctly by verifying that the restrictions took place on your device.

 

Un-enrolling your Windows 10 Device


In this section, we are going to un-enroll our Windows 10 VM so that we can use it for other lab modules. We will delete the device record from the console, which will also un-enroll the device and remove all the apps and profiles that are pushed from AirWatch console, also known as managed content.


 

Delete Device from AirWatch Console

 

From the AirWatch Console,

  1. Click on Devices
  2. Click on List View
  3. Select the check box next to your device friendly name.
  4. Click on More Actions
  5. Click on Delete Device

 

 

Enter Reason and Delete

 

  1. Enter the reason as "lab completed"
  2. Click on Delete

 

 

Validate DELETE IN PROGRESS...

 

  1. You may see device friendly name changing to DELETE IN PROGRESS...
  2. Click on the Refresh Icon to validate if the device deletion is successful.

 

 

Ensure that device record is deleted

 

  1. Use the Refresh Button if needed.
  2. Ensure that the device record is now deleted from the AirWatch console and you see the message No Records Found.

 

 

 

Navigate to Windows 10 Settings

 

  1. Click on the Windows Icon
  2. Click on the gear icon to access Windows 10 Settings

 

 

 

Access Accounts Settings

 

From the Settings Menu, access Accounts

 

 

Validate That No Management Account Exists

 

  1. Click on Access work or school
  2. Validate that you DO NOT see any account connected to device management or other types.

 

Conclusion


In addition to managing mobile devices, AirWatch can also manage your Windows 10 applications as well.  This quick look into Windows 10 management should provider a clearer picture on how you can manage your Windows 10 devices by configuring restrictions and profiles and deploying applications alongside your mobile workforce.  For a deeper dive into Windows 10 Management, consider taking HOL-1857-02-UEM - VMware AirWatch: Unified Endpoint Management for Windows 10.

This concludes the Basic Windows 10 Management module.


Module 4 - Workspace ONE UEM Console Roles (30 minutes)

Introduction


In this lab module, you will learn how AirWatch Console Roles can be used to define how AirWatch administrators can interact with the AirWatch Console.  This module will also review how to configure Self-Service options available for your end users.  You will learn how to create and assign Roles to administrators and users alike and see how these changes impact the experience for both.


Login to the AirWatch Console


To perform most of the lab you will need to login to the AirWatch Management Console.


 

Launch Chrome Browser

 

Double-click the Chrome Browser on the lab desktop.

 

 

Authenticate to the AirWatch Administration Console

 

The default home page for the browser is https://hol.awmdm.com. Enter your AirWatch Admin Account information and click the Login button.

NOTE - If you see a Captcha, please be aware that it is case sensitive!

  1. Enter your Username. This is you email address that you have associated with your VMware Learning Platform (VLP) account.
  2. Enter "VMware1!" for the Password field.
  3. Click the Login button.

NOTE - Due to lab restrictions, you may need to wait here for a minute or so while the Hands On Lab contacts the AirWatch Hands On Labs server.

 

 

Accept the End User License Agreement

 

NOTE - The following steps of logging into the Administration Console will only need to be done during the initial login to the console.

You will be presented with the AirWatch Terms of Use. Click the Accept button.

 

 

Address the Initial Security Settings

 

After accepting the Terms of Use, you will be presented with a Security Settings pop-up.  The Password Recovery Question is in case you forget your admin password and the Security PIN is to protect certain administrative functionality in the console.  

  1. You may need to scroll down to see the Password Recovery Questions and Security PIN sections.
  2. Select a question from the Password Recovery Question drop-down (default selected question is ok here).
  3. Enter "VMware1!" in the Password Recovery Answer field.
  4. Enter "VMware1!" in the Confirm Password Recovery Answer field.
  5. Enter "1234" in the Security PIN field.
  6. Enter "1234" in the Confirm Security PIN field.
  7. Click the Save button when finished.

 

 

Close the Welcome Message

 

After completing the Security Settings, you will be presented with the AirWatch Console Welcome pop-up.

  1. Click on the Don't show this message again check box.
  2. Close the pop-up by clicking on the X in the upper-right corner.

 

Administrator Roles


AirWatch lets you control specific roles to be applied to different administrators for different administrative purposes. In this Hands-On-Lab (HOL), you'll learn how to configure roles for your administrators.


 

Check Your Current Admin Role

 

Check the current role of the logged in user:

  1. Click Account button in the top-right corner of the Console.  Your email address will be listed on the button.
  2. Confirm that the current Role is HOL Administrator at your organization group.

A good strategy when creating new roles is to assign the role to yourself. That allows you to use this dropdown menu to select different roles and actually see the effects of the role you are editing!

 

 

Creating a new role

 

  1. Click Accounts.
  2. Expand the Administrators dropdown.
  3. Click Roles under Administrators.
  4. Click + Add Role.

 

 

Adding the New Role and Attaching It To Your Admin Account

 

  1. Click Accounts.
  2. Expand Administrators.
  3. Click List View.
  4. Click the Administrator account, which will be your email address.

 

iOS Device Enrollment


In this section, we are going to enroll an iOS device to complete the steps on the device side.


 

Download/Install AirWatch MDM Agent Application from App Store - IF NEEDED

 

NOTE - Checked out devices will likely have the AirWatch MDM Agent already installed. You may skip this step if your device has the AirWatch MDM agent installed.

At this point, if using your own iOS device or if the device you are using does NOT have the AirWatch MDM Agent Application installed, then install the AirWatch Application.

To Install the AirWatch MDM Agent application from the App Store, open the App Store application and download the free AirWatch MDM Agent application.

 

 

Launching the AirWatch MDM Agent

 

Launch the AirWatch Agent app on the device.  

NOTE - If you have your own iOS device and would like to test you will need to download the agent first.

 

 

Choose the Enrollment Method

 

Click on the Server Details button.

 

 

Find your Group ID from AirWatch Console

 

 

  1. To find the Group ID, hover your mouse over the Organization Group tab at the top of the screen. Look for the email address you used to log in to the lab portal.
  2. Your Group ID is displayed at the bottom of the Organization Group pop up.

NOTE - The Group ID is required when enrolling your device in the following steps.

 

 

Attach the AirWatch MDM Agent to the HOL Sandbox

 

Once the Agent has launched you can enroll the device.  To do so, follow the below steps.

  1. Enter "hol.awmdm.com" for the Server field.
  2. Enter your Group ID for your Organization Group for the Group ID field.  Your Group ID was noted previously in the Finding your Group ID step.
  3. Tap the Go button.

NOTE - If on an iPhone, you may have to close the keyboard by clicking Done in order to click the Continue button.

 

 

Authenticate the AirWatch MDM Agent

 

On this screen, enter the Username and Password for the basic user account.

  1. Enter "testuser" in the Username field.
  2. Enter "VMware1!" in the Password field.
  3. Tap the Go button.

 

 

Redirect to Safari and Enable MDM Enrollment in Settings

 

The AirWatch Agent will now redirect you to Safari and start the process of enabling MDM in the device settings.

Tap on Redirect & Enable at the bottom of the screen.

 

 

Allow Website to Open Settings (IF NEEDED)

 

If you prompted to allow the website to open Settings to show you a configuration profile, tap Allow.

NOTE - If you do not see this prompt, ignore this and continue to the next step.  This prompt will only occur for iOS Devices on iOS 10.3.3 or later

 

 

Install the MDM Profile

 

Tap Install in the upper right corner of the Install Profile dialog box.

 

 

Install and Verify the AirWatch MDM Profile

 

Tap Install when prompted at the Install Profile dialog.

NOTE - If a PIN is requested, it is the current device PIN. Provided VMware devices should not have a PIN.

 

 

iOS MDM Profile Warning

 

You should now see the iOS Profile Installation warning explaining what this profile installation will allow on the iOS device.

Tap Install in the upper-right corner of the screen.

 

 

Trust the Remote Management Profile.

 

You should now see the iOS request to trust the source of the MDM profile.

Tap Trust when prompted at the Remote Management dialog.

 

 

iOS Profile Installation Complete

 

You should now see the iOS Profile successfully installed.

Tap Done in the upper right corner of the prompt.

 

 

AirWatch Enrollment Success

 

Your enrollment is now completed. Tap Open to navigate to the AirWatch Agent.

 

 

Accept the Authentication Complete Prompt

 

Click on Done to continue.

 

 

Accept Notification Prompt (IF NEEDED)

 

Tap Allow if you get a prompt for Notifications.

 

 

Accept the App Installation (IF NEEDED)

 

You may be prompted to install a series of applications depending on which Module you are taking. If prompted, tap Install to accept the application installation.

 

User Roles


Now that we have a device enrolled, we will look at how to configure User Roles to enable or prevent your users from performing specific actions in the Self Service Portal.


 

Adding a new Role

 

Return to the AirWatch Console and perform the following actions.

  1. Click Accounts.
  2. Expand Users.
  3. Click Roles.
  4. Click + Add Role.

 

 

Allocating Permissions

 

  1. Click on Accounts.
  2. Expand Users.
  3. Click on List View.
  4. Click on the pencil icon to edit the testuser account.

 

 

Viewing Role changes in the Self Service Portal (SSP)

Now that we've assigned the new role to the user we will take a look at the effect this has on the user's ability to perform actions in the Self Service Portal.

 

Enterprise Wipe Device From Self Service Portal


Since we've enabled our end users to Enterprise Wipe their devices from the Self Service Portal, we will now un-enroll our iOS device by performing an Enterprise Wipe as an end user.


 

Enterprise Wipe the Device

 

Next, we will Enterprise Wipe the enrolled device from the self service portal.

NOTE - Enterprise Wipe IS NOT a factory reset of the device, it will only remove the data that has been delivered to your device through AirWatch.

Click Enterprise Wipe.

 

 

Verify the Device Un-Enrollment

 

Press the Home button on the device to go back to the home screen. The applications pushed through AirWatch should have been removed from the device.

NOTE - The App Catalog and any settings pushed through AirWatch management should have been removed. The Agent will still be on the device because that was downloaded manually from the App Store. Due to lab environment settings, it may take some time for the signal to traverse through the various networks out and back to your device.

 

 

Verify the Device Un-Enrollment in AirWatch Console

 

You can confirm that the device was un-enrolled through the AirWatch Console, as well.

  1. Click Devices.
  2. Click List View.
  3. Find the device you enrolled, you may need to scroll to the right to view the Enrollment status.
  4. Confirm the Enrollment status is showing as Unenrolled.

 

Conclusion


As seen, role based access allows you to configure what actions are available for both AirWatch administrators and users.

Administrator Roles define what functionality each admin had access to. This provides a more focused admin experience, ensuring your admins with limited permissions are only granted access to the items that they need for their day-to-day tasks. It also helps prevents unwanted changes by limiting what actions can be accessed by admins using certain roles.

User Roles define what actions users are allowed to take through the AirWatch Self Service Portal. Limiting these options can also help prevent your users from taking unwanted action, such as un-enrolling their own devices.

Experimenting with these roles and finding the right solution for your administrators and users is important to enable them with the appropriate access they need while ensuring they do not have access to unneeded actions. These roles can be easily removed, added, or changed when you need to adapt your use cases.

This concludes the AirWatch Console Roles module


Module 5 - Branding the Workspace ONE UEM Console, SSP and SCL (30 min)

Introduction


Branding allows you to provide a more familiar and personalized experience to both your AirWatch administrators and your end users.  The AirWatch Console, Self Service Portal, and various applications can be branded to match your organization and provide a more cohesive experience from device enrollment to every day use.  This module will explore how to enable and configure branding for the AirWatch Console, Self Service Portal, and the VMware Content Locker and VMware Browser apps.


Login to the AirWatch Console


To perform most of the lab you will need to login to the AirWatch Management Console.


 

Launch Chrome Browser

 

Double-click the Chrome Browser on the lab desktop.

 

 

Authenticate to the AirWatch Administration Console

 

The default home page for the browser is https://hol.awmdm.com. Enter your AirWatch Admin Account information and click the Login button.

NOTE - If you see a Captcha, please be aware that it is case sensitive!

  1. Enter your Username. This is you email address that you have associated with your VMware Learning Platform (VLP) account.
  2. Enter "VMware1!" for the Password field.
  3. Click the Login button.

NOTE - Due to lab restrictions, you may need to wait here for a minute or so while the Hands On Lab contacts the AirWatch Hands On Labs server.

 

 

Accept the End User License Agreement

 

NOTE - The following steps of logging into the Administration Console will only need to be done during the initial login to the console.

You will be presented with the AirWatch Terms of Use. Click the Accept button.

 

 

Address the Initial Security Settings

 

After accepting the Terms of Use, you will be presented with a Security Settings pop-up.  The Password Recovery Question is in case you forget your admin password and the Security PIN is to protect certain administrative functionality in the console.  

  1. You may need to scroll down to see the Password Recovery Questions and Security PIN sections.
  2. Select a question from the Password Recovery Question drop-down (default selected question is ok here).
  3. Enter "VMware1!" in the Password Recovery Answer field.
  4. Enter "VMware1!" in the Confirm Password Recovery Answer field.
  5. Enter "1234" in the Security PIN field.
  6. Enter "1234" in the Confirm Security PIN field.
  7. Click the Save button when finished.

 

 

Close the Welcome Message

 

After completing the Security Settings, you will be presented with the AirWatch Console Welcome pop-up.

  1. Click on the Don't show this message again check box.
  2. Close the pop-up by clicking on the X in the upper-right corner.

 

AirWatch Console & Self Service Portal Branding


This section will introduce you to Branding the AirWatch Web Console and Self Service Portal. Many customers alter the branding of their Web Console and Self Service Portal to match their corporate branding. In this section we will browse the available options for branding these two websites.


 

Create a Child Organization Group For Branding

Because this lab will change the look and feel of the AirWatch Management Console you will create a child Organization Group under your main group to do this module.

 

 

This step shows you how to change the Company Logo, which is seen at the AirWatch Console Login screen, the corner of the AirWatch Console screen, and the Self Service Portal.

 

 

Login Page Background

In this section you will change the Login Page Background, which is the image displayed at the AirWatch Console Login screen.

 

 

Self Service Login Page Background

In this section, you will change the Self Service Login Page Background so that the Self Service Portal login background matches the AirWatch Console login background.

 

 

Colors

In this section you will change the Color theme of the AirWatch Console.

 

 

Confirm the Console Branding Changes

Now that the Branding changes have been configured and saved, we can test these changes within the AirWatch Console and the Self Service Portal.

 

Content Locker & Browser Branding (iOS)


This section will show you how to brand your VMware Content Locker and AirWatch Browser application. We will browse the available options for branding an AirWatch SDK enabled application, create a Branding profile and attach the SDK profile to AirWatch applications.


 

Creating SDK Branding Profiles

In this step we will create a new SDK Profile with a Branding Payload.

 

 

Edit the VMware Content Locker Settings

In this step we will set the previously created branding profile as the active SDK profile for the AirWatch VMware Content Locker.

 

 

Edit the AirWatch Browser Settings

In this step we will set the previously created branding profile as the active SDK profile for the AirWatch Browser.

 

 

Publish the VMware Content Locker

In this step, we will publish the VMware Content Locker to registered devices in order to test the Branding updates.

 

 

Publish the VMware Browser Application

In this step, we will publish the VMware Browser application to registered devices to test the Branding changes.

 

iOS Device Enrollment (into Branding Group)


You are now going to enroll your iOS device for use with this module.


 

Download/Install AirWatch MDM Agent Application from App Store - IF NEEDED

 

NOTE - Checked out devices will likely have the AirWatch MDM Agent already installed. You may skip this step if your device has the AirWatch MDM agent installed.

At this point, if using your own iOS device or if the device you are using does NOT have the AirWatch MDM Agent Application installed, then install the AirWatch Application.

To Install the AirWatch MDM Agent application from the App Store, open the App Store application and download the free AirWatch MDM Agent application.

 

 

Switch to the Branding Group (IF NEEDED)

 

If your organization group is not showing as your@email.shown.here / Branding, follow the below steps to switch to the Branding organization group that you created earlier.

  1. Click the Organization Group dropdown labeled your@email.shown.here.
  2. Click the Branding organization group under your@email.shown.here.

 

 

Launching the AirWatch MDM Agent

 

Launch the AirWatch Agent app on the device.  

NOTE - If you have your own iOS device and would like to test you will need to download the agent first.

 

 

Choose the Enrollment Method

 

Click on the Server Details button.

 

 

Finding your Group ID

 

The first step is to make sure you know what your Organization Group ID is.  

  1. To find the Group ID, hover your mouse over the Organization Group tab at the top of the screen. Look for the email address you used to log in to the lab portal.
  2. Your Group ID is displayed at the bottom of the Organization Group pop up. The Group ID is required when enrolling your device in the following steps.

 

 

Attach the AirWatch MDM Agent to the HOL Sandbox

 

Once the Agent has launched you can enroll the device.  To do so, follow the below steps.

  1. Enter "hol.awmdm.com" for the Server field.
  2. Enter your Group ID for your Organization Group for the Group ID field.  Your Group ID was noted previously in the Finding your Group ID step.
  3. Tap the Go button.

NOTE - If on an iPhone, you may have to close the keyboard by clicking Done in order to click the Continue button.

 

 

Authenticate the AirWatch MDM Agent

 

On this screen, enter the Username and Password for the basic user account.

  1. Enter "testuser" in the Username field.
  2. Enter "VMware1!" in the Password field.
  3. Tap the Go button.

 

 

Redirect to Safari and Enable MDM Enrollment in Settings

 

The AirWatch Agent will now redirect you to Safari and start the process of enabling MDM in the device settings.

Tap on Redirect & Enable at the bottom of the screen.

 

 

Allow Website to Open Settings (IF NEEDED)

 

If you prompted to allow the website to open Settings to show you a configuration profile, tap Allow.

NOTE - If you do not see this prompt, ignore this and continue to the next step.  This prompt will only occur for iOS Devices on iOS 10.3.3 or later

 

 

Install the MDM Profile

 

Tap Install in the upper right corner of the Install Profile dialog box.

 

 

Install and Verify the AirWatch MDM Profile

 

Tap Install when prompted at the Install Profile dialog.

NOTE - If a PIN is requested, it is the current device PIN. Provided VMware devices should not have a PIN.

 

 

iOS MDM Profile Warning

 

You should now see the iOS Profile Installation warning explaining what this profile installation will allow on the iOS device.

Tap Install in the upper-right corner of the screen.

 

 

Trust the Remote Management Profile.

 

You should now see the iOS request to trust the source of the MDM profile.

Tap Trust when prompted at the Remote Management dialog.

 

 

iOS Profile Installation Complete

 

You should now see the iOS Profile successfully installed.

Tap Done in the upper right corner of the prompt.

 

 

AirWatch Enrollment Success

 

Your enrollment is now completed. Tap Open to navigate to the AirWatch Agent.

 

 

Accept the Authentication Complete Prompt

 

Click on Done to continue.

 

 

Accept Notification Prompt (IF NEEDED)

 

Tap Allow if you get a prompt for Notifications.

 

 

Accept the App Installation (IF NEEDED)

 

You may be prompted to install a series of applications depending on which Module you are taking. If prompted, tap Install to accept the application installation.

 

Confirm Application Branding


We will now inspect the applications on our enrolled iOS Device to confirm the Branding settings.


 

Confirm the Browser Branding Changes

Next, let us view the changes to the Browser.

 

 

Confirm the Content Locker Branding

Lastly, let us view the Content Locker Branding changes.

 

Un-enrolling Your Device


You are now going to un-enroll the iOS device from AirWatch.

NOTE - The term "Enterprise Wipe" does not mean reset or completely wipe your device. This only removes the MDM Profiles, Policies, and content which the AirWatch MDM Agent controls.

It will NOT remove the AirWatch MDM Agent application from the device as this was downloaded manually before AirWatch had control of the device.


 

Enterprise Wipe (un-enroll) your iOS device

 

Enterprise Wipe will remove all the settings and content that were pushed to the device when it was enrolled.  It will not affect anything that was on the device prior to enrollment.

To Enterprise Wipe your device you will first bring up the AirWatch Console in a web browser. You may need to re-authenticate with your credentials (VLP registered email address and "VMware1!" as the password).

  1. Click Devices on the left column.
  2. Click List View.
  3. Click the checkbox next to the device you want to Enterprise Wipe.

NOTE - Your Device Friendly Name will very likely be different than what is shown. It will, however, be in the same location as shown on image in this step.

 

 

Find the Enterprise Wipe Option

 

  1. Click More Actions. NOTE - If you do not see this option, ensure you have a device selected by clicking the checkbox next to the device.
  2. Click Enterprise Wipe under Management.

 

 

Enter your security PIN

 

After selecting Enterprise Wipe, you will be prompted to enter your Security PIN which you set after your logged into the console ("1234").

  1. Enter "1234" for the Security PIN. You will not need to press enter or continue, the console will confirm your PIN showing "Successful" below the Security PIN input field to indicate that an Enterprise Wipe has been requested.  NOTE: If "1234" does not work, then you provided a different Security PIN when you first logged into the AirWatch Console.  Use the value you specified for your Security PIN.

NOTE - If the Enterprise Wipe does not immediately occur, follow the below steps to force a device sync:

  1. On your device, open the AirWatch Agent application.
  2. Tap the Device section (under Status) in the middle of the screen.
  3. Tap Send Data near the top of the screen.  If this does not make the device check in and immediately un-enroll, continue to Step #4.
  4. If the above doesn't make it immediately un-enroll, then tap Connectivity [Status] under Diagnostics.
  5. Tap Test Connectivity at the top of the screen.

NOTE - Depending upon Internet connectivity of the device and responsiveness of the lab infrastructure, this could take a couple of minutes or more if there is excessive traffic occurring within the Hands On Lab environment.

Feel free to continue to the "Force the Wipe" step to manually uninstall the AirWatch services from the device if network connectivity is failing.

 

 

Verify the Un-Enrollment

 

Press the Home button on the device to go back to the home screen. The applications pushed through AirWatch should have been removed from the device.

NOTE - The applications and settings pushed through AirWatch management should have been removed. The Agent will still be on the device because that was downloaded manually from the App Store. Due to lab environment settings, it may take some time for the signal to traverse through the various networks out and back to your device. Continue on to the next step to force the wipe if the needed.

 

 

Force the Wipe - IF NECESSARY

 

If your device did not wipe, follow these instructions to ensure the wipe is forced immediately. Start by opening the iOS Settings app.

  1. Tap General in the left column.
  2. Scroll down to view the Device Management option.
  3. Tap Device Management at the bottom of the list of General settings.

 

 

Force the Wipe - IF NECESSARY

 

Tap the Workspace Services profile that was pushed to the device.

 

 

Force the Wipe - IF NECESSARY

 

  1. Tap Remove Management on the Workspace Services profile.  
    NOTE - If prompted for a device PIN, enter it to continue.  VMware provisioned devices should not have a device PIN enabled.
  2. Tap Remove on the Remove Management prompt.

After removing the Workspace Services profile, the device will be un-enrolled.  Feel free to return to the "Verify the Un-Enrollment" step to confirm the successful un-enrollment of the device.

 

Conclusion


Branding your AirWatch Console, Self Service Portal, and applications you distribute to devices can help unify the look and feel of your environment to match your company brand.  This allows a more personal experience for your administrators and users from start to finish and can be a powerful tool to assist in user adoption.  Explore ideas around how you can leverage your brand within AirWatch for your administrators and users.

This concludes the Branding the AirWatch Console, SSP and SCL module.


Conclusion

Thank you for participating in the VMware Hands-on Labs. Be sure to visit http://hol.vmware.com/ to continue your lab experience online.

Lab SKU: HOL-1857-01-UEM

Version: 20180430-190405