VMware Hands-on Labs - HOL-2251-09-DWS


Lab Overview - HOL-2251-09-DWS - Workspace ONE UEM - Getting Started with the Digital Workspace

Lab Guidance


Note: It may take more than 90 minutes to complete this lab. You should expect to only finish 2-3 of the modules during your time.  The modules are independent of each other so you can start at the beginning of any module and proceed from there. You can use the Table of Contents to access any module of your choosing.

The Table of Contents can be accessed in the upper right-hand corner of the Lab Manual.

Interested in providing a secure digital workspace to meet the demands of a modern and distributed workforce but don't know where to start? Learn the core concepts of Workspace ONE UEM (Unified Endpoint Management) and the fundamentals of enrolling and managing iOS, macOS, Windows 10, and Android devices to distribute apps, policies, restrictions, and powerful workflows. Explore the entire Anywhere Workspace solution, including insightful reports and automation with Workspace ONE Intelligence and how to provide secure access with the Unified Access Gateway.

Lab Module List:

  • Module 1 - Introduction to Windows 10 Management (30 minutes) (Beginner) This lab module focuses on introducing the concepts of Unified Endpoint Management (UEM) with Workspace ONE for the Windows 10 platform. Learn how to enroll a Windows 10 device into Workspace ONE UEM and how to configure and deploy restriction profiles and applications to your enrolled device.
  • Module 2 - Introduction to Apple iOS Management (30 minutes) (Beginner) This lab module focuses on introducing the concepts of Unified Endpoint Management (UEM) with Workspace ONE for the iOS platform. Learn how to enroll an iOS device with Workspace ONE UEM and deploy device profiles to add restrictions and change the behavior of your iOS devices.
  • Module 3 - Introduction to Apple macOS Management (45 minutes) (Intermediate)  Explore key Workspace ONE UEM administration features and concepts available for the macOS platform. This module gives you a better understanding of how macOS devices are enrolled, what management options are available, and how these options can improve and impact the user experience by configuring macOS and publishing applications.
  • Module 4 - Introduction to Android Management (30 minutes) (Beginner) This lab module focuses on introducing the concepts of Unified Endpoint Management (UEM) with Workspace ONE for the Android platform. Learn the fundamentals of Android, including how to enroll an Android device into Workspace ONE UEM and manage enrolled devices by configuring restrictions and pushing apps. Learn how Android Enterprise and Workspace ONE UEM secure your Android devices by using modern device management APIs.
  • Module 5 - Introduction to Workspace ONE Intelligent Hub and Hub Services (60 minutes) (Beginner) Learn the fundamental capabilities of the Workspace ONE Intelligent Hub app and how it simplifies enrollment for Workspace ONE UEM. Explore and configure Hub Services and Workspace ONE Access to expand the Intelligent Hub app feature set to provide a unified app catalog, Single Sign-On (SSO) capabilities, people search, and more.
  • Module 6 - Workspace ONE Intelligence - Introduction to Dashboards, Automation, and Reports (45 minutes) (Beginner) Explore the Workspace ONE Intelligence Console to view how Dashboards and Reports can provide deeper insights and customized inspection for your deployments at a glance. Configure Automation tasks and discover how to reduce your manual administrative workload, increase security and automate remediation.
  • Module 7- Securing the Anywhere Workspace with Secure Access Service Edge (SASE) (60 minutes) (Intermediate) Workspace ONE Tunnel enables secure access for mobile workers and devices. Users have a simple experience and need not enable or interact with Tunnel, and IT organizations may take a least-privilege approach to enterprise access, ensuring only defines apps and domains have access to the network. Tunnel provides industry-best security and builds on TLS 1.2+ libraries, implements SSL Pinning to ensure no MITM attacks, and includes client certificates on the allowlist to ensure identity integrity. Combined with explicit definitions of managed applications and integration with Workspace ONE compliance engine, Tunnel can help customers attain Zero Trust goals for their workforce.

Lab Principals:

  • Vernon Lihou, EUC Subject Matter Expert, EMEA
  • Mike Marx, Senior Competitive Technical Manager, USA

Lab Captains: 

  • Darren Weatherly, Senior Technical Marketing Architect, Australia
  • Pavitra Nagendrappa, Colleague Support Engineer, India

Associate Lab Captains:

  • Asitha Karunakaran, Member of Technical Staff, India

This lab manual can be downloaded from the Hands-on Labs Document site found here:

http://docs.hol.vmware.com

This lab may be available in other languages.  To set your language preference and have a localized manual deployed with your lab, you may utilize this document to help guide you through the process:

http://docs.hol.vmware.com/announcements/nee-default-language.pdf


 

Location of the Main Console

 

  1. The area in the RED box contains the Main Console.  The Lab Manual is on the tab to the Right of the Main Console.
  2. A particular lab may have additional consoles found on separate tabs in the upper left. You will be directed to open another specific console if needed.
  3. Your lab starts with 90 minutes on the timer.  The lab can not be saved.  All your work must be done during the lab session.  But you can click the EXTEND to increase your time.  If you are at a VMware event, you can extend your lab time twice, for up to 30 minutes.  Each click gives you an additional 15 minutes.  Outside of VMware events, you can extend your lab time up to 9 hours and 30 minutes. Each click gives you an additional hour.

 

 

Alternate Methods of Keyboard Data Entry

During this module, you will input text into the Main Console. Besides directly typing it in, there are two very helpful methods of entering data which make it easier to enter complex data.

 

 

Click and Drag Lab Manual Content Into Console Active Window

You can also click and drag text and Command Line Interface (CLI) commands directly from the Lab Manual into the active window in the Main Console.  

 

 

Accessing the Online International Keyboard

 

You can also use the Online International Keyboard found in the Main Console.

  1. Click on the Keyboard Icon found on the Windows Quick Launch Task Bar.

 

 

Click once in active console window

 

In this example, you will use the Online Keyboard to enter the "@" sign used in email addresses. The "@" sign is Shift-2 on US keyboard layouts.

  1. Click once in the active console window.
  2. Click on the Shift key.

 

 

Click on the @ key

 

  1. Click on the "@ key".

Notice the @ sign entered in the active console window.

 

 

Activation Prompt or Watermark

 

When you first start your lab, you may notice a watermark on the desktop indicating that Windows is not activated.  

One of the major benefits of virtualization is that virtual machines can be moved and run on any platform.  The Hands-on Labs utilizes this benefit and we are able to run the labs out of multiple data centers.  However, these data centers may not have identical processors, which triggers a Microsoft activation check through the Internet.

Rest assured, VMware and the Hands-on Labs are in full compliance with Microsoft licensing requirements.  The lab that you are using is a self-contained pod and does not have full access to the Internet, which is required for Windows to verify the activation.  Without full access to the Internet, this automated process fails and you see this watermark.

This cosmetic issue has no effect on your lab.  

 

 

Look at the lower right portion of the screen

 

Please check to see that your lab is finished all the start-up routines and is ready for you to start. If you see anything other than "Ready", please wait a few minutes.  If after 5 minutes your lab has not changed to "Ready", please ask for assistance.

 

Module 1 - Introduction to Windows 10 Management (30 minutes)

Introduction


Learn how to enroll a Windows 10 device into Workspace ONE UEM and how to configure and deploy restriction profiles and applications to your enrolled device.


 

Pre-Requisites

To successfully complete this Hands-On Lab, you'll need to ensure you have the following pre-requisites:

  • A virtual machine or spare Windows device running Windows 10 (non-Home edition) with the latest updates installed. 
  • DO NOT access the Hands-On Lab from the same machine you will be managing.
    NOTE - We have provided a Windows 10 VM for you which has all the prerequisites setup for this lab. We recommend you use that by following the instructions in the manual for this lab.
  • Administrative rights to the virtual machine or spare Windows device you will use to perform the Hands-On Lab.
  • A Windows 10 Desktop app (*.msi), such as 7-Zip.  A sample Windows 10 app has been provided in the lab machine for your use.


As a reminder, DO NOT access the Hands-On lab from the same machine you plan to enroll & manage as part of the HOL exercise. As part of the HOL, you will be rebooting this machine and temporarily lose access to the lab documentation if you run the lab from the device you enroll.

To complete this lab, we recommend you use a test device ONLY and avoid enrolling personal devices in the lab at all costs.

 

DO NOT Enroll Personal Windows 10 Devices


IMPORTANT: You SHOULD NOT enroll a personal Windows 10 device for the upcoming exercise! Personal devices may be enrolled into other EMM providers which can cause undesired conflicts and issues.

Please follow the upcoming steps to enroll and use the provided Win10-01a virtual machine for this Hands-on Lab.


IMPORTANT: You SHOULD NOT enroll any personal device(s) for the upcoming exercise! 

Personal devices may be enrolled into other UEM providers which can cause undesired conflicts and issues. - We want to avoid this!

To complete this lab, we recommend you use a test device ONLY and avoid enrolling personal devices in the lab. 


Connect to the Windows 10 Virtual Machine


<img src="assets/7a06722d-530a-42bb-a5ce-01f3fbf68012.png" height="127" width="113" />

Double-click the Win10-01a.rdp shortcut located on the Main Console Desktop to connect to the Windows 10 virtual machine.


 

Login to the Workspace ONE UEM Console


To perform most of the lab, you will log into the Workspace ONE UEM Admin Console.


 

Launch Chrome Browser

 

Double-click the Google Chrome shortcut located on the desktop of the virtual machine you are currently connected to.

 

 

Enter the Admin Username for the Workspace ONE UEM Admin Console

 

The default home page for the browser is https://hol.awmdm.com. Enter your Workspace ONE UEM Admin Account information and click the Login button.

  1. Enter your Username. This is the email address that you have associated with your VMware Learning Platform (VLP) account that you utilized to take Hands-on Labs.
  2. Click Next, then advance to the next step of the lab manual to enter the password, which will always be VMware1!.

NOTE - If you see a Captcha, please be aware that it is case sensitive!

 

 

Authenticate to the Workspace ONE UEM Console

 

The password field will be displayed after entering your username.

  1. Enter VMware1! for the Password field.
  2. Click the Log In button.

NOTE: Due to lab restrictions, you may need to wait here for a minute or so while the Hands On Lab contacts the Workspace ONE UEM Hands On Labs server.

 

 

Accept the End User License Agreement

 

You will be presented with the Workspace ONE UEM Terms of Use. Due to the lab environment the Terms of Use will not display, but this will not affect the lab itself. Click the Accept button.


NOTE: The following steps of logging into the Administration Console will only need to be done during the initial login to the console.

 

 

Address the Initial Security Settings

After accepting the Terms of Use, you will be presented with this Security Settings pop-up

 

The Password Recovery Question is in case you forget your admin password and the Security PIN is to protect certain administrative functionality in the console.  

  1. You may need to scroll down to see the Password Recovery Questions and Security PIN sections.
  2. Select a question from the Password Recovery Question drop-down (default selected question is ok here).
  3. Enter VMware1! in the Password Recovery Answer field.
  4. Enter VMware1! in the Confirm Password Recovery Answer field.
  5. Enter 1234 in the Security PIN field.
  6. Enter 1234 in the Confirm Security PIN field.
  7. Click the Save button when finished.

 

 

Console Highlights

 

A popup window will appear after you complete your security questions.

Click the 'X' in the upper right corner to close the Workspace ONE UEM Console Highlights window.

 

Create a Basic User Account


Basic accounts are the accounts which are created locally in the Workspace ONE UEM admin console, as opposed to the accounts which are imported from an active directory. In this section, we will create a Basic User account which we will use for enrollment in the following section.


 

Click on Add / User

 

In the top right corner of the Workspace ONE UEM console,

  1. Click Add.
  2. Click User.

 

 

Add User information

 

In the pop-up window,

  1. Ensure that security type is Basic
  2. Enter the username as basicuser
  3. Enter the password as VMware1!
  4. Confirm the password as VMware1!
  5. Enter the first name as Basic
  6. Enter the last name as User
  7. Enter the e-mail address as basicuser@corp.local
    NOTE: Use the scroll bar if you don't see the option to enter email address
  8. Click on Save

You should see a confirmation that user is created successfully. If the user is already created with the same username then you can use the existing user in the following section.

 

Activate Hub Services


The activation flow for Hub Services depends on whether you are a new customer or an existing customer.


 

New Customers to Workspace ONE

New cloud customers who purchased Workspace ONE after January 2019 have Hub Services activated automatically as part of the instance provisioning process. Workspace ONE UEM, Workspace ONE Access, and Hub Services consoles are connected together, and the Hub catalog is enabled for the Intelligent Hub app.

 

 

Existing Cloud Workspace ONE UEM Customers

Existing customers can configure Workspace ONE Access tenant URL, tenant admin username and password to activate Hub Services. If you do not have a Workspace ONE Access tenant, you can request one from the Workspace ONE UEM administrator console itself, using the Request a Cloud Tenant button.

For this lab, we have already provided you a Workspace ONE Access tenant which we will use in the next step to active Hub Services.

 

 

Accessing Your Tenant Details in the Workspace ONE UEM Console

A temporary Workspace ONE Access tenant has been generated for you to use throughout this lab.  The Workspace ONE Access tenant URL and login details were uploaded to the Content section in the Workspace ONE UEM Console at the start of the lab.

 

In the Workspace ONE UEM Console:

  1. Click Content
  2. Expand Content
  3. Click List View
  4. Find the text file named vIDM Tenant Details for your@email.shown.here.txt and click the checkbox beside it to select the file
  5. Click Download

 

Open the Downloaded Text File

 

After the file downloads, click the vIDM Tenant Details for your@email.shown.here.txt file from the download bar to open it.

Copy the Tenant URL

 

  1. Select the Tenant URL text and right-click
  2. Click Copy

NOTE: Your tenant name will match your Group ID in the Workspace ONE UEM Console.

 

Navigate to Workspace ONE Hub Services

 

  1. In the top right corner, click the My Services button
  2. Click on Workspace ONE Hub Services

 

 

Get Started

 

Click Get Started to begin the Hub Services activation process.

 

 

Activate Hub Services

 

  1. Right-click in the Tenant URL field and click Paste
  2. Ensure that you have entered the URL from the notepad file you downloaded in the earlier step. If the clipboard is blank or carrying some other value, go back and copy the tenant URL from the notepad file you downloaded earlier.
  3. Enter Administrator for the username
  4. Enter VMware1! for the password
  5. Click Test Connection
  6. Ensure that the the success message Test Connection Successful! is displayed
  7. Click Save to continue

 

 

Launch Hub Services

 

Ensure that the message confirming Hub Services has been successfully activated is displayed. You have now successfully Activated Hub Services for your tenant!

 

Enrolling Your Windows 10 Device with the Created Basic Account


You will now enroll the Windows 10 device in Workspace ONE UEM by using the Workspace ONE Intelligent Hub app.


 

Downloading the Workspace ONE Intelligent Hub app

 

NOTE: You do NOT need to complete these steps, the Workspace ONE Intelligent Hub has already been downloaded for you! This step is purely informative.

You can download the latest Workspace ONE Intelligent Hub app for your current platform by following the below steps:

  1. Navigate to https://www.getwsone.com in your browser.
  2. Click Download Hub for Windows 10.
  3. Click Keep when warned about the AirWatchAgent.msi download.

For expediency, the Workspace ONE Intelligent Hub app has already been downloaded for you. Continue to the next step to start the installer.

 

 

Launch the Workspace ONE Intelligent Hub Installer

 

  1. Click the File Explorer icon from the taskbar.
  2. Click Documents.
  3. Click HOL.
  4. Double-click the AirwatchAgent.msi file to start the installer.

NOTE: The installer may take a few seconds to launch, please be patient after clicking the AirwatchAgent.msi file.

 

Click Run

 

Click Run to proceed with the installation.

Accept the Default Install Location

 

Leave the default install location and click Next.

NOTE: The Next button may take several seconds to enable while the required additional features are installed.

Accept the License Agreement

 

  1. Select I accept the terms of the License Agreement.
  2. Click Next.

Start the Workspace ONE Intelligent Hub Install

 

Click Install to start the installer.

NOTE - The Installing Hub UI Component step may take several minutes to complete. Please do not interrupt the install!

Allow the Workspace ONE Intelligent Hub Installer to Run (IF NEEDED)

 

If prompted to allow the app to make changes on your device, click Yes. Otherwise, continue to the next step.

Complete the Workspace ONE Intelligent Hub Installer

 

NOTE: The installer may take several minutes to complete.  Please wait until you see the completed install screen before continuing.

Click Finish to complete the Workspace ONE Intelligent Hub installer.

NOTE: After clicking finish, the Native Enrollment application will launch to guide you through enrolling into Workspace ONE UEM.  It will take around 45-60 seconds to launch the agent.

 

Enroll Your Windows 10 Device Using the Workspace ONE Intelligent Hub

 

NOTE: The above screen may take 2-3 minutes to display after clicking Finish from the previous step!

  1. Enter hol.awmdm.com for the Server Address.
  2. Click Next.

 

Find your Group ID from Workspace ONE UEM Console

 

The next step is to make sure you know what your Organization Group ID is.  

  1. To find the Group ID, hover your mouse over the Organization Group tab at the top of the screen. Look for the email address you used to log in to the lab portal.
  2. Your Group ID is displayed at the bottom of the Organization Group pop up.

Enter Your Group ID

 

  1. Enter Your Group ID for the Group ID field.  If you forgot your Group ID, check the previous steps on how to retrieve it.
  2. Click Next.

Enter Your User Credentials

 

  1. Enter basicuser in the Username field.
    NOTE: This was the username of the basic user account you created in previous steps in the Workspace ONE UEM Console
  2. Enter VMware1! in the Password field.
  3. Click Sign In.

NOTE: Wait while the server checks your enrollment details. This may take a few minutes.

Accept Data Policy

 

Click I Agree.

Finish the Workspace ONE UEM Enrollment Process

 

Click Done to end the Enrollment process.  Your Windows 10 device is now successfully enrolled into Workspace ONE UEM!

View the Intelligent Hub App

 

Once the enrollment is completed, the Workspace ONE Intelligent Hub app will be displayed.  The Favorites and Apps tabs will be empty because we have not yet deployed any apps to your users and devices.

In the next steps, you will deploy two applications: Workspace ONE Assist and 7-Zip.  Workspace ONE Assist will be deployed and installed automatically to the end user's device, while 7-Zip will be an "on demand" app, meaning users can initiate the app download and install from the app catalog if and when they need access to 7-Zip.

Configuring a Device Profile for Windows 10


Profiles allow you to modify how the enrolled devices behave. This exercise helps you to configure and deploy a restrictions profile that we can verify has applied to the device later in the section.


 

Add a Profile

 

In the Workspace ONE UEM Administrator Console:

  1. Click Resources
  2. Expand the Profiles & Baselines section
  3. Click Profiles
  4. Click Add
  5. Click Add Profile

 

Add a Windows Profile

 

Select the Windows icon.

Note: Make sure that you select Windows and not Windows Rugged.

Add a Windows Desktop Profile

 

Select Windows Desktop.

Select Context - Device Profile

 

Select Device Profile.

Define the General Settings

 

  1. Select General if it is not already selected.
  2. Enter a profile name such as Windows Restrictions in the Name text box.
  3. Optionally enter Windows Restrictions into the Description field.
  4. Click in the Smart Groups field. This will pop-up the list of created Smart Groups. Select the All Devices Smart Group.
    Note: You may need to scroll down to view the Smart Groups field.

Note: You DO NOT need to click Save & Publish at this point. This interface allows you to move around to different payload configuration screens before saving.

Select the Restrictions Payload

 

NOTE: When initially setting a payload, a Configure button will show to reduce the risk of accidentally setting a payload configuration.

  1. Select the Restrictions payload in the Payload section on the left.
  2. Click the Configure button to continue setting the Restrictions payload.

Adding a Restriction - Disable End User Unenrollment

 

  1. Select Block for Allow MDM Unenrollment.
  2. Click Save & Publish.

NOTE: Some restrictions require a certain version of Windows or higher to apply to a device.  A few references are available for you to determine which version of Windows is required, including:

  • VMware Policy Builder: https://www.vmwarepolicybuilder.com
  • Configuration Service Provider (CSP) Reference: http://aka.ms/CSPList
  • Whats New in MDM Enrollment and Management: https://docs.microsoft.com/en-us/windows/client-management/mdm/new-in-windows-mdm-enrollment-management

Publish the Restrictions Profile

 

A preview of devices that will receive this profile based on the assigned smart groups is shown. Click Publish.

 

Verify the Restrictions Profile Now Exists

 

You should now see your Restrictions Profile within the List View of the Devices Profiles window.

Note: If you need to edit the Restrictions Profile, this is where you would do so. To edit the profile, click the profile name, then select Add Version. Update the profile and click Save & Publish to push the new settings to the assigned devices.

 

Delivering On Demand Apps on Windows 10


There are two ways to distribute applications: On Demand and Auto.

  • On Demand allows users to initiate the download and install of an app presented in the Intelligent Hub app catalog when they decide that they need access to the app.  
  • Auto will download and install the app automatically on the device without requiring the user to interact with the app from the Intelligent Hub app catalog.

This exercise will show how to deploy the 7-Zip executable as an On Demand app.


 

Add Internal Application

 

In the Workspace ONE UEM Administrator Console:

  1. Click Resources
  2. Expand the Apps section
  3. Click Native
  4. Click Add
  5. Click Application File

 

 

Upload Application

 

Click Upload.

 

Find the Application Installer

 

Click the Choose File button.

Upload the 7-Zip EXE File

 

  1. Click Documents.
  2. Click HOL.
  3. Select the 7z1604-x64 executable file.
  4. Click Open.

Save the EXE File

 

Click Save.

NOTE: The app upload may take a few minutes to complete! Continue to the next step once the upload completes. If you see "An error has occurred HTTP Status Code 0" please try the upload again as internet bandwidth is variable.

Continue to the App Settings

 

  1. Select No for Is this a dependency app?
  2. Click Continue.

 

Configure App Details

 

  1. Enter a name for your application: 7-Zip. This name will be displayed in the app catalog to your users.
  2. Select 64-bit for the Supported Processor Architecture.

 

Configure Application Files

 

  1. Select the Files tab.
  2. Scroll down to find the App Uninstall Process section.
  3. Enter the following for Uninstall Command: 7z1604-x64.exe /Uninstall

NOTE: Remember that you can copy and paste text from the manual into the lab to avoid typing mistakes!

NOTE: For more information about copying text from the manual, see the Guidance section.

Select Deployment Options

 

  1. Select Deployment Options.
  2. Scroll down until you see the option for Install Command.
  3. Enter Install Command as: 7z1604-x64.exe /S

NOTE: Remember that you can copy and paste text from the manual into the lab to avoid typing mistakes!

NOTE: For more information about copying text from the manual, see the Guidance section.

Add Identify Application Condition

 

  1. Scroll down to find the When To Call Install Complete section.
  2. Select Defining Criteria for Identity Application By.
  3. Click Add.

Configure the Install Complete Defining Criteria

 

  1. Select File Exists for the Criteria Type.
  2. Enter C:\Program Files\7-Zip\7zFM.exe for the Path.
  3. Click Add.

NOTE: Remember that you can copy and paste text from the manual into the lab to avoid typing mistakes!

NOTE: For more information about copying text from the manual, see the Guidance section.

 

Save and Assign the Application

 

Click Save & Assign.

 

Configure Assignment Distribution

 

  1. Enter All Devices for the Name.
  2. Click the Assignment Groups field.
  3. Select All Devices (your@email.shown.here) from the list.

Add Assignment Group and Push Mode

 

  1. Select On Demand for the App Delivery Method. This will make the app available to your assigned users in the app catalog.
  2. Enable the Display in App Catalog setting.
  3. Click Create.

Note: You now have the ability to choose if the app is displayed in the app catalog or not. This is helpful when deploying driver updates or scripted actions and don't want the end-user to see this in the catalog.

Save the Assignments

 

Click Save to save the app assignments.

Publish the Application

 

Click Publish to publish the application to the list of devices shown.

Confirm App Creation

 

The 7-Zip application has been created and assigned to the All Devices smart group as an On Demand app, meaning it will not be automatically installed on the end user device when it is enrolled. This allows the app to be installed by the end user through the app catalog or by an administrator through the Workspace ONE UEM administrator console.

Continue to the next step.

Delivering Auto Apps on Windows 10


You will now distribute an Auto app, which will automatically download and install the app to the user's device without requiring them to interact with the app within the Intelligent Hub app catalog.


 

Add Internal Application

 

In the Workspace ONE UEM Administrator Console:

  1. Click Resources
  2. Expand the Apps section
  3. Click Native
  4. Click Add
  5. Click Application File

 

 

Upload Application

 

Click Upload.

 

Find the Application MSI

 

Click the Choose File button.

Upload the Workspace ONE Assist MSI File

 

  1. Click Documents
  2. Click HOL
  3. Select the WS1_Assist_v21.03.msi file
  4. Click Open

Save the MSI File

 

Click Save.

NOTE: The app upload may take a few minutes to complete! Continue to the next step once the upload completes. If you see "An error has occurred HTTP Status Code 0" please try the upload again as internet bandwidth is variable.

Continue to the App Settings

 

  1. Select No for Is this a dependency app?
  2. Click Continue.

 

Configure App Details

 

Select 64-bit for the Supported Processor Architecture.

 

Confirm Deployment Options

 

  1. Select the Deployment Options tab.
  2. Scroll down to find the How To Install section.
  3. Notice that the Install Command and installer codes have been entered automatically from the details within the MSI, unlike when working with the EXE file previously.

Add Application Image

 

  1. Click the Images tab
  2. Click the Icon tab
  3. Click the area labeled Click or drag files here

Upload the Workspace ONE Assist Icon

 

  1. Click Documents
  2. Click HOL
  3. Click to select WS1_Assist_Icon.png
  4. Click Open

Proceed to Save and Assign

 

  1. Confirm that the Workspace ONE Assist icon was successfully uploaded
  2. Click Save & Assign

 

Save and Assign the Application

 

  1. Enter All Devices for the Distribution Name
  2. Click the Assignment Groups field
  3. Select the All Devices (your@email.shown.here) group

 

Configure App Delivery Method

 

  1. Select Auto for the App Delivery Method. This will automatically deploy and install the app for your users, making it available right away without any interaction with the app catalog.
  2. Enable the Display in App Catalog setting.
  3. Click Create.

NOTE: You now have the ability to choose if the app is displayed in the app catalog or not. This is helpful when deploying driver updates or scripted actions and don't want the end-user to see this in the catalog.

Save the Assignments

 

Click Save to save the app assignments.

Publish the Application

 

Click Publish to publish the application to the list of devices shown.

Confirm App Creation

 

The Workspace ONE Assist application has been created and assigned to the All Devices smart group and the App Delivery Method was set to Auto, meaning the app will be automatically downloaded and installed without requiring any user interaction when a Windows 10 device is enrolled into the organization.  

Continue to the next step.

Validate Device Enrollment


Your device was enrolled and received three configurations:

  1. A Restriction Profile which prevents end users from unenrolling the Windows 10 device
  2. The 7-Zip app was deployed as an On Demand app
  3. The Workspace ONE Assist app was deployed as an Auto app

You will now confirm that the Restriction Profile was installed by verifying that the restrictions are applied on your device and that the two apps are available according to their deployment type (On Demand vs. Auto).


 

Review New Unenrollment Settings

 

  1. Click the Windows Start button
  2. Click the Windows Settings button

 

Accounts

 

Click on Accounts.

Access Work or School

 

  1. Click on Access work or school.
  2. Click on Connected to Workspace ONE MDM.

End-User Can&#39;t Unenroll

 

  1. Click Disconnect.

Notice, the end-user now does not have the ability to unenroll their device from Workspace ONE UEM management.

Before and After Restrictions

 

Here you can see the before and after results of applying the Allow or Don't Allow MDM Unenrollment policy on the Windows 10 device.

 

Confirm Applications

 

  1. Click the Workspace ONE Intelligent Hub app from the task bar.
  2. Click the Apps tab to view the app catalog.
  3. Click Refresh to view the new apps that have been made available.
  4. Confirm that the 7-Zip and Workspace ONE Assist apps both display under the New Apps section.

 

Install the 7-Zip Application

 

Click the 7-Zip app.

Start the 7-Zip Install

 

Click Install.

Confirm the Install

 

  1. Click Install for the pop-up.  The status of the 7-Zip app will change to Installing.
  2. Click Home to return to the app catalog.

Monitoring the Install

 

  1. Click the Downloads button to open the Activity Monitor.
  2. The Activity Monitor allows you to view progress on your application downloads and if they have completed. Wait until both 7-Zip and Workspace ONE Assist finish installing, then continue to the next step.
  3. Click X to close the Activity Monitor.

Confirm the Apps Installed

 

  1. Click the Windows button.
  2. Confirm that both 7-Zip and Workspace ONE Assist appear under the Recently Added section. Feel free to launch the apps if you wish, then continue to the next step.

 

Validation Conclusion

You were able to confirm that the Restriction Profile took affect on the device as intended and that the two applications you made available, Workspace ONE Assist and 7-Zip, were presented to the user from the app catalog and were successfully installed!

 

Un-enrolling your Windows 10 Device


In this section, we are going to un-enroll our Windows 10 VM so that we can use it for other lab modules.

We will use the Enterprise Wipe wipe command to remove all of the managed content that was pushed to the device (such as profiles and apps) by Workspace ONE while not modifying any personal content or data on the device.


 

Enterprise Wipe from Workspace ONE UEM Console

 

Return to the Workspace ONE UEM Administrator Console in Google Chrome,

  1. Click on Devices
  2. Click on List View
  3. Select the check box next to your device friendly name.
  4. Click on More Actions
  5. Click on Enterprise Wipe

 

 

Enter PIN and Enterprise Wipe Device

 

  1. You may need to scroll down to find the Security PIN input
  2. Enter the Security PIN that you created when you first logged into the Workspace ONE UEM administration console, which was 1234. If you used a different PIN, enter that one instead.
  3. Click Delete

 

 

Validate Enterprise Wipe

 

NOTE: The Enterprise Wipe may take several minutes to process.

  1. Click the Refresh icon periodically to refresh the page to check if the Enterprise Wipe has processed
  2. If needed, scroll to the right to find the Enrollment column
  3. Notice that the Enrollment status for the device changes to Unenrolled once the Enterprise Wipe command is processed

 

 

Navigate to Windows 10 Settings

 

  1. Click on the Windows Icon
  2. Click on the gear icon to access Windows 10 Settings

 

 

 

Access Accounts Settings

 

From the Settings Menu, access Accounts

 

 

Validate That No Management Account Exists

 

  1. Click on Access work or school
  2. Validate that you DO NOT see any account connected to Workspace ONE MDM.

NOTE: The CORP AD domain is the local domain in this lab and is not controlled by Workspace ONE UEM Enrollment, so you will see this connection when your device is enrolled or unenrolled.

NOTE: If the Access Work or School page was opened from earlier, you may need to refresh or navigate away from the page and return to see the changes.

 

  1. Click the Connected to Workspace ONE UEM account
  2. Click Disconnect
  3. Click Yes

 

Return to the Main Console


<img src="assets/9af3b6f6-5b16-4a7f-a309-b5a387142b7e.png" height="34" width="586" />

Click Close (X) on the Remote Desktop Connection bar at the top of the screen to return to the Main Console to finish making configurations within the Workspace ONE UEM Console.


 

Summary


In addition to managing mobile devices, Workspace ONE UEM can also manage your Windows 10 devices.  This quick look into Windows 10 management should provide a clearer picture of how you can manage your Windows 10 devices by configuring restrictions and profiles and deploying applications alongside your mobile workforce.

This concludes the Basic Windows 10 Management module.


Level Up Your VMware End User Computing Knowledge with VMware Tech Zone


<img src="assets/71027dfc-017e-414a-af41-9f035e6b5be7.png" height="291" width="715" />

Interested in learning more about VMware End User Computing (EUC) but don't know where to start? Look no further than https://techzone.vmware.com, your fastest path to understanding, evaluating, and deploying VMware End User Computing products!

Tech Zone focuses on providing practical product guidance, curated activity paths, and technical content to take you from zero to hero!  Our mission at Tech Zone is to provide you with the resources you need to keep leveling up your knowledge no matter where you are in your digital workspace journey.

Interested? Check us out at https://techzone.vmware.com!


 

Module 2 - Introduction to Apple iOS Management (30 minutes)

Introduction


This lab module will focus on introducing the concepts of Unified Endpoint Management (UEM) with Workspace ONE. This lab will walk you through how to enroll an iOS device and deploy device profiles to configure your iOS devices to leverage UEM functionality.


DO NOT Enroll Personal iOS Devices


IMPORTANT: You SHOULD NOT enroll a personal device for the upcoming exercise! 

Personal devices may be enrolled into other UEM providers which can cause undesired conflicts and issues. 

To complete this lab, we recommend you use a test device ONLY and avoid enrolling personal devices in the lab. 


Login to the Workspace ONE UEM Console


To begin this lab, you will need to login to the Workspace ONE UEM admin console.


 

Launch Chrome Browser

 

Double-click the Google Chrome shortcut located on the desktop of the virtual machine you are currently connected to.

 

 

Log in to the Workspace ONE UEM Admin Console

 

  1. Click the WS1 bookmark folder.
  2. Click the WS1 UEM Console link.
  3. Enter your Username. This is the email address that you have associated with your VMware Learning Platform (VLP) account that you utilized to take Hands-on Labs.
            Note: Your password for the next step will be VMware1!
  4. Click Next.

 

 

Authenticate to the Workspace ONE UEM Console

 

The password field is displayed.

  1. Enter VMware1! in the Password field.
  2. Click the Log In button.

NOTE: You may need to wait here for a minute or so while the Hands On Lab contacts the Workspace ONE UEM Hands On Labs server.

 

 

Accept the Terms of Service

 

You will be presented with the Workspace ONE UEM Terms of Service. Click the Accept button.

NOTE: The following steps are only performed for the initial login to the administration console.

 

 

Address the Initial Security Settings

After accepting the Terms of Use, you will be presented with this Security Settings pop-up

 

The Password Recovery Question is in case you forget your admin password and the Security PIN is to protect certain administrative functionality in the console.  

  1. Scroll down to see the Password Recovery Questions and Security PIN sections.
  2. Select a question from the Password Recovery Question drop-down (default selected question is ok here).
  3. Enter VMware1! in the Password Recovery Answer field.
  4. Enter VMware1! in the Confirm Password Recovery Answer field.
  5. Enter 1234 in the Security PIN field.
  6. Enter 1234 in the Confirm Security PIN field.
  7. Click the Save button when finished.

 

 

Console Highlights

 

A popup window will appear after you complete your security questions.

Click the 'X' in the upper right corner to close the Workspace ONE UEM Console Highlights window.

 

Create a Device Restriction Profile


In this section, we will create a restriction profile that will disable the camera and disable Siri on the device. We will set the profile for auto-deployment, so that the profile is installed automatically when the device is enrolled.


 

Add A Profile

 

In the top right corner of the Workspace ONE UEM console,

  1. Click Add.
  2. Click Profile.

 

 

Select Platform

 

 

 

Select the Context

 

Click the Device Profile context option.

 

 

Configure General Payload

 

  1. Select General if not selected already
  2. Enter iOS Restriction Profile for the Name field
  3. Ensure the Assignment Type is Auto
  4. Click the Smart Groups dropdown field and select All Devices (your@email.shown.here)

 

 

Configure Restriction Payload

 

  1. Click on the Restrictions payload in the left panel.
  2. Click Configure.

 

 

Disable Camera and Siri

 

  1. Scroll down approximately one page to find the Allow Siri option.
  2. Uncheck the Allow Siri checkbox listed under the Device Functionality section. This will disable Siri on the device.
  3. Take note of the iOS version and Supervised requirements for each restriction. The target device receiving this restriction must on the listed iOS version or higher (ie: iOS 5) and must be Supervised if the Supervised tag is also shown.
    For example: The Allow Siri restriction does not require the device to be Supervised, but the Allow Manual Profile Installation restriction does. Take note of these requirements and ensure your devices meet all of the requirements shown when publishing restriction profiles.
  4. Click Save & Publish.

NOTE: Supervised devices give schools and business greater control over iOS device that they own. Supervising devices allows administrators additional device restrictions that are not possible with Bring Your Own Device (BYOD) scenarios to respect end user privacy.

 

 

Publish the Profile

 

Click Publish.

 

 

Validate profile creation

 

  1. Click Resources.
  2. Expand Profiles & Baselines.
  3. Click Profiles.
  4. Validate that you see iOS Restriction Profile in the Profiles List.

 

Validate Device Configuration Before Enrollment


<img src="assets/beb77dea-76f2-43d6-bed3-23e021445d0f.png" height="657" width="899" />

Before enrolling your device, confirm that Siri is available for use on your iOS app so you can confirm that the iOS Restriction Profile properly disables Siri once the device is enrolled in an upcoming step.

  1. Activate Siri on your device (holding the Home or Side button, depending on your device).
  2. If Siri is disabled, tap Turn On Siri.
  3. Ensure you see Siri is listening for input, confirming that Siri is enabled on the device.

 

iOS Device Enrollment using testuser


In this section, we are going to enroll an iOS device. The upcoming steps will need to be completed from an iOS device.


 

Download and Install Workspace ONE Intelligent Hub from App Store (IF NEEDED)

 

NOTE: Checked out devices will likely have the Workspace ONE Intelligent Hub already installed. You may skip this step if your device has the Workspace ONE Intelligent Hub installed.

At this point, if you are using your own iOS device or if the device you are using does NOT have the Workspace ONE Intelligent Hub Application installed, then install the application from the App Store.

To Install the Workspace ONE Intelligent Hub application from the App Store, open the App Store application and download the free Workspace ONE Intelligent Hub application.

 

 

Launching the Workspace ONE Intelligent Hub

 

Launch the Hub app on the device.  

NOTE: If you have your own iOS device and would like to test you will need to download the Workspace ONE Intelligent Hub app first.

 

 

Enter the Server URL

 

Once the Hub has launched you can enroll the device.  To do so, follow the below steps.

  1. Enter hol.awmdm.com for the Server field.
  2. Tap the Next button.

NOTE: If on an iPhone, you may have to close the keyboard by clicking Done in order to click the Continue button.

 

 

Find your Group ID in the Workspace ONE UEM Console

 

 Return to the Workspace ONE UEM Console,

  1. To find the Group ID, hover your mouse over the Organization Group tab at the top of the screen. Look for the email address you used to log in to the lab portal.
  2. Your Group ID is displayed at the bottom of the Organization Group pop up.

NOTE: The Group ID is required when enrolling your device in the following steps.

 

 

Attach the Workspace ONE Intelligent Hub to your Sandbox

 

Return to the Workspace ONE Intelligent Hub application on your iOS Device,

  1. Enter your Group ID for your Organization Group for the Group ID field.  Your Group ID was noted previously in the Finding your Group ID step.
  2. Tap the Next button.

NOTE: If on an iPhone, you may have to close the keyboard by clicking Done in order to click the Next button.

 

 

Enter User Credentials

 

You will now provide user credentials to authenticate to Workspace ONE UEM.

  1. Enter testuser in the Username field.
  2. Enter VMware1! in the Password field.
  3. Tap the Next button.

 

 

Skip Password Save

 

If prompted for password saving, click Not Now

 

 

Review privacy notice

 

The Workspace ONE Intelligent Hub will show a privacy message detailing what is collected and what is not collected from the device.  

The next step is to download the configuration profile to enroll your device into Workspace ONE UEM.

Tap Continue to begin.

 

 

Setup device profile

 

The next step is to download the configuration profile to enroll your device into Workspace ONE UEM.

Tap Download profile to begin.

 

Allow Website to Open Settings

 

When prompted that the website is trying to download a configuration profile, tap Allow.

Close Profile Downloaded Notification

 

When the Profile Downloaded notification is displayed, click Close.

 

Now that the profile is downloaded, tap Tap here when download finishes.  This will return you to the Intelligent Hub application where you will install the profile.

 

 

Install device profile

 

The next step is to Install the configuration profile to enroll your device into Workspace ONE UEM.

Tap Install profile to begin.

 

 

Open the Settings App

 

An instructional prompt will inform users how to finish their enrollment profile installation in the Settings app. Tap Open the Settings app to continue.

 

Open the Downloaded Profile

 

In the Settings app, tap the Profile Downloaded tab at the top of the Settings menu.

Install the Workspace ONE MDM Profile

 

  1. Tap Install in the upper right corner of the Install Profile dialog box.
    NOTE: If you have a passcode on your device, you will be prompted to input the passcode to continue.
  2. Tap Install for the pop-up prompt to confirm.

iOS MDM Profile Warning

 

You should now see the iOS Profile Installation warning explaining what this profile installation will allow on the iOS device.

Tap Install in the upper-right corner of the screen.

Trust the Remote Management Profile.

 

You should now see the iOS request to trust the source of the MDM profile.

Tap Trust when prompted at the Remote Management dialog.

iOS Profile Installation Complete

 

You should now see that the iOS Profile was successfully installed.

Tap Done in the upper right corner of the prompt.

 

Navigate to Workspace ONE Intelligent Hub

 

Your enrollment is now completed! Return to the Workspace ONE Intelligent Hub app.

 

Continue to Hub

 

 

You will see that the profile is not successfully configured.

  1. Tap Take me to Hub to continue.
  2. A Configuring Hub loading bar will display, wait for this to complete and then continue to the next step.

Accept Notifications for Hub (IF NEEDED)

 

Tap Allow if you get a prompt to allow notifications for the Hub app.

Skip the Introduction (IF PROMPTED)

 

Click Skip.

Confirm the Privacy Policy

 

Tap I Understand when shown the Privacy policy.

Accept the Data Sharing Policy

 

Tap I Agree for the Data Sharing policy.

 

Confirm the Device Enrollment in the Hub App

 

Confirm that the Hub app shows the user account (testuser) that you enrolled with..

You have now successfully enrolled your iOS device with Workspace ONE UEM! Continue to the next step.

 

Validate Device After Restriction Profile


You will now validate that the restriction profile for disabling Siri on the device is applying as expected. You will confirm the restriction profile in two ways:

  1. Inspecting the Mobile Device Management profile that was installed to the device in previous steps to confirm that the restriction is present.
  2. Attempting to interact with Siri on the device.

 

Validate the Restriction Profile in Settings

 

Tap the Settings app.

 

Navigate to Profiles &amp; Device Management

 

  1. Tap General.
  2. Scroll down to find the Profiles & Device Management option.
  3. Tap Profiles & Device Management.

Open the Device Manager Profile

 

Tap the Device Manager profile under Mobile Device Management.

Inspect Restrictions

 

Tap Restrictions to inspect the restrictions associated with this profile.

Confirm Siri Not Allowed Restriction

 

Confirm that the Siri not allowed restriction is included in the list.

 

Validate Siri is Disabled on the Device

Attempt to activate Siri on your device again by holding the home button and notice that Siri no longer responds.

If you navigate to the Settings app, you will also notice that the Siri & Search settings are no longer available on the device.

 

Un-enrolling Your iOS Device


You are now going to un-enroll the iOS device from Workspace ONE UEM.

NOTE: The term "Enterprise Wipe" does not mean reset or completely wipe your device. This only removes the MDM Profiles, Policies, and content which the Workspace ONE Intelligent Hub controls.

It will NOT remove the Workspace ONE Intelligent Hub application from the device as this was downloaded manually before the user enrolled in to Workspace ONE UEM.


 

Enterprise Wipe (Un-Enroll) Your iOS Device

 

Enterprise Wiping will remove all the settings and content that were pushed to the device after it was enrolled.  It will not affect anything that was on the device prior to enrollment.

Return to the Workspace ONE UEM Console,

  1. Click Devices
  2. Click List View
  3. Click the checkbox next to the device you want to Enterprise Wipe
  4. Click More Actions
  5. Click Enterprise Wipe

 

 

Enter your security PIN

 

After selecting Enterprise Wipe, you will be prompted to enter your Security PIN which you set after you logged into the Workspace ONE UEM console to 1234.

Enter 1234 for the Security PIN. You will not need to press enter or continue, the console will confirm your PIN showing "Successful" below the Security PIN input field to indicate that an Enterprise Wipe has been requested.  

NOTE: If 1234 does not work, then you provided a different Security PIN when you first logged into the Workspace ONE UEM Console.  Use the value you specified for your Security PIN.

NOTE: If the Enterprise Wipe does not immediately occur, follow the below steps to force a device sync:

  1. On your device, tap the Workspace ONE Intelligent Hub application
  2. Tap This Device
  3. Tap Send Data near the top of the screen.  If this does not make the device check in and immediately un-enroll, continue to Step #4.
  4. If the above doesn't make it immediately un-enroll, then tap Connectivity [Status] under Diagnostics.
  5. Tap Test Connectivity at the top of the screen.

NOTE: Depending upon Internet connectivity of the device and responsiveness of the lab infrastructure, this could take a couple of minutes or more if there is excessive traffic occurring within the Hands On Lab environment.

Feel free to continue to the "Force the Wipe" step to manually uninstall the Workspace ONE UEM services from the device if network connectivity is failing.

 

 

Verify the Un-Enrollment

 

Return to the device springboard. Notice that any applications pushed through Workspace ONE UEM  have been removed from the device.  In addition, navigating to Settings > General > Profiles will show that the Workspace Services profile has been removed from the device and any configurations pushed have been reverted.

NOTE: The Workspace ONE Intelligent Hub will still be on the device because that was downloaded manually from the App Store. Due to lab environment settings, it may take some time for the signal to traverse through the various networks out and back to your device. Continue on to the next step to force the wipe if the needed.

 

 

Force the Wipe - IF NECESSARY

 

If your device did not wipe, follow these instructions to ensure the wipe is forced immediately. Start by opening the iOS Settings app.

  1. Tap General in the left column.
  2. Scroll down to view the Device Management option.
  3. Tap Device Management at the bottom of the list of General settings.

 

Force the Wipe - IF NECESSARY

 

Tap the Device Manager profile that was pushed to the device.

Force the Wipe - IF NECESSARY

 

  1. Tap Remove Management on the Workspace Services profile
    NOTE: If prompted for a device PIN, enter it to continue
  2. Tap Remove on the Remove Management prompt

After removing the Device Manager profile, the device will be un-enrolled.  Feel free to return to the Verify the Un-Enrollment step to confirm the successful un-enrollment of the device.

Validate Device after Un-Enrolling


Once the device has unenrolled, the restrictions that you pushed to disable Siri will be removed but will not modify any other aspects of your device.  Attempt to activate Siri again and confirm that Siri is now working.


Summary


Managing your devices with Workspace ONE UEM empowers your administrators to ensure devices are operating and accessing corporate resources securely without violating user privacy.  Now that you know how to enroll a device and push a profile, consider exploring the other lab topics available in this module to further expand your Workspace ONE UEM knowledge.

This concludes the Introduction to Apple iOS Management module.  


Note that this Hands-On Lab does not cover the full breadth and capabilities for managing iOS and tvOS with Workspace ONE.   Please see VMware's TechZone for videos, blogs, and documentation that can help you with advanced topics in iOS/tvOS management, such as:

  • Apple Business Manager and Automated Device Enrollment
  • Device Staging and Enroll-on-Behalf
  • Volume Purchased Application Deployment
  • Kiosk Mode
  • Certificates and Identity/Directory Integration
  • Productivity Apps
  • Check-In, Check-Out
  • Unified App Catalog and Single Sign-On via Hub Services and VMware Access
  • Apple Education Integration (e.g Apple School Manager
  • ... and More!

Level Up Your VMware End User Computing Knowledge with VMware Tech Zone


<img src="assets/71027dfc-017e-414a-af41-9f035e6b5be7.png" height="291" width="715" />

Interested in learning more about VMware End User Computing (EUC) but don't know where to start? Look no further than https://techzone.vmware.com, your fastest path to understanding, evaluating, and deploying VMware End User Computing products!

Tech Zone focuses on providing practical product guidance, curated activity paths, and technical content to take you from zero to hero!  Our mission at Tech Zone is to provide you with the resources you need to keep leveling up your knowledge no matter where you are in your digital workspace journey.

Interested? Check us out at https://techzone.vmware.com!


 

Module 3 - Introduction to Apple macOS Management (45 minutes)

Introduction


In this lab module, we will explore some Workspace ONE administration features and concepts available for the macOS platform.  This lab will give you a better understanding of how macOS devices are enrolled, what management options you have available, and how these options can improve and impact the user experience by configuring macOS and publishing applications.

Before you can start the lab, make sure you review the next page to ensure you can successfully complete the lab.


 

Pre-Requisites

To successfully complete this Hands-On Lab, you'll need to ensure you have the following pre-requisites:

  • An Apple device running macOS version 10.14.0 (Mojave) or later.

 

DO NOT Enroll Personal macOS Devices


IMPORTANT: You SHOULD NOT enroll a personal device for the upcoming exercise! 

Personal devices may be enrolled into other UEM providers which can cause undesired conflicts and issues. 

To complete this lab, we recommend you use a test device ONLY and avoid enrolling personal devices in the lab. 


Login to the Workspace ONE UEM Console


To begin this lab, you will need to login to the Workspace ONE UEM admin console.


 

Launch Chrome Browser

 

Double-click the Google Chrome shortcut located on the desktop of the virtual machine you are currently connected to.

 

 

Log in to the Workspace ONE UEM Admin Console

 

  1. Click the WS1 bookmark folder.
  2. Click the WS1 UEM Console link.
  3. Enter your Username. This is the email address that you have associated with your VMware Learning Platform (VLP) account that you utilized to take Hands-on Labs.
            Note: Your password for the next step will be VMware1!
  4. Click Next.

 

 

Authenticate to the Workspace ONE UEM Console

 

The password field is displayed.

  1. Enter VMware1! in the Password field.
  2. Click the Log In button.

NOTE: You may need to wait here for a minute or so while the Hands On Lab contacts the Workspace ONE UEM Hands On Labs server.

 

 

Accept the Terms of Service

 

You will be presented with the Workspace ONE UEM Terms of Service. Click the Accept button.

NOTE: The following steps are only performed for the initial login to the administration console.

 

 

Address the Initial Security Settings

After accepting the Terms of Use, you will be presented with this Security Settings pop-up

 

The Password Recovery Question is in case you forget your admin password and the Security PIN is to protect certain administrative functionality in the console.  

  1. Scroll down to see the Password Recovery Questions and Security PIN sections.
  2. Select a question from the Password Recovery Question drop-down (default selected question is ok here).
  3. Enter VMware1! in the Password Recovery Answer field.
  4. Enter VMware1! in the Confirm Password Recovery Answer field.
  5. Enter 1234 in the Security PIN field.
  6. Enter 1234 in the Confirm Security PIN field.
  7. Click the Save button when finished.

 

 

Console Highlights

 

A popup window will appear after you complete your security questions.

Click the 'X' in the upper right corner to close the Workspace ONE UEM Console Highlights window.

 

Activate Hub Services


The activation flow for Hub Services depends on whether you are a new customer or an existing customer.


 

New Customers to Workspace ONE

New cloud customers who purchased Workspace ONE after January 2019 have Hub Services activated automatically as part of the instance provisioning process. Workspace ONE UEM, Workspace ONE Access, and Hub Services consoles are connected together, and the Hub catalog is enabled for the Intelligent Hub app.

 

 

Existing Cloud Workspace ONE UEM Customers

Existing customers can configure Workspace ONE Access tenant URL, tenant admin username and password to activate Hub Services. If you do not have a Workspace ONE Access tenant, you can request one from the Workspace ONE UEM administrator console itself, using the Request a Cloud Tenant button.

For this lab, we have already provided you a Workspace ONE Access tenant which we will use in the next step to active Hub Services.

 

 

Accessing Your Tenant Details in the Workspace ONE UEM Console

A temporary Workspace ONE Access tenant has been generated for you to use throughout this lab.  The Workspace ONE Access tenant URL and login details were uploaded to the Content section in the Workspace ONE UEM Console at the start of the lab.

 

In the Workspace ONE UEM Console:

  1. Click Content
  2. Expand Content
  3. Click List View
  4. Find the text file named vIDM Tenant Details for your@email.shown.here.txt and click the checkbox beside it to select the file
  5. Click Download

 

Open the Downloaded Text File

 

After the file downloads, click the vIDM Tenant Details for your@email.shown.here.txt file from the download bar to open it.

Copy the Tenant URL

 

  1. Select the Tenant URL text and right-click
  2. Click Copy

NOTE: Your tenant name will match your Group ID in the Workspace ONE UEM Console.

 

Navigate to Workspace ONE Hub Services

 

  1. In the top right corner, click the My Services button
  2. Click on Workspace ONE Hub Services

 

 

Get Started

 

Click Get Started to begin the Hub Services activation process.

 

 

Activate Hub Services

 

  1. Right-click in the Tenant URL field and click Paste
  2. Ensure that you have entered the URL from the notepad file you downloaded in the earlier step. If the clipboard is blank or carrying some other value, go back and copy the tenant URL from the notepad file you downloaded earlier.
  3. Enter Administrator for the username
  4. Enter VMware1! for the password
  5. Click Test Connection
  6. Ensure that the the success message Test Connection Successful! is displayed
  7. Click Save to continue

 

 

Launch Hub Services

 

Ensure that the message confirming Hub Services has been successfully activated is displayed. You have now successfully Activated Hub Services for your tenant!

 

Activate macOS Hub App Catalog


When you activate Hub Services with your Workspace ONE UEM tenant, the unified app catalog available in Hub Services will be used in the Intelligent Hub app on enrolled devices. One additional setting is needed to activate the modern unified app catalog with Hub Services - you will need to disable the legacy catalog for macOS.

In this section, you are going to activate the Hub App Catalog for macOS.


 

Navigate to Catalog Settings

 

In the Workspace ONE UEM Console

  1. Click Groups & Settings
  2. Click All Settings

 

 

Override the Legacy Catalog Settings

 

  1. Click Apps
  2. Click Workspace ONE
  3. Click AirWatch Catalog
  4. Click General
  5. Click Publishing
  6. Select Override for Current Setting
  7. Select Disabled for Legacy Catalog (macOS)

This will disable the older web clip based Catalog for the macOS platform. Instead, users will receive the new Hub App Catalog which provides an updated app catalog with richer features, but also includes features such as notifications, people search, a custom home page, and more.

 

 

Save Changes

 

  1. Scroll down to the bottom
  2. Click Save
  3. Click the X to close the Settings window

 

Create Profiles


This exercise explores how to modify the macOS device behavior using Profiles.

Profiles are the mechanism by which Workspace ONE UEM manages settings on a macOS device.  macOS profile management is done in two ways: device level and enrollment-user level. You can set appropriate restrictions and apply appropriate settings regardless of the logged-on user. You can also apply settings specific to the logged-on user on the device. 

All profiles are broken down into two basic sections, the General section and the Payload section.

  • The General section has information about the Profile, its name and some filters on what device will get it.
  • The Payload sections define actions to be taken on the device.

Every Profile must have all required fields in the General section properly filled out and at least one payload configured.

Device Profiles are typically used to control settings that apply system-wide.  Device profiles can include items such as VPN and Wi-Fi configurations, Global HTTP Proxy, Disk Encryption, and/or Directory (LDAP) integration.

In this exercise, you will create a profile that disables various macOS System Preferences from being changed by the end user.


 

Add a macOS Profile

 

Return to the Workspace ONE UEM administration console in Google Chrome:

  1. Click Resources
  2. Expand Profiles & Baselines
  3. Click Profiles
  4. Click Add
  5. Click Add Profile

 

Select Profile Platform

 

Click macOS.

Select the Profile Context

 

There are two contexts for Profiles: User and Device. User Profiles will apply the configuration to only the logged in user on the device. Device Profiles will apply the configuration to the entire device.

Click Device Profile.

Configure General Payload

 

Configure the device profile as follows:

  1. Select the General payload if not already selected
  2. Enter macOS Device Restrictions for the profile name
  3. Select Auto for the Assignment Type
  4. Scroll down to view the Smart Groups field and click in the search box
  5. Select the All Devices (your@email.shown.here) group from the list

Each tab on the left is a "Payload". These represent different features or restrictions you can configure on the device with the selected platform and context of the Profile. You may have more than one Payload per Profile, but it is best practice to generally keep one Payload per Profile (excluding the General payload, which is required).

The configurations you have made with create a macOS device context profile that will be automatically assigned and applied to any macOS device that enrolls in your organization group.

Add the Restrictions Payload

 

  1. Click the Restrictions payload
  2. Click Configure

Clicking Configure will add the Restrictions payload to the Profile and allow you to determine what restrictions will be applied to the macOS device with this Profile.

Configure the Restrictions Payload

 

  1. Click the Preferences tab
  2. Enable the Restrict System Preference panes checkbox
  3. Select Disable Selected Items
  4. Enable the Accessibility checkbox
  5. Enable the Desktop & Screen Saver checkbox
  6. Click Save & Publish

This will prevent the end users from being able to access or change the Accessibility and Desktop & Screen Saver settings under System Preferences.

 

Preview and Publish Profile

 

  1. Normally, a list of devices that would receive this configuration would be displayed here. Since you have not enrolled a macOS device yet, no devices are displayed.
  2. Click Publish.

 

 

Confirm the Profile was Created

 

The macOS Device Restrictions profile is now added to the list of Profiles in your organization group. You can see how many Payloads (excluding General) are configured, the assignment type, and assigned groups.  If you need to edit the Profile, you would return to this view in order to make changes.

This Restrictions profile is now published and will be automatically assigned to any macOS device that enrolls in your organization group. You will confirm this Restrictions profile is applying on the device after enrolling a device in a later step.

 

Create Sensors


Sensors allow you to quickly and securely automate data collection from your endpoints with common scripting languages. macOS Sensors supports Bash, Python 3, and Zsh, and Windows Desktops support PowerShell.

This collected data can be used as conditions in the Freestyle Orchestrator feature to take action based on the condition and value of this data. You can learn more about Freestyle Orchestrator in Module 1 - Introduction to Freestyle Orchestrator. You can also use Workspace ONE Intelligence to create reports and dashboards based on your Sensor data.

In this section, you will create a Sensor for macOS which will query the type of processor that is used on the device.


 

Navigate to Sensors

 

The first time you access the Sensors page, an overview will be presented with a link to the VMware docs articles for macOS Sensors and Windows Desktop Sensors. Refer to these links for additional documentation around Sensors.

  1. Click Resources
  2. Click Sensors
  3. Scroll down to the bottom of the page
  4. Click Get Started

 

 

Add a macOS Sensor

 

  1. Click Add
  2. Click macOS

 

Add General Information

 

  1. Enter macos_cpu_arch for the Name
  2. Optionally enter Determine x64 (Intel) vs arm (M1) for the description
  3. Click Next

This sensor will be used to report if the device's CPU architecture is x64 (using the Intel chip) or arm (using the M1 chip).  

Enter the Sensor Details

 

  1. Select Zsh for the Language
  2. Select System for the Execution Context
  3. Select String for the Response Data Type

Copy and Paste the Sensor Code

 

This Sensor is setup to use the Zsh language and is targeting the System (Device-wide) execution context rather than the Current User context setting which will run against the currently logged in user of the device. The Response Data Type indicates what will be returned from the script: A String (text), Integer (number), Boolean (true/false), or Date Time.

In this case, the Sensor will read the CPU architecture, which will either be "x64" or "M1", so it is returning the value as a String.

  1. Click and drag to highlight the below code block, starting from #!/bin/zsh to echo $PROC, and drag and drop it the Code section to paste the necessary sensor code.
  2. Click Next.
<pre>#!/bin/zsh touch /tmp/cpu_arch.txt PROC=$(/usr/bin/uname -m) echo $PROC > /tmp/cpu_arch.txt echo $PROC</pre>

Save &amp; Assign the Sensor

 

You can optionally create variables to use with this script, but it is not needed for this use case. Click Save & Assign to proceed.

 

Assign a macOS Sensor

 

  1. Notice the warning stating that Employee Owned devices will be automatically excluded from Sensor assignments due to privacy reasons, as Sensors can query sensitive details from the device.
  2. Click New Assignment.

 

Assign to All Devices

 

  1. Enter All Devices for the Assignment Name
  2. Click the Select Smart Group field
  3. Select the All Devices (your@email.shown.here) group
  4. Click Next

For ease, you will deploy this sensor to all non-Employee Owned devices that enroll into your organization. In a real deployment, you could target specific Smart Groups that you wish to deploy this Sensor to.

Configure Deployment Triggers

 

  1. Select Periodically for the Triggers
  2. Click Save

You can select more than one trigger, so consider what would fit your user case best when creating Sensors in your organization.

 

Confirm Sensor Creation

 

  1. Your All Devices sensor is now created. If more than one Assignment was created, they would all show up here and you could use the left handlebar to re-arrange the Priority between them as necessary.
  2. Click Close to return to the Resources page.

You have now successfully created and assigned a macOS Sensor which will report back if the device's CPU architecture is "x64" (Intel) or "arm" (M1).  Once you enroll a device in later steps, you will view this sensor and confirm the value.

Sensors are powerful options for securely automating data collection for your endpoints. Consider what other use cases you could accomplish with sensors, and check our the macOS Sensors examples in the documentation for ideas.

 

Deploy a 3rd Party macOS Application (Internal Applications)


VMware integrates with the Open-Sourced "munki" project for third-party application management on enrolled macOS devices. Administrators can manage third-party (non-AppStore) software using the internal apps view in Workspace ONE UEM. The integration allows administrators to consume a global CDN for software delivery, without requiring the administrators to fully understand munki's inner workings and configuration.

In this exercise, you will enable the application catalog and deploy an Application to your device.


Note: Workspace ONE UEM also provides a second facility for delivering software/configurations and running scripts/commands on a macOS device. This method, known as Product Provisioning, is outside the scope of this exercise.   For more information, refer to Deploying Third-Party macOS Applications: VMware Workspace ONE Operational Tutorial on VMware TechZone.


 

Administrators can deliver software to macOS using multiple methods.  As a quick reference, VMware recommends using the following methods to deliver software to macOS devices:

  • Mac App Store Applications:   VMware recommends delivering any application that may be available on the Mac App Store be delivered as a Volume-Purchased app from Apple Business Manager.   Apps should be assigned via device-based licenses and set to auto-update if the application is not business-critical.
  • Non-Store Applications:   As much as possible, 3rd-Party applications which are not available through the app store should be delivered as an Internal Application (leveraging the underlying munki integration).  

 

 

Enable macOS Software Management

NOTE: The steps in this section have already been completed for you in the Hands-On Lab.  You DO NOT need to Enable Software Management as it has already been completed on your behalf.

Prior to deploying a macOS Application, VMware Workspace ONE UEM administrators must enable their environments for Software Management. The following items are pre-requisites for macOS Software Management:

  1. For On-Premise Installations, "File Storage" must be enabled (Settings > Installation > File Path).
  2. "Software Management" must be enabled (Settings > Devices & Users > Apple > Apple macOS > Software Management)
  3. VMware AirWatch Agent for macOS version 3.0 (or newer).   Note the best experience is provided via macOS Intelligent Hub.

Continue to the next step.

 

Access All Settings (REFERENCE ONLY)

 

NOTE: The steps in this section have already been completed for you in the Hands-On Lab.  You DO NOT need to Enable Software Management as it has already been completed on your behalf.

  1. Click Groups & Settings
  2. Click All Settings

Enable File Storage (REFERENCE ONLY)

 

NOTE: The steps in this section have already been completed for you in the Hands-On Lab.  You DO NOT need to Enable Software Management as it has already been completed on your behalf.

  1. Ensure you are at the Global Organization Group unless your particular setup requires configuring at child Organization Groups.  
  2. Expand Installation
  3. Click File Path
  4. Scroll the file paths screen and click Enabled for File Storage Enabled
  5. Enter the path of a file share accessible from your Device Services and Console servers.
  6. Click Disabled for File Storage Caching Enabled unless you have planned and sized your Device Services server accordingly.
  7. Click Enabled for File Storage Impersonation Enabled
  8. Enter the username credentials to impersonate in order to access the file storage path
  9. Enter the password for the impersonation user
  10. Confirm the password for the impersonation user
  11. Click Test Connection and ensure you see Connection Succeeded
  12. Click Save

Enable Software Management (REFERENCE ONLY)

 

NOTE: The steps in this section have already been completed for you in the Hands-On Lab.  You DO NOT need to Enable Software Management as it has already been completed on your behalf.

  1. Expand Devices & Users
  2. Expand Apple
  3. Expand Apple macOS
  4. Click Software Management
  5. Click Override
  6. Click Enabled for Enable Software Management
  7. Click Save
  8. Ensure settings are Saved Successfully

 

Prepare macOS Applications for Deployment

NOTE: These steps are optional as the necessary application files are included for you in the Hands-on Lab. If you wish to see how to extract the necessary files for app deployment on macOS, continue with these steps. If not, CLICK HERE to continue to uploading the app files.

NOTE: These steps require a macOS device.

In this section, you will download the Workspace ONE Admin Assistant tool and use it to prepare another 3rd-Party application for deployment.

 

Download Evernote

NOTE: These steps are optional as the necessary application files are included for you in the Hands-on Lab. If you wish to see how to extract the necessary files for app deployment on macOS, continue with these steps. If not, CLICK HERE to continue to uploading the app files.

NOTE: These steps require a macOS device.

 

On a macOS device, open Safari or a web browser of your choice.

  1. Enter https://evernote.com/download in the URL bar.  Press ENTER.
  2. Click Download.

The DMG file for Evernote will download to the Downloads folder.

Download the Workspace ONE Admin Assistant Tool

NOTE: These steps are optional as the necessary application files are included for you in the Hands-on Lab. If you wish to see how to extract the necessary files for app deployment on macOS, continue with these steps. If not, CLICK HERE to continue to uploading the app files.

NOTE: These steps require a macOS device.

 

In the same tab as you downloaded Skitch, paste the link in Safari to download the Workspace ONE Admin Assistant tool and press ENTER on the keyboard:   https://getwsone.com/AdminAssistant/VMwareAirWatchAdminAssistant.dmg

The DMG file will download to the Downloads folder.

Begin Installing Workspace ONE Admin Assistant Tool

NOTE: These steps are optional as the necessary application files are included for you in the Hands-on Lab. If you wish to see how to extract the necessary files for app deployment on macOS, continue with these steps. If not, CLICK HERE to continue to uploading the app files.

NOTE: These steps require a macOS device.

 

On the dock, perform the following:

  1. Click the Downloads folder.
  2. Click VMwareWorkspaceONEAdminAssistant.dmg.

Launch Installer Package

NOTE: These steps are optional as the necessary application files are included for you in the Hands-on Lab. If you wish to see how to extract the necessary files for app deployment on macOS, continue with these steps. If not, CLICK HERE to continue to uploading the app files.

NOTE: These steps require a macOS device.

 

Double-click the VMware Workspace ONE Admin Assistant.pkg file

Continue Installer

NOTE: These steps are optional as the necessary application files are included for you in the Hands-on Lab. If you wish to see how to extract the necessary files for app deployment on macOS, continue with these steps. If not, CLICK HERE to continue to uploading the app files.

NOTE: These steps require a macOS device.

 

Click Continue

Review and Continue Installer

NOTE: These steps are optional as the necessary application files are included for you in the Hands-on Lab. If you wish to see how to extract the necessary files for app deployment on macOS, continue with these steps. If not, CLICK HERE to continue to uploading the app files.

NOTE: These steps require a macOS device.

 

  1. Review the License Agreement and click Continue
  2. Click Agree.

Install the Admin Assistant Tool

NOTE: These steps are optional as the necessary application files are included for you in the Hands-on Lab. If you wish to see how to extract the necessary files for app deployment on macOS, continue with these steps. If not, CLICK HERE to continue to uploading the app files.

NOTE: These steps require a macOS device.

 

Click Install.

Enter Admin Credentials

NOTE: These steps are optional as the necessary application files are included for you in the Hands-on Lab. If you wish to see how to extract the necessary files for app deployment on macOS, continue with these steps. If not, CLICK HERE to continue to uploading the app files.

NOTE: These steps require a macOS device.

 

If prompted for administrative credentials, enter the credentials required to install.

  1. Enter the username for the device
  2. Enter the password for the device
  3. Click Install Software

Close the Installer

NOTE: These steps are optional as the necessary application files are included for you in the Hands-on Lab. If you wish to see how to extract the necessary files for app deployment on macOS, continue with these steps. If not, CLICK HERE to continue to uploading the app files.

NOTE: These steps require a macOS device.

 

  1. Click Close when the installer completes
  2. Click Move to Trash to clean up the installer

Launch VMware Admin Assistant Tool

NOTE: These steps are optional as the necessary application files are included for you in the Hands-on Lab. If you wish to see how to extract the necessary files for app deployment on macOS, continue with these steps. If not, CLICK HERE to continue to uploading the app files.

NOTE: These steps require a macOS device.

 

  1. Launch Launchpad
  2. Enter Workspace in the search bar
  3. Click Workspace ONE Admin Assistant

Drag and Drop Evernote

NOTE: These steps are optional as the necessary application files are included for you in the Hands-on Lab. If you wish to see how to extract the necessary files for app deployment on macOS, continue with these steps. If not, CLICK HERE to continue to uploading the app files.

NOTE: These steps require a macOS device.

 

  1. With the Workspace ONE Admin Assistant open, click the Downloads folder on the Dock.
  2. Click and Drag the Evernote DMG.
  3. Drag and Drop the Evernote DMG onto the Workspace ONE Admin Assistant app file upload section.

The Workspace ONE Admin Assistant Tool begins parsing the file to extract information necessary to deploy the software.

Monitor Process and Reveal Files

NOTE: These steps are optional as the necessary application files are included for you in the Hands-on Lab. If you wish to see how to extract the necessary files for app deployment on macOS, continue with these steps. If not, CLICK HERE to continue to uploading the app files.

NOTE: These steps require a macOS device.

 

  1. Monitor the progress of the parsing.  The result will change to a green checkmark when it is completed, which may take 15 - 30 seconds.
  2. In the pop-up window, click Reveal in Finder

Review Generated Files

NOTE: These steps are optional as the necessary application files are included for you in the Hands-on Lab. If you wish to see how to extract the necessary files for app deployment on macOS, continue with these steps. If not, CLICK HERE to continue to uploading the app files.

NOTE: These steps require a macOS device.

 

In the Finder window:

  1. Note the Path of the Output for the Evernote files:  ~/Documents/Workspace ONE Admin Assistant/Evernote-##.##.##
  2. Note the output from the Assistant tool as described below:
Evernote-##.##.##.dmg -- The Application has been packaged into a DMG file.   (Note: MPKG and PKG files will not be modified)
Evernote-##.##.##.plist -- A metadata file (referenced as the pkginfo.plist in munki documentation) which contains information used by the munki framework to determine how to install/uninstall the software
Evernote.png -- An icon image extracted from the app used for user-friendly display in the console and Workspace ONE app for macOS

All output for the Admin Assistant tool follows the convention ~/Documents/Workspace ONE Admin Assistant/{AppName-Version}.  At the time this lab was created, Evernote was at version 10.16.7 but may be different depending on when you take this lab.

 

Deploy a 3rd Party macOS Application

You will now use the provided Workspace ONE Assist dmg and plist files to upload Workspace ONE Assist as a 3rd party macOS application in Workspace ONE UEM.

 

Add an Application File

 

Return to the the Workspace ONE UEM Administrator Console in the Hands-on Lab interface:

  1. Click Resources
  2. Expand Apps
  3. Click Native
  4. Click the Internal tab
  5. Click Add
  6. Click Application File

Upload the Application File

 

Click Upload.

Choose File for Upload

 

Click Choose File.

Select the Assist PKG File

 

  1. Click Documents
  2. Click HOL
  3. Click macOS
  4. Click Assist-21.03.00.014.pkg
  5. Click Open

Upload the Assist PKG File

 

Click Save to upload the select Assist-21.03.00.014.pkg file.

NOTE: The pkg file may take 1-2 minutes to upload! Continue to the next step once the upload finishes.

Continue After Uploading Application

 

Click Continue.

Configure Deployment Type

 

  1. Select Full Software Management for the Deployment Type
  2. The Workspace ONE Admin Assistant for macOS can be downloaded from this page if needed. This is for informational purposes only, you do not need to download the Workspace ONE Admin Assistant as we have already reviewed how to utilize the app on a macOS device in previous steps.
  3. Click Upload to provide the Metadata file for this app.

Choose Metadata File

 

Click Choose File.

Select the Workspace ONE Assist plist File

 

  1. Click Documents
  2. Click HOL
  3. click macOS
  4. Click Assist-21.03.00.014.plist
  5. Click Open

Upload the Assist plist File

 

Click Save to upload the selected Assist-21.03.00.014 plist file.

Continue after Metadata File Upload

 

  1. The Assist metadata file is now uploaded.
  2. Click Continue.

Configure the Application

 

The Workspace ONE Assist application and corresponding metadata have been uploaded to Workspace ONE UEM!

  1. The Details tab contains the application ID, version, supported device models, and more. This information is gathered from the provided plist metadata. Feel free to review the Details and other tabs as desired but do not make any changes!
  2. Click the Images tab.

Configure an Application Icon

 

You will need to add an icon for the application, which will be displayed in the app catalog and on the user's device once installed. Click the click or drag files here area to upload an image.

Select the Assist Icon

 

  1. Click Documents
  2. Click HOL
  3. Click macOS
  4. The Workspace ONE Admin Assistant tool will also extract and provide an image to use. That image has been made available to you as Assist.png. Click Assist.png.
  5. Click Open

Confirm the Icon and Save

 

  1. You can preview the uploaded icon here.
  2. Click Save & Assign to configure which devices and users will receive the uploaded Workspace ONE Assist application.

Configure Application Assignment

 

The Application Assignment determines which users and devices will receive the Workspace ONE Assist and how the app will be delivered. You will create an assignment rule that will publish the application automatically (installs the app without requiring user input) to all devices in your organization.

  1. Enter a descriptive name for the assignment, such as All Devices.
  2. Click the Assignment Groups section to see a list of available assignment groups.
  3. Select All Devices (your@email.shown.here). This will cause the app to be distributed to all eligible devices enrolled in your organization.

Update App Delivery Method

 

  1. Select Auto for the App Delivery Method.
    Auto means the application will be published and installed on the device as soon as possible and without any user interaction needed. On Demand makes the app available to the device but does not begin an install, which can either be triggered by the user through the App Catalog or Self Service Portal or by an Administrator through the Workspace ONE UEM administration console.
  2. Keep the Display in App Catalog option as Enabled.
    This will show the Workspace ONE Assist app to the user in the app catalog, allowing them to install or reinstall the app if needed.
  3. Click Restrictions.

Enable App Restrictions

 

Restrictions can be applied to the assignment to change the behavior of the application.

  1. Click to enable the Remove on Unenroll restriction. This means that the Workspace ONE Assist app will be automatically removed from the user's device when the device is unenrolled (meaning it is no longer managed by Workspace ONE UEM).
  2. Click Create.

Save the App Assignment

 

  1. You can confirm and edit your Assignments from this view. You can have multiple assignments that can be ordered by priority to determine which one is applied to devices that overlap multiple assignment types. For this simple use case, you will just leverage the single assignment to apply to all macOS devices in your organization.
  2. Click Save.

Publish the Application

 

  1. A list of devices that will receive this app are displayed here. The list is empty because you have not yet enrolled a macOS device.
  2. Click Publish.

Confirm the Application was Published

 

The Workspace ONE Assist app is now published! Any macOS device enrolled into your organization will now automatically be assigned the Workspace ONE Assist app and it will install without user interaction. When the device is unenrolled, the app will automatically be removed from the device.

You can return to this view (Resources > Native > Internal) and click the Workspace ONE Assist app to make changes to it in the future as needed, such as updating the assignments, adding a new app version, etc.

Continue to the next step.

Configure Post-Enrollment Onboarding Experience


Administrators can now keep users informed on the device provisioning process after enrollment completes by enabling the post-enrollment onboarding experience in Workspace ONE UEM Intelligent Hub. After enrollment is finished, Intelligent Hub will display a new window which tracks all incoming application installs. Administrators can enable and customize the experience in the Workspace ONE UEM administrator console.

This feature requires Workspace ONE UEM 21.05 or later and and Workspace ONE Intelligent Hub 21.04 or later.


 

Enable Post-Enrollment Onboarding Experience

 

  1. Click Groups & Settings
  2. Click All Settings

 

Navigate to Enrollment Settings

 

  1. Expand Devices & Users
  2. Expand General
  3. Click Enrollment

Configure Optional Prompt

 

  1. Click the Optional Prompt tab
  2. Select Override for Current Setting to make changes

Configure the Post-Enrollment Onboarding Experience

 

  1. Scroll down to the bottom to find the macOS Settings
  2. Select Enabled for the Enable Post-Enrollment Onboarding Experience option, then scroll down.
  3. Leave the Welcome Header as the default Hello, {FirstName}, which will greet the user by their first name
  4. Update the Welcome Subheader to Welcome to ACME Corp
  5. Use the default Body Text or supply your own. Note that there is a 500 character count limit
  6. When configuring the fields, you can use the Plus (+) button to see supported Lookup Values for this field.  Lookup values, such as {FirstName}, will retrieve the value at runtime and replace it with the current value, allowing for easy dynamic variable retrieval.
  7. Click Save
  8. Click Close

The post-enrollment onboarding experience is now enabled and configured. This will provide a better user onboarding experience as users can easily track the progress on applications that are downloading and installing.  

Installing the Workspace ONE Intelligent Hub for macOS


NOTE: These steps require a macOS device. If you do not have a macOS device, you can follow these steps in the manual to see the end result.


In this exercise, you will download and install the Workspace ONE Intelligent Hub on a macOS device. 


 

Login to a macOS Device

NOTE: These steps require a macOS device. If you do not have a macOS device, you can follow these steps in the manual to see the end result.

 

Login to a macOS device as an administrator account.

 

 

Download the Workspace ONE Intelligent Hub

NOTE: These steps require a macOS device. If you do not have a macOS device, you can follow these steps in the manual to see the end result.

 

Open Safari or your preferred web browser.

  1. Enter  https://www.getwsone.com in the URL field, then press ENTER.
  2. Click Download Hub under the macOS section. The Workspace ONE Intelligent Hub installer begins to download and will save to the downloads folder by default.

 

Allow Downloads (IF NEEDED)

NOTE: These steps require a macOS device. If you do not have a macOS device, you can follow these steps in the manual to see the end result.

 

If prompted to allow downloads from getwsone.com, click Allow. Otherwise, continue to the next step.

 

Install the Workspace ONE Intelligent Hub

NOTE: These steps require a macOS device. If you do not have a macOS device, you can follow these steps in the manual to see the end result.

 

  1. Click the Downloads folder in the dock (next to the Trash Bin).
  2. Click the VMwareWorkspaceONEIntelligentHub.pkg file to begin the installer.

 

Continue at Introduction Screen

NOTE: These steps require a macOS device. If you do not have a macOS device, you can follow these steps in the manual to see the end result.

 

Click Continue.

Continue and Agree to Terms

NOTE: These steps require a macOS device. If you do not have a macOS device, you can follow these steps in the manual to see the end result.

 

  1. On the License page, click Continue. 
  2. Click Agree (to the license terms).

Begin Install

NOTE: These steps require a macOS device. If you do not have a macOS device, you can follow these steps in the manual to see the end result.

 

  1. Click Install.  You are now  prompted to enter the computers administrator credentials.
  2. Enter the username for the device.
  3. Enter the password for the device.
  4. Click the Install Software button.

NOTE: The install may take a few minutes, please be patient while the install completes.

Close and Move to Trash

NOTE: These steps require a macOS device. If you do not have a macOS device, you can follow these steps in the manual to see the end result.

 

 

  1. Click Close when the installer finishes.
  2. Click Move to Trash to move the installer to the trash.

Enroll a macOS Device


In this exercise, you enroll a macOS device into Workspace ONE UEM. Enrollment is the action that brings a device under management and control by Workspace ONE UEM. There are a number of ways to enroll the various platforms (macOS included), but for this exercise we cover a basic enrollment scenario.  


This enrollment flow is considered User-Approved per the functionality introduced in macOS High Sierra.


 

Begin macOS Enrollment Process

 

  1. When the Hub Notification displays, click Enroll Now to start the enrollment process.
  2. Alternatively, you can click the Hub Icon from the top bar and click Enroll Now to start the enrollment process.

 

 

Enter the Enrollment Server URL

 

  1. Enter hol.awmdm.com in the Email or Server Address field
  2. Click Next

Note: The Enrollment Wizard may take a small amount of time to launch based on the capabilities of the hardware or Virtual Machine. If you do not see the Enrollment Wizard immediately, be patient and wait for it to appear.

 

 

Find your Group ID in the Workspace ONE UEM Console

 

 Return to the Workspace ONE UEM Console,

  1. To find the Group ID, hover your mouse over the Organization Group tab at the top of the screen. Look for the email address you used to log in to the lab portal.
  2. Your Group ID is displayed at the bottom of the Organization Group pop up.

NOTE: The Group ID is required when enrolling your device in the following steps.

 

 

Enter Enrollment Server Details

 

  1. Enter your Group ID. This was documented in the previous steps titled Retrieve Your Group ID.
  2. Click Next.

 

 

Enter Enrollment Credentials

 

  1. Enter testuser for the enrollment username.
  2. Enter VMware1! for the password.
  3. Click Next.

 

 

Enable Device Management

 

Click Next to enable device management.

 

 

Install the Workspace Services Profile

 

 

 

 

After a few seconds, the Profiles System Preferences page will be displayed and prompt you to install the Workspace Services profile, which enrolls the device into mobile device management (MDM) with Workspace ONE UEM.

  1. Click Install for the Workspace Services profile.
  2. Click Install when prompted.
  3. Enter the username of the device user.
  4. Enter the password of the device user.
  5. Click Enroll.
  6. Click Close on the System Preferences window to close it.

 

 

Continue after Device Enrollment

 

Return to the Workspace ONE Intelligent Hub app and click Done when the installation completes.

 

 

Accept Privacy and Data Sharing Prompts

 

 

When prompted:

  1. Click I Understand for the Privacy Policy
  2. Click I agree for the Data Sharing Policy

 

 

Validate Mac Enrollment

Follow the next steps to verify that the Mac has been successfully enrolled.

 

In upper-right corner:

  1. Note the Workspace ONE icon in the menu bar. Click the icon to view the menu.
  2. Note the menu shows your device as Enrolled.

 

 

Key Takeaways

  • Agent-based macOS enrollment is streamlined and intuitive.
  • Workspace ONE UEM supports a number of enrollment methods for macOS devices: web-based, agent-based, staged (pre-installed agent), enrollment on-behalf, and enrollment using the Apple Device Enrollment Program.
  • Agent logs can be collected directly from the Workspace ONE Intelligent Hub.  This eases helpdesk troubleshooting by allowing end-user to quickly send diagnostic information to helpdesk and/or administrative users.

 

Validate Configurations on an Enrolled macOS Device


<img src="assets/3830ec3b-c364-4820-9a7f-2b2e0e8693db.png" height="643" width="1123" /><img src="assets/6a363593-f4de-4bba-af3b-1ce816de19e0.png" height="641" width="1118" />

The Workspace ONE Intelligent Hub will now display the onboarding settings that you configured previous in the Workspace ONE UEM administrator console.

  1. Confirm that the Header (Hello, {FirstName}), Subheader (Welcome to ACME Corp), and Body Text display your configured message for a personalized onboarding experience.
  2. The app installation progress is shown here.
  3. All apps that were configured to install on enrollment are shown in the Activity Monitor for easy and clear monitoring.
  4. Once the Workspace ONE Assist app finishes installing, click Get Started. Users can click Get Started at any point to continue to the Hub app catalog before everything is completed, but this provides a clear method for monitoring if their device is fully configured or not before they begin using it.

 

 

 

View Intelligent Hub App

 

The modern unified app catalog provided by Hub Services is displayed due to the configurations that you made. This enables the following features:

  • Favorites
  • Apps
  • For You (Notifications)
  • Support
  1. Click the Apps tab. A list of available apps are shown on this page for the user to interact with. This could include virtual apps made available through Horizon in addition to native apps!
  2. A list of filters are available based on the apps you have published to help the user find what they need.
  3. The Refresh button will reload the app catalog.
  4. The Activity Monitor can be viewed to track progress on new app installs that the user or administrator triggers on the device.
  5. Apps can be added to your Favorites for easy access. Click the star icon to add Assist as a Favorite App.

 

Other Intelligent Hub Features (Optional)

 

If desired, explore the other features in Intelligent Hub before continuing to the next step to verify the other configurations you published to the device.

  1. The Favorites tab shows a list of apps that you have marked as a favorite for quick access.
  2. The For You tab is a list of notifications sent by your administrators. This rich notifications can be configured in Hub Services. You can learn more about these notifications in the Introduction to Workspace ONE Intelligent Hub and Hub Services module.
  3. The Support tab provides a list of devices that are enrolled to your user account, a method for collecting logs, and configurable contact details to reach your administrators.

Continue to the next step when ready.

 

Validate the Workspace ONE Assist Install

 

 

  1. Open Launchpad
  2. Search for Assist
  3. Click the Assist app that was installed by Workspace ONE UEM
  4. After confirming that the app launches, click the Close button to close the app

This confirms that the Workspace ONE Assist app was successfully downloaded and installed on the device.

 

 

Validate the Restrictions Profile

 

  1. Open System Preferences.
  2. Confirm that the Desktop & Screen Saver and Accessibility options are disabled. This confirms that the Restriction Profile you created to block these configurations in System Preferences has successfully applied to the device.

NOTE: If these options are still accessible, you may need to close and re-open System Preferences.

 

 

Validate the Device Sensor

 

Return to the Workspace ONE UEM administrator console:

  1. Click Devices
  2. Click List View
  3. Click the enrolled macOS device to view the Device Details page

 

View the Device Sensors

 

  1. Click the Sensors tab
  2. Confirm that the macos_cpu_arch sensor that was created is displayed. A Sensor Value of either x86_64 (for Intel chips) or ARM (for M1 chips) will be displayed based on what your device's processor is.

 

If the Sensor has not processed on the device yet, you can force the Sensor to process by querying the Sensors on the device. You can skip this and proceed to the next step if your Sensor has already executed.

  1. Click More Actions
  2. Click Sensors
  3. Click Refresh periodically and check if the macos_cpu_arch sensor is reporting data after executing

 

Key Takeaways

This completes your verification of the configurations you made for your macOS device! In summary, you configured and confirmed the following:

  1. The Hub Services unified app catalog and other features were available on the device through the Intelligent Hub app
  2. The Restriction profile to block the Desktop & Screen Saver and Accessibility settings in System Preferences was successful
  3. The Sensor to detect the device's processor was deployed to the device and accessible from the Workspace ONE UEM administrator console
  4. The Workspace ONE Assist app was successfully uploaded and deployed to the device
  5. The custom Post-Enrollment Onboarding Experience was available on the device to help the user understanding if the onboarding process had been completed and what assets were included in onboarding

 

Enterprise Wipe a macOS Device


An Enterprise Wipe removes corporate data that was added to the device while leaving personal data intact. This can be used to retire devices from your organization or wipe lost devices to ensure that corporate apps and data are removed.


 

Initiate Enterprise Wipe

 

  1. From the toolbar in the device details header, select More Actions.
  2. Select Enterprise Wipe under the Management header in the drop-down menu.

 

 

Enter Security PIN to Confirm Wipe

 

  1. Scroll down until you see the section to Enter Security PIN.
  2. Enter your security PIN 1234 to initiate the Enterprise Wipe. If you provided another PIN at the beginning of the lab, provide that security PIN instead.

 

 

Confirm Enterprise Wipe

 

  1. Click Devices
  2. Click List View
  3. Scroll to the right to find the Enrollment column for the macOS device
  4. Confirm that the Enrollment column shows Unenrolled
  5. If the device is not Unenrolled yet, periodically click the Refresh button to check the status

The Enterprise Wipe may take a few minutes to complete. Once completed, the corporate data and apps that were pushed to the device will be removed while leaving the personal data intact.

Once the Enrollment column reports Unenrolled, continue to the next step.

 

Validate the Enterprise Wipe on the macOS Device


<img src="assets/8e7d95db-0e53-4227-915e-18a12709c7e7.png" height="657" width="671" />
  1. Open System Preferences.
  2. Confirm that the Desktop & Screen Saver and Accessibility settings are able to be configured again.

This confirms that the Restrictions Profile was removed when the device was unenrolled.


 

 

Verify Workspace ONE Assist Was Removed

 

  1. Open Launchpad
  2. Enter Assist in the search bar
  3. Confirm that Workspace ONE Assist is not in the returned list of apps

Since the Workspace ONE Assist app was pushed with the Remove On Unenroll restriction, Workspace ONE Assist will be removed from the device when it is unenrolled.

 

Summary


This lab covered basic macOS administration using VMware Workspace ONE UEM and a user-initiated enrollment workflow.  You enrolled your macOS device, created profiles, deployed an application, locked the device, used Custom Attributes and then enterprise wiped the content and settings from the device.  


Note that this Hands-On Lab does not cover the full breadth and capabilities for managing macOS with Workspace ONE.   Please see VMware's TechZone for videos, blogs, and documentation that can help you with advanced topics in macOS management, such as:

  • Apple Business Manager and Automated Device Enrollment
  • Device Staging and Enroll-on-Behalf
  • Volume Purchased Applications
  • Kiosk Mode
  • Certificates and Identity/Directory Integration
  • Mail Integration
  • ... and More!

Level Up Your VMware End User Computing Knowledge with VMware Tech Zone


<img src="assets/71027dfc-017e-414a-af41-9f035e6b5be7.png" height="291" width="715" />

Interested in learning more about VMware End User Computing (EUC) but don't know where to start? Look no further than https://techzone.vmware.com, your fastest path to understanding, evaluating, and deploying VMware End User Computing products!

Tech Zone focuses on providing practical product guidance, curated activity paths, and technical content to take you from zero to hero!  Our mission at Tech Zone is to provide you with the resources you need to keep leveling up your knowledge no matter where you are in your digital workspace journey.

Interested? Check us out at https://techzone.vmware.com!


 

Module 4 - Introduction to Android Management (30 minutes)

Introduction


Learn the fundamentals of Android Enterprise, including how to enroll an Android device into Workspace ONE UEM and manage enrolled devices by configuring restrictions and pushing apps. Learn how Android Enterprise and Workspace ONE UEM secure your Android devices by using modern device management APIs.


 

What is Android Enterprise?

What is Android Enterprise?

Android enterprise debuted with 5.0 Lollipop in 2014 as an optional solution manufacturers could add to their OS images in order to integrate a common set of device management and Enterprise Mobility Management (EMM) APIs. From 6.0 Marshmallow, it was no longer optional and has since been a mandatory component for all Google Mobile Service (GMS) certified manufacturers.

 

 

What does Android Enterprise Offer?

Android Enterprise offers a wide variety of rich features that cover numerous device management scenarios:

  • A rich Enterprise Mobility Management (EMM) experience.  This allows device administrators to send configurations, applications, and policies down to any Android Enterprise (AE) device, providing a secure method of managing devices and corporate data no matter where your devices are.
  • Work Profile mode for BYOD (Bring Your Own Device) scenarios, which allows for a device to have a separate work container from their personal apps and data.
  • Work-Managed mode (previously called device owner), which provides corporations a larger suite of options for securing corporate owned devices that are not intended for personal use.
  • Corporately Owned, Single Use (COSU) mode, which provides corporations with a kiosk-like experience.  The Work-Managed device is locked down in a Kiosk-like state, granting access to a few applications or resources instead of the entire underlying device operating system.
  • Corporate Owned, Personally Enabled (COPE) joins the Work Profile and Work-Managed modes to provide a fully managed device with personal space.
  • Zero-Touch Enrollment for out of the box Android 8.0 and higher devices, providing a streamlined enrollment experience for end users.
  • A corporate-managed Managed Google Play portal, allowing administrators to explicitly approve applications to an application store that can be accessed by end users.
  • Silent Application Installation without requiring a user provided Google account on the device.
  • App Configuration, enabling device administrators to deploy key-value pairs to managed applications to modify the end user experience.
  • Mandatory Device Encryption to ensure that your corporate resources are secured and protected on the device.

 

 

Understanding Device Management Scenarios

 

The above graphic shows the big picture differences between various device management scenarios.

Bring Your Own Device (BYOD):

  • Commonly used where employees or end users have their own personal devices that need access to corporate resources.
  • To avoid managing the end user's personal data or apps, a Work Profile can be deployed to keep the corporate apps and data separate from their personal apps and data.
  • This grants device administrators the ability to securely control access to corporate resources from a personal device without managing the full personal device.

Corporate Owned:

  • Commonly used where corporations own devices that are given to employees or end users to fulfill their role or task.
  • Work-Managed mode allows for the entire device to be managed and controlled, allowing for a wider range of configurations.
  • Work-Managed mode does not provide an un-managed personal space and should only be used for corporate owned devices.

Corporate Owned Single Use (COSU):

  • Commonly used where corporations own devices that are used as Kiosks or have Kiosk-like applications running on them.
  • Corporate Owned Single Use leverages Work-Managed mode to manage the entire device, but does not grant the end user access to the full underlying device operating system.

Corporate Owned, Personally Enabled (COPE):

  • Commonly used where corporations own devices that are given to employees or end users that permits some level of personal usage while still being corporately controlled.
  • Corporate Owned, Personally Enabled leverages a Work-Managed personal space for varying amounts of personal usage while employing a Work Profile to control corporate resources, data, and apps.
  • This joins the ideas of Work Profile and Work-Managed modes into a single device.

 

 

Different Enrollment Methods

In addition to providing different device management scenarios, there are also multiple ways in which devices can be enrolled into Android Enterprise.

 

Near-Field Communication (NFC) Enrollment

With the Near-Field Communication (NFC) bump method, a NFC programmer app is setup on a designated programmer device.  Subsequent devices are "bumped" into the programmer device to pass the necessary initial policies (such as Wi-Fi, device configurations, etc.) to the bumped device via NFC.

The process will vary slightly in terms of pre-applied settings, what agent is downloaded in order to enroll the device on the relevant platform, etc.  Workspace ONE UEM allows for the additional configuration of a named account to directly enroll the device against.

Hashtag (#) Enrollment or Device Policy Controller (DPC) Identifier Enrollment

This method was introduced in Android 6.0 Marshmallow.  When prompted to add or create an account on a freshly wiped (or directly from the box) device, rather than enter in a Google account, the administrator would type in afw#hub and then the device would download the Workspace ONE Intelligent Hub app and begin the enrollment process with the correct configurations.

QR Enrollment

 

By tapping on Welcome 6 times when the device boots into the setup Wizard, it will prompt the device to connect to Wi-Fi and start QR enrollment.

In Android 9.0 P, the QR payload is bundled into the system and therefore doesn’t require a download. This offers faster provisioning as the device no longer needs to connect to the internet to download the QR package and the ability to add Wi-Fi credentials to the QR code.

Zero-Touch Enrollment

Devices are purchased through authorized resellers, assigned to Workspace ONE UEM and then later, when the end-user first takes the device freshly out of the box, will be ready to enroll as a work-managed device straight away. With Zero-Touch enrollment, administrators can send enrolled and configured devices directly to end-users to authenticate with.

DO NOT Enroll Personal Android Devices


IMPORTANT: You SHOULD NOT enroll a personal device for the upcoming exercise! 

Personal devices may be enrolled into other UEM providers which can cause undesired conflicts and issues. 

To complete this lab, we recommend you use a test device ONLY and avoid enrolling personal devices in the lab. 


Login to the Workspace ONE UEM Console


To begin this lab, you will need to login to the Workspace ONE UEM admin console.


 

Launch Chrome Browser

 

Double-click the Google Chrome shortcut located on the desktop of the virtual machine you are currently connected to.

 

 

Log in to the Workspace ONE UEM Admin Console

 

  1. Click the WS1 bookmark folder.
  2. Click the WS1 UEM Console link.
  3. Enter your Username. This is the email address that you have associated with your VMware Learning Platform (VLP) account that you utilized to take Hands-on Labs.
            Note: Your password for the next step will be VMware1!
  4. Click Next.

 

 

Authenticate to the Workspace ONE UEM Console

 

The password field is displayed.

  1. Enter VMware1! in the Password field.
  2. Click the Log In button.

NOTE: You may need to wait here for a minute or so while the Hands On Lab contacts the Workspace ONE UEM Hands On Labs server.

 

 

Accept the Terms of Service

 

You will be presented with the Workspace ONE UEM Terms of Service. Click the Accept button.

NOTE: The following steps are only performed for the initial login to the administration console.

 

 

Address the Initial Security Settings

After accepting the Terms of Use, you will be presented with this Security Settings pop-up

 

The Password Recovery Question is in case you forget your admin password and the Security PIN is to protect certain administrative functionality in the console.  

  1. Scroll down to see the Password Recovery Questions and Security PIN sections.
  2. Select a question from the Password Recovery Question drop-down (default selected question is ok here).
  3. Enter VMware1! in the Password Recovery Answer field.
  4. Enter VMware1! in the Confirm Password Recovery Answer field.
  5. Enter 1234 in the Security PIN field.
  6. Enter 1234 in the Confirm Security PIN field.
  7. Click the Save button when finished.

 

 

Console Highlights

 

A popup window will appear after you complete your security questions.

Click the 'X' in the upper right corner to close the Workspace ONE UEM Console Highlights window.

 

Configuring Android Enterprise for Workspace ONE UEM


We will be covering some of the Android basic functionality.

When running on Android 5.0 Lollipop devices, Android Enterprise is built into the operating system with no need for an additional application.

To begin using Android Enterprise inside the Workspace ONE UEM Console, you need to register your enterprise with Google. This creates your Android Enterprise admin account which connects with Workspace ONE UEM to manage your enterprise devices. Users will not be able to use Android Enterprise features from their devices until registered with Workspace ONE UEM. The Android Enterprise setup wizard simplifies the process. To simplify your experience, this initial process has been done for you.   If you are interested in learning more about this process please talk to your Workspace ONE UEM Sales Engineer or Representative.

NOTE: Once a Google Admin Account is bound to Workspace ONE UEM, you cannot reuse this Google Admin for another organization.  Due to this limitation, you would be unable to use the Google Admin Account we have already bound to Workspace ONE UEM for this lab.


 

Open Settings (FOLLOW ALONG)

 

NOTE - The following changes have already been configured for you as part of the lab!

  1. Click Groups & Settings
  2. Click All Settings

 

 

Open Android Enterprise Configuration (FOLLOW ALONG)

 

NOTE - The following changes have already been configured for you as part of the lab!

  1. Click Devices & Users
  2. Expand Android
  3. Click Android EMM Enterprise
  4. Click Register with Google

 

 

Provide Google Admin Account (FOLLOW ALONG)

 

NOTE - The following changes have already been configured for you as part of the lab!

  1. Confirm you are logged into your Google Admin Account that you wish to associate with your Android Enterprise configuration.
    NOTE - Once you register a Google Admin Account to Android Enterprise, you cannot disassociate your Google Admin Account from that Organization.  Ensure the Google Admin Account shown is the account you wish to associate with your Organization!
  2. Click Get Started

 

 

Provide your Organization Details (FOLLOW ALONG)

 

NOTE - The following changes have already been configured for you as part of the lab!

  1. Enter your Organization Name.
  2. Check the Google Play Agreement checkbox.
  3. Click Confirm.

 

 

Complete Registration (FOLLOW ALONG)

 

NOTE - The following changes have already been configured for you as part of the lab!

Click Complete Registration to return to the Workspace ONE UEM Android Enterprise configuration

 

 

Confirm Android Enterprise Integration (FOLLOW ALONG)

 

NOTE - The following changes have already been configured for you as part of the lab!

Back in the Workspace ONE UEM Console,

  1. On the Android Enterprise Configuration page, scroll down until you see the Google Admin Console Settings and Google API Settings sections.
  2. Under Google Admin Console Settings, note that the account information you provided during the Android Enterprise configuration step is displayed here.
  3. Confirm that your Android Enterprise Registration Status is shown as Successful.
  4. Note that the Client ID and Google Service Account Email Address have been created and configured for you automatically.  No additional configurations with Android Enterprise or the Google Developers Console are required.

Your Organization Group is now successfully configured with Android Enterprise!

 

Device Enrollment with Android Enterprise (Work Profile)


In this section, we will be enrolling your device with Workspace ONE UEM and get it set up with Android Enterprise.

NOTE - The screenshots in this article will differ depending on the make and model of the Android device you are using.


 

Download the Workspace ONE Intelligent Hub (IF NEEDED)

 

If you do not have the Workspace ONE Intelligent Hub app on your device, you will need to download it the app before continuing.

To install the Workspace ONE Intelligent Hub app, you can open the Google Play Store app and download the free Workspace ONE Intelligent Hub app or navigate to https://www.getwsone.com in your device browser and follow the Get it on Google Play link to the Workspace ONE Intelligent Hub page in the Google Play Store.

 

 

Launching the Workspace ONE Intelligent Hub App

 

Launch the Hub app on the device.  

 

Provide the Workspace ONE UEM Server URL

 

  1. Enter hol.awmdm.com or the Server URL.
  2. Tap NEXT.

Allow Phone Permission for Hub (IF NEEDED)

 

Tap Allow.

Find your Group ID from Workspace ONE UEM Console

 

The next step is to make sure you know what your Organization Group ID is.  

  1. To find the Group ID, hover your mouse over the Organization Group tab at the top of the screen. Look for the email address you used to log in to the lab portal.
  2. Your Group ID is displayed at the bottom of the Organization Group pop up.

Attach the Workspace ONE Intelligent Hub to the HOL Sandbox

 

  1. Enter your Group ID for the Group ID field.  This was noted previously in the Finding your Group ID step.
  2. Tap NEXT.

Provide User Credentials

 

  1. Enter testuser for the Username field.
  2. Enter VMware1! for the Password field.
  3. Tap Continue.

Confirm the Privacy Policy

 

Tap I Understand for the Privacy Policy.

Accept the Data Sharing Policy

 

Tap I Agree for the Data Sharing Policy.

Accept the Terms and Conditions

 

Tap Agree.

Set Up the Android Enterprise Work Profile

 

Tap NEXT.

NOTE - This may take some time, please be patient while the Setup process completes.

(Optional) Device Encryption

 

If your device is encrypted, you will not see this page and can continue to the next step.

If your device is not encrypted, you will be prompted to encrypt it and must tap ENCRYPT to continue. Encrypting the device can take several minutes or potentially longer depending on the amount of data on the device.

Administrator Rights

 

Tap OK to confirm the Privacy Policy.

NOTE - Enrollment time may vary depending on your network connectivity. Typically, it takes around 1 minute to complete.  Please be patient while this process completes.

IMPORTANT - During the enrollment process, you will see several processing screens.  Please note that you do not need to interact with the device further until you see the Workspace ONE Intelligent Hub app confirming your enrollment (next page).

Confirm Device Enrollment

 

You have now completed enrolling your device using the Workspace ONE Intelligent Hub.  After the enrollment process completes, the Workspace ONE Intelligent Hub app will display the notification Congratulations! You have successfully enrolled your device.

You can now Exit the Workspace ONE Intelligent Hub app.

Badged Apps

 

On your Android device, you should now see the new Work applications. Android Enterprise apps are differentiated by an orange briefcase icon also referred to as Badged Apps.

In the Applications view, your Work apps and Personal apps are shown in a unified launcher.  For example, your device will show both a personal icon for Google Chrome and a separate icon for Work Chrome denoted by the badge. The Workspace ONE Intelligent Hub is badged and exists only within the Work Profile data space.

IMPORTANT - There is no control over personal apps nor will the Hub app have access to personal information. There are a handful of system apps that come with the Work Profile by default such as Work Chrome, Google Play, Google settings, Contacts and Camera.

Work Container

 

On some devices, you may also notice the Work container on your device depending on the OS version.  This Work container can be utilized for quick access to your Work (Badged) Apps.

Android Enterprise Profiles


In this section, we are going to create Android Enterprise profiles to modify devices restrictions and to assist in protecting sensitive data. Profiles serve many different purposes, from letting you enforce corporate rules and procedures to tailoring and preparing Android Enterprise capable devices for how they will be used.

IMPORTANT: If your device is enrolled with Android Enterprise, then ONLY Android Enterprise profiles will take effect on the device. Android device profiles will NOT take effect.


 

Restriction Profile Overview

Restriction profiles provide a second layer of device data protection by allowing you to specify and control how, when and where your employees use their devices. The Restriction profiles lock down native functionality of Android Enterprise devices and vary based on device enrollment.

 

 

Create a New Profile

 

In the Workspace ONE UEM Administrator Console,

  1. Click Resources
  2. Expand the Profiles & Baselines section
  3. Click Profiles
  4. Click Add
  5. Click Add Profile

 

Select the Android Platform

 

Click Android

Configure the General Settings

 

  1. Ensure the General payload is selected
  2. Enter Android Restrictions for the Name field
  3. Click Smart Groups to display the list of available assignments.
  4. Select the All Devices (your@email.shown.here) group.

Configure Restrictions

 

  1. Enter Restrictions in the payload search box
  2. Click the Restrictions payload
  3. Click Configure

Configure Screen Capture Restrictions

 

Uncheck the Allow Screen Capture checkbox for the Work Profile column.

Configure Camera Restrictions

 

  1. Scroll down to find the Applications section
  2. Uncheck the Allow Camera checkbox for the Work Profile column
  3. Click Save And Publish

Publish the Profile

 

Click Publish.

 

Verify the Android Enterprise Camera Restrictions

 

On your device, notice that after we push the profile your device will no longer have the badged camera application available but your personal side (unbadged) camera will still be available for usage. This confirms the camera restriction that you setup on the Workspace ONE UEM Android profile that was previously created.

  1. Search for camera on the device
  2. Before the profile takes affect, notice that the Camera work (badged) app exists alongside the personal (unbadged) app
  3. After the profile takes affect, notice that the Camera work (badged) app has been removed

NOTE - Due to lab network limitations, it may take a few minutes for the badged Camera application to be removed.  If you still see it on your device, please wait until the application is successfully removed.

 

 

Screenshot in a non-badged app

 

  1. Search for contacts on the device
  2. Open your Personal (non-badged) Contacts app
  3. Take a screen shot (Power button and volume down / Power Button + Home Button at the same time for 2 seconds), notice that the screenshot was successful.

NOTE - The shortcut to change screenshot may vary depending on your device model. Please see a lab assistant in case assistance is required.

 

 

Verify the Android Enterprise Screenshot Restriction

 

  1. Search for contacts on the device
  2. Open your Work (badged) Contacts app
  3. Take a screen shot (Power button and volume down / Power Button + Home Button at the same time for 2 seconds), notice that the screenshot was NOT successful.

This shows the screenshot restriction that we applied on the Workspace ONE UEM Android profile created previously.

 

Approving Applications


This section is designed to walk you through the process of approving applications for integration between Workspace ONE UEM and Android Enterprise. Applications that you push through the integration of Workspace ONE UEM and Android Enterprise have the same functionality as their counterparts from the Google Play Store. However, you can use Workspace ONE UEM features to add functionality and security to these applications.

  • To add convenience of use, configure the Send Application Configuration option. Application configurations allow you to pre-configure supported key-value pairs and to push them down to devices along with the application. Examples of supported values may include usernames, passwords, and VPN settings. Support values depends upon the application.
  • To add secure features, use Workspace ONE UEM profiles for Android Enterprise. Profiles allow you to set passcodes, apply restrictions, and use certificates for authentication.

 

Add Public Application

 

In the Workspace ONE UEM Administrator Console,

  1. Click Resources
  2. Expand Apps
  3. Click Native
  4. Click the Public tab
  5. Click Add Application

 

Search for Public Application

 

  1. Select Android from the Platform drop-down menu
  2. Select Search App Store for the Source
  3. Enter Workspace ONE Web in the Name text box
  4. Click Next

Select the Workspace ONE Web App

 

Click the Web - Workspace ONE app.

Selecting and Approving Apps

 

  1. Notice that the application is already marked as Approved. This is because the Android EMM Registration settings were configured at a parent level organization group and your organization group is inheriting these settings.  Apps only need to be approved once, which has already been done for you.
  2. Click Select to proceed.

Continue to the next step, or view the below steps to see the necessary approval steps for a new app.

IMPORTANT: The below steps are purely informative and can be skipped if desired. They are included to show the approval process for new applications.

 

 

 

 

  1. Click Approve for the desired app.
  2. Scroll through the list of items the app has access to.
  3. Click Approve.
  4. Review and select how you would like to handle new app permission requests. This allows you to choose between a manual approval or automatic approval if the app requests new permissions in the future from what we were displayed on the previous screen.  
  5. Click Save.

This process would then return the administrator to the first step in this process, allowing them to click Select and continue adding the desired app.

 

Publish Public App

 

Click Save & Assign.

 

Add Assignment Distribution

 

  1. Enter All Devices for the distribution Name
  2. Click in the Assignment Groups field
  3. Select the All Devices (your@email.shown.here) group

Configure Assignment

 

  1. Select Auto for the App Delivery Method.
  2. Click Create

Save and Publish Workspace ONE Web

 

Click Save.

Preview Assigned Devices and Publish

 

Click Publish.

Confirm Application Creation

 

Confirm that the Workspace ONE Web app was approved and created and assigned to the All Devices group.

Verify Work Apps


In the previous section, we learned how we can approve and push an Android application from the Workspace ONE UEM Console.  In this section, we will verify that Work apps installed correctly on our enrolled Android device.


 

Confirm the Published Workspace ONE Web Application Downloaded

 

Return to your testing Android device and confirm that the Workspace ONE Web application has downloaded and displays as a Work app.

NOTE - Depending on lab network traffic, you may need to wait several minutes for the download to complete.

Using this process, you can rapidly approve new applications and deploy them to your users.

 

 

Open the Badged Android Enterprise Play Store App

 

Open your Work Play Store application on your Android device.

NOTE - The screenshot may differ depending on device model and OS.

 

 

Accept Google Play Terms of Service (IF NEEDED)

 

If you are prompted with the Google Play Terms of Service, tap Accept. Otherwise, continue to the next step.

 

 

Open Play Store Menu

 

Tap the Menu button in the top-left corner.

NOTE - The screenshot may differ depending on device model and OS.

 

 

View Play Store Work Apps

 

Tap My Work Apps from the menu.

NOTE - The screenshot may differ depending on device model and OS.

 

 

Verify Workspace ONE Web Is Available As A Work App

 

  1. Tap Installed.
  2. Confirm that the Workspace ONE Web application is in your list of Work applications.  You may need to scroll down to find the application.

NOTE - The screenshot may differ depending on device model and OS.

The Workspace ONE Web app is listed as a Work app because it was approved as a Work app through the Workspace ONE UEM Console while adding and assigning the application to your users.  This streamlines and rapidly improves the process of approving and deploying Work apps to your Android devices!

 

Un-enrolling Your Android Device


You are now going to un-enroll the Android device from Workspace ONE UEM.

NOTE: The term Enterprise Wipe does not mean reset or completely wipe your device. This only removes the MDM Profiles, Policies, and content which the Workspace ONE Intelligent Hub app controls.

NOTE: The Enterprise Wipe will NOT remove the Workspace ONE Intelligent Hub application from the device as this was downloaded manually before Workspace ONE UEM had control of the device.


 

Enterprise Wipe (un-enroll) your Android device

 

Enterprise Wipe will remove all the settings and content that were pushed to the device when it was enrolled.  It will not affect anything that was on the device prior to enrollment.

To Enterprise Wipe your device, return to the Workspace ONE UEM Admin Console.

  1. Click Devices on the left column
  2. Click List View
  3. Click the link for the device that you enrolled

 

 

Find the Enterprise Wipe Option

 

  1. Click More Actions
  2. Click Enterprise Wipe under Management

 

 

Enter your security PIN

 

After selecting Enterprise Wipe, you will be prompted to enter your Security PIN which you set after your logged into the console (1234).

  1. Scroll down to the bottom of the Enterprise Wipe prompt.
  2. Note the optional field to send a reason to your end user stating why their Work Profile was removed.
  3. Enter 1234 for the Security PIN. You will not need to press enter or continue, the console will confirm your PIN showing "Successful" below the Security PIN input field to indicate that an Enterprise Wipe has been requested.  
    NOTE: If 1234 does not work, then you provided a different Security PIN when you first logged into the Workspace ONE UEM Console.  Use the value you specified for your Security PIN.

NOTE: If the Enterprise Wipe does not immediately occur, follow the below steps to force a device sync:

  1. On your device, open the Workspace ONE Intelligent Hub application.
  2. Tap This Device.
  3. Scroll down to the bottom and click Sync Device. This will force the device to check in to Workspace ONE UEM to be notified that it should be unenrolled.  Wait a moment a see if the command is processed, if not, skip to step #4.
  4. Tap Enrollment.
  5. Tap Unenroll Device. This allows you to process the Unenrollment command from the device manually.

NOTE: Depending upon Internet connectivity of the device and responsiveness of the lab infrastructure, this could take a couple of minutes or more if there is excessive traffic occurring within the Hands On Lab environment.

 

 

Confirming the Device was Un-Enrolled (Console)

 

  1. Click Devices
  2. Click List View
  3. Click the Refresh button on the Device List View screen.
  4. Check if the device is showing Unenrolled for the Enrollment status.  If not, continue to refresh the page until the device shows as Unenrolled.

NOTE: Depending on internet connectivity of the device, this could take a couple of minutes.

 

 

Confirm the Device was Un-Enrolled (Device)

 

On the device, notice that the badged apps are removed after the device is unenrolled and any configurations pushed to the device after enrollment has been removed.

 

Learn More about Android Enterprise


This is just a sampling of the functionality you will see with Android Enterprise integrated with Workspace ONE UEM. To learn more about features and functions please contact your VMware End User Computing representative or visit our website at http://www.workspaceone.com/ or the website for Android Enterprise at https://www.android.com/enterprise.


Summary


The work profile is designed specifically for personal (BYOD) devices. Using Android in the enterprise, Workspace ONE UEM creates a "Work profile", a container which separates the personal space and the corporate space in a device. Workspace ONE UEM can fully control the work profile but has zero control over the personal profile.


Level Up Your VMware End User Computing Knowledge with VMware Tech Zone


<img src="assets/71027dfc-017e-414a-af41-9f035e6b5be7.png" height="291" width="715" />

Interested in learning more about VMware End User Computing (EUC) but don't know where to start? Look no further than https://techzone.vmware.com, your fastest path to understanding, evaluating, and deploying VMware End User Computing products!

Tech Zone focuses on providing practical product guidance, curated activity paths, and technical content to take you from zero to hero!  Our mission at Tech Zone is to provide you with the resources you need to keep leveling up your knowledge no matter where you are in your digital workspace journey.

Interested? Check us out at https://techzone.vmware.com!


 

Module 5 - Introduction to Workspace ONE Intelligent Hub and Hub Services (60 minutes)

Introduction


Workspace ONE Intelligent Hub is VMware's next generation employee engagement application that allows you to securely access, discover, stay connected, and be productive from anywhere. It replaces the legacy Agent application and combines with Hub Services to enhance the identity, application, and enterprise mobility management capabilities offered by Workspace ONE. 


<img src="assets/71dd8a43-6ce4-49bf-95a0-c8252429eb7a.png" height="638" width="833" />

Intelligent Hub integrates a unified app catalog, access control, and application management on iOS, Android, macOS, Windows 10 and via a browser. The prerequisite for many of the Intelligent Hub features is to activate the Hub Services component within Workspace ONE Access. After Hub Services activation, you can customize Intelligent Hub features based on whether your deployment is integrated with Workspace ONE Access or not.


 

 

Hub Services without Workspace ONE Access

Without integrating with Workspace ONE Access, you can configure a Hub Catalog to allow access to native mobile apps and web apps, create a custom tab, and brand the Workspace ONE Intelligent Hub app to add your company's logo and color profile.

 

 

Hub Services with Workspace ONE Access

When Workspace ONE Access is integrated with Workspace ONE UEM, you can create a full digital workspace experience for users with additional Hub features, such as People Search and Notifications, and identity-related features, such as authentication and single sign-on.

In this lab, you will configure several of the features within Hub Services and view the result in the browser version of Intelligent Hub.

 

Login to the Workspace ONE UEM Console


To begin this lab, you will need to login to the Workspace ONE UEM admin console.


 

Launch Chrome Browser

 

Double-click the Google Chrome shortcut located on the desktop of the virtual machine you are currently connected to.

 

 

Log in to the Workspace ONE UEM Admin Console

 

  1. Click the WS1 bookmark folder.
  2. Click the WS1 UEM Console link.
  3. Enter your Username. This is the email address that you have associated with your VMware Learning Platform (VLP) account that you utilized to take Hands-on Labs.
            Note: Your password for the next step will be VMware1!
  4. Click Next.

 

 

Authenticate to the Workspace ONE UEM Console

 

The password field is displayed.

  1. Enter VMware1! in the Password field.
  2. Click the Log In button.

NOTE: You may need to wait here for a minute or so while the Hands On Lab contacts the Workspace ONE UEM Hands On Labs server.

 

 

Accept the Terms of Service

 

You will be presented with the Workspace ONE UEM Terms of Service. Click the Accept button.

NOTE: The following steps are only performed for the initial login to the administration console.

 

 

Address the Initial Security Settings

After accepting the Terms of Use, you will be presented with this Security Settings pop-up

 

The Password Recovery Question is in case you forget your admin password and the Security PIN is to protect certain administrative functionality in the console.  

  1. Scroll down to see the Password Recovery Questions and Security PIN sections.
  2. Select a question from the Password Recovery Question drop-down (default selected question is ok here).
  3. Enter VMware1! in the Password Recovery Answer field.
  4. Enter VMware1! in the Confirm Password Recovery Answer field.
  5. Enter 1234 in the Security PIN field.
  6. Enter 1234 in the Confirm Security PIN field.
  7. Click the Save button when finished.

 

 

Console Highlights

 

A popup window will appear after you complete your security questions.

Click the 'X' in the upper right corner to close the Workspace ONE UEM Console Highlights window.

 

Accessing Your Workspace ONE Access Tenant Details


Workspace ONE Intelligent Hub end-user services are configured via the Hub Services admin console.  Hub Services is co-located with Workspace ONE Access.  Think of Hub Services as the server-side component and Intelligent Hub as the end-user client.

The following sections will guide you through accessing your Workspace ONE Access tenant, logging in, then accessing the Hub Services admin console.


 

Accessing Your Workspace ONE Access Tenant Details in the UEM Console

A temporary Workspace ONE Access tenant has been generated for you to use throughout this lab.  The Workspace ONE Access tenant URL and login details were uploaded to the Content section in the Workspace ONE UEM Console at the start of the lab.

 

In the Workspace ONE UEM Console:

  1. Click Content on the far left
  2. Expand Content at the top
  3. Click List View
  4. Find the text file named vIDM Tenant Details for your@email.shown.here.txt and click the checkbox beside it to select the file
  5. Click Download

 

Open the Downloaded Text File

 

After the file downloads, click the vIDM Tenant Details for your@email.shown.here.txt file from the download bar to open it.

Copy the Tenant URL

 

  1. Select the Tenant URL text and right-click
  2. Click Copy

NOTE: Your tenant name will match your Group ID in the Workspace ONE UEM Console.

Log into Workspace ONE Access Admin Console


In this section, we login to the Workspace ONE Access admin console and access the Hub Services admin console.


 

Open a New Browser Tab

 

Click the Add Tab button in the browser to open a new tab.

 

 

Navigate to Your Workspace ONE Access Tenant URL

 

  1. Right-click inside the address bar in the new tab.
  2. Click Paste and go to the URL.

NOTE: This is the Workspace ONE Access tenant URL you received from the previous steps. If you did not copy or note this information from the previous step, return to those previous steps and note your Workspace ONE Access tenant URL.

 

 

Login to Your Workspace ONE Access Tenant

 

  1. Enter Administrator for the Username
  2. Enter VMware1! for the Password
  3. Click Sign In

 

 

Navigate to the Administrator Console

 

After logging in, you will see the Intelligent Hub User Portal as pictured above.  You will need to navigate to the Administrator Console.

  1. Click the User dropdown circle in the top-right corner.
  2. Click Workspace ONE Access Console.

This will open the Administration Console in a separate tab in your browser.

NOTE: If you do not see the above view, you are already in the Administration Console and can skip this step.

 

 

(Optional)Dismiss the Release Notes Banner

 

If you see a banner about Release Notes details, click OK on the far right to dismiss it.

 

Add a SaaS App to the App Catalog


We will add an example SaaS App to our app catalog to utilize in a later section.


 

Navigate to the Workspace ONE Access App Catalog and Add SaaS App

 

  1. Click the Catalog tab (Note: Do not click the down arrow in the Catalog tab. Instead just click Catalog.)
  2. Click the NEW button.
  3. Type Salesforce into the Search field.
  4. Click on Salesforce in the search results.

 

 

New SaaS App Definition Section

 

  1. Scroll down
  2. Click the NEXT button

 

 

New SaaS App Configuration Section

 

  1. Keep default settings and click NEXT

 

 

New SaaS App Access Policies Section

 

  1. Keep default access policy and click NEXT

 

 

New SaaS App Summary Section

 

  1. Click SAVE & ASSIGN

 

 

Assign New SaaS App to User

 

  1. Type administrator into the Users / User Groups search field
  2. Click administrator@System Domain in the search results
  3. Click SAVE

 

 

Confirm SaaS App Added to User&#39;s Catalog

 

  1. Click back to the second tab in the browser, which is the Intelligent Hub User Portal.
  2. Click the Apps tab to view the App Catalog.
  3. Click the refresh button in the browser to refresh the catalog. You will now see Salesforce in the App Catalog.

 

Navigate to Hub Services Admin Console and Complete Hub Templates Wizard


The following section will get you started in the Hub Services admin console and introduce you to Hub Templates.


 

Return to the Workspace ONE Access Admin Console

 

  1. Click the third tab in the browser to return to the Workspace ONE Access admin console.

 

 

Navigate to the Hub Services Admin Console

 

  1. Find the Catalog tab and click the down arrow
  2. Click on Hub Configuration

 

 

Launch Hub Services

 

  1. Click the LAUNCH button

 

 

Hub Templates Wizard

The 20.08 release of Hub Services had a significant addition to support wider adoption of Hub Services and Intelligent Hub features called Hub Templates.  Before 20.08, any Hub Services configurations for Intelligent Hub were all or nothing - all employees received the same configurations.  This limited the administrator’s ability to roll out features in phases or accommodate different teams or divisions.  Now admins can create one or more templates with unique Hub Services capabilities and assign them to UEM Smart Groups or Workspace ONE Access User Groups to control the Intelligent Hub experience for their employees.  Hub Templates is available with Hub Services 20.08 SaaS release and later and requires UEM 20.08 at minimum and at least the 20.08 version of the Intelligent Hub clients.

For environments that already have Hub Services enabled, after upgrading to 20.08, admins will see the migration wizard. The admin can choose whether to migrate the app catalog settings from the UEM console, or create new global settings.  

 

  1. This screen provides an introduction to Hub Templates. Scroll down to find the Next button.
  2. Click the Next button.

 

Hub Templates Wizard (continued)

 

  1. You can read more about Hub Templates configuration steps. Then click the GOT IT button.

 

Migrate App Catalog Settings

Starting with the 20.08 UEM release, all Intelligent Hub app catalog settings are now in the Hub Services console. For environments with Hub Services already configured, the administrator can choose to migrate app catalog settings from Workspace ONE UEM.

 

  1. Click the Migrate button.

 

 

Confirm Migration

 

  1. Scroll down to find the FINISH button.
  2. Click the FINISH button.

 

Add App Catalog and Custom Tab Versions


Before we can create a template for Intelligent Hub settings, we first need to configure a few of the available features for our end users.


 

Access the App Catalog Settings

The App Catalog tab allows you to define the layout and capabilities of the Intelligent Hub app catalog that is presented to your users.  We will modify the catalog by adding a promotion for the Salesforce app, highlighting this app in our catalog, and then disable the use of Virtual Apps on mobile devices.

 

 

  1. Click the App Catalog menu item on the left.
  2. You may see a notification to Add a Version indicating we can create different versions of the app catalog for different groups of users. Click DON'T SHOW AGAIN.

 

Add App Catalog Version

 

  1. Click the VERSION: GLOBAL dropdown.
  2. Click ADD VERSION.

Name the App Catalog Version for the Sales Team

 

  1. Enter the version name Sales Team and add description App Catalog customized for the Sales Team.
  2. Scroll down and look for the ADD SECTION dropdown under the Catalog Layout section.

Customize the App Catalog Layout for the Sales Team

 

  1. Click ADD SECTION
  2. Click Promotions

The Sales Team app catalog will now show a Promotions section at the top, followed by New Apps, Recommended and Category List sections.

Customize the Promotion Section

 

  1. Click the Promotions section to expand it.
  2. Click in the App Name search box. If you have multiple apps, you can type here to limit the shown results.
  3. Select the Salesforce result from the list.

This will cause the Salesforce app to be promoted to your end users.  Consider promoting important or heavily used apps you are encouraging your end users to utilize!

Save the Catalog Layout for the Sales Team

 

  1. Scroll down past the Catalog Layout section to find the save button.
  2. Click SAVE.

 

Configure the Custom Tab

 

The Custom Tab is a URL that directs users to your company intranet site or to another resource that you want to easily share with your users.

  1. Select the Custom Tab menu item on the left.
  2. Click the VERSION: GLOBAL dropdown.
  3. Click ADD VERSION.

 

Custom Tab Settings

 

  1. Enter the Version Name as Custom Tab for Sales Team
  2. Enter the Description as Direct Sales Team to product resources
  3. Turn the Web toggle ON so this Custom Tab will show in the browser version of the Intelligent Hub.
  4. Enter the URL as https://www.vmware.com
  5. Select Last for the Position.

Save Custom Tab Settings

 

  1. Scroll down to find the save button.
  2. Click SAVE.

Configure Branding for Intelligent Hub


By default, VMware branding is used within the Intelligent Hub. However, you can customize the logo, text color, and background color that appears in the Intelligent Hub app and browser views.

In this section, we will change the Company Logo and the Organization Name in the Branding Settings for the Intelligent Hub.


 

Add Branding Version

 

  1. Click on the Branding menu item on the left to customize branding for Intelligent Hub.
  2. Click the VERSION: GLOBAL dropdown.
  3. Click ADD VERSION.

 

 

 

  1. Name the version Branding for Sales Team.
  2. Click the Organization Logo UPLOAD link.

 

 

Navigate to the Company Logo File

 

From the pop-up window,

  1. Expand Documents
  2. Expand HOL
  3. Click on Hub folder
  4. Select WWE_logo.png
  5. Click Open

 

 

Preview the Branding Changes

 

  1. Notice that after you updated the Company Logo setting, your Preview pane updated to reflect what your users will see.  
  2. The Preview pane allows you to switch between Browser, Desktop, and Mobile views to see how your changes will be reflected on each platform.

Other settings on this page will be reflected here as well for a quick preview before you publish changes to your users.

Continue to the next step.

 

 

Change the Organization Name

 

  1. Scroll down to the Web Browser section.
  2. Change the Organization Name from VMware to Worldwide Enterprises.

 

 

Save the Branding Changes

 

  1. Scroll to the bottom of the Branding section.
  2. Click SAVE to save the branding configurations.

NOTE: There are other branding options such as background and icon color, but to limit the scope of the lab, we are going to only modify the organization name and company logo for demonstration purposes.  Feel free to make additional configurations on your own if you wish to see them in action later.

 

Hub Services Notifications


The Intelligent Hub notifications framework is a robust, flexible cloud-hosted service designed to generate and serve actionable, real-time notifications to your employees. Users can receive notifications in their Hub portal in a browser and the Intelligent Hub app on their devices.

Let's take a look at the types of notifications available:

  1. New Apps Available - A notification to announce that new applications are available in the catalog is automatically generated in Hub Services. Users can select new apps and save them to their device from the notification message.
  2. Custom Notification - You can either use templates from the Notification wizard within the Hub Services admin console or use the Notification API to automate notifications. These notifications allow you to send reminders, critical information or call for action on user devices.
  3. Notifications via Workspace ONE Experience Workflows - You can integrate 3rd-party business applications with Hub Services, such as approval notifications from Salesforce, Concur or Coupa, directly to the For You tab in Intelligent Hub.

In this section, we will create a Custom Notification using the wizard within the Hub Services admin console.


 

Get Started with Notifications

 

  1. Click the Notifications menu item on the left.
  2. Click GET STARTED to continue.

 

 

Notifications Tab in Hub Services

 

  1. Click the NEW button.

 

 

Select Notification Action

 

  1. Select Create Notification.

 

 

Set Notification Definition

 

  1. Enter Email Outage for the Name.
  2. Select All Employees from the Target Audience Type dropdown.
  3. Select High-priority Priority type.
  4. Click NEXT.

Notifications can be set to Standard, High-priority or Urgent priority levels.  High-priority notifications will display at the top of the For You tab within Intelligent Hub.  Urgent notifications will display as a pop-up window within Intelligent Hub and must be dismissed by the user.

 

 

Set Notification Content

 

  1. Notifications can either be Informational or Actionable.  Actionable Notifications contain buttons the user must click to accept, reject, approve or otherwise acknowledge the notification or take action.  Informational Notifications simply present some information for the user to read.  Select Informational from the Template dropdown.
  2. Enter Email Outage for Title.
  3. Enter IT Notification for Subtitle.

 

 

Continue Notification Content

 

  1. Scroll down to find the Description field.
  2. Enter The IT Department is aware of the issues with email and are currently working to correct. for Description.

 

 

Preview Notification

 

  1. You are able to view a preview of the notification within the Hub Services console on the right side of the screen as you are changing the content.
  2. Click NEXT.

 

 

Review Summary of Notification

 

  1. Review the notification settings and click CREATE.

Although this is just an example scenario for the purposes of this lab, the Hub Services Notification framework is particularly useful when email and other communication mediums are unavailable.

 

 

Validate the Notification Status

 

It will take about 10 - 15 seconds to send the notification.

  1. Confirm that you see the status as Success for the Email Outage Notification you created in this section.

 

Assign Hub Settings to a New Template


<img src="assets/62cbeb26-d303-4c89-acbf-316699d0198e.png" height="447" width="1258" />
  1. Click the Templates menu item on the left.
  2. If you see the Review anytime popup, click DON'T SHOW AGAIN to dismiss.
  3. Click ADD TEMPLATE to create a new Intelligent Hub template for the Sales Team.

 

 

Modify New Hub Template for Sales Team

 

  1. Enter Sales Team Hub Templete to name the new template.
  2. Click App Catalog to expand that section.
  3. Select Sales Team from the Layout Version dropdown.  This is the catalog layout version we created earlier in this module.

 

 

Finish Modifying Hub Template for Sales Team

 

  1. Scroll down to find the Branding Settings.
  2. Expand the Branding section.
  3. Select the Branding for Sales Team version in the dropdown.
  4. Toggle the Custom Tab ON so that it turns green. When turned on, Custom Tab will move to the list of Enabled services and will be removed from the Available services section.

 

 

Save the New Hub Template

 

  1. Notice the Custom Tab setting moved from Available services to the Enabled section.
  2. Click SAVE & ASSIGN.

 

 

Assign Hub Template to User Group

 

In the Template Assignment dialog box that pops up:

  1. Type all into the Access User Groups search bar.
  2. Click ALL USERS search result.
  3. Click the SAVE button.

 

 

Confirm Hub Template Assignment

 

  1. We can see the Hub Template for the Sales Team is assigned to ALL USERS.  Priority can be utilized to manage any conflicts for users that exist in more than one user group.

 

Review Customizations in Intelligent Hub


<img src="assets/1774caf3-f2ab-41da-a604-c639bd208a60.png" height="619" width="793" />
  1. Click the second tab in the browser, which is the Intelligent Hub User Portal.
  2. Click the For You tab in Intelligent Hub.  Notice the Notification count as 1 on the tab to indicate there is one new notification.
  3. Notice the IT Notification we created immediately shows in the Priority section of the For You tab - no browser refresh required.  Click the X in the top right of each notification to dismiss and move the notification to the history.

 

 

Log Out of Intelligent Hub

 

To view the App Catalog, Branding and Custom Tab changes we made earlier, we need to log out of Intelligent Hub and log back in.

  1. Click the User dropdown circle at the top right of the Intelligent Hub.
  2. Click Sign out to log out of Intelligent Hub.

 

 

Go Back to Intelligent Hub Login Page

 

  1. Click the Go back to login page button.

 

 

Log Back Into Intelligent Hub

 

  1. Enter administrator for Username.
  2. Enter VMware1! for Password.
  3. Click the Sign in button.

 

 

Confirm Branding, App Catalog and Custom Tab Changes

 

  1. Notice the Company Name in the browser tab has changed to Worldwide Enterprises.
  2. Notice the company logo has changed to the logo we uploaded.
  3. Notice the Salesforce app is now promoted at the top of the App Catalog.
  4. Click the Home tab and notice a new browser tab opens to the URL we entered earlier.

 

Summary


Congratulations! You have completed the Workspace ONE Intelligent Hub and Hub Services module!  In this module, you learned how to:

  • Configure Workspace ONE Hub Services and view customizations within Intelligent Hub
  • Add a SaaS app to the Intelligent Hub catalog
  • Create different versions of Intelligent Hub settings and assign to a Hub Template
  • Customize the Intelligent Hub app catalog layout
  • Customize branding for the Workspace ONE Intelligent Hub app
  • Create a Custom Tab for Intelligent Hub
  • Create and send Custom Notifications to the Intelligent Hub app

Level Up Your VMware End User Computing Knowledge with VMware Tech Zone


<img src="assets/71027dfc-017e-414a-af41-9f035e6b5be7.png" height="291" width="715" />

Interested in learning more about VMware End User Computing (EUC) but don't know where to start? Look no further than https://techzone.vmware.com, your fastest path to understanding, evaluating, and deploying VMware End User Computing products!

Tech Zone focuses on providing practical product guidance, curated activity paths, and technical content to take you from zero to hero!  Our mission at Tech Zone is to provide you with the resources you need to keep leveling up your knowledge no matter where you are in your digital workspace journey.

Interested? Check us out at https://techzone.vmware.com!


 

Module 6 - Workspace ONE Intelligence - Introduction to Dashboards, Automation, and Reports (45 minutes)

Introduction


With so much data available to IT admins managing modern, mobile work styles and no single tool to make sense of it, IT is faced with a huge challenge to manage the digital workspace. The lack of unified visibility across devices, applications and users makes it particularly hard to make data-driven decisions. As a result, manual processes become the norm, and IT is cornered into being reactive to employee demands and external events instead of being proactive.

Deep insights empower IT admins to better plan and optimize their app and policy deployments based on network performance, resource entitlement and deployment risk. And with the ability to automate processes, IT admins can proactively increase their level of security hygiene and meet compliance requirements, while improving user experiences.

With the automation engine at the heart of Workspace ONE Intelligence, IT admins can automate workflows across their environments by defining rules that take actions based on a rich set of parameters. This allows IT to create contextual workflows that take automated remediation actions based on security threats, and meet compliance requirements through automated access control. In addition, the Experience Management solution within Intelligence monitors digital employee experience and automated actions can be triggered when a poor experience is detected.  And because Workspace ONE Intelligence provides extensibility with an API layer for third parties, IT admins can build workflows that leverage their unique environment to meet their needs.

With automation, Workspace ONE Intelligence helps IT meet employee experience targets and increase security through automated remediation.


Connect to the Windows 10 Virtual Machine


<img src="assets/7a06722d-530a-42bb-a5ce-01f3fbf68012.png" height="127" width="113" />

Double-click the Win10-01a.rdp shortcut located on the Main Console Desktop to connect to the Windows 10 virtual machine.


 

Login to the Workspace ONE UEM Console


To perform most of the lab, you will log into the Workspace ONE UEM Admin Console.


 

Launch Chrome Browser

 

Double-click the Google Chrome shortcut located on the desktop of the virtual machine you are currently connected to.

 

 

Enter the Admin Username for the Workspace ONE UEM Admin Console

 

The default home page for the browser is https://hol.awmdm.com. Enter your Workspace ONE UEM Admin Account information and click the Login button.

  1. Enter your Username. This is the email address that you have associated with your VMware Learning Platform (VLP) account that you utilized to take Hands-on Labs.
  2. Click Next, then advance to the next step of the lab manual to enter the password, which will always be VMware1!.

NOTE - If you see a Captcha, please be aware that it is case sensitive!

 

 

Authenticate to the Workspace ONE UEM Console

 

The password field will be displayed after entering your username.

  1. Enter VMware1! for the Password field.
  2. Click the Log In button.

NOTE: Due to lab restrictions, you may need to wait here for a minute or so while the Hands On Lab contacts the Workspace ONE UEM Hands On Labs server.

 

 

Accept the End User License Agreement

 

You will be presented with the Workspace ONE UEM Terms of Use. Due to the lab environment the Terms of Use will not display, but this will not affect the lab itself. Click the Accept button.


NOTE: The following steps of logging into the Administration Console will only need to be done during the initial login to the console.

 

 

Address the Initial Security Settings

After accepting the Terms of Use, you will be presented with this Security Settings pop-up

 

The Password Recovery Question is in case you forget your admin password and the Security PIN is to protect certain administrative functionality in the console.  

  1. You may need to scroll down to see the Password Recovery Questions and Security PIN sections.
  2. Select a question from the Password Recovery Question drop-down (default selected question is ok here).
  3. Enter VMware1! in the Password Recovery Answer field.
  4. Enter VMware1! in the Confirm Password Recovery Answer field.
  5. Enter 1234 in the Security PIN field.
  6. Enter 1234 in the Confirm Security PIN field.
  7. Click the Save button when finished.

 

 

Console Highlights

 

A popup window will appear after you complete your security questions.

Click the 'X' in the upper right corner to close the Workspace ONE UEM Console Highlights window.

 

Intelligence Opt-In Process


The first step to start using Workspace ONE Intelligence is to authorize the data synchronization between Workspace ONE UEM and Intelligence Cloud Service. This is done through the Opt-In Process that needs to be performed by someone with administrator privileges to the Workspace ONE UEM console.


 

Access to Intelligence

 

In the Workspace ONE UEM Console:

  1. Click Monitor.
  2. Click Intelligence.

 

 

Getting Started

 

Click GET STARTED to initiate the Opt-in process

 

 

Authorizing Intelligence to collect and replicate the data (Opt-In)

 

  1. Scroll down to find the Opt In checkbox.
  2. Enable the Opt In checkbox.
  3. Click Next.

 

 

Complete the Terms of Service

 

This is the final step on the opt-in Process, where you will be providing your information and accept the VMware Cloud Services Terms of Service.

  1. Enter your Name.
  2. Enter your Email Address.
  3. Enter your Title.
  4. Enter your Company Name.
  5. Enter your Company Address.
  6. Click Accept.

After accepting, you will be redirected to the Workspace ONE Intelligence Console.

 

 

Dismiss Product Announcement

 

  1. You may see a popup window with product announcements. Click the X in the top right to dismiss the window.

 

 

Activate 30 Day Trial

 

  1. Click Dashboards
  2. Click Activate 30 Day Trial

 

 

Enter the details for 30 Day trial

 

  1. Enter your First Name.
  2. Enter your Last Name.
  3. Enter your Email Address.
  4. Enter your Job Title.
  5. Enter your Company Name.
  6. Enter your Company City.
  7. Enter your Zip/Postal Code.
  8. Enter your Company Country.
  9. Enter your Phone Number.
  10. Click Accept.

 

 

Confirm Trial Activation

 

Click Get Started.

 

 

Returning to Workspace ONE UEM Console

You will now enroll the provided Windows 10 virtual machine into Workspace ONE UEM. You will use this Windows 10 virtual machine throughout the lab to see how you can interact with the device in both Workspace ONE UEM and Workspace ONE Intelligence.

 

  1. Click the Services button.
  2. Click Workspace ONE UEM.

 

DO NOT Enroll Personal Windows 10 Devices


IMPORTANT: You SHOULD NOT enroll a personal Windows 10 device for the upcoming exercise! Personal devices may be enrolled into other EMM providers which can cause undesired conflicts and issues.

Please follow the upcoming steps to enroll and use the provided Win10-01a virtual machine for this Hands-on Lab.


IMPORTANT: You SHOULD NOT enroll any personal device(s) for the upcoming exercise! 

Personal devices may be enrolled into other UEM providers which can cause undesired conflicts and issues. - We want to avoid this!

To complete this lab, we recommend you use a test device ONLY and avoid enrolling personal devices in the lab. 


Enrolling Your Windows 10 Device with a Basic Account


You will now enroll the Windows 10 device in Workspace ONE UEM by using the Workspace ONE Intelligent Hub app.


 

Downloading the Workspace ONE Intelligent Hub app

 

NOTE: You do NOT need to complete these steps, the Workspace ONE Intelligent Hub has already been downloaded for you! This step is purely informative.

You can download the latest Workspace ONE Intelligent Hub app for your current platform by following the below steps:

  1. Navigate to https://www.getwsone.com in your browser.
  2. Click Download Hub for Windows 10.
  3. Click Keep when warned about the AirWatchAgent.msi download.

For expediency, the Workspace ONE Intelligent Hub app has already been downloaded for you. Continue to the next step to start the installer.

 

 

Launch the Workspace ONE Intelligent Hub Installer

 

  1. Click the File Explorer icon from the taskbar.
  2. Click Documents.
  3. Click HOL.
  4. Double-click the AirwatchAgent.msi file to start the installer.

NOTE: The installer may take a few seconds to launch, please be patient after clicking the AirwatchAgent.msi file.

 

Click Run

 

Click Run to proceed with the installation.

Accept the Default Install Location

 

Leave the default install location and click Next.

NOTE: The Next button may take several seconds to enable while the required additional features are installed.

Accept the License Agreement

 

  1. Select I accept the terms of the License Agreement.
  2. Click Next.

Start the Workspace ONE Intelligent Hub Install

 

Click Install to start the installer.

NOTE: The Workspace ONE Intelligent Hub install may take several minutes to complete, do not interrupt the installer!

Complete the Workspace ONE Intelligent Hub Installer

 

NOTE: The installer may take several minutes to complete.  Please wait until you see the completed install screen before continuing.

Click Finish to complete the Workspace ONE Intelligent Hub installer.

NOTE: After clicking finish, the Native Enrollment application will launch to guide you through enrolling into Workspace ONE UEM.  It will take 2-3 minutes to launch the Intelligent Hub.

 

Enroll Your Windows 10 Device using the Workspace ONE Intelligent Hub

 

NOTE: The above screen may take 2-3 minutes to display after clicking Finish from the previous step!

  1. Enter hol.awmdm.com for the Server Address.
  2. Click Next.

 

Locate your Group ID from Workspace ONE UEM Console

 

The next step is to retrieve your Organization Group ID.

  1. To find the Group ID, Go back to the Workspace ONE UEM Administration Console and hover your mouse over the Organization Group tab at the top of the screen. Look for the email address you used to log in to the lab portal.
  2. Your Group ID is displayed at the bottom of the Organization Group pop up. Copy this value.

Enter Your Group ID

 

  1. Enter Your Group ID in the Group ID field.  If you forgot your Group ID, check the previous steps on how to retrieve it.
  2. Click Next.

Enter Your User Credentials

 

  1. Enter testuser in the Username field.
  2. Enter VMware1! in the Password field.
  3. Click Sign In.

NOTE: Wait while the server checks your enrollment details. This may take a few minutes.

Accept Data Policy

 

Click I Agree.

Finish the Workspace ONE UEM Enrollment Process

 

Click Done to end the Enrollment process.  Your Windows 10 device is now successfully enrolled into Workspace ONE UEM!

Return to the Workspace ONE Intelligence Console


<img src="assets/e2abb13d-7a70-4c6b-9319-1abc762aec5b.png" height="362" width="385" />

Back in the Workspace ONE UEM Administration console in your browser,

  1. Click the My Services button in the top-right corner.
  2. Click Workspace ONE Intelligence.

 

Creating Reports


In this activity, you explore reporting capabilities by creating a report for enrolled devices.


 

Open Report Settings

 

In the Workspace ONE Intelligence Console:

  1. Click Reports.
  2. A Get Started page is displayed if this is the first time accessing the Reports section. If displayed, click Get Started.

 

 

Add a Report

 

  1. Click Add.
  2. Click From Template.

 

 

Explore Report Categories and Templates

 

To begin creating a report, select the category of data you want to obtain. The available categories include:

  • Apps
  • Devices
  • Platform
  • Security
  • Integration

Then, use the tags on each category to filter the category's customizable templates to define the content your report collects. For complete control of the report's content, use the Custom Report template to define your own criteria.

Feel free to click on each category to see the templates available to each.

 

 

Select Enrolled Devices Template

 

  1. Select Devices category.
  2. Select Status tag to filter the related templates.
  3. Click Start for the Enrolled Devices template. Selecting this template creates a report about enrolled devices that displays data in pre-defined columns

 

 

Add Report Filters

 

 

 

 

  1. Under Filters, click the + icon to add a new filter.
  2. Enter platform in the first search field.
  3. Select Platform under Devices from the drop-down menu that appears.
  4. Select Includes for the Select Operator field.
  5. Select Apple, Android, and WinRT from the final drop-down menu.
    NOTE: If you do not see the above options in the drop-down menu, this means you do not have an enrolled device of that type in your organization. You can type each platform name manually and press ENTER after each to add them to the list.

NOTE: The platform list is based on devices available in your environment, so you may not see all three requested platforms on this activity.

 

 

Preview the Report

 

Scroll down to the Report Preview section and click Refresh Preview. Observe how your currently enrolled devices automatically populate in the preview.

 

 

Add Report Columns

 

 

 

  1. Under Report Preview, click the Edit Columns button.
  2. Scroll down to find the Devices section. You can click the arrows next to App Activity, App Feedback and Apps to collapse these sections.
  3. Under Available Columns, select the following:
    • Available Device Storage Capacity
    • Available Physical Memory
    • BIOS Version
    • Battery Percent
  4. Click Add.

 

 

Change Column Order

 

  1. Under Selected Columns, select Available Device Storage Capacity, Available Physical Memory, BIOS Version, and Battery Percent. These newly added columns will be at the top of the list. You will need to Shift + Click each column to select multiple columns at once.
  2. Click Down four times to re-order the columns. You can also drag and drop the selected items to move the values up and down.
  3. Click Save.

 

 

Review New Columns

 

In the Report Preview, verify the new columns appear in the report.

NOTE: If column data is empty, it is either because the device samples have not been retrieved yet or the column does not apply to the given device (i.e.: Battery Percent on a Desktop device).

NOTE: The above screenshot is from a demo environment with multiple devices to show an example. Your environment will look different.

 

 

Save the Report

 

 

  1. Click Save in the top right corner to save the report.
  2. Confirm that the Enrolled Devices report saved successfully.

 

 

Manage the Report

 

After the report saves, it is added to the list of available reports. Click the Report Name (Enrolled Devices) to manage the report.

 

 

Explore Report Overview

 

From this view, you can configure additional management settings:

NOTE: Do not click the following buttons, these details are informational only.

  1. Edit allows you to alter the settings you configured when you made the report.
  2. Run allows you to manually trigger a data sync.
  3. Share allows you to email the report.
  4. Save As Template allows you to create a template from this report.
  5. Delete allows you to remove the report.

 

Scheduling Reports


After saving a report, you can use scheduling to automate data collection and collaboration. In this activity, you will schedule the Enrolled Devices report to run on a monthly basis.


 

Add a Report Schedule

 

  1. Click Schedules.
  2. Click Add.

 

 

Configure the Report Schedule

 

  1. Enter a Schedule Name. For example, Windows, Apple and Android Enrolled Devices.
  2. For Recurrence, select Monthly.
  3. For Day of the Month, select 1.
  4. For Starts At, change the time to 08:00.
  5. For Ends, select a future date such as 06/30/2028. You can click the dropdown arrow by the Year on the popout to change between the currently selected year.
  6. Click Schedule.

 

 

Confirm Report Schedule

 

  1. Click Schedules.
  2. Confirm that the schedule matches the parameters you defined.

 

 

Delete Report Schedule

 

 

To delete a schedule report:

  1. Select the report to be deleted. In this case, select the Windows, Apple and Android Enrolled Devices report you just created.
  2. Click Delete.
  3. Click Delete on the popup to confirm the action.

 

Downloading Reports


After saving a report, you can almost immediately download it as a CSV file. In this activity, you will download the CSV file for the Enrolled Devices report that you created.


 

Access Report Downloads

 

To access the report's available downloads, select the Downloads tab.

 

 

Download the Report

 

 

On the Downloads tab:

  1. Scroll down to the reports list.
  2. Click the Refresh icon if no reports are displayed to refresh the list.
  3. Verify the status displays as Completed.
  4. Click Download.
  5. Validate that a CSV of the Enrolled Devices report downloads.

 

Customizing the Dashboard View


<img src="assets/d61951dd-e72a-4559-a256-3dce08268efa.png" height="505" width="818" /><img src="assets/4d66b260-5eb8-4599-bb92-65981634a2e6.png" height="219" width="480" />
  1. Click the Dashboards tab.
  2. A Getting Started page is shown the first time you access the Dashboards page. If displayed, click Get Started.
  3. Click Add to create a new Dashboard.
  4. Click Custom Dashboard.

 

 

 

Add Dashboard

 

  1. Enter a dashboard name, such as My Devices Dashboard
  2. Enter an optional description for the dashboard
  3. Click Save

 

 

Add A Widget

 

Newly created dashboards by default have no information on them. You can add widgets to them and create custom dashboards to meet your business needs.

  1. Click Add Widget.
  2. Click From Template.

 

 

Explore Widget Categories and Templates

 

To begin creating a widget, you can select Custom Widget or select one of built-in widgets by selecting the categories and tags. The list of categories will be based on the integrations configured within your Workspace ONE Intelligence tenant and may differ from the image you see in this activity.

The available categories can include:

  • Apps
  • Devices
  • Hub
  • Platform
  • Product
  • Security
  • Integration

When you start with Workspace ONE Intelligence for the first time, you will see multiple categories.

Then, use the tag for each category to filter the customizable templates to define the content your widget displays. For complete control of the widget's content, use the Custom Widget template to define your own criteria.

Feel free to click on each category to see the templates available to each.

 

 

Select a Template

 

 

  1. Select the Devices Category.
    NOTE: If the dropdown does not load when clicked, you may need to scroll down before clicking the Devices category or maximize the lab window. The list will not load if there is not enough UI space to draw the drop down on the smaller resolution.
  2. Select the Enrollments tag.
  3. Click Start for Total Enrollments template.

 

 

Name the Default Template

 

Under Data Visualization, review the default Total Enrollments template. The initial default settings provide a snapshot of current device enrollment. If you change the settings, the snapshot results change accordingly.

  1. Change the name of the widget to Total Enrollments Over Time.

 

 

Configure the Template

 

 

To create a snapshot of total enrollments over time, modify the default Total Enrollments template.

  1. Select Historical.
  2. For Chart Type, select Line.
  3. For Group by, enter Platform and select the first result from the list.
  4. Set the Date Range to Last 14 Days.
  5. Click Save in the top right corner to save the widget.

Note: The screenshot shown is from a test environment. Your preview is based on your environment, and will differ from the preview you see in the screenshot.

As a supplement to its reporting capabilities, the Workspace ONE Intelligence dashboard displays critical business data in an easy-to-consume visual summary. Within dashboards, the configurable widgets allow you to customize the data that displays.

After configuring the Total Enrollment Over Time widget, you can manage how it displays on your dashboard. In this activity, you will modify your dashboard view by repositioning and expanding the Total Enrollment Over Time widget.

 

 

Customize the Dashboard

 

 

By default, the new widget appears at the bottom of your dashboard. Since this is the first widget on this dashboard, it will be at the top.

  1. Click Customize the unlock the dashboard widgets.
  2. You can click Total Enrollments Over Time (the chart title) and drag the widget to a new location on your dashboard.
  3. You can click and drag the corners of the widget to change the width or height of the Total Enrollments Over Time widget.
  4. After you are satisfied with the position and size of the widget, click Save at the top of the Dashboards page.

 

 

Save the Dashboard Layout

 

Click Save to save the dashboard layout.

 

 

Future Updates to the Dashboard

 

If you wish to modify the dashboard in the future, you can interact with the following:

  1. Add Widget allows you to add additional widgets to the dashboard.
  2. Customize allows you to change the layout of the existing widgets on the dashboard.

 

Increasing Compliance Across Devices


The Security Risk dashboards in Workspace ONE Intelligence gather reports on numerous device states and quickly identify high-risk devices. In this activity, you will explore the following Security Risk dashboards Workspace ONE Intelligence: Threats Summary, Compromised Devices, Policy Risks, and Vulnerabilities. 


 

Access the Security Risk Dashboards

 

In the Workspace ONE Intelligence console, under Dashboards, click Security Risk.

 

 

Identify Devices without Passcodes

 

NOTE: The screenshot was taken from a demo environment, so your view will not match the example above.

  1. Select the Policy Risks tab to view the number of passcode-less devices detected in the past 30 days.
    Then, after you understand the scope of the issue, use automation to mitigate the risk. For example, you can create a rule to automatically move a passcode-less device to quarantine, or remove its access to corporate data.
  2. Scroll down.

 

 

Identify Unencrypted Devices

 

 

 

NOTE: The screenshot was taken from a demo environment, so your view will not match the example above.

Scroll down to find Unencrypted Device Events dashboard. This chart shows the total number of unencrypted devices identified on a daily basis by Workspace ONE Intelligence.

  1. Point to the data points for additional details about the number of devices per platform.
  2. Click View to obtain a detailed list of devices.
  3. Click Security Risk: Policy Risks to return.

 

 

Identify Vulnerable Devices

 

NOTE: The screenshot was taken from a demo environment, so your view will not match the example above.

Select the Vulnerabilities tab to view the number of vulnerable devices identified in the last 30 days.

Without encryption, confidential information is unprotected, and can easily land in the wrong hands. To mitigate this risk, create policies to enforce device encryption. For example, you can create a policy to block corporate access until the device is encrypted through Workspace ONE UEM.

 

Configuring Workspace ONE Intelligence Automation Connectors


To take full advantage of Workspace ONE Intelligence, you need to configure at least one Automation Connector to enable Automation Actions in your environment.

Among the multiple available Connectors, the Workspace ONE UEM connector is key, as it enables Intelligence Automation to take actions against your organization's devices, apps, device sensors and OS updates.

In this activity, you will configure the Workspace ONE UEM Connectors to allow API communication between Workspace ONE Intelligence and Workspace ONE UEM.


 

Switch to Workspace ONE UEM Console

 

From the Workspace ONE Intelligence console:

  1. Click the Services menu icon.
  2. Select Workspace ONE UEM.

 

 

Navigate to All Settings

 

In the Workspace ONE UEM Administrator console:

  1. Click Groups & Settings.
  2. Click All Settings.

 

 

Regenerate the API Key

 

  1. Click System.
  2. Click Advanced.
  3. Click API.
  4. Click REST API.
  5. Click Override to generate the new API Key used to integrate with Workspace ONE Intelligence.
  6. For the AirWatchAPI Service, select the full API Key field and right-click.
  7. Click Copy to save the API Key for an upcoming step.
  8. Click Save.
  9. Click Close.

 

 

Return to Workspace ONE Intelligence Console

 

From the Workspace ONE UEM Administrator console:

  1. Click the Services menu icon.
  2. Select Workspace ONE Intelligence.

 

 

Open Automation Connections

 

 

  1. Click Integrations.
  2. Click Workflow Connectors.
  3. Click Get Started.

 

 

Setup Workspace ONE UEM Integration

 

 

  1. If you were taken away from the Integrations tab after clicking Get Started, click the Integrations tab again.
  2. Click View for the Workflow Connections card.
  3. Click Setup for the Workspace ONE UEM card.

On the Workspace ONE UEM card, click Set Up.

 

 

Configure Authorization

 

  1. Enter the Base URL for the Workspace ONE UEM environment. In this case, https://as350.awmdm.com.
  2. Choose Basic Authentication for the Auth Type.
  3. Enter the API User Name for the Workspace ONE UEM administrator with access to the REST API Key you copied earlier.  This will be Your VLP E-Mail Address that you used to sign into the Workspace ONE UEM Console.
  4. Enter the API User Password VMware1!.
  5. Paste the Workspace ONE UEM API Key. This is the AirWatchAPI Service Key that you copied from the Workspace ONE UEM console in the previous activity.
  6. Click Authorize.

 

 

Validate Authorization

 

  1. Verify the Workspace ONE UEM card now displays the Status as Authorized and the card action changes to Deauthorize. This indicates integration was successful.
  2. Click the ... button.
  3. Click View Actions.

 

 

Review Automation Actions against Workspace ONE UEM

 

As a result, you are now able to define automated flows, which can take over 25+ different actions against your devices, apps, and OS updates. The screenshot shows some of the actions available against devices.

Continue to the next step.

 

Using Automation to Tag Low Battery Life Devices


In this activity, you will use the automation capabilities in Workspace ONE Intelligence to tag low battery life devices in Workspace ONE UEM.


 

Return to the Workspace ONE UEM Console

 

From the Workspace ONE Intelligence Console:

  1. Click the Services menu.
  2. Click Workspace ONE UEM.

 

 

Navigate to All Settings in Workspace ONE UEM Console

 

In the Workspace ONE UEM console:

  1. Click Groups & Settings.
  2. Click All Settings.

 

 

Create the Low Battery Health Tag

 

  1. Click Device & Users.
  2. Click Advanced.
  3. Click Tags.
  4. Click Create Tag.

 

 

Save Low Battery Health Tag

 

  1. Enter Low Battery Health for the Tag Name.
  2. Click Save.

 

 

Obtain Tag ID

 

  1. Hover the mouse over the Low Battery Health tag you just created.
  2. The tag URL is displayed on the status bar of the browser—the tag ID is the number at the end of the URL. Manually enter the number into Notepad or copy it somewhere you can reference. This tag ID will be used as part of the automation action in the following steps.
  3. Click Close.

Note: In the sample image, the tag ID is 10007 – your ID will differ.

 

 

Return to the Workspace ONE Intelligence Console

 

  1. Click the My Services button.
  2. Click Workspace ONE Intelligence.

 

 

Open Automation Settings

 

In the Workspace ONE Intelligence console:

  1. Click the Automations tab.
  2. Click Add.
  3. Click Custom Workflow.

 

 

Select a Template

 

  1. Navigate to Category.
  2. Navigate to Workspace ONE UEM.
  3. Click Devices.

 

 

Define Automation Settings

 

 

  1. In the Name field, enter Dell Battery Replacement.
  2. Under Filter (If), select Dell Battery Health.
  3. Select Less Than.
  4. Enter 25.

 

 

Add an Action

 

 

 

  1. In the Action (Then) section, click the + icon to expand the options.
  2. Click Workspace ONE UEM.
  3. Enter Add tag in the search field.
  4. Select the Workspace ONE UEM -> Add Tag to Device result.

 

 

Configure Action Settings

 

  1. Leave the Device ID field as ${device_id}
  2. Change the Path Variables selection to Search for existing values.
  3. Click the Organization Name field and select your organization name from the list. The organization name of your group will match your email address.
  4. Click the Tag Name field and select the Low Battery Health tag from the list.
  5. Click Test.

 

 

Test the Add Tag to Device Automation

 

  1. You will need to select a Device ID to substitute for the dynamic value ${device_id} from the previous step. The single Device ID record correlates to the Windows 10 device you enrolled earlier, click to select it.
    NOTE: The Device ID shown here will differ from your environment.
  2. Click Next.

 

Run the Test

 

  1. Notice that the Device ID and Tag ID values were replaced with the values from your Workspace ONE UEM environment.
    NOTE: The Device ID shown here will differ from your environment.
  2. Click Test.

Confirm Test was Successful

 

  1. Confirm that the Test Results show 200 OK.
  2. Click Cancel to exit the automation test.

 

Save the Workflow

 

  1. In the bottom right corner, toggle Enable Workflow on.
  2. Click Save.

NOTE: This screenshot was taken from a sample environment. Your Filter Results will show 0 because the Dell Battery Health event does not apply to the Windows 10 virtual machine that was enrolled. When deploying the same automation to physical Dell devices, your affected devices would show here.

 

 

Save and Run Workflow

 

  1. Toggle the One-time Manual Run option to on. This will immediately execute the workflow against the target devices.
  2. Click Save & Run.

 

 

Confirm Automation is Created

 

Confirm that you can see the Dell Battery Replacement automation in the dashboard with a status of Enabled.

 

Reviewing Automation Events


After you have created an automation in the Workspace ONE Intelligence console, the configured actions begin to take effect and are recorded in the logs. In this activity, you will use the automation logs to review the automation events for Dell devices that need battery replacement.


 

Open the Log

 

NOTE: The screenshot will differ from your environment because the Dell Battery Health event will not trigger for the Windows 10 virtual machine that was enrolled since it is not a physical Dell device. Refer to the screenshot for a sample of how this would appear in a real environment.

In the Automations Dashboard:

  1. Click the Dell Battery Replacement workflow.
  2. Select Activity.

 

 

Review the Log

 

NOTE: The screenshot will differ from your environment because the Dell Battery Health event will not trigger for the Windows 10 virtual machine that was enrolled since it is not a physical Dell device. Refer to the screenshot for a sample of how this would appear in a real environment.

Depending on the battery health of the device you enrolled, the automation event you configured in this activity may or may not have been triggered. For this reason, the following screenshot is a sample from an unrelated log. It provides an example of multiple actions taken on different services.

 

Return to the Workspace ONE UEM Console


<img src="assets/a0d329b2-3e43-4f7c-9920-22d9dd33d998.png" height="236" width="376" />

In the top-right corner of the Workspace ONE Intelligence Console:

  1. Click the My Services button
  2. Click the Workspace ONE UEM button

 

Un-enrolling your Windows 10 Device


In this section, we are going to un-enroll our Windows 10 VM so that we can use it for other lab modules.

We will use the Enterprise Wipe wipe command to remove all of the managed content that was pushed to the device (such as profiles and apps) by Workspace ONE while not modifying any personal content or data on the device.


 

Enterprise Wipe from Workspace ONE UEM Console

 

Return to the Workspace ONE UEM Administrator Console in Google Chrome,

  1. Click on Devices
  2. Click on List View
  3. Select the check box next to your device friendly name.
  4. Click on More Actions
  5. Click on Enterprise Wipe

 

 

Enter PIN and Enterprise Wipe Device

 

  1. You may need to scroll down to find the Security PIN input
  2. Enter the Security PIN that you created when you first logged into the Workspace ONE UEM administration console, which was 1234. If you used a different PIN, enter that one instead.
  3. Click Delete

 

 

Validate Enterprise Wipe

 

NOTE: The Enterprise Wipe may take several minutes to process.

  1. Click the Refresh icon periodically to refresh the page to check if the Enterprise Wipe has processed
  2. If needed, scroll to the right to find the Enrollment column
  3. Notice that the Enrollment status for the device changes to Unenrolled once the Enterprise Wipe command is processed

 

 

Navigate to Windows 10 Settings

 

  1. Click on the Windows Icon
  2. Click on the gear icon to access Windows 10 Settings

 

 

 

Access Accounts Settings

 

From the Settings Menu, access Accounts

 

 

Validate That No Management Account Exists

 

  1. Click on Access work or school
  2. Validate that you DO NOT see any account connected to Workspace ONE MDM.

NOTE: The CORP AD domain is the local domain in this lab and is not controlled by Workspace ONE UEM Enrollment, so you will see this connection when your device is enrolled or unenrolled.

NOTE: If the Access Work or School page was opened from earlier, you may need to refresh or navigate away from the page and return to see the changes.

 

  1. Click the Connected to Workspace ONE UEM account
  2. Click Disconnect
  3. Click Yes

 

Return to the Main Console


<img src="assets/9af3b6f6-5b16-4a7f-a309-b5a387142b7e.png" height="34" width="586" />

Click Close (X) on the Remote Desktop Connection bar at the top of the screen to return to the Main Console to finish making configurations within the Workspace ONE UEM Console.

NOTE: If the Remote Desktop Connection bar is not visible, you may have unpinned it. Hover your mouse of the top of the screen to display the Remote Desktop Connection bar again, then click close.


 

Summary


In this module, you've learned how to:

  • Create automated reports that share relevant information to interested parties, and eliminate manual steps for the IT Team.
  • Add Widgets to Dashboards that show Total Enrollments over time.
  • Predict battery failures and automate replacement tagging for Windows 10 Dell devices.
  • Leverage integration with 3rd party services, like ServiceNow, to trigger automated actions.

To learn more about additional use cases where you can leverage Workspace ONE Intelligence, please review the following resources:

For additional resources and information on Workspace ONE Intelligence, be sure to check out the VMware Workspace ONE Intelligence pages:

https://www.vmware.com/products/workspace-one/intelligence.html

https://www.vmware.com/products/workspace-one/digital-employee-experience-management.html

 


Level Up Your VMware End User Computing Knowledge with VMware Tech Zone


<img src="assets/71027dfc-017e-414a-af41-9f035e6b5be7.png" height="291" width="715" />

Interested in learning more about VMware End User Computing (EUC) but don't know where to start? Look no further than https://techzone.vmware.com, your fastest path to understanding, evaluating, and deploying VMware End User Computing products!

Tech Zone focuses on providing practical product guidance, curated activity paths, and technical content to take you from zero to hero!  Our mission at Tech Zone is to provide you with the resources you need to keep leveling up your knowledge no matter where you are in your digital workspace journey.

Interested? Check us out at https://techzone.vmware.com!


 

Module 7 - Securing the Anywhere Workspace with Secure Access Service Edge (SASE) (60 minutes)

Introduction


The Workspace ONE Tunnel and Secure Access Service Edge are two components of the Anywhere Workspace that allow employees to securely access resources on-premises and in the cloud by providing a Per-Application and full device Tunnel connection that allows applications to tunnel, block, or bypass traffic based on the target domain.


 

Logical Architecture

 

With VMware Secure Access, VMware has combined the consistent, secure cloud application access functionality of VMware SD-WAN with the capability of Workspace ONE to allow only trusted devices and users to access applications hosted on-premises or in the cloud. 

With Workspace ONE:

  • Workspace ONE Tunnel enables secure access for all workers and devices working anywhere with an internet connection outside the office.
  • There are multiple layers of authorization, too. User and Device must be Workspace ONE enrolled, and then the Tunnel Client can provide application and domain-specific routing
  • Users have a 'no-touch' Tunnel experience. Its setup and configuration are 100% managed by Workspace ONE UEM.
  • IT organizations can take a least-privilege approach to enterprise access, ensuring only managed devices, defined apps and domains have access to the internal network.
  • Zero Trust goals can be reached by combining explicit definitions for managed applications and integration with the Workspace ONE compliance engine. 

With SASE:

  • VMware SD-WAN is an integral part of the VMWare SASE and provides visibility into the applications accessed by the remote mobile users on their devices.
  • As traffic integrates into the SD-WAN overlay, Dynamic Multipath Optimization (DMPO) benefits are applied, reducing latency, packet loss, and jitter while improving bandwidth utilization.
  • Secure Access receive connection from the device through Workspace ONE Tunnel App and allow only managed and in compliance devices to connect through.
  • Cloud Web Security is responsible to inspect web traffic coming from Secure Access, any unsecure traffic gets dropped before routed to the final destination.

 

 

What you will learn on this lab

In this lab, you will learn how to:

  • Integrate Workspace ONE Tunnel with Workspace ONE UEM
  • Configure Tunnel Traffic Rules to tunnel, block, or bypass traffic to the Workspace ONE Tunnel
  • Import and publish the Workspace ONE Tunnel application to your end users
  • Create and publish a Profile with a VPN payload for Workspace ONE Tunnel
  • Enroll a Windows 10 virtual machine
  • Use the Workspace ONE Tunnel application to access an intranet website hosted on a private network
  • Configure Cloud Web Security policies in Secure Access to block unwanted or malicious actions
  • Investigate traffic details and metrics in the SD-WAN Network Orchestrator

 

Connect to the Windows 10 Virtual Machine


<img src="assets/7a06722d-530a-42bb-a5ce-01f3fbf68012.png" height="127" width="113" />

Double-click the Win10-01a.rdp shortcut located on the Main Console Desktop to connect to the Windows 10 virtual machine.


 

Login to the Workspace ONE UEM Console


To perform most of the lab, you will log into the Workspace ONE UEM Admin Console.


 

Launch Chrome Browser

 

Double-click the Google Chrome shortcut located on the desktop of the virtual machine you are currently connected to.

 

 

Enter the Admin Username for the Workspace ONE UEM Admin Console

 

The default home page for the browser is https://hol.awmdm.com. Enter your Workspace ONE UEM Admin Account information and click the Login button.

  1. Enter your Username. This is the email address that you have associated with your VMware Learning Platform (VLP) account that you utilized to take Hands-on Labs.
  2. Click Next, then advance to the next step of the lab manual to enter the password, which will always be VMware1!.

NOTE - If you see a Captcha, please be aware that it is case sensitive!

 

 

Authenticate to the Workspace ONE UEM Console

 

The password field will be displayed after entering your username.

  1. Enter VMware1! for the Password field.
  2. Click the Log In button.

NOTE: Due to lab restrictions, you may need to wait here for a minute or so while the Hands On Lab contacts the Workspace ONE UEM Hands On Labs server.

 

 

Accept the End User License Agreement

 

You will be presented with the Workspace ONE UEM Terms of Use. Due to the lab environment the Terms of Use will not display, but this will not affect the lab itself. Click the Accept button.


NOTE: The following steps of logging into the Administration Console will only need to be done during the initial login to the console.

 

 

Address the Initial Security Settings

After accepting the Terms of Use, you will be presented with this Security Settings pop-up

 

The Password Recovery Question is in case you forget your admin password and the Security PIN is to protect certain administrative functionality in the console.  

  1. You may need to scroll down to see the Password Recovery Questions and Security PIN sections.
  2. Select a question from the Password Recovery Question drop-down (default selected question is ok here).
  3. Enter VMware1! in the Password Recovery Answer field.
  4. Enter VMware1! in the Confirm Password Recovery Answer field.
  5. Enter 1234 in the Security PIN field.
  6. Enter 1234 in the Confirm Security PIN field.
  7. Click the Save button when finished.

 

 

Console Highlights

 

A popup window will appear after you complete your security questions.

Click the 'X' in the upper right corner to close the Workspace ONE UEM Console Highlights window.

 

Login to the SD-WAN Network Orchestrator


<img src="assets/4dfef03a-6b3b-4ba9-853c-d0c762b52909.png" height="535" width="897" />

In addition to the Workspace ONE UEM administrator console, you will also be logging in as a read-only user to the SD-WAN Network Orchestrator console for this Hands-on Lab to view and confirm various settings related to the Workspace ONE Tunnel service hosting, Secure Access settings, and Cloud Web Security Policies.

  1. Click the Pin button on the remote desktop tab, this will allow easier access to the various tabs in your browser
  2. Click the New tab button to open a new tab
  3. Click the Tunnel bookmark folder
  4. Click the SD-WAN Network Orchestrator bookmark
  5. Enter holuser@vmware.com for the username
  6. Enter VMware1! for the password
  7. Click Login
  8. Click the first tab to return to Workspace ONE UEM

Leave the SD-WAN Network Orchestrator tab open as you will be periodically returning to this tab throughout the lab.


 

Validate Unsuccessful Connection to Intranet Site


An intranet website is being hosted on an external private network which is not reachable from the Hands-on Labs network. This intranet website accepts accepts connects over ports 80, 8081, and 8082.

You will browse to this intranet website prior to publishing the Workspace ONE Tunnel and VPN policies to your Windows 10 virtual machine to confirm it is inaccessible. You will browse to this intranet website after the Workspace ONE Tunnel app and policies are configured and distributed to the enrolled virtual machine to confirm that the device can reach the intranet website on the protected network by tunneling the traffic through the Workspace ONE Tunnel service.


 

Browse to the Inaccessible Intranet Site

 

In Google Chrome:

  1. Click the New tab button.
  2. Click the Tunnel bookmark folder
  3. Hover over Web Security Examples, then click Intranet (Port 80) from the folder
  4. Confirm that you cannot reach the http://intranet-server site
    NOTE:
    The request will timeout before displaying the error page. You may need to wait 30-60 seconds for the timeout to occur.
  5. Click the Close button on the intranet-server tab to close it for now
  6. Click the first tab to return to the Workspace ONE UEM administrator console

Since http://intranet-server is not accessible over the public internet, our virtual machine cannot display the webpage. The intranet site is hosted on a private network which can only be reached once the device is connected to the Workspace ONE Tunnel service hosted in the same private network.

You will need to deploy and configure the Workspace ONE Tunnel app and a VPN profile to allow your devices to establish a connection to the Tunnel service that is hosted on a SASE PoP (Point of Presence) in San Jose. Once these configurations are completed, the device will tunnel traffic for the http://intranet-server site to the private network where the intranet site is hosted.

Before you can push the necessary app and profile to your device, you will need to enroll the device first. This will allow Workspace ONE UEM to manage the device and publish the app and profile to it over the air.

 

Enrolling Your Windows 10 Device with a Basic Account


You will now enroll the Windows 10 device in Workspace ONE UEM by using the Workspace ONE Intelligent Hub app.


 

Downloading the Workspace ONE Intelligent Hub app

 

NOTE: You do NOT need to complete these steps, the Workspace ONE Intelligent Hub has already been downloaded for you! This step is purely informative.

You can download the latest Workspace ONE Intelligent Hub app for your current platform by following the below steps:

  1. Navigate to https://www.getwsone.com in your browser.
  2. Click Download Hub for Windows 10.
  3. Click Keep when warned about the AirWatchAgent.msi download.

For expediency, the Workspace ONE Intelligent Hub app has already been downloaded for you. Continue to the next step to start the installer.

 

 

Launch the Workspace ONE Intelligent Hub Installer

 

  1. Click the File Explorer icon from the taskbar.
  2. Click Documents.
  3. Click HOL.
  4. Double-click the AirwatchAgent.msi file to start the installer.

NOTE: The installer may take a few seconds to launch, please be patient after clicking the AirwatchAgent.msi file.

 

Click Run

 

Click Run to proceed with the installation.

Accept the Default Install Location

 

Leave the default install location and click Next.

NOTE: The Next button may take several seconds to enable while the required additional features are installed.

Accept the License Agreement

 

  1. Select I accept the terms of the License Agreement.
  2. Click Next.

Start the Workspace ONE Intelligent Hub Install

 

Click Install to start the installer.

NOTE: The Workspace ONE Intelligent Hub install may take several minutes to complete, do not interrupt the installer!

Complete the Workspace ONE Intelligent Hub Installer

 

NOTE: The installer may take several minutes to complete.  Please wait until you see the completed install screen before continuing.

Click Finish to complete the Workspace ONE Intelligent Hub installer.

NOTE: After clicking finish, the Native Enrollment application will launch to guide you through enrolling into Workspace ONE UEM.  It will take 2-3 minutes to launch the Intelligent Hub.

 

Enroll Your Windows 10 Device using the Workspace ONE Intelligent Hub

 

NOTE: The above screen may take 2-3 minutes to display after clicking Finish from the previous step!

  1. Enter hol.awmdm.com for the Server Address.
  2. Click Next.

 

Locate your Group ID from Workspace ONE UEM Console

 

The next step is to retrieve your Organization Group ID.

  1. To find the Group ID, Go back to the Workspace ONE UEM Administration Console and hover your mouse over the Organization Group tab at the top of the screen. Look for the email address you used to log in to the lab portal.
  2. Your Group ID is displayed at the bottom of the Organization Group pop up. Copy this value.

Enter Your Group ID

 

  1. Enter Your Group ID in the Group ID field.  If you forgot your Group ID, check the previous steps on how to retrieve it.
  2. Click Next.

Enter Your User Credentials

 

  1. Enter testuser in the Username field.
  2. Enter VMware1! in the Password field.
  3. Click Sign In.

NOTE: Wait while the server checks your enrollment details. This may take a few minutes.

Accept Data Policy

 

Click I Agree.

Finish the Workspace ONE UEM Enrollment Process

 

Click Done to end the Enrollment process.  Your Windows 10 device is now successfully enrolled into Workspace ONE UEM!

Configure Tunnel Traffic Rules


When administrators integrate the Workspace ONE Tunnel service hosted from their SASE PoP into Workspace ONE UEM, they would follow these steps:

  1. Login to the SD-WAN Network Orchestrator.
  2. Navigate to Secure Access and configure their Secure Access policies, providing a DNS name for the Tunnel service, Workspace ONE UEM integration details, and the DNS server the Tunnel service will utilize.
  3. Login to the Workspace ONE UEM administrator console.
  4. Navigate to the Tunnel integration page and configure the same DNS name and appropriate port for the SASE PoP hosted Tunnel service.
  5. Configure the Tunnel Traffic Rules to determine what traffic will be tunneled, proxied, or bypass the Tunnel service on the device.

In this lab, the Secure Access Policies and Workspace ONE Tunnel integrations have been made for you for the sake of time. You will have read-only access to both the SD-WAN Network Orchestrator console and the Workspace ONE Tunnel settings in Workspace ONE UEM. You will step through this process to become familiar with the configurations and review what has been setup.


 

Review the Secure Access Settings in the SD-WAN Network Orchestrator

 

In Google Chrome:

  1. Click the SD-WAN Network Orchestrator tab
  2. The default landing page is the SD-WAN > Network Overview page
  3. This page shows the number of activated Edges and Links and their respective health status
  4. Additional details about your Edges can be seen here. For this lab, the edge is deployed on an on-premise datacenter to enable access to the intranet website via SD-WAN.

 

Navigate to the Secure Access Page

 

  1. Click the Enterprise Applications drop down, which currently shows SD-WAN
  2. Click Secure Access

View Secure Access Settings

 

The Secure Access Policies page has a list of your Secure Access clients.

  1. Notice that the # of PoPs for our EUC HOL Secure Access service is 1. You can have 1 or more PoPs in your SD-WAN.
  2. Additional information about our Secure Access client is available here, such as the Enterprise DNS settings, if CWS (Cloud Web Security) policies are enabled, and the deployment status.
  3. Click the EUC HOL Secure Access link.

Workspace ONE UEM Configuration

 

  1. The DNS Name field indicates the endpoint where the Workspace ONE Tunnel service is hosted.
  2. The Workspace ONE UEM API URL and Organization Group ID where you plan to integrate Workspace ONE Tunnel would be provided here.
    NOTE: In this setup, Workspace ONE Tunnel has been integrated with Workspace ONE UEM at a parent organization group already and the settings are inherited by your child group.
  3. Workspace ONE UEM administrator credentials that can authorize the Workspace ONE UEM REST APIs would be provided here.

Workspace ONE UEM Configuration (Continued)

 

  1. Scroll down to the bottom of the Workspace ONE UEM Configuration section.
  2. The Configure Tunnel Hostname within the Org Group toggle will setup the Workspace ONE Tunnel hostname automatically in Workspace ONE UEM using the provided API URL, Group ID, and administrator credentials so that administrators do not need to manually configure the Tunnel connection details.
  3. The Brief Description tabs can be expanded to get more details about each setup step.
  4. Click Next.

Enterprise and Network Settings

 

  1. The Enterprise DNS Server that the Secure Access client will use is set to Google (using DNS 8.8.8.8, 8.8.4.4). You can configure other Public or Private DNS Servers and provide them here to meet your networking needs.
  2. The Enterprise IP Ranges signifies the supernet which applies to all secure access users across all PoPs.
  3. Click Next.

PoP (Point of Presence) Selection

 

  1. The Selected Instances show the PoPs that are participating in this Secure Access deployment. In this case, a single PoP in San Jose is provided.
  2. Click Next.

Additional Security Settings

 

  1. The Additional Security settings allow you to specify a Cloud Web Security (CWS) policy that will apply to this Secure Access deployment. In this setup, we are associated the Corporate-Policy CWS Policy. You will explore these settings to learn more about Cloud Web Security policies in an upcoming step.
  2. Click Cancel to close the Secure Access configuration.

Now that you have seen how the Secure Access deployment and the single PoP are configured, return to the Workspace ONE UEM administrator console to review the Workspace ONE Tunnel integration settings.

 

Open the Tunnel Configuration

 

  1. Click the first tab to return to the Workspace ONE UEM administrator console
  2. Click Groups & Settings
  3. Click All Settings

 

Navigate to Tunnel Configuration

 

  1. Click System
  2. Click Enterprise Integration
  3. Click VMware Tunnel

 

Browse the Tunnel Configuration

 

NOTE: The Tunnel configuration to the SASE PoP tenant has already been setup for you in the interest of time. You will review the configured changes to understand what settings were used for this implementation.

  1. Click Deployment Details to expand the section
  2. The Deployment Type has been set to Basic, which is the deployment type supported by VMware SASE, there is no need to perform Cascade mode into the SASE PoP.
  3. Recall that the DNS Name of  the Secure Access service was euchol.sa.gsm.vmware.com which will be used by the Workspace ONE Tunnel client to know where the Tunnel service is hosted. The Hostname should be the endpoint at which the Tunnel service can be reached, which is euchol.sa.gsm.vmware.com in our deployment.
  4. The Port for the SASE PoP hosting the Tunnel service is 443 and is provided to you as part of SASE hosting solution.

This section defines how to connect to the Tunnel service. The Windows 10 virtual machine in the lab will use these settings to establish a connection to the Tunnel service hosted on the SASE PoP at hosted at euchol.sa.gsm.vmware.com on port 443.

Continue to the next step.

 

Confirm the Authentication Settings

 

  1. Click Server Authentication to expand the section
  2. Confirm the SSL setting is AirWatch
  3. Click Client Authentication to expand the section
  4. Confirm the Authentication setting is AirWatch

Certificates are used to secure the traffic between the client and the Tunnel service. The AirWatch Certificate Authority can be used to generate client and/or server certificates for the Tunnel service. You can optionally provide your own certificates by selecting Third Party and uploading your certificates.

In our use case, we will leverage the AirWatch Certificate Authority for our certificates.

Confirm the Traffic Rule Sets

 

  1. Scroll down to find the Device Traffic Rule Sets section
  2. Click View

Device Traffic Rule Sets define which applications for which devices are allowed to utilize the Tunnel service to reach a destination, which destinations are blocked, and which can be bypassed (not sent through the Tunnel).

See Understanding Device Traffic Rules on TechZone for more information.

View the Traffic Assignments

 

  1. The Device Traffic Rule sets have been configured at a Parent Organization Group in Workspace ONE UEM, so your account is not privileged to add or delete rules.  Compare your view (on the left) to an administrator with Tunnel privileges (on the right).
  2. Click Default Rule.

Confirm the Device Traffic Rules

 

In this Hands-on Lab, you will not have privileges to view the Device Traffic Rules since they are configured at a parent organization group. See below for a screenshot of the configuration to review what has been configured for the lab.

 

NOTE: You will not be able to access the above page or make changes to these settings. The screenshot is for informational purposes so you can see the configuration of the Tunnel for this lab.

In this configuration, we are allowing a small subset of destinations to traverse through the Tunnel when using Google Chrome on Windows 10 devices and bypassing the Tunnel in all other use cases. This configuration is used to show specific use cases in the Hands-on Labs networking, and the next step will discuss more typical real-world configurations for comparison.

  1. When creating rules, Administrators can set the Tunnel mode to Per Application or Full Device. Per Application enables the Tunnel when the listed applications in the rules below are used and need to connect to the destinations in the TUNNEL action rules, allowing you to selectively tunnel specific traffic. Full Device causes all traffic on the device to route through the tunnel.
  2. Administrators can add new Rules or manage which applications are allowed to utilize the Workspace ONE Tunnel. The rules are shown below and are processed by Rank order.
  3. The top-ranked rule is set to allow Google Chrome on Windows devices (WinRT) to TUNNEL any of the domains or IPs matching the values in the Destination field through the Tunnel service. When a user opens Chrome on Windows 10 and navigates to any of these destinations, the traffic will be tunneled to the Secure Access service hosted on the SASE POP tenant.
    NOTE: For additional details on how to configure destination domain wildcards and IPs, see the Device Traffic Rules Wildcard Guidelines.
  4. The final rule is to BYPASS, so all other apps and destinations will bypass the Tunnel service completely.
  5. Administrators can use the Save or Save and Publish buttons to save the configuration. Publishing the configuration will push the latest changes down to your devices where Save will only write the changes.
  6. When finished, click Close to return to the previous page.

Examples of Tunnel Traffic Rules

NOTE: This step is informational only and discusses a few real world applications of the Tunnel Traffic Rules to achieve a desired result. You cannot make the configurations shown on this step.

In the previous steps, we mentioned that the Device Traffic Rules we are using are not reflective of a typical deployment.  

USE CASE: Corporate-Owned iOS Devices

In the below example, the Device Traffic Rules allowing a few specific browsers for iOS to Tunnel necessary corporate traffic (such as SalesForce and Microsoft Office) while blocking some social media sites that corporate does not want allow on corporate-owned devices.

 

USE CASE: Limited Tunnel Traffic with Contractors

Consider a use case where Contractors need access to a set of intranet sites from their devices, and they may not always be on site to access your corporate network. In this example, a set of browsers across iOS, macOS, Android, and Windows are allowed to Tunnel traffic to two intranet sites while all other traffic bypasses the Tunnel. This helps respect end-user privacy by not tunneling their personal traffic through the Tunnel service while also ensuring potentially malicious or undesirable sites are not routed through your Tunnel service.

 

Consider how you can use the combination of Per Application and Full Device rules combined with the TUNNEL, BYPASS, BLOCK, and PROXY actions to achieve your desired outcomes for different business use cases.

Continue to the next step.

Close the Traffic Assignments page

 

Click Close on the Manage Traffic Assignments popup to return to the Tunnel configuration page.

 

Summary

You have now reviewed the Tunnel configuration that has been completed for you in order for Google Chrome on an enrolled Windows 10 device to be allowed to Tunnel all matching domains and IPs to the Tunnel service hosted by the SASE PoP. This configuration will allow traffic to the http://intranet-server destination to tunnel to the private network and access the intranet site, while also tunneling traffic to inspect for malicious or unwanted network behavior and protect the user with your configured Cloud Web Security (CWS) policies.

Next, you will create the a Profile with a VPN payload that will send your Workspace ONE Tunnel configuration to devices that enroll in your organization.

 

Create and Publish VPN Profile


With the Workspace ONE Tunnel integrated with Workspace ONE UEM, you are ready to create a Profile with a VPN payload. The Workspace ONE Tunnel app, which you will deploy in a later step, requires a Profile with a VPN payload to be available on the device so that the Tunnel Device Traffic Rules can be parsed and enforced.

This allows you to deliver different Tunnel Device Traffic Rules to different users or different devices in your organizations to meet their specific needs.

For more details, the Workspace ONE Tunnel operational tutorial on TechZone covers creating Per-App VPN Profiles for iOS, macOS, Windows 10, and Android.


 

Create a Profile with a VPN Payload

 

  1. Click Resources
  2. Click Profiles & Baselines
  3. Click Profiles
  4. Click Add
  5. Click Add Profile

 

Select the Windows Platform

 

Click Windows.

Select Windows Desktop Device Type

 

Click the Windows Desktop device type. This will apply the following configurations you make to Windows 10 devices.

Select Device Profile Context

 

Click the Device Profile context.

This will apply the configurations you make to the entire Windows 10 device, regardless of the user. You would use User Profiles instead if you wished to deploy user-specific configurations.

Configure the General Payload Settings

 

  1. Click the General payload tab, if not already selected.
  2. Enter Corporate Tunnel for the Name. This Profile will be identified by this name in the Admin Console and on devices.
  3. Select Auto for the Assignment Type. This will publish the Profile automatically to your designated devices and not require any end user input to retrieve the settings.
  4. Click the Smart Groups input field to see a list of available smart groups for assignment.
  5. Select the All Devices (your@email.shown.here) result.

This will configure the profile, named Corporate Tunnel, to be published automatically to any Windows 10 devices that enroll to your organization.

Add a VPN Payload

 

  1. Click the VPN payload tab
  2. Click Configure to enable the VPN payload

Profiles can have more than one Payload associated with them, so you will need to click Configure for each Payload you wish to add. However, it is generally best practice to only include one Payload per Profile for simplicity.

Configure the VPN Payload

 

  1. Enter Corporate Tunnel for the connection name.
  2. Select Workspace ONE Tunnel for the Connection Type.
  3. Notice that the Server and other options populated automatically. If we had more than one Device Traffic Rule, you could select which set of rules would apply to this profile, but we only have one (Default - Default) created. The other defaults can be left as is for this lab.

Add a Domain for DNS Resolution

 

  1. Scroll down to find the DNS Resolution settings
  2. Select Enabled for the Enhanced Domain Resolution setting
  3. Click Save and Publish

This VPN Profile will be pushed down to the device, which the Workspace ONE Tunnel application will use to determine where the Tunnel service is hosted (euchol.sa.gsm.vmware.com:443) and what Device Traffic Rules will be used.

 

Publish the VPN Profile

 

  1. A preview of the devices that will receive this Profile based on the selected assignments are shown here. The single virtual machine that you enrolled is currently displayed.
  2. Click Publish.

The Profile with the VPN payload is now published to your devices with the necessary Workspace ONE Tunnel configuration. Since the assignment type was set to Auto, your devices that get enrolled will automatically receive this configuration.

 

 

Confirm the Profile was Created

 

Once created, the Corporate Tunnel Profile will appear in your list of Profiles in the Workspace ONE UEM administrator console. If you need to edit or update your Profile, you would do so through this view.

 

Publish Workspace ONE Tunnel App


You will now upload and prepare the Workspace ONE Tunnel app for deployment. The Workspace ONE Tunnel app is responsible for utilizing the details of your Profile containing VPN payloads to establish connections to the Workspace ONE Tunnel service hosted in the SASE PoP.


 

Upload the Workspace ONE Tunnel Application

 

  1. Click Resources on the left-hand menu
  2. If needed, click Apps to expand the section
  3. If needed, click Native
  4. Click the Internal tab
  5. Click the Add dropdown
  6. Click Application File

The Workspace ONE Tunnel binary has been hosted for you on the virtual machine. Ordinarily, you would navigate to https://my.workspaceone.com, sign in with your credentials, and download the Workspace ONE Tunnel binary from the Products section for the desired platform.

 

Add an Application

 

Click Upload.

Choose the Application File

 

Click Choose File.

Select the VMwareTunnelInstaller_2.1.1.exe File

 

  1. Click Documents
  2. Click HOL
  3. Click to select the VMwareTunnelInstall_2.1.1.exe file
  4. Click Open

Save the Application Upload

 

  1. Confirm the Workspace ONE Tunnel installer was selected
  2. Click Save to upload the application file

NOTE: The app upload may take a few minutes to complete! Continue to the next step once the upload completes. If you see "An error has occurred HTTP Status Code 0" please try the upload again as internet bandwidth is variable..

 

Configure the Workspace ONE Tunnel App

 

Click Continue.

 

Edit the App Details

 

  1. Click the Details tab
  2. Enter Workspace ONE Tunnel for the Name field
  3. Enter 2.1.1.7 for the App Version field
  4. Click the Supported Processor Architecture dropdown
  5. Click 64-bit

DO NOT click Save & Assign yet, continue to the next step.

Configure the Uninstall Command

 

NOTE: Remember that you can copy + paste the text from the manual into the console by using keyboard shortcuts or by clicking + dragging to highlight the text, then dragging the text into the text field.

  1. Click the Files tab
  2. Scroll down to the bottom
  3. Select Input for the Custom Script Type
  4. For the Uninstall Command, enter the following command to inform how the Workspace ONE Tunnel app can be uninstalled if UEM needs to remove the app from the device: VMwareTunnelInstaller_2.1.1.exe /uninstall /Passive

Configure the How to Install Settings

 

NOTE: Remember that you can copy + paste the text from the manual into the console by using keyboard shortcuts or by clicking + dragging to highlight the text, then dragging the text into the text field.

  1. Click the Deployment Options tab
  2. Scroll down to find the How To Install section
  3. Click Device for the Install Context
  4. For the Install Command, enter: VMwareTunnelInstaller_2.1.1.exe /install /Passive. This will inform UEM how to silently install the app when it is published to devices.
  5. Click Yes for Admin Privileges
  6. Select Force restart for Device Restart

Configure Installer Codes

 

  1. Scroll down to find the Install Timeout, Installer Reboot Exit Code, and Installer Success Exit Codes
  2. Enter 10 for the Installer Timeout
  3. Enter 3010 for the Installer Reboot Exit Code
  4. Enter 0 for the Installer Success Exit Code

The Install Timeout field informs UEM how long (in minutes) it should attempt to install the executable before retrying the command.

Exit Codes inform the device how to respond to the install process. 3010 notes that a restart is required to complete the install. 0 indicates that the action completed successfully.

Add Criteria for When to Call Install Complete

 

  1. Scroll down to the bottom to find the When to Call Install Complete settings
  2. Select Defining Criteria
  3. Click Add

Add File Exists Criteria

 

NOTE: Remember that you can copy + paste the text from the manual into the console by using keyboard shortcuts or by clicking + dragging to highlight the text, then dragging the text into the text field.

  1. Select File exists for the Criteria Type
  2. Enter C:\Program Files\VMware\Workspace ONE Tunnel\VMwareTunnel.exe for the Path
  3. Click Add

This File exists Criteria will inform UEM that the Workspace ONE Tunnel app has been successfully installed once the VMwareTunnel.exe file exists at the configured path.

Add an Application Icon

 

  1. Click the Images tab
  2. Click the Icon tab
  3. Click the currently empty image box

Select the VMwareTunnel.png File

 

  1. Click Documents
  2. Click HOL
  3. Select the VMwareTunnel.png file
  4. Click Open

Save and Assign

 

The application configuration is completed! Click Save & Assign.

 

Create Application Assignment

Now that you have uploaded the application and input details so that Workspace ONE UEM knows how to install and uninstall the application, you now need to assign which users or devices in your organization will receive this app.

 

  1. Enter All Devices for the Assignment Name
  2. Click the Assignment Groups input field
  3. Click the All Devices (your@email.shown.here) option

This assignment to the All Devices group indicates that every Windows 10 device that enrolls into your organization, regardless of the user or type (Employee Owned, Corporate Owned, etc.) will receive the application.

 

Update Delivery Method

 

  1. Select Auto for the App Delivery Method
  2. Click Restrictions

Configuring the App Delivery Method to Auto means that the application will automatically be delivered to any Windows 10 devices that enroll in your organization. If you wanted users to be able to download the application as needed, you could select On Demand.

Update Restrictions

 

  1. Enable the Make App MDM Managed if User Installed option
  2. Click Create

The Make App MDM Managed if User Installed option will overwrite the Workspace ONE Tunnel application installed on the device if it already exists. This can be important if you need to push configurations down to a device, as this is not possible if the device is not managed by MDM (Workspace ONE UEM). Enabling this will ensure all installed Workspace ONE Tunnel applications on our devices are MDM managed.

Save the Application Assignments

 

  1. Confirm that the All Devices assignment you created shows up
  2. Click Save

 

Publish the Application

 

The application is now configured and assigned and ready to publish! Publishing will make the application with its configurations available to your users.

  1. A preview of devices that will receive this application assignment are shown here. Because you have already enrolled the Windows 10 virtual machine, it displays in this preview.
  2. Click Publish.

 

Validate Workspace ONE Tunnel Install


The Workspace ONE Tunnel app that was published to the device requires a restart in order to complete the installation. The app configuration that was setup will force the device to reboot automatically once the app is finished installing.


<img src="assets/56bbd572-1288-40ec-83b7-e55b1f2aa0d9.png" height="674" width="800" />

To expedite the sync process that will trigger the application install:

  1. Click the Workspace ONE Intelligent Hub app from the task bar
  2. Click Sync Device

<img src="assets/08bb70a9-2b00-4a5f-87e7-90422714c609.png" height="564" width="668" />

The Workspace ONE Tunnel app that was published to the device requires a restart in order to complete the installation. The app configuration that was setup will force the device to reboot automatically once the app is finished installing.

IMPORTANT: The Workspace ONE Tunnel app may take several minutes to install, therefore, the automatic restart may not trigger right away. Please wait until the device automatically restarts, do not trigger a restart manually!


<img src="assets/20e3f19b-d9b8-4036-a515-74fbfd9c6093.png" height="162" width="558" />

Once the device restart triggers, you will be notified that the Remote Desktop Connection was ended. Click OK.


 

 

 

 

Reconnect to the Win10-01a Virtual Machine

 

From the Main Console desktop, double-click the Win10-01a.rdp shortcut to reconnect to the virtual machine.

NOTE: It may take a few minutes before the device finishes rebooting. If your connection attempt fails, wait a minute and try again.

 

 

Launch Microsoft PowerShell

 

  1. Right-click the Windows Start button
  2. Click Windows PowerShell (Admin)

 

Run the Proxy Setup Script

 

NOTE: Remember that you can click + drag to highlight the above text, then drag and drop it into the HOL console to paste it to avoid typos!

  1. Type the command C:\HOL\Win10TunnelProxy.ps1 and press ENTER.
  2. Type the command: Restart-Service -Name VMwareTunnel and press ENTER.
  3. Click the X to close PowerShell.

Due to the networking in the Hands-on Labs environment, we need to an an entry into the proxy settings to allow the outbound traffic to leave the network. This script makes this update for you.

 

Confirm the Proxy Settings

 

  1. Click the Search icon on the task bar
  2. Type internet options
  3. Click Internet Options

 

Confirm Proxy Exceptions

 

 

 

  1. In Internet Options, click the Connections tab.
  2. Click LAN Settings.
  3. Click Advanced.
  4. Confirm that the Exceptions list contains the *.vmware.com entry.
  5. Click OK on Proxy Settings to close the page.
  6. Click OK on Local Area Network (LAN) Settings to close the page.
  7. Click OK on Internet Properties to close the page.

 

Launch the Workspace ONE Tunnel app

 

  1. Click the Windows Start button
  2. Click the Workspace ONE Tunnel app under Recently added

 

 

Open the Workspace ONE Tunnel Status Page

 

  1. Click the task bar drop down button to see more apps
  2. Right-click the Workspace ONE Tunnel app icon from the system toolbar
  3. Click Status

 

 

Confirm the Tunnel Status

 

  1. Click the (i) icon next to Google Chrome to see the configuration.
  2. We can see that the Google Chrome application is configured to send a set of domains (such as *vmware.com, *gambling.com, etc.) and the IP address CIDR Block and Ports (172.31.64.0/23 ports 80, 8081, and 8082) through the Tunnel service.

 

Login to the Workspace ONE UEM Console


<img src="assets/e607592e-4581-454b-b6c3-2a0078117ae3.png" height="151" width="99" />

Double-click the Google Chrome shortcut located on the desktop of the virtual machine you are currently connected to.


 

 

Enter the Admin Username for the Workspace ONE UEM Admin Console

 

The default home page for the browser is https://hol.awmdm.com. Enter your Workspace ONE UEM Admin Account information and click the Login button.

  1. Enter your Username. This is the email address that you have associated with your VMware Learning Platform (VLP) account that you utilized to take Hands-on Labs.
  2. Click Next, then advance to the next step of the lab manual to enter the password, which will always be VMware1!.

NOTE - If you see a Captcha, please be aware that it is case sensitive!

 

 

Authenticate to the Workspace ONE UEM Console

 

The password field will be displayed after entering your username.

  1. Enter VMware1! for the Password field.
  2. Click the Log In button.

NOTE: Due to lab restrictions, you may need to wait here for a minute or so while the Hands On Lab contacts the Workspace ONE UEM Hands On Labs server.

 

Login to the SD-WAN Network Orchestrator


<img src="assets/4dfef03a-6b3b-4ba9-853c-d0c762b52909.png" height="535" width="897" />

In addition to the Workspace ONE UEM administrator console, you will also be logging in as a read-only user to the SD-WAN Network Orchestrator console for this Hands-on Lab to view and confirm various settings related to the Workspace ONE Tunnel service hosting, Secure Access settings, and Cloud Web Security Policies.

  1. Click the Pin button on the remote desktop tab, this will allow easier access to the various tabs in your browser
  2. Click the New tab button to open a new tab
  3. Click the Tunnel bookmark folder
  4. Click the SD-WAN Network Orchestrator bookmark
  5. Enter holuser@vmware.com for the username
  6. Enter VMware1! for the password
  7. Click Login
  8. Click the first tab to return to Workspace ONE UEM

Leave the SD-WAN Network Orchestrator tab open as you will be periodically returning to this tab throughout the lab.


 

Validate Successful Connection to the Intranet Site


You have now made the following configurations:

  • Confirmed that the Workspace ONE Tunnel configuration in your Workspace ONE UEM tenant is integrated with the Tunnel service hosted by the SASE PoP
  • Confirmed the Device Tunnel Traffic rules that specifies which domains and IPs should be Tunneled, proxied, or bypassed
  • Created and deployed a Profile with a VPN payload to your device
  • Imported, configured, and deployed the Workspace ONE Tunnel app to your device
  • Reconnected to the Windows 10 virtual machine after the Workspace ONE Tunnel install required a device reboot

With the Workspace ONE Tunnel app deployed and configured, you are now ready to test accessing the intranet site again.

This time, the Workspace ONE Tunnel Device Tunnel Traffic rules specify that requests to IPs in the 172.31.64.0/23 range (which is where the intranet-server is hosted) on ports 80, 8081, and 8082 should pass through the Tunnel. Since the Tunnel is hosted in the same private network,


 

Navigate to the Intranet Website on Port 80

 

  1. Click the New Tab button
  2. Click the Tunnel bookmark folder
  3. Hover over the Web Security Examples folder, then click the Intranet (Port 80) bookmark link. Notice that the Intranet home page now loads since the device was able to establish a successful connection to the Tunnel which is able to resolve the http://intranet-server site through the local host record.
  4. Click the Workspace ONE Tunnel app from the task bar
  5. Confirm that the Status now shows Connected. This occurred because the managed app, Google Chrome, attempted to contact a managed domain from the Device Traffic Rules and connected to the Tunnel service hosted by the SASE PoP to reach the endpoint.

IMPORTANT: If you see an error about the hostname not being resolvable when connecting to the site, the Tunnel service may have been establishing a connection still. Wait a few seconds and refresh the page.

 

 

Navigate to the Intranet Website on Port 8081

 

  1. Click the Tunnel bookmark folder
  2. Hover over the Web Security Examples folder, then click the Intranet (Port 8081) bookmark link.

Recall that our Device Traffic Rules were also allowing port 8081 and 8082 to the 172.31.64.0/23 network where the intranet server resides. This confirms that you can also successfully reach the http://intranet-server:8081 endpoint through the Tunnel.

 

 

Navigate to the Intranet Website on Port 8082

 

  1. Click the Tunnel bookmark folder
  2. Hover over the Web Security Examples folder, then click the Intranet (Port 8082) bookmark link.
  3. Click the Close button on this tab

Recall that our Device Traffic Rules were also allowing port 8081 and 8082 to the 172.31.64.0/23 network where the intranet server resides. This confirms that you can also successfully reach the http://intranet-server:8082 endpoint through the Tunnel.

 

Validate Cloud Web Security Policies


You may recall that while we inspected the Secure Access setting in the SD-WAN Network Orchestrator that a Cloud Web Security (CWS) policy named Corporate-Policy was enabled. Cloud Web Security policies allow for network traffic for Secure Access users to be inspected and blocked to keep users and corporate resources safe from malicious and undesirable sites.

The Corporate-Policy Cloud Web Security policy has been configured to:

  • Prevent enrolled devices from browsing to undesirable websites based on category, such as a gambling website
  • Prevent users from downloading files that are not encrypted with a password

 

View Cloud Web Security Policies

 

  1. Click the second tab to return to the SD-WAN Network Orchestrator
  2. Click the Enterprise Applications drop down
  3. Click Cloud Web Security

 

Navigate to Configure Tab

 

Click the Configure tab.

Inspect the Security Policy

 

The list of Security Policies for your Secure Access deployment are available here. Click the Corporate-Policy link.

SSL Inspection Policies

 

 

The SSL Inspection tab is the default landing tab. All policies process in order from top to bottom, similar to a Network Access Control List (NACL).

  1. The Default SSL Inspection Rule applies to any source or destination and only inspects traffic for logging and metric purposes. This is the initial and default SSL Inspection rule and cannot be edited or deleted.
  2. A Bypass rule has been added named UEM bypass. Click the UEM bypass rule to see more details.
  3. The Skip SSL Inspection is set to Destination, allowing us to specify an IP address, range, CIDR block, or host/domain record to bypass.
  4. We've configured the Destination Host/Domain field to awmdm.com, which means our Workspace ONE UEM traffic to hol.awmdm.com won't be inspected.
  5. Click Cancel to close the SSL Exception.

URL Filtering Policies

 

  1. Click the URL Filtering tab
  2. See the 3 default URL Filtering rules which cannot be removed or edited which act as a catch-all rule, allowing all domains, threats, and categories
  3. Click the Allow default rule that was created to block some categories

Remember that the rules are processed in order from top to bottom, so the three default allow rules will only be processed if any proceeding rules do not apply.

URL Filtering Policies (Continued)

 

 

 

  1. The Based On settings are first, which let you target Website Categories, Threat Categories, or Domains. We wanted to block specific categories for devices, so we have selected Website Categories.
  2. Click Next to continue to the Source and Destination settings.
  3. The All Users and Groups source was selected to apply this rule to everyone.
  4. The Custom Selection option was selected for Destinations to pick which Categories we want to target.
  5. The Dating, Gambling, and Games categories were selected.
  6. Click Next to continue to the Action settings.
  7. The Action setting allows you to set this rule to Allow or Block the categories you selected. We selected Block to prevent users from browsing to the target categories
  8. Click Cancel to close the URL Filtering rule.

Content Filtering Policies

 

  1. Click the Content Filtering tab
  2. Note the two default Content Filtering rules which allow file downloads if the file is encrypted with a password prompt and allows any file upload
  3. Click the Block File Upload rule that we created

Remember that the rules are processed in order from top to bottom, so the two default allow rules will only be processed if any proceeding rules do not apply.

Content Filtering Policies (Continued)

 

 

 

NOTE: The following is for informational purposes only.  Due to this being a live production environment, no changes can be made.  Click the Cancel button to continue.


  1. The Transfer Type determines if you are targeting Uploads or Downloads. We have selected Upload for this rule.
  2. Click Next to continue to the Source and Destination settings.
  3. The Source was set to All Users and Groups to apply the rule to everyone.
  4. The Destinations was set to All Domains/Categories to apply to all destinations.
  5. Click Next to continue to the Action settings.
  6. The Action setting allows you to set this rule to Allow or Block the content you selected. We selected Block to prevent users from uploading files.
  7. Click Cancel to close this Content Filtering rule.

Content Inspection Policies

 

  1. Click the Content Inspection tab
  2. Note that the default Content Inspection rule that marks any source or destination inspection as clean, meaning no action is taken.

No additional Content Inspection rules were created for this deployment.

 

Validate Categories Filtering Rule

 

  1. Click the New tab button
  2. Click the Tunnel bookmark folder
  3. Hover over the Web Security Examples folder, then click the Gambling Website bookmark link
  4. Confirm that the request was blocked because the website was classified as a gambling site

Recall that our URL Filtering policies had a rule that blocked accessing a few categories of websites, one of which included gambling websites.  This confirms that the traffic passing through the Tunnel service was inspected, the category was determined to be a gambling website, which our policy specifies should be blocked.

 

 

Validate Content Filtering Rule

 

  1. Click the Tunnel bookmark folder
  2. Hover over the Web Security Examples folder, then click the EICAR Anti-Maleware Test File bookmark link
  3. Scroll down to find the download area
  4. Click the eicar_com.zip file

 

File Download Policy Restricts Request

 

After attempting to download the .zip file, the request is blocked because it violates the Document or File Download Policy Restriction that has been configured. Recall that the default Content Filtering rule only allows file downloads if they are encrypted and require a password prompt, which this file does not.  Because none of our other configured rules explicitly allow non-encrypted files to be downloaded, the file is therefore blocked.

 

Validate File Upload Block Rule

 

  1. Click the Tunnel bookmark folder
  2. Hover over the Web Security Examples folder, then click the File Uploader bookmark link
  3. Click Add Files

 

Select a File to Upload

 

  1. Click Documents
  2. Click HOL
  3. Click VMwareTunnel.png
  4. Click Open

Confirm File is Unable to Upload

 

  1. After the file upload process starts, you will see that the progress bar for the VMwareTunnel.png upload changes to error.
  2. Click Close on this browse tab.

Recall that our Cloud Web Security policy had a Content Filtering rule that blocked all file uploads for all users.  This confirms that the user was unable to upload the file because the process was blocked by the Cloud Web Security policy.

Cloud Web Security Analysis


You have reviewed how the Cloud Web Security policy was configured to prevent actions for your end users. You will now inspect the Monitoring section of the Cloud Web Security section of the SD-WAN Network Orchestrator UI to see what details are available for administrators of the system.


 

Navigate to the Cloud Web Security Monitor Page

 

  1. If you browsed away from the SD-WAN Network Orchestrator tab, click the second tab to return
  2. If you browsed away from the Cloud Web Security page, click the Enterprise Applications drop down and select Cloud Web Security
  3. Click the Monitor tab on the Cloud Web Security page

 

 

View Threat Analysis

 

NOTE: Your dashboards will differ from the above view because they are displaying real metrics gathered from the Hands-on Lab.

  1. Click Threat Analysis
  2. Click the Time filter and change it to Past 30 Days
  3. Notice that the dashboards update to show data from the past 30 days

 

 

Threat Analysis Dashboards

 

NOTE: Your dashboards will differ from the above view because they are displaying real metrics gathered from the Hands-on Lab.

  1. Scroll down to find the Threat Analysis dashboards
  2. The Top 5 Threat Types, Threat Origins, Vulnerable Services, and Threats By Users display real metrics in your Secure Access deployment. You can examine the details here to make informed decisions on changes to your Secure Access deployment.

 

 

View Traffic Analysis

 

NOTE: Your dashboards will differ from the above view because they are displaying real metrics gathered from the Hands-on Lab.

  1. Click Traffic Analysis
  2. Click the Time filter and change it to Past 30 Days
  3. Notice that the dashboards update to show data from the past 30 days

 

 

Traffic Analysis Dashboards

 

NOTE: Your dashboards will differ from the above view because they are displaying real metrics gathered from the Hands-on Lab.

  1. Scroll down to find the Traffic Analysis dashboards
  2. The Top 5 Sites, Categories, Actions, and Users dashboards display real metrics in your Secure Access deployment. You can examine the details here to make informed decisions on changes to your Secure Access deployment.

 

 

View Web Logs

 

A log of traffic, how it was categorized, and how it was handled by your policies is available in the Web Logs section.

  1. Click Web Logs
  2. Click any of the results in the web log to see more details about the traffic
  3. Scroll down to see more details in the Log Entry Details section

 

 

Return to the Workspace ONE UEM Administrator Console

 

Click the first tab to navigate back to the Workspace ONE UEM Administrator console to complete the next steps.

 

Un-enrolling your Windows 10 Device


In this section, we are going to un-enroll our Windows 10 VM so that we can use it for other lab modules.

We will use the Enterprise Wipe wipe command to remove all of the managed content that was pushed to the device (such as profiles and apps) by Workspace ONE while not modifying any personal content or data on the device.


 

Enterprise Wipe from Workspace ONE UEM Console

 

Return to the Workspace ONE UEM Administrator Console in Google Chrome,

  1. Click on Devices
  2. Click on List View
  3. Select the check box next to your device friendly name.
  4. Click on More Actions
  5. Click on Enterprise Wipe

 

 

Enter PIN and Enterprise Wipe Device

 

  1. You may need to scroll down to find the Security PIN input
  2. Enter the Security PIN that you created when you first logged into the Workspace ONE UEM administration console, which was 1234. If you used a different PIN, enter that one instead.
  3. Click Delete

 

 

Validate Enterprise Wipe

 

NOTE: The Enterprise Wipe may take several minutes to process.

  1. Click the Refresh icon periodically to refresh the page to check if the Enterprise Wipe has processed
  2. If needed, scroll to the right to find the Enrollment column
  3. Notice that the Enrollment status for the device changes to Unenrolled once the Enterprise Wipe command is processed

 

 

Navigate to Windows 10 Settings

 

  1. Click on the Windows Icon
  2. Click on the gear icon to access Windows 10 Settings

 

 

 

Access Accounts Settings

 

From the Settings Menu, access Accounts

 

 

Validate That No Management Account Exists

 

  1. Click on Access work or school
  2. Validate that you DO NOT see any account connected to Workspace ONE MDM.

NOTE: The CORP AD domain is the local domain in this lab and is not controlled by Workspace ONE UEM Enrollment, so you will see this connection when your device is enrolled or unenrolled.

NOTE: If the Access Work or School page was opened from earlier, you may need to refresh or navigate away from the page and return to see the changes.

 

  1. Click the Connected to Workspace ONE UEM account
  2. Click Disconnect
  3. Click Yes

 

Return to the Main Console


<img src="assets/9af3b6f6-5b16-4a7f-a309-b5a387142b7e.png" height="34" width="586" />

Click Close (X) on the Remote Desktop Connection bar at the top of the screen to return to the Main Console to finish making configurations within the Workspace ONE UEM Console.

NOTE: If the Remote Desktop Connection bar is not visible, you may have unpinned it. Hover your mouse of the top of the screen to display the Remote Desktop Connection bar again, then click close.


 

Summary


You have completed this Hands-on lab for Securing the Anywhere Workspace with Secure Access Service Edge (SASE)! With the principals learned here, consider how the Anywhere Workspace can enable remote and secure access to your cloud applications and corporate datacenter no matter where your employees are located.

In review, you learned how to:

  • Integrate Workspace ONE Tunnel with Workspace ONE UEM
  • Configure Tunnel Traffic Rules to tunnel, block, or bypass traffic to the Workspace ONE Tunnel
  • Import and publish the Workspace ONE Tunnel application to your end users
  • Create and publish a Profile with a VPN payload for Workspace ONE Tunnel
  • Enroll a Windows 10 virtual machine
  • Use the Workspace ONE Tunnel application to access an intranet website hosted on a private network
  • Configure Cloud Web Security policies in Secure Access to block unwanted or malicious actions
  • Investigate traffic details and metrics in the SD-WAN Network Orchestrator

Level Up Your VMware End User Computing Knowledge with VMware Tech Zone


<img src="assets/71027dfc-017e-414a-af41-9f035e6b5be7.png" height="291" width="715" />

Interested in learning more about VMware End User Computing (EUC) but don't know where to start? Look no further than https://techzone.vmware.com, your fastest path to understanding, evaluating, and deploying VMware End User Computing products!

Tech Zone focuses on providing practical product guidance, curated activity paths, and technical content to take you from zero to hero!  Our mission at Tech Zone is to provide you with the resources you need to keep leveling up your knowledge no matter where you are in your digital workspace journey.

Interested? Check us out at https://techzone.vmware.com!


 

Conclusion

Thank you for participating in the VMware Hands-on Labs. Be sure to visit http://hol.vmware.com/ to continue your lab experience online.

Lab SKU: HOL-2251-09-DWS

Version: 20230328-223206