general

unmanaged but secured – how mobile application management support your enterprise

while ios and android offer more and more deep api to securely managed a mobile device and integrate into enterprise – apple utilize restrictions to natively separate managed from unmanaged content – android buildin work container on every device to secure enterprise data – both offer enrollment program to easiely intergrate the devices to management system

but there a argument to not rely on device management api – ios lack unfinished restriction of unmanaged/managed data, it is possible to bypass limitation under certain conditions – android depricated existing device admin feature in favor of android enterprise technology, but new container ui/ux isn’t consitant between different os releases and lack of some existing features, e.g. private/business calender overlay

privacy is a main point to offer a byod solution for your employees, ios managed devices could report your installed app and fully wipe even your private data (until user-enrollment was released), android enterprise addressed this from the very first, apple introduced user-erollment to address privacy concerns for byod deployments

usablity is the other big point to address for your users – while apple provide the ability to use business data within ios native applications, android lack of a consistant look and feel between os releases and different management api, batch icons differ at different releases and espesially samsung devices – to ease support provide the same email app across both mobile os

2019-06-09 07_00_15-MobileIron Email+ - Apps on Google Play

2019-06-09 07_00_05-‎MobileIron Email+ on the App Store

mobile application management also named non-MDM managed your data within an app or a entire framework, the app is’t capable to control your device, e.g. to enforce device pin or encryption – major mdm vendor like airwatch, mobileiron, blackberry formerly good and citrix provide a framework to secure your data over serveral productivity apps, without the need to rely on device api

blackberry_uem-logos

microsoft offer with it’s office 365 apps the capability to secure business data with app protection policies without the need to enroll your device to a unified endpoint management, 3rd party mdm could optinally integrate these features with graph api

Conceptual image that shows company data being protected by policies

when it comes to enterpise integration with full device vpn support, certificate authentication or kiosk (single use) devices there is no way around a uem solution

don’t be a fool, select your prefered solution, based on the requirement for each usecase

apple, technology

iOS13 just released, but already updated

…with some interesting festures:

  • share ETA in maps
  • dynamic wallpapers
  • icon of volume slide

even for enterprise mobility there is some interesing festure, with iOS13.1 it’s possible to silently update an App, it will close, update and continue in kiosk/single app-mode.

more about apple developer beta at beta.apple.com

or read about how to downgrade beta

https://madereal.blog/2019/03/19/downgrade-beta/
general

new forms of malware via calendar invite even more annoying

more often noticed and actually effected by myself – google calenar display per default new invites from inbox, usually displayed in calendar for easy scheduleing or to block the timeslot – so attacker can target your gmail account to push notification directly to your mobile device when the fake calendar entry occurs

to get rid of this spam, it’s not enough to delete each calendar entry, because a new invite immediately popup’s in your calendar – your have to disable the feature “automatically add invitations” in google calendar event settings

further … a vulnerability in WIB sim-browser can let attackers globally take control of hundreds of millions of the victim mobile phones worldwide to make a phone call, send SMS to any phone numbers, send victim’s location, launch WAP browser, etc. – read more

security

switch to modern authentication – sms as second factor is insecure

not only since twitter ceo jack dorsey was a victim with activated additional sms authentication for it’s account – now twitter disabled “temporarily” the ability to tweet via sms

…that phone numbers and sms’s were not designed to be used as two-factor authentication systems, as they are insecure.

Fabio Assolini, Senior Security Researcher at Kaspersky Lab, TechRadar Middle East

sim swapping is a technique of porting the same number to a new sim card of someone else, instead use features like oauth (already developed in 2006) – modern uem solutions ot casb take care about this with checking additional properties, like manged apps or encrypted devices > further secure alternatives below

multi-factor authentication
general

load webpages with different user agents, quick and easy without any plugin

… if you want to test or troubleshoot your mobile webpage or browser app it’s quite tricky from desktop – mobile webapplication deliver content based on the browsers user agent – there are severals browser plugins to switch the agent – but all major browser offer a build in feature to change the behaviour

google chrome

in settings > more tools > developer tools (Crtl + Shift + I) below network conditions your able to switch user agent – e.g. search at google to display

microsoft edge and internet explorer

F12 developer tools (press F12) > Emulation opens an onboard user agent switcher

mozilla firefox

webpage is loaded in same way an iPad would do – type about:config in addressbar, search for useragent and create a new entry

string: general.useragent.override

value: Mozilla/5.0(iPad; CPU OS 6_0 like Mac OS X) AppleWebKit/536.26(KHTML, like Gecko) Version/6.0 Mobile/10A5355d Safari/8536.25

macOS safari

enable in settings > advanced the option show develop menu in menu bar

iOS devices

since iOS13 / iPadOS – safari browser of the apple tablet can switch between mobile and desktop presentation of a webpage, as shown in the video below

android devices

install e.g. Rocket Browser to test the behavoir of other user agents, in Settings > General Settings is it possible to change the user agent – developed android webapps can define an own user agent with java code webview.getSettings().setUserAgentString(MyString);


test your Browser features here and see what’s your browser capable of

https://launchr.eu/browser/


android tips & tricks everyone should know
apple, innovation

whole new iOS13 with more privacy in enterprise

tim cook recently spoke about user data and privacy, while criticizing technology companies, like google or facebook

iOS is enterprise’s first choice for mobile activity, egnyte‘s enterprise insight showed a clear weighting and content is getting more more mobile

How-Businesses-Work-in_employees-840x1087

the biggest change since iOS5 introduced supervised devices and open-in management debuted in iOS7

iOS 13 will available in fall 2019 – since google is pushing hard with android enterprise to fit business needs, with it’s buildin containerization based on samsung’s KNOX – iOS 13 provide more granular security and better privacy restriction

enrollment methods

there are already rolled out thousands of iOS devices with either manually installing a mdm profile (uamdm) or centralized with device enrollment program (dep) to get the device under control of a unified endpoint management (uem) – additionally you can enable your iOS device as supervised either while dep enrolled or via apple configurator connected to a mac

newly added – user enrollment – previously an administrator of a managed device was able to retrieve the installed apps, remove the passcode or wipe the entire device – at least the privacy controls of the registered uem prohibit this features to individuals – with user enrollment there are huge improvements to the users privacy

  • user needs to login with managed apple id
  • uem unable to retrieve device information like IMEI, serial or mac address
  • private apps aren’t reported to uem
  • no control about device passcode or to wipe the entire device
  • still the configuration of wifi, vpn or exchange accounts will available
  • other existing restrictions reserved for supervised devices, see listing below

restriction changes

  • allowSafari, available since iOS 4, require supervised device as of iOS 13
  • allowVideoConferencing, available since iOS 4, require supervised device as of iOS 13
  • allowWiFiPowerModification, available for supervised iOS 13 devices
  • safariAllowAutoFill, available since iOS 4, require supervised device as of iOS 13
  • allowAddingGameCenterFriends, available since iOS 4.2.1, require supervised device as of iOS 13
  • allowAppInstallation, available since iOS 4, require supervised device as of iOS 13
  • allowCamera, available since iOS 4, require supervised device as of iOS 13
  • allowCloudBackup, available since iOS 5, require supervised device as of iOS 13
  • allowCloudDocumentSync, available since iOS 5, require supervised device as of iOS 13
  • allowCloudKeychainSync, available since iOS 7, require supervised device as of iOS 13
  • allowContinuousPathKeyboard, available for supervised iOS 13 devices
  • allowExplicitContent, available since iOS 4, require supervised device as of iOS 13
  • allowFindMyDevice, available for supervised iOS 13 devices
  • allowFindMyFriends, available for supervised iOS 13 devices
  • allowiTunes, available since iOS 4, require supervised device as of iOS 13
  • allowMultiplayerGaming, available since iOS 4.1, require supervised device as of iOS 13

read a full list of apple’s device management restrictions here

Sign in with Apple vs. managed Apple ID

while sign in with apple is the approach to to compete with google or facebook as a identity provider (idp) for external services, for business on the other hand managed Apple IDs were so far to manage functions of Apple Business Manager, since WWDC 2019 it’s necessary to register with user  enrollment, enterprise create additional account’s for byod user to add to their device, keeps data completely separated between both accounts, hopefully compared to now:

iPadOS

along with iOS13 apple separate to path between iPhone and iPad with a standalone OS, finally iPadOS can provide more feature to the tablet, a classic desktop replacement could possible – view the demo below

stay tuned for final release around mid-september with likely new 2019 iPhone


technology

iOS security framework like a swiss cheese

apple did a quite good job with the restrction of openin function between managed and unmanaged apps, and advanced it’s separation within it’s native mail and even contacts app

  • allow open documents from unmanaged apps to managed apps
  • allowUnmanagedToRead ManagedContacts

read more >>

manged_contacts

but

there are still leaks in the security framework to get around enterprise restrictions, further details below


openin

apps and even accounts are separated in managed/unmanaged, via enterprise deployed exchange configuration could blocked to move/forward messages to other email accounts within the native apple mail app – the separation between private/business accounts highlighted in colors red/blue through managed domain configuration and also apply to safari domains, downloaded files from managed web domains could only be shared with managed mail accounts, 3rd party apps could implement app configuration to disable copy/paste, sounds perfekt so far,
…but it is still possible to copy/paste business data to private

quick look

an opened document in nativ viewer also respect to managed/unmanaged restriction…
…but when open the file in quick look, you able to send the file in any account without restriction

pictures

it is possible to save media to gallery, for sure it is possible to perform a screenshot but is a bit more tricky

lockscreen

via enterprise registered bringyourowndevices could display sensitive information without the need to enter device credentials at the lockscreen, a mangement system could block the information for devices registered

  • allowLockScreenNotificationsView
  • allowLockScreenTodayView

… but this would impact also the notification for private apps

keyboard

furhtermore for byod it is hard to maintain security without restricting private use, users could use custom keyboard with potential embedded keylogger, iOS developer could add a code below in their project’s to present default iOS keyboard


stay tuned for iOS13 adding more security features 🔐 and privacy with user enrollment 🔏

technology

maximum exchange partnership exceeded – how to solve

with a lot testing with mobile device, i reached again the maximum number of allowed mobiles devices to sync with exchange environment via active sync

You have 100 device partnerships out of the maximum allowed 100 partnerships. After you reach the maximum, you can’t create additional partnerships until you delete existing ones from your account. To do this, sign in to Outlook Web App, click Options > Phone > Mobile Devices, and delete any unused partnerships.

when logged in via webmail it is possible to remove the paired devices via selfservice, unfortunately it is just possible to remove each device by itself in a not very performant ui

exchange mobile devices

as an admin there a other ways to get around this limitation via powershell

change the limit and increase the number – execute Get-ThrottlingPolicy | Set-ThrottlingPolicy -EASMaxDevices 20

programatically remove paired mobile devices Get-MobileDeviceStatistics -Mailbox "tonysmith" | Format-Table DeviceType, FirstSyncTime, LastSuccessSync, Guid