ALTE DOCUMENTE
|
|||||||||
The Microsoft® Exchange ActiveSync® Mobile Administration Web
tool enables administrators to manage the process of remotely erasing lost,
stolen, or otherwise compromised
By using the Exchange ActiveSync Mobile Administration Web tool, administrators can perform the following actions:
View a list of all devices that are being used by any enterprise user.
Select/de-select devices to be remotely erased.
View the status of pending remote erase requests for each device.
View a transaction log that indicates which administrators have issued remote erase commands, in addition to 16516s1816q the devices those commands pertained to.
Install the tool on an Exchange Server 2003 with Service Pack 2 (SP2) front-end server.
Note Exchange ActiveSync Mobile Administration Web tool works with the device password policy enforcement logic in Exchange Server 2003 SP2. To use the tool without enforcing a device password policy for the users, create an empty policy by selecting require password, but leave all sub-fields unselected.
To install the Exchange ActiveSync Mobile Administration Web tool, run the MobileAdmin.msi package on the front-end server.
Note When installed as described, the tool will be available from any remote computer that has a browser that can access the virtual directory associated with the tool. However, to access the tool from the same computer that it is installed on, you must use one of the following approaches:
add the server name to the Local intranet list for Internet Explorer (In Internet Explorer, click Tools, click Internet Options, click Security, click Local intranet, and then click Sites)
use 'localhost' as the server name when specifying the mobileAdmin URL in the browser
By default, access to the Exchange ActiveSync Mobile Administration Web tool is restricted to Exchange administrators and local administrators. A user from either of these groups can enable additional users to access the tool by modifying the security settings on the MobileAdmin tool installation folder. You do this by right-clicking the folder, and then selecting sharing & security, which displays the Insert Folder Security properties dialog box.
By using this user interface, an administrator can add a user or group by clicking Add and then entering the name of the user or group to which they want to grant access.
Similarly, a user or group can be removed by selecting that user or group, and then clicking Remove.
The Welcome Screen presents an administrator with a list of administrative options. Select one of these options to start the associated Web page. The options displayed on the Welcome Screen are as follows:
Remote Wipe Run a remote wipe command for a lost or stolen mobile device.
Transaction Log View a log of administrative actions, noting time/action/user.
The Remote Device Wipe administrator console provides the following functions:
Issue a remote wipe command for a lost or stolen mobile device.
View the status on a pending remote wipe command.
Undo (cancel) a remote wipe command if a lost or stolen mobile device is recovered.
Delete a device partnership.
To issue a remote wipe command, search for a user's
The user can be searched by specifying either their e-mail name or full SMTP address, for example, "user1" or "[email protected].
The status is indicated under Status for each mobile device and may contain one or more of the following values:
OK device can synchronize.
Wipe Initiated... Administrator has chosen the wipe action, but the directive has not yet been sent to the mobile device.
Sent To Device The remote wipe directive has been sent to the mobile device and we are waiting for confirmation.
Device Acknowledged The device has acknowledged receipt of the remote device wipe directive and its intent to run the wipe.
Wipe operation completed successfully All bookkeeping and so on has been completed and the remote wipe has been performed.
When a Wipe action is specified for a mobile device, it remains active until the administrator specifies otherwise. This means that after the initial remote wipe has been completed, the server continues to send a remote wipe directive if the same mobile device ever tries to reconnect. If a lost device is recovered, the administrator will have to cancel this directive so that the mobile device can successfully connect again. You do this by locating the mobile device that has the remote wipe action set, and then clicking Cancel Wipe.
Lastly, the administrator can use the remote wipe console to delete a device partnership from the server. This has the effect of cleaning up all state information associated with a specified mobile device on the server and is primarily useful for housekeeping purposes. If a mobile device tries to connect after its partnership has been deleted, it will be forced to re-establish that partnership with the server through a recovery process that is transparent to both the IT administrator and the end user.
To delete a partnership, locate the device you want in the device list, and then click Delete.
The Transaction Log displays the following information for all critical administrative actions performed with the Exchange ActiveSync Mobile Administration Web tool:
Date Time Date and time when the action was executed.
User The user who executed the action.
Mailbox The mailbox that the action pertained to.
Device Id The device that the action pertained to.
Type The type of device that the action pertained to.
Action The action taken by the administrator.
There are also Refresh and Clear buttons for administrative actions. When the administrator clicks Clear, a prompt is issued verifying that this action is to be performed. Click OK or Cancel. When a "clear" action has been performed, an event is logged that indicates this.
Copyright
Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
2005 Microsoft Corporation. All rights reserved.
Microsoft, MS-DOS,
Windows, Windows NT, Windows Server, and ActiveSync are either registered trademarks or trademarks
of Microsoft Corporation in the
All other trademarks are property of their respective owners.
|