Archives

By Product

Mercy Innovates from the Data Center to the Patient Bedside

Mercy is an integrated healthcare organization with 43 hospitals and more than 700 physician practices and outpatient facilities, serving more than 3 million patients a year. Through technology, Mercy wants to be better partners with their patients, giving them more guidance and preventing problems before they happen.

Mercy received the 2016 HiMMS Nicholas E. Davies Award of Excellence for using health information technology to improve patient care and the bottom line. VMware helps Mercy innovate in healthcare from the data center to the patient&#rsquo;s bedside.

  • Mercy&#rsquo;s goal is to analyze data to provide better outcomes for patients – making sure they have the right product for the right patient at the right time - and also to keep that data secure with VMware NSX and VMware vRealize Automation.
  • Mercy is using the VMware vCloud Air partner network to provide general healthcare-class hosting
  • Mobile devices increase care in patients&#rsquo; homes, extending their clinical care team. Mercy also uses the tablet-based Mercy Bedside app, managed by VMware AirWatch, which patients and their families can use while in the hospital to ease the care process.

“The role that VMware has played … really is enabling the technology. Building these solutions is impossible without the ability to utilize technology as seamlessly as we use our stethoscopes.&#rdquo;
—Todd Stewart, Vice President of Clinical Integrated Solutions, Mercy

Learn more about innovative solutions for healthcare at vmware.com/solutions/industry/healthcare.

Because you liked this video:

  • VMware Horizon VDI Powers WCH’s Hospital of the Future
  • Case Study: Halton Healthcare Modernizes Data Centers & Expands with New Hospital
  • American Red Cross Uses VDI for Faster Disaster Relief

 

The post Mercy Innovates from the Data Center to the Patient Bedside appeared first on VMware End-User Computing Blog.

Read more..

STEM for All at UMass Lowell

The scientists of the future are embracing consumer-simple, enterprise-secure digital workspace solutions at UMass Lowell. With more than 17,750 students—and a strategic plan to increase enrollment to 20,000 over the next few years—this university is known for its educational initiatives in science, technology, engineering and math (STEM). Part of that mission is providing easier access to computationally complex and expensive STEM software packages.

What started as a simple need for more space on campus grew into an initiative that brought virtual desktops and simplified application access to students, faculty and staff. In 2013, the university needed to find a way to reclaim classroom space to teach its growing student body. The school was &#rsquo;bursting at the seams,&#rdquo; according to Steve Athanas, the school&#rsquo;s director of platforms and systems engineering.

&#rsquo;VDI, for us, started as a way to turn computer labs back into usable teaching space. But it turned out to be significantly more than that. Our VDI story is about fundamentally transforming the way we teach and the way we conduct business.&#rdquo;

To learn more about how UMass Lowell uses digital workspace solutions to simplify access to education, read the case study.

UMass Lowell Extends STEM Education with Digital Workspaces

Want to Calculate Fluid Dynamics on Your Phone at a Hockey Game?

UMass Lowell uses VMware Horizon for virtual desktops,VMware App Volumes to distribute applications and VMware User Environment Manager to maintain application settings across sessions. Through a portal called vLabs, UMass Lowell users can access university virtual desktops and apps from anywhere at any time, on any device.

According to Athanas, &#rsquo;Once students realized they were able to access their applications anytime and anywhere, it changed how they functioned as students.&#rdquo; Instead of having to log time in an on-campus computer lab, students could bring a mobile device with them and study whenever it&#rsquo;s convenient. &#rsquo;That&#rsquo;s really important because a huge percentage of our students have either full-time or part-time jobs as they&#rsquo;re achieving their education,&#rdquo; said Athanas.

&#rsquo;The way that VMware is simplifying app distribution is really huge. It means my team spends less time setting up and more time working with our ultimate customers, delivering value to the organization.&#rdquo;

Partnerships for Education

VMware technology partners are playing important roles in the UMass Lowell IT department and in campus academics. The school recently launched a high-performance Horizon cluster with virtual graphics processing units (GPUs) from NVIDIA. Computationally and graphics-intensive design and engineering programs now run on any student or faculty device that can run a Horizon desktop. The university has added additional NVIDIA GPU support to its base image to support the graphical look and feel of a Windows 10 deployment.

Athanas cited VMware partner StacksWare as a critical addition to his IT arsenal. StacksWare metrics for App Volumes deployments provide real-time, deep inspection of application usage.

&#rsquo;This software can tell me right now which users on campus are using which applications, where they’re using them from and how long they’re using them. I can roll all that up and make better decisions about software licenses for the campus. It&#rsquo;s been really transformative for us.&#rdquo;

From &#rsquo;It Works&#rdquo; to &#rsquo;Thank You&#rdquo;

Athanas cited a UMass Lowell study showing that 66 percent of students said that vLabs improved their academic success.

&#rsquo;You know you’re hitting the right mark when instead of users saying &#lsquo;It works,&#rsquo; or &#lsquo;It hasn’t had any problems,&#rsquo; they come up to you and say, &#lsquo;Thank you.&#rsquo; We’re now in a position where faculty and especially students say, &#lsquo;Thank you, this has saved me time, this has saved me effort, my job is easier, my academics are easier.&#rsquo; That’s transformative.&#rdquo;

The post STEM for All at UMass Lowell appeared first on VMware End-User Computing Blog.

Read more..

VMware AirWatch 101: Honeywell Dolphin CT50 Bar Code Enrollment

The bar code enrollment workflow simplifiesenrollment intoVMware AirWatchfor Honeywell Dolphin CT50 devices. While Android Lollipop devices support bar code enrollment, Android Marshmallow devices require slightly different AirWatch Console configurations to enable this workflow. Today’s post covers the configurations and bar code enrollment workflow for Honeywell Dolphin CT50devices on Android Marshmallow.

Honeywell Dolphin CT50 Bar Code Enrollment

In the following workflow, the EZConfig Editor (designed for the Windows OS on a PC) produces two sets of bar codes. The first contains the information required to establish a Wi-Fi configuration on the Honeywell CT50. The second set contains the information to enroll the Honeywell CT50 into VMware AirWatch.The bar codes are presented from within the EZConfig Editor application directly on the PC display. Then, use the EZConfig for Scanning utility on a Honeywell CT50 deviceto scan the bar codes.

Download and Install the EZConfig Editor

The first step in the workflow is to install the EZConfig Editor. Later, you’ll use the EZConfig Editor tocreate bar codes thatestablish Wi-Fi settings and enroll devices into VMware AirWatch.

1. From your Windows PC, click the Honeywell Sensing and Productivity Solutions link.

2. Click the Software tab. Under Tools and Utilities, click the Honeywell EZConfig for Mobility Setup r411The file version number may vary depending on the update schedule from Honeywell. link and download the associated ZIP file.

3. Unzip the file, and run the setup.exe file.

4. When complete, the EZConfig Editor window appears on the PC.

Check the Honeywell CT50 for the Power Tools Application

After installing the EZConfig Editor, confirm that the correct version of the Power Tools Application installed on the device.

  1. On the Honeywell CT50 apps screen, look for the Power Tools icon.
  2. If not present, proceed to the section: Download and Install the Power Tools Application on the Honeywell CT50.
  3. If present, selectPower Tools > Diagnostic Information > About and check the version number.
  4. If the Power Tools version is lower than4.01.00.3791, proceed to thesectionDownload and Install the Power Tools Application on the Honeywell CT50.
  5. If the Power Tools version is 4.01.00.3791 or higher, proceed to the section: Use the EZConfig Editor to Establish Honeywell CT50 Wi-Fi Settings.

Download and Install the Power Tools Application on the Honeywell CT50

Take corrective action if you discovered the Power Tools application was not installed, or was running the wrong version. Simply download and install the Power Tools application suite.

1. Open the Honeywell Sensing and Productivity Solutionspage in your browser.

2. Under the Tools and Utilities section, click the Software tab, and download the Honeywell_CommonES_Android_3.15.3150.zip ZIP fileThe file version number may vary depending on the update schedule from Honeywell..

3. Once download completes, establish a USB connection between your PC and the Honeywell CT50.

4. On the Honeywell CT50&#rsquo;s internal storage card, copy the file to the /Honeywell/autoinstall folder.

5. On the Honeywell CT50, hold down the power button and select Reboot to trigger the application’s installation.

6. After installation successfully completes, click the Power Tools app to access the EZConfig for Scanning utility.

Use the EZConfig Editor to Establish Honeywell CT50 Wi-Fi Settings

After installing the software necessary for barcode enrollment, establish Honeywell CT50 Wi-Fi settings using the EZConfig Editor.

1. Establish a USB connection between your PC and the Honeywell CT50

2. From the Honeywell CT50 upload the DeviceConfig.xml file to the PC.

2. In the EZConfig Editor, navigate toFile > Open >Internal Storage > Honeywell > ezconfig > generatedAdd a Tooltip Text.

3. Select the DeviceConfig.xml file, and click Open.

4. Select DeviceConfig > Connection Settings > Radio Manager > Supplicant > Profile 1, and enter the valuesField values are described in the Key: PSK panel. to modify the Wi-Fi settings in the DeviceConfig.xml file.

5. Select File > Save As, and save the settings to an EXM file for future use. You can give the file a unique name, specific to your own requirements.

6. In the EZConfig Editor, select File > Create EZConfig Bar Code.

7. In the EZConfig Bar Code window, reviewthe resulting bar code.

7. On the Honeywell CT50, selectPower Tools > EZConfig for Scanning utility andscan the bar code.

Note:

After establishing a Wi-FiIf scanning multiple barcodes, the Wi-Fi connection may not establish. In this instance, reboot the Honeywell CT50 to establish the connection. connectionfor the Honeywell CT50,create access to files for VMware AirWatch enrollment.

Creating Access to Files for VMware AirWatch Enrollment

Return tothe EZConfig Editor, and establish access to the files used for VMware AirWatch enrollment:

1. Openyour browser, and log into the VMware AirWatch Console. Navigate toDevices > Staging & Provisioning > Staging, and click Add to create an Android Staging Package.

2. In the Staging window, enter the desired Enrollment User and Password credentials, and leave the Manifest tab empty.

3. In the upper-right corner of the Staging window, click the down arrow, and select Sideload Staging.

4. In the Generate Sideload Staging Package window, click the Organization Group field and select a group to configure device assignment. Leavethe Universal check box deselected.

5. Click Download to download the Sideload Staging ZIP file to your PC, and save the file to a convenient location.

6. On your PC, locate and unzip the file, and open the enrollment folder.

7. From the enrollment folder, upload the credentials.bin file to a file repository accessible to the Honeywell CT50. Take note of the path for future configuration within the EZConfig Editor.

8. From the VMware AirWatch Resources Portal, upload the latest VMware AirWatch Android Agent to the same file repository to be accessed by the Honeywell CT50. Again, take note of the path for future configuration within the EZConfig Editor.

Note: If you cannot access the VMware AirWatch Android Agent, request access from the VMware AirWatch Support Team via a Help Desk Ticket.

9. From the VMware AirWatch Resources Portal, upload the latest Honeywell Services APK file to the same file repository to be accessed by the device. Again, take note of the path for future configuration within the EZConfig Editor.

Note: If you cannot access the Honeywell Services APK file, request access from the VMware AirWatch Support Team via a Help Desk Ticket.

You have finished creating access to files for VMware AirWatch enrollment. The next step is to establish settings for VMware AirWatch enrollment in the EZConfig Editor on the PC.

Configure the EZConfig Editor for VMware AirWatch Enrollment

After creating file access for enrollment, establish settings for VMware AirWatch enrollment in the EZConfig Editor on the PC.

1. Download the Provisioner_bin.exm file toyour PC tomodify it within the EZConfig Editor.

2. In the EZConfig Editor, locatethe provisioner_bin.exm file.

3. Select File > Open to choose and open the file and see its Task folders.

4. In the first Task folder of the EZConfig Editor, modify the Value field entry to make the credentials.bin file available for enrollment.

  • Source – Repository link to the .bin file with a/ format. For example:<link>/credentials.bin
  • Action – Contains the action commandInstallFile.
  • Destination – Storage location on the device.For example:/sdcard/credentials.bin

5. In the second Task folder, modify the Value field entry to install the Honeywell Services APK file.

  • Source – Repository link to the Honeywell Services APK file using the / format. For example: /HoneywellService-release-1.2.apk
  • Action – Contains the action commandInstallApk.
  • Launch – Android intent command that uses the unique Android bundle ID of the Honeywell Services APK file. For example: am start -a android.intent.action.MAIN -n com.airwatch.admin.honeywell/.HoneywellActivity.

6. In the third Task folder, modify the Value field entry to install the VMware AirWatch Agent APK file.

  • Source – Repository link to the VMware AirWatch Agent APK file using the / format. For example: /AirWatchAgent-playstore-release-7.0.0.161-SNAPSHOT.apk
  • Action – Contains the action commandInstallApk
  • Launch – Android intent command that uses the unique Android bundle ID of the VMware AirWatch Agent APK file. For example: am start -a android.intent.action.MAIN -n com.airwatch.androidagent/com.airwatch.agent.ui.activity.SplashActivity -e hideui true

Example:

7. In the fourth Task folder, modifythe Value field entry to allow the AirWatch Agent to have access READ access to the external storage card.

  • Source – Repository link to the VMware AirWatch Agent APK file using the / format. For example: /AirWatchAgent-playstore-release-7.0.0.161-SNAPSHOT.apk
  • Action – Contains the action commandRun
  • Launch – Android intent command that uses the unique Android bundle ID of the VMware AirWatch Agent APK file. For example: pm grant com.airwatch.agent.action.READ_EXTERNAL_STORAGE

7. In the fifthTask folder, modifythe Value fieldentry to perform the enrollment process.

  • Source – Repository link to the VMware AirWatch Agent APK file using the / format. For example: /AirWatchAgent-playstore-release-7.0.0.161-SNAPSHOT.apk
  • Action – Contains the action commandRun
  • Launch – Android intent command that uses the unique Android bundle ID of the VMware AirWatch Agent APK file. For example: am broadcast -a com.airwatch.agent.action.IMPORT_CREDENTIAL_XML -e file /sdcard/credentials.bin --user 0

8. In the sixth Task folder, modifythe Value field toimport the BINfile used by the VMware AirWatch Agent for enrollment.

  • Source – Repository link to the VMware AirWatch Agent APK file using the / format. For example: /AirWatchAgent-playstore-release-7.0.0.161-SNAPSHOT.apk
  • Action – Contains the action commandRun
  • Launch – Android intent command that uses the unique Android bundle ID of the VMware AirWatch Agent APK file. For example: am broadcast -a com.airwatch.agent.action.AUTO_ENROLL --user 0

9. Return tothe EZConfig Editor main menu.

  • Select File > Save, and name the file.
  • SelectFile > Create EZConfig Bar Code, andgenerate a bar code for scanning.

10.On the Honeywell CT50, click Power Tools >EZConfig and scan the bar code. This actionenrolls your Honeywell CT50 device into VMware AirWatch.

Honeywell Dolphin CT50 Bar Code Enrollment Summary

With a simple bar code scan, the VMware AirWatch enrollment process can be expedited by using the Honeywell EZConfig Editor and Honeywell EZConfig for Scanning utilities.

The post VMware AirWatch 101: Honeywell Dolphin CT50 Bar Code Enrollment appeared first on VMware End-User Computing Blog.

Read more..

One Device for On-the-Go Mobility & Desktop Productivity—Eliminate Compromise with VMware & Samsung

VMware Workspace ONE and VMware Horizon Client 4.5 are now available on the Google Play store. Both can be installed on Samsung Galaxy S8 and S8+ smartphones and used with Samsung DeX Station, which enables USB connectivity to peripherals.

The joint Samsung and VMware solution delivers a unified, digital workspace to keep end users productive. Users can seamlessly transition between their on-the-go mobile device and their full-size desk workspace that includes a monitor, mouse and keyboard.

With Samsung and VMware, end users can quickly move from mobile device to desktopfor continuous productivity at work.

Workspace ONE is a simple and secure enterprise platform for delivering and managing any application on the Galaxy S8 and S8+ smartphone. Integrating identity management, real-time application delivery and enterprise mobility management, Workspace ONE helps IT engage digital employees, reduce the threat of data leakage and modernize traditional operations for the mobile-cloud era.

With the Samsung DeX Station, end users can turn their Galaxy S8 or S8+ into a true PC experience. When docked at the DeX Station, Galaxy S8 and S8+ phones launch a special DeX mode on the connected, external monitor, and applications can be opened in multiple, separate windows. We recommend connecting a mouse, keyboard and Ethernet cable for added productivity.

With Workspace ONE and Horizon Client 4.5 installed on the device, DeX users can take advantage of on-the-go access to their Windows, mobile and cloud applications. Without compromising corporate security, this combination is an ideal choice for bring-your-own-device (BYOD) users.

Here&#rsquo;s an example of a Galaxy S8 running DeX mode on a monitor with a Horizon virtual desktop and Workspace ONE.

With Horizon, DeX users will also experience Blast Extreme adaptive transport for high-performing cloud applications and virtual desktops—right from Samsung Galaxy S8 and S8+ devices.

Meanwhile, users can easily multitask between their personal and corporate worlds and even take phone calls. While docked in the DeX Station, call functionality works seamlessly with a Bluetooth headset, without interrupting the desktop experience.

Organizations that want to test the Galaxy S8 or S8+ with Horizon and/or Workspace ONE can quickly sign up at VMware TestDrivefor End-User Computing. IT can conveniently access a free, cloud-based demo environment within minutes—without spinning up internal resources and/or infrastructure.

Go to VMware TestDrive

Learn More

  • See the announcement:Introducing New Samsung Galaxy S8 + VMware Workspace ONE
  • Read more from VentureBeat: Samsung&#rsquo;s DeX dock turns the Galaxy S8 into a PC
  • Watch a demo at KRON 4: Samsung&#rsquo;s Dex Turns Your Phone into a Work or Home Computer

The post One Device for On-the-Go Mobility & Desktop Productivity—Eliminate Compromise with VMware & Samsung appeared first on VMware End-User Computing Blog.

Read more..

VMware Mirage Speeds Windows 10 Migration for Physical PCs

You&#rsquo;ve decided that Windows 10 is in your future. Maybe you&#rsquo;ve even got designs on what that future should look like. But how do you get there? How do you move your legacy XP machines? How do you move your 32-bit Windows 7 machines?

Your existing PC estate is vast, complex and interlinked. Regardless of how amazing you are as an administrator, it contains many unknowns and &#rsquo;gotchas&#rdquo; that have been burned into the images and control scripts by countless admins before you.

VMware can help. We have a sophisticated portfolio of tools that can help you break your problem into discrete, manageable tasks.

  • We have VMware User Environment Manager, which can decouple the PC from its user data, bloated profiles and help you tackle your unmaintainable logon scripts.
  • We have VMware App Volumes, which ring fences your applications, including the user-installed ones, and packages them for dynamic delivery to whole groups of people in a single click.
  • We have VMware Horizon 7, which can deliver the entire Windows experience dynamically to any device of your users&#rsquo; choosing.
  • We have VMware AirWatch, which is probably the most scalable and flexible way anyone can manage remote devices—be they phones, laptops or whatever.
  • And finally, we have VMware Workspace ONE, a single solution that brings all these tools together in one framework to help you realize your future Windows designs.

So how exactly do you complete the one-time operation of moving what you physically have, to what you want—virtual or otherwise? The answer is VMware Mirage.

Migrating to Windows 10 with Mirage

Mirage streamlines the two most common migration approaches: 1) upgrading an existing Windows device, in place, to Windows 10 or 2) migrating a user&#rsquo;s profile and files in a hardware-refresh process from their previous device to a new one.

When performing an in-place upgrade, you can deploy a Windows 10 base layer (with Win10-compatible apps already built in) to a collection of users. That base layer will upgrade the local operating system (OS) to Windows 10, but it will not delete or overwrite the users&#rsquo; personal files or profile. This approach greatly reduces the time you have to spend getting users back up and running, and it greatly reduces downtime.

When leveraging a hardware refresh cycle, you can seamlessly migrate all the users&#rsquo; personal files and profile from the old devices over to the new Windows 10 devices.

In addition, Mirage takes a full snapshot of the original Windows system before the migration begins. Should a failure occur on any endpoint during the migration, the user can be quickly restored to their previous system, without downtime or fire drills.

Read More

Read more about how renting Mirage for six months can fast track your Windows 10 adoption.

Try It

VMware offers an extensive library of online tools so you can experience our products without installing the software. Try the Windows 10 Mirage Migration Hands-on Lab #1753 today.

The post VMware Mirage Speeds Windows 10 Migration for Physical PCs appeared first on VMware End-User Computing Blog.

Read more..

Help’s on the Way with the New VMware Horizon Help Desk Tool

Today, I&#rsquo;m very excited to share with you one of the new features in the VMware Horizon 7.2 release: the Horizon Help Desk Tool.

I meet with many customers about their day-to-day management of Horizon, and I often get the same feedback. Organizations need a simple tool specifically for level one and two help desk/frontline support staff to provide basic, but frequent, help desk support for virtual desktop infrastructure (VDI) and virtual app (published app) users.

This could be a user saying their session feels slow because, unbeknownst to them, they have too many browser tabs consuming most of the memory—or a virtual desktop is hanging, and they just need help restarting the desktop.

These simple cases often get escalated to the Horizon administrators, becoming a distraction and impacting their productivity. Some customers create their own utilities or need third-party products to fill these use cases.

This Help Desk Tool is designed to fill that gap for Horizon customers. Out of the box, Horizon admins can delegate basic help desk-related functions to folks in the frontline.

Help Desk Tool Features & Functionality

Through the simple-to-use interface, help desk staff can quickly look up a user, find their sessions and drill down into specific session details, including:

  • On the client side: client name, client IP, username, protocol and bandwidth information.
  • On the server/virtual machine (VM) side: machine name, IP address, logon time, duration, session state, state duration, Horizon pod name, connection broker and vCenter name.

Help desk staff can quickly find client and VM information for users and take action.

And using the Horizon Help Desk Tool, help desk staff can take basic actions to help get the user up and running again, including:

  • Sending a message to the user,
  • Launching Microsoft Remote Assistance to actively help the user in session,
  • Disconnecting and
  • Resetting the VM.

You also will see resource consumption for CPU and memory, along with latency information. This information is continually collected, looking back to the last 15 minutes of the session. In most cases, this will yield a long enough set of information for users calling the help desk team.

CPU, memory, latency and logon data is continually collected to view in the Horizon Help Desk Tool.

Lastly, you also see a breakdown of the logon process. This will help identify what could potentially be causing a long logon experience for users.

Upgrade to Horizon 7.2

Help Desk Tool is a feature of Horizon Enterprise edition and Horizon Apps Advanced edition.
To experience the new Horizon Helpdesk Tool, download the evaluation copy of Horizon, or upgrade to Horizon 7.2.

  • Skype for Businesssolution page
  • Horizon 7.2 GAblog
  • Horizon 7download page
  • Horizon Clientdownload page

The post Help&#rsquo;s on the Way with the New VMware Horizon Help Desk Tool appeared first on VMware End-User Computing Blog.

Read more..

VMware Horizon 7.2 GA: What’s New with Skype for Business, a New Help Desk Tool & More

Today, we are excited to announce the general availability of VMware Horizon 7.2, the next release of the premier platform for virtual desktops and applications. With the release of Horizon 7.2, customers get:

  • An improved Microsoft Skype for Business user experience,
  • A new tool to enable generalist IT staff to resolve the majority of end-user issues,
  • Greater scalability and
  • Updates to Linux virtual desktops.

Skype for Business

With Horizon 7.2, our optimized solution for Skype for Business is now officially supported with Windows clients. Developed in collaboration with Microsoft, this allows you to deliver Skype for Business in a virtual desktop while also delivering a great user experience—securing collaboration, simplifying management and reducing costs.

Note: For those interested in the Skype for Business solution for Linux clients, email to request access to the private beta.

Help Desk Tool

Because Horizon 7 is often deployed at very large scales, customers asked us for a tool so frontline or help desk IT staff can quickly troubleshoot and remediate issues—without needing to pull in specialist Horizon administrators. We listened.

Horizon 7.2 introduces a new Help Desk Tool, which provides IT admins with level one and two help desk functionality. Administrators can look up users and find their sessions; initiate Microsoft Remote Assistance; send user messages and, if needed, disconnect, log off and even reset desktops to quickly remediate and get the user up and running.

Scalability

Speaking of scale, it gets even better. Horizon 7.2 increases scalability for Cloud Pod Architecture (CPA) deployments to now support up to 120,000 sessions across 12 View pods and five sites. Additionally, Horizon can now support 4,000 desktops with a single VMware vCenter Server for linked-clone, full-clone and instant-clone deployments.

Instant Clone Technology, a key component of JMP (Just-in-Time Management Platform)and a major initiative for the Horizon team, has been updated to enable reuse of preexisting Active Directory (AD) accounts for instant-clone pools. Additionally, super video graphics array (SVGA) video memory settings can now be configured in the master virtual machine (VM), and the pools will inherit these settings. Instant Clone Technology has also been extended to support local datastores.

Linux Desktops

Last but not least, VMware Horizon 7.2 for Linux provides a plethora of new capabilities that broaden the use case for Linux desktops. This includes key features such as USB redirection, client drive redirection (CDR), HTML access with audio capabilities and support for Red HatEnterpriseLinux (RHEL) 6.9 x64 and CentOS 6.9 x64.

We are very excited about this release as we continue to deliver innovation in our market-leading products. We invite you to see for yourself and take a look at some of our resources below for more information:

  • Skype for Businesssolution page
  • Help Desk Toolblog
  • Horizon 7download page
  • Horizon Clientdownload page

The post VMware Horizon 7.2 GA: What&#rsquo;s New with Skype for Business, a New Help Desk Tool & More appeared first on VMware End-User Computing Blog.

Read more..

VMware AirWatch 101: Windows 10 Custom Settings Profile

Did you opt out of an AirWatch Console upgrade, but wish you had access to its profile settings? Do you want Windows Insider devices to take advantage of pre-released CSPs? If so, then say hello to my little friend: the VMware AirWatch Enterprise Mobility Management Windows 10custom settings profile.

Windows 10 Custom Profile Solution Overview

Use the custom settings profile to deliver the newest functionality to managed devices. Configuring the profile is easy. First, navigate to the appropriate platform&#rsquo;s profile settings in the AirWatch Console. Then, select the custom settings payload, and upload SyncML (XML) code into the textbox. Finally, save and publish the profile, delivering the settings to devices.

To configure a custom settings profile, you need the correct chunk of SyncML code. There are many ways to get SyncML. Before you get started, review the methods and select the one that works best for you.

Method 1: Copy SyncML Samples

  • Best For: Anyone who doesn&#rsquo;t want to reinvent the wheel
  • Level of Effort: 1/10
  • Value: Foolproof results, Validated samples
  • Caveats: Some samples only apply to certain devices or specific editions. Limited number of samples

Method 2: Copy the SyncML of a Newer AirWatch Console&#rsquo;s Profile

  • Best For: Anyone who opted out of a console upgrade that still wants the latest profile settings.
  • Level of Effort: 4/10
  • Value: Use the newest settings, Skip the production environment upgrade
  • Caveats: Limited to the AirWatch Console&#rsquo;s supported feature set

 

Method 3: Create SyncML from Scratch

  • Best For: Anyone who wants to use pre-released CSPs for Windows Insider devices.
  • Level of Effort: 7/10
  • Value: Deliver pre-released CSPs to Windows Insider devices.
  • Caveats: Limited to Windows Insider devices.

Formatting 101: Create a Complete Block of SyncML

A complete block of SyncML code consists of the following attributes:

  • Runs from<[characteristic]>to<[characteristic]>
  • Uses Add, Delete, Replace, or Exec as a characteristic
  • Does not contain text before or after the characteristcs.
  • May or may not remove all whitespace and linearize the code block to condense its size.
For Example:

2 ./Device/Vendor/MSFT/AssignedAccess/KioskModeApp chr {"Account":"standard","AUMID":"AirWatchLLC.AirWatchBrowser_htcwkw4rx2gx4!App"}

Update or Delete Settings

Manually applytags to updateor delete settings using aWindows 10 custom settings profile.

  • To update settings use the replace tag: to
  • To remove settings use the delete tag: to
For Example: Remove Kiosk Assigned Access Setting

2 ./Device/Vendor/MSFT/AssignedAccess/KioskModeApp

Configure a Windows 10 Custom Settings Profile

1. Copy or create a complete block of SyncML code.

Copy SyncML Samples

  1. Go to VMware Code Sample Exchange
  2. Find the correct sample
  3. Copy the text

Copy the Profile Settings from the Latest AirWatch Console

  1. Log into a version of the AirWatch Console that supports the desired profile functionality.
  2. Configure and Save this payload to create a profile.
  3. Find the new profile in the list view.a. Click its radio buttonb. Click the XML optionc. Copy the SyncML that appears
  4. Paste the SyncML into a text editor, and edit it.a. Remove lines of text so that all the code falls between the tags:<[ Add, Delete, Replace, or Exec ]> to <[ Add, Delete, Replace, or Exec ]>b. Optionally, remove the whitespace, and linearize the SyncML.
  5. Copy the formatted code.

Create New SyncML

  1. Go to the Configuration Service Provider(CSP) Reference
  2. Access the newest Windows Insider features
  3. Follow the site’s available guidelines to create the code sample
  4. Copy the text

2. Navigate to Devices > Profiles > List View > Add > Add Profile > Windows > Windows Desktop.

3. Refer to the LocURI to determine the profile&#rsquo;s context.

  • User Profile - Select if the LocURI begins with ./User/.
  • Device Profile - Select if the LocURI begins with ./Device/.

4. Configure General settings to determine how the profile deploys and who receives it.

5. Select the Custom Settings payload.

6. Click Configure, and paste the complete block of SyncML code in the text box.

7. Select Save & Publish.

The post VMware AirWatch 101: Windows 10 Custom Settings Profile appeared first on VMware End-User Computing Blog.

Read more..

Driving Toward a Digital Workspace? 6 Reasons to Attend vForum Online Summer 2017 (With 2 Bonuses)

Thanks to the modern workforce, Software-as-a-Service (SaaS) apps and mobile workflows, traditional ways of managing and securing users, apps and devices (and all that associated data) are starting to show some cracks in effectiveness. While this presents a challenge for IT, it also presents an opportunity—out with the old, in with the new.

For many IT departments, now is the time to progress toward a digital workspace. With an ideal digital workspace solution in place, IT gains the simple, secure infrastructure needed to deliver the apps and data teams need across any work device—as well as an application delivery platform that handles both native and cloud applications.

To learn how, register to join vForum Online on June 28. In this free, half-day event—our largest online conference—you&#rsquo;ll get what you need to take the first steps on the path to a modern, digital workspace, right from the convenience of your desk.

If you&#rsquo;ve attended previous vForum Online conferences, you&#rsquo;ll see this one is a little different. We&#rsquo;ve broken it down into specific, goal-oriented tracks so you can more easily pursue a specific aim. But whether you&#rsquo;re returning or just starting out at vForum, you simply cannot miss this opportunity to enhance your IT expertise.

Need a reason to register? Here are six—with two special bonus reasons:

  1. Discover ThreeWays to Start Your Transformation:What does it take to migrate to a new workspace that actually works? In our breakout session, &#rsquo;Empowering the Digital Workspace: ThreeKey Initiatives for Moving to a Digital Workspace,&#rdquo; you&#rsquo;ll see how the four pieces of the workspace puzzle fit together. One of them is to virtualize desktops and apps. Know what the other three are?
  1. Then, Have Your Big Questions Answered:Questions, comments or high-level concerns you have about moving to a digital workspace? Ask a VMware pro. In one of our Chats with Experts on the digital workspace, you&#rsquo;ll talk live and get your issues resolved right on the spot.
  1. See How to Simplify App and Access Management:If you&#rsquo;re looking to give your teams a smarter, more reliable way to do mobile work—without compromising on security—the &#rsquo;Putting the User First: Simplify App and Access Management&#rdquo; breakout session is one vForum Online talk you need to hear.
  1. Take the Mystery out of Managing Mobile Devices:Just beginning to manage mobile devices? Without a helpful, interactive guide, enterprise mobility management (EMM) and mobile device management (MDM) can seem a little confusing. In our &#rsquo;Introduction to VMware AirWatch&#rdquo; Hands-on Lab, you&#rsquo;ll log in to the AirWatchconsole as an admin to write a policy, then enroll a device into your newly configured environment.
  1. Gain a Guide to Windows Endpoint Management:Know how the VMware digital workspace platform allows IT teams to manage Windows 10 PCs—wherever they are, and however they&#rsquo;re owned? You will. Start in the breakout session, &#rsquo;Modernizing Windows Endpoint Management: Leveraging Windows 10 and Cloud-Based Management,&#rdquo; and then head to related Chat, where you&#rsquo;ll be able to discuss things in more detail with a VMware expert.
  1. Do a Deep Dive on the Digital Workspace:In the demo, &#rsquo;VMware AirWatch: Workspace ONE, Single Sign-on and VMware Identity Manager,&#rdquo; you&#rsquo;ll walk through the latest on the VMware Workspace ONE solution. Then, you&#rsquo;ll configure its integration with AirWatch to enable single sign-on (SSO) from any device to any application, thanks to VMware vCenterSSO.
  1. BONUS #1: Hear From Our CEO:Ever wonder what&#rsquo;s on the mind of our distinguished CEO Pat Gelsinger? Now, you have a special chance to find out for yourself. vForum Online Summer 2017 kicks off with his keynote, entitled &#rsquo;5 Myths of IT.&#rdquo; In it, Pat will challenge some conventional (but questionable) IT wisdom as he shares hispersonal perspective. You won&#rsquo;t want to miss this.
  1. BONUS #2: Win a Cool Prize:Learn something new; win something new. We&#rsquo;re handing out some awesome prizes to several lucky attendees of vForum Online, like an Oculus Rift VR headset, a voice-controlled Amazon Echo speaker and so much more. Will you win a prize?

The big day is quicklyapproaching, and we hope to see you there. But first things first:Register for the June 28 vForum Online today.

The post Driving Toward a Digital Workspace? 6 Reasons to Attend vForum Online Summer 2017 (With 2 Bonuses) appeared first on VMware End-User Computing Blog.

Read more..

Don’t Leave Holes in Your Office 365 Security Strategy

Secure every access point to Microsoft Office 365 emails and data with VMware Workspace ONE.

If your organization is like most, you&#rsquo;re either using Microsoft Office 365 or thinking about an Office 365 implementation. Since the data and email in Office 365 are vital to your business, you&#rsquo;ve probably thought through how to protect Office 365 with application access control policies. You need to ensure, however, that your policies protect all apps with access to Office 365.

Imagine that one of your end users goes to visit family for the holidays. While at her parent&#rsquo;s house, she borrows her father&#rsquo;s laptop to check work emails. Although you require multi-factor authentication (MFA) for access to Office 365, she logs into Outlook 2010 using nothing more than a username and password. Outlook downloads her mailbox, she checks her email, and after a few days, she returns home.

All her emails, however, stay on the laptop. That data is out of her control and out of IT&#rsquo;s control, creating data loss risks if the laptop is sold, lost or compromised with malware. How did your user (unwittingly) bypass your conditional access rules, and what can you do to protect your data and email?

In this blog post, we&#rsquo;ll cover how this data leak occurred, and how VMware Workspace ONE allows you to avoid similar Office 365 data losses and security holes.

Applying Access Policies to Office 365 Authentication Methods

To understand how your user bypassed your MFA requirement, you have to understand that Office 365 supports two ways to log users in: Modern authentication and legacy username/password authentication. In the example above, your user logged in with a legacy username/password client, accidentally bypassing the policies you created to protect Office 365.

To control access to Office 365 emails and data no matter what client your user chooses, you need a solution such as Workspace ONE that protects both authentication methods. Although many Office 365 client apps use newer modern authentication, older Office 365 apps, Android and iOS native mail (using ActiveSync), and third-party Office 365 apps (such as Thunderbird) use legacy username/password authentication.

Protecting both authentication types is vital for most organizations. Workspace ONE controls access to Office 365 no matter which client app a user chooses with policies based on group, network range, device type or OS and more.

Modern vs. Legacy Authentication

Here&#rsquo;s how to tell the difference Office 365 modern authentication and legacy username/password authentication:

Modern Authentication

If the end user is redirected to an IDP in a browser, it&#rsquo;s modern authentication.

Microsoft modern authentication redirects the end user in a browser from the Office 365 app to an identity provider (IdP), such as Workspace ONE, to authenticate. Modern authentication takes advantage of Microsoft&#rsquo;s Azure Active Directory Authentication Libraries (ADAL). For more details on modern authentication, see Microsoft&#rsquo;s summary here.

This is modern authentication. The user is redirected to Workspace ONE in a browser.

Legacy Authentication

If the end user enters credentials into the client&#rsquo;s UI (and there&#rsquo;s no redirection to an IDP), it&#rsquo;s legacy username/password authentication.

In username/password authentication, the Office 365 client collects a username and password in its own UI (rather than sending the user to an IDP in a browser). Because the user enters their credentials into the client rather than using standard browser single sign-on (SSO), legacy username/password authentication doesn&#rsquo;t support advanced features such as MFA or VMware mobile SSO. Microsoft sometimes calls legacy username/password authentication by a more specific name such as basic authentication or the Microsoft Online Services Sign-In Assistant.

This is legacy username/password authentication. The user enters credentials directly into the client UI—there&#rsquo;s no browser redirect to Workspace ONE or another IDP.

Many identity solutions can only protect access to Office 365 for clients using modern authentication. Workspace ONE protects access to Office 365 without requiring additional products or servers, no matter what client a user chooses.

Use Cases for Controlling Access to Office 365

Because modern authentication supports MFA, certificate authentication, VMware mobile SSO and all other standard authentication features of Workspace ONE, organizations have fine-grained control over how they allow access for Office 365 clients using modern authentication.

Controlling legacy username/password clients, on the other hand, is tricky. Because legacy username/password clients only support one authentication method (username and password), organizations can&#rsquo;t rely on the enhanced security of MFA, VMware mobile SSO or other authentication features. Instead, many organizations take the following approaches:

  • Allow legacy username/password access to Office 365 for mobile email only. In this approach, an organization could block legacy username/password access to Office 365 apps and data for all apps and add an exception for native mobile email clients that use Exchange ActiveSync. This approach works well with the mobile email management features in Workspace ONE. Many organizations choose this path because Exchange ActiveSync clients don&#rsquo;t download the user&#rsquo;s entire mailbox, reducing the risk of data loss. Your organization can also choose to limit mobile email access to the extra-secure VMware Boxer app.

 

  • Allow legacy username/password access to Office 365 only under more secure conditions. Because legacy username/password clients such as Thunderbird or older versions of Office don&#rsquo;t support MFA, some organizations want to limit these clients to only connect to Office 365 under more secure circumstances. For example, you might only allow Thunderbird on your corporate network to ensure users are not downloading their mailboxes on multiple computers. This approach can reduce the risk of data loss.
  • Allow legacy username/password access only for specific users or groups. Organizations may want to limit which users can connect to Office 365. For example, IT could block retail employees from accessing mobile email while they are offsite.
  • Block all access to Office 365 for username/password clients. Some organizations want to ensure all users access Office 365 with MFA, mobile SSO or other secure methods. Because modern authentication supports these methods but legacy username/password authentication does not, these organizations should block username/password client apps. Users will still be able to access Office 365 through Office 2016 apps (or Office 2013 apps, if they are configured correctly).

Workspace ONE & Office 365

Workspace ONE makes securing and deploying Office 365 easier, with industry-leading enterprise mobility management (EMM) to keep your devices and users safe. Learn more about how Workspace ONE protects Office 365, while providing end users with consumer-level ease of use. Visit vmware.com/products/workspace-one, or contact your VMware account representative for more details.

Because you liked this post:

  • Better Together: VMware Workspace ONE & Office 365
  • Enable Consumer Simple, Secure Access to Office 365 with New VMware Workspace ONE Enhancements
  • VMware Named a Leader in Gartner Magic Quadrant for Enterprise Mobility Management (EMM)

The post Don&#rsquo;t Leave Holes in Your Office 365 Security Strategy appeared first on VMware End-User Computing Blog.

Read more..

Go Que Newsroom

Categories