What can you configure with Backstage device management?

09 Aug, 2015

Pretty much everything!

Backstage can manage just every aspect of your iPhone, iPad, or Mac and at a very deep, secure level.  The exhaustive lists below will give you a clear picture of just how powerful a management tool Backstage is for iOS and Mac OS X.

The big ticket items:

  • Activation Lock
  • Secure remote locking
  • Secure remote wiping
  • Data encryption
  • App deployments and distribution (Paid apps, free apps, and internally developed apps)
  • Book distribution
  • Apple’s App Store volume purchase program
  • System and app settings

Security:

  • Lock configuration profiles to prevent tampering
  • Passcode complexity
  • Passcode length
  • Device auto-lock (how long before lock screen)
  • New passcode (expiring passcodes)
  • Secure wipe after certain number of failed login attempts
  • Force local data encryption
  • Force encrypted backups
  • Forcing Apple Watch locking (wrist detection)

Mail, calendars, contacts, and tasks:

  • IMAP, CalDAV, and CardDAV settings
  • Microsoft Exchange ActiveSync settings
  • IMAP and SMTP authentication
  • ActiveSync certificates and authentication
  • Custom network ports
  • S/MIME settings
  • SMTP settings
  • SSL authentication
  • Subscribed calendars

LDAP and Network:

  • LDAP authentication
  • LDAP over SSL
  • Search scope and bases
  • WiFi authentication settings
  • Network proxy servers
  • WiFi security
  • SCEP settings

VPN:

  • L2TP
  • PPTP
  • IPSec
  • Cisco AnyConnect
  • Juniper SSL
  • F5 SSL
  • SonicWALL Mobile Connect
  • Aruba VIA
  • Check Point Mobile VPN
  • IKEv2

Bookmarks, display, connectivity:

  • Web Clips (home screen bookmarks)
  • Fonts
  • AirPlay settings (preconfigure for AirPlay connectivity)
  • AirPrint settings
  • Web content filtering (profanity, racism, hate, porn, etc)
  • Global HTTP proxy settings

User restrictions:

  • Use of camera
  • Use of FaceTime
  • Screenshots
  • AirDrop
  • iMessage
  • Siri
  • Using Siri while device is locked
  • Siri profanity filter
  • User-generated content in Siri
  • Access to the App Store
  • Access to iBooks store
  • Installing apps
  • Removing apps
  • In-app purchases
  • Downloading Podcasts
  • Requiring an iTunes password
  • Allowing iCloud backup
  • Allowing iCloud documents and data storage
  • Allowing iCloud keychain
  • App data storage on iCloud
  • Allowing iCloud photo sharing
  • Allowing iCloud photo stream
  • Allowing users to wipe their devices
  • Allowing users to manually accept SSL and TLS certificates
  • Allowing users to modify their cellular usage per app
  • Allowing Handoff
  • Allowing Internet search results in Spotlight
  • Allowing Touch ID to unlock your device
  • Allowing users to modify stored Touch ID fingerprints
  • Requiring an AirPlay passcode upon pairing
  • Allowing the predictive keyboard
  • Allowing auto correction
  • Allowing dictionary definitions
  • Allowing Passbook notifications on a user’s lock screen
  • Allowing users to access Control Center from their lock screen.
  • Allowing Notification Center in the Lock screen
  • Allowing the Today view in the Lock screen
  • Allowing the use of Game Center
  • Allowing the use of the Safari web browser
  • Enabling AutoFill in Safari
  • Forcing anti-physhing and anti-fraud detection in Safari
  • Enabling JavaScript in Safari
  • Blocking popups in Safari
  • Allowing or restricting cookies in Safari
  • Allowing access to music, videos, and TV shows
  • Allowing playback of explicit music, videos, and TV shows
  • Allowing explicit sexual content in the iBooks store

There’s actually a lot more.  And there’s a lot of configuration that goes very deep into many of the broad categories listed here.  Whether your organization is simply looking for a way to protect its data and enforce security policies, or whether you need to tightly manage devices, users, and groups - you can configure your devices just the way you need.  And best of all, every configuration you make, gets pushed over the air directly to your users’ devices.

Backstage device management ensures your iPhones, iPads, and Macs are secure and configured the way they should be, providing both peace of mind and reduced IT support costs.  Once you start managing your devices, you’ll wonder how you ever survived without it.