<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/tohsheen-bazaz/rss" /><link>https://www.ivanti.com/blog/authors/tohsheen-bazaz</link><item><guid isPermaLink="false">c0d68666-d128-4f71-acdb-45e9135b7c98</guid><link>https://www.ivanti.com/blog/the-android-14-enterprise-features-you-should-know</link><atom:author><atom:name>Tohsheen Bazaz</atom:name><atom:uri>https://www.ivanti.com/blog/authors/tohsheen-bazaz</atom:uri></atom:author><category>Endpoint Management</category><title>The Android 14 Enterprise Features You Should Know</title><description>&lt;p&gt;Android 14, Google’s latest release, brings a host of improvements for users, with enhancements to accessibility, localization, battery life improvements and more. But for IT admins, there are also several Android 14 enterprise features to plan for that enhance user privacy and control.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;What’s new in Android 14 for Enterprise?&amp;nbsp;&lt;/h2&gt;

&lt;h3&gt;New APIs to display work contacts and caller IDs on personal side&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Previous Android releases have allowed cross-profile data sharing so that personal apps can access work profile contacts and phone numbers – a small but meaningful feature that reduces friction for the many end users who use the same device for work and personal communication.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With Android 14, IT admins can apply more granular policies by specifying &lt;em&gt;which&lt;/em&gt; apps are allowed to access this information.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Calendar apps, which may use cross-profile data, should consider switching to &lt;a href="https://developers.google.com/android/work/connected-apps" rel="noopener" target="_blank"&gt;connected apps&lt;/a&gt;, which can use both work and personal data (for instance by displaying a single calendar view with work and personal appointments), but without giving IT admins access to personal data, thereby maintaining user privacy.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Restrictions to ultra-wideband radio&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Ultra-wideband (UWB) technology, a short-range wireless communication protocol used primarily to track the location of objects with high accuracy, has only recently been introduced to high-end smartphones, although government and military applications go back decades. Android 13 was the first Android release with feature-complete UWB support.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;UWB is expected to grow rapidly, particularly in applications such as healthcare, logistics and manufacturing, where extremely accurate real-time location information can assist with complex and challenging asset tracking.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In anticipation of that growing ubiquity, Android 14 allows an admin to turn off UWB on corporate-owned devices in situations where it is not desirable, for instance when security and privacy concerns outweigh the benefit of real-time location data.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;When will features be available?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Google doesn’t share exact release dates, but Android 14 is expected to be released soon, in early September. Like every year, Google Pixel devices will receive updates on release day. Other device manufacturers follow their own cadence for over-the-air updates, so check with your vendors for schedules.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ivanti UEM solutions will support Android 14 on day zero, meaning Ivanti customers can transition seamlessly to Android 14 on all of their Android devices.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Where to get more information on Android 14&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;For additional details on new Android 14 enterprise features, visit Google’s &lt;a href="https://developer.android.com/about/versions/14/work" rel="noopener" target="_blank"&gt;Android 14 release notes&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For details about support for Android 14 on Ivanti products, visit &lt;a href="https://forums.ivanti.com/s/article/Ivanti-Guidance-on-Android-14-Compatibility?language=en_US" target="_blank"&gt;Ivanti customer support&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Tue, 05 Sep 2023 19:06:14 Z</pubDate></item><item><guid isPermaLink="false">578ad139-1aa3-40e0-89cd-d48d2be04e52</guid><link>https://www.ivanti.com/blog/android-13-and-ivanti-uem</link><atom:author><atom:name>Tohsheen Bazaz</atom:name><atom:uri>https://www.ivanti.com/blog/authors/tohsheen-bazaz</atom:uri></atom:author><category>Endpoint Management</category><title>Android 13 and Ivanti UEM: What to Know About the Latest Enterprise Features</title><description>&lt;p&gt;Android 13, the latest release from Google, is here. For IT administrators, this means making sense of new enterprise features and enhancements: what changed, why should you care – and most importantly, what should you do about it?&lt;/p&gt;

&lt;h2&gt;Is Ivanti Android 13 ready?&lt;/h2&gt;

&lt;p&gt;For Ivanti customers, one thing you won’t need to worry about is whether the new OS is supported by your UEM solution. Ivanti UEM products are Android 13 ready, with day zero support for a seamless transition. Customers can access product-specific support through the &lt;a href="https://forums.ivanti.com/s/article/MobileIron-Guidance-on-Android-13-Compatibility" target="_blank"&gt;Ivanti Community&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;What’s new in Android 13 for Enterprise: the features admins should know&lt;/h2&gt;

&lt;p&gt;Android 13 brings several new enterprise features and many enhancements to user privacy, control and comfort. There are a number of changes to pay attention to:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;More user control over privacy, battery management and notifications.&lt;/li&gt;
	&lt;li&gt;Enhanced 5G/cellular support.&lt;/li&gt;
	&lt;li&gt;New device and security settings, as well as security enhancements to the OS.&lt;/li&gt;
	&lt;li&gt;More options for corporate out-of-the-box deployment.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Let’s dig into each of these areas.&lt;/p&gt;

&lt;h3&gt;End user privacy and usability enhancements&lt;/h3&gt;

&lt;p&gt;Android fans have reason to cheer: it’s not often that privacy and usability improve simultaneously, and Android 13’s new user controls offer both. Administrators will want to ensure that any work apps that should be exempt from these controls are configured to do so.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Users can stop unwarranted services.&lt;/strong&gt; Users can view and stop apps with foreground services from the notification drawer. &amp;nbsp;&lt;a href="https://developer.android.com/guide/components/foreground-services#handle-user-initiated-stop" rel="noopener" target="_blank"&gt;Some apps are exempt&lt;/a&gt; from this action, including Ivanti/MobileIron Go. To get rid of this user control entirely, you will need to configure “Disallow User Control.”&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;New rules help preserve and optimize battery use.&lt;/strong&gt; The system will place an app in the restricted bucket when app behavior matches &lt;a href="https://developer.android.com/topic/performance/appstandby#restricted-bucket" rel="noopener" target="_blank"&gt;certain criteria&lt;/a&gt;. Although some apps are exempt, other apps – including work apps – may be subject to this new rule. To avoid work apps being placed in the restricted bucket, admins can configure “Disallow User Control.”&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;New runtime permissions offer more quiet time and privacy.&lt;/strong&gt; Android apps run in a limited-access sandbox, and if an app needs to use resources or information outside of that sandbox, it must define permissions. Android 13 adds more than 20 new permissions, but three are of particular interest:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;POST_NOTIFICATIONS&lt;/strong&gt; determines whether an app is eligible to send exempt (i.e. general) notifications. All apps that require pushing notifications would require user consent or preapproval from a UEM console.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;USE_EXACT_ALARM&lt;/strong&gt; determines whether an app is eligible to send time-related notifications and reminders, limiting these to alarm clock, timer and calendar apps.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;NEARBY_WIFI_DEVICES&lt;/strong&gt;, part of the NEARBY_DEVICES permission group, helps apps that manage a device’s connection to nearby access points over Wi-Fi request specific permissions, rather than privacy-sensitive location permission.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Android’s developer site offers &lt;a href="https://developer.android.com/reference/android/Manifest.permission" rel="noopener" target="_blank"&gt;further details on the new permissions&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;5G and cellular support enhancements&lt;/h3&gt;

&lt;p&gt;For both 5G and non-5G users, the Android 13 release offers improvements for handling traffic.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Admins have more options for 5G slicing.&lt;/strong&gt; This feature, first introduced as part of Android 12, now allows admins to have many slices configured and to extend them to company-owned assets – meaning you can use dedicated 5G slices to expedite traffic routing.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;APNs can be configured with a specific enterprise ID.&lt;/strong&gt; Carriers must share the APN endpoint name with the IT admin so that the admin can input that information into the APN configuration, which will help in tagging traffic.&lt;/p&gt;

&lt;p&gt;Android’s developer site offers &lt;a href="https://developer.android.com/reference/android/app/admin/DevicePolicyManager#setPreferentialNetworkServiceConfigs(java.util.List%3Candroid.app.admin.PreferentialNetworkServiceConfig%3E)" rel="noopener" target="_blank"&gt;further details on network configurations&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;Security enhancements&lt;/h3&gt;

&lt;p&gt;Android 13 brings a number of additional device and security controls worth investigating:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;DISALLOW_ADD_WIFI_CONFIG&lt;/strong&gt; disallows a user from adding a new Wi-Fi configuration.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;DISALLOW_CHANGE_WIFI_STATE&lt;/strong&gt; disallows a user from enabling or disabling Wi-Fi. Even if the user manages to put the device in airplane mode, the device remains connected.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;DISALLOW_SHARING_ADMIN_CONFIGURED_WIFI&lt;/strong&gt; disallows a user from sharing Wi-Fi for admin-configured networks.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;DISALLOW_WIFI_DIRECT&lt;/strong&gt; disallows a user from using Wi-Fi Direct.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;DISALLOW_WIFI_TETHERING&lt;/strong&gt; disallows a user from using Wi-Fi tethering, including existing control tethering.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;EnableTrustOnFirstUse&lt;/strong&gt; allows a user to accept the Root CA cert, which is received from the network server during an initial connection to a new network. It still requires user action and explicit acceptance.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;SetMinimumRequiredWifiSecurityLevel&lt;/strong&gt; prohibits devices from connecting to networks that do not meet a minimum level of security.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;SetWifiSsidPolicy(WifiSsidPolicy)&lt;/strong&gt; allows admins to define a list of SSIDs to allow and disallow.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Control MAC randomization&lt;/strong&gt; with &lt;a href="https://developer.android.com/reference/android/net/wifi/WifiConfiguration#RANDOMIZATION_NONE" rel="noopener" target="_blank"&gt;these four different options&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Two notable changes to the OS also improve Android’s security.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NIAP-compliant security logs track Wi-Fi and Bluetooth connectivity events.&lt;/strong&gt; These logs meet the requirements of the Common Criteria Protection Profile for Mobile Device Fundamentals.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Intent filters block non-matching intents.&lt;/strong&gt; When an app sends an intent to an exported component of another app that targets Android 13+, that intent is only delivered if it matches an &amp;lt;intent-filter&amp;gt; element in the receiving app. (Note that explicit intents address a specific package name and are not affected by this change.)&lt;/p&gt;

&lt;h3&gt;Corporate out-of-the-box deployment enhancements&lt;/h3&gt;

&lt;p&gt;Finally, Android 13 offers more deployment options:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;EXTRA_PROVISIONING_ALLOW_OFFLINE&lt;/strong&gt; allows enrollment of Android devices in completely closed networks. If you are using the QR code method for enrollment, you need to add an additional flag to the QR code.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;EXTRA_PROVISIONING_KEEP_SCREEN_ON&lt;/strong&gt; allows the device screen to be active during provisioning.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;EXTRA_PROVISIONING_USE_MOBILE_DATA&lt;/strong&gt; is a Boolean setting that allows the device to be provisioned using mobile data, or not.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Android’s developer site offers &lt;a href="https://developer.android.com/reference/android/app/admin/DevicePolicyManager#EXTRA_PROVISIONING_ALLOW_OFFLINE" rel="noopener" target="_blank"&gt;further details on provisioning&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Taking advantage of Android 13’s latest enterprise features&lt;/h2&gt;

&lt;p&gt;The release of Android 13 emphasizes again the importance of adopting Android Enterprise from legacy Device Admin, which was &lt;a href="https://developers.google.com/android/work/device-admin-deprecation" rel="noopener" target="_blank"&gt;deprecated in Android 10&lt;/a&gt;. We strongly recommend that you plan this migration.&lt;/p&gt;

&lt;p&gt;It is also important to note that while Google’s Pixel devices receive updates on day one, other device manufacturers follow their own cadence for over-the-air updates. You can check with your vendors for updates and schedules.&lt;/p&gt;

&lt;p&gt;To get details on Android 13 compatibility and support for your specific UEM product, visit the &lt;a href="https://forums.ivanti.com/s/article/MobileIron-Guidance-on-Android-13-Compatibility" target="_blank"&gt;Ivanti Community&lt;/a&gt; or speak to your customer success manager.&lt;/p&gt;</description><pubDate>Thu, 18 Aug 2022 14:22:43 Z</pubDate></item><item><guid isPermaLink="false">0e12759f-5f6e-4d3d-8aea-4911ca160613</guid><link>https://www.ivanti.com/blog/pipeline-ransomware-could-i-be-next</link><atom:author><atom:name>Tohsheen Bazaz</atom:name><atom:uri>https://www.ivanti.com/blog/authors/tohsheen-bazaz</atom:uri></atom:author><category>Security</category><title>Pipeline Ransomware. Could I Be Next?</title><description>&lt;p&gt;If you have been following the news or trying to buy gas in Atlanta, you probably have already heard about the ransomware attack on one of the most important strategic pipelines in the US. 2020 saw ransomware attacks skyrocket and now 2021 seems to be following the trend. The current situation begs us to rethink how we think about our security practices and mindset.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;One area of security that you may have heard about is Zero Trust (ZT). For our Ivanti customers I will try to bring some key aspects of this topic to light so that we can help you implement ZT within your own environment.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;When I talk about Zero Trust internally or externally, I have always tried to explain this as a mindset and a journey. Some ways in which I think about it include:&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/blog/the-8-best-practices-for-reducing-your-organization-s-attack-surface"&gt;Reduce the attack surface&lt;/a&gt; overall and with every inch of new product added.&lt;/li&gt;
	&lt;li&gt;Security should not be an afterthought, but an integral part of any solution.&lt;/li&gt;
	&lt;li&gt;Re-emphasize who and how can one get access to a service or a resource.&lt;/li&gt;
	&lt;li&gt;Last but not least, have a “Always Verify, Never Trust” mindset.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;You may see I keep repeating “mindset.” I simply cannot emphasize how important this aspect is to achieving a security level where an organization can carry on with business with very minimal risk of cyberattacks. Also, by no means are the things I have listed here going to be an end-all-be-all list.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;As an Ivanti customer what do I need to look into?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How to stop using passwords&lt;/strong&gt; – What if your end users did not know or even have a password? Does that sound exciting? What if they would get an even better user experience than the current password-based technology you may be using? &lt;a href="https://www.ivanti.com/products/passwordless-authentication"&gt;Ivanti’s Zero Sign On&lt;/a&gt; technology could help you here.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How to stop various phishing attacks?&lt;/strong&gt; Phishing on mobile devices is more concerning as organizations have been fighting phishing attacks, for a considerable amount of time, via email or otherwise on desktops. But again, since we are implementing a Zero Trust framework, we cannot ignore those powerful mobile endpoints. A good mobile phone today is more powerful than even some desktops, and more importantly almost every employee is using it to work from everywhere.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;If I combine above two aspects of password theft and phishing on mobile phones, which are not protected, as an attacker it’s easier for me to go after user credentials on those endpoints using email, SMS, or some sophisticated man-in-the-middle (MiTM) attacks. However, the key advantage an attacker has is the limited real estate and a user who is eager to click.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Application security and device integrity:&lt;/strong&gt; Whether your users are using Windows, macOS, iOS or Android, it’s critical to have control on the applications that are being used at work.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Allowing users to use their favorite tools should also be a choice for IT to consider as line of business users (LOBs) are successful when they have the right tools secured by IT. &amp;nbsp;We have seen SolarWind’s Orion software breach instance and I hope by now we understand even approved software can be vulnerable. This is where a quicker remediation comes in handy. &lt;a href="https://www.ivanti.com/ivanti-neurons"&gt;Ivanti Neurons&lt;/a&gt; helps IT to self-heal and self-secure, allowing IT to move swiftly to fix identified issues.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conditional access:&lt;/strong&gt; A key step to reducing attack surface is to form a policy on who gets access and how. Ivanti’s conditional access capabilities can help you here. For example, a user coming via an unmanaged device, unknown network, or some other condition will always be blocked and given a custom remediation page. This is powerful as you are only allowing devices you can trust. Even when sanctioned devices are allowed to access a service or resource, Ivanti’s solutions ensure that these are based on that endpoint and user’s security posture.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Patch Management:&lt;/strong&gt; Chances are your patches are not keeping pace with the changes and vulnerabilities discovered. While this may seem daunting for thousands of devices in your enterprise, we can help you achieve this in a few clicks. Using &lt;a href="https://www.ivanti.com/products/discovery"&gt;Ivanti Neuron’s discover engine&lt;/a&gt;, you get a peek into services that you might not even know existed. Discovering the unknowns will help you understand the footprint across internal datacenters, or even public datacenters such as AWS.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;At the end of the day, we have to fight cyberattacks with cooperation and executing on a “Never Trust, Always Verify” aka Zero Trust ideology using best-of-breed solutions. To summarize:&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Discover the unknowns of your enterprise via &lt;a href="https://www.ivanti.com/ivanti-neurons"&gt;Ivanti Neurons&lt;/a&gt;.&lt;/li&gt;
	&lt;li&gt;Have a patching cadence.&lt;/li&gt;
	&lt;li&gt;Try to implement passwordless technologies to reduce attack surface for password thefts.&lt;/li&gt;
	&lt;li&gt;Do not undermine mobile endpoints and provide attackers an entry point.&lt;/li&gt;
	&lt;li&gt;Have a policy for who and how gets access to a service or resource to limit unwarranted access.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Learn more about Ivanti Neurons and request a &lt;a href="https://www.ivanti.com/lp/uem/demos/end-point-manager" target="_blank"&gt;full private demo&lt;/a&gt;&amp;nbsp;through our website.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Thu, 13 May 2021 21:54:27 Z</pubDate></item></channel></rss>