Welcome!

Big Data Journal Authors: Yeshim Deniz, Pat Romanski, Elizabeth White, Trevor Parsons, Adrian Bridgwater

Blog Feed Post

How to provision large number of mobile devices into Kiosk lock down mode

Applies to: SureLock and SureFox

If you're an IT administrator in an organization, it should not be difficult to understand how tedious it can become when it comes to configuring multiple devices. To make this process easy for you, SureLock and SureFox allow you to configure one device, export its settings to a file and then replicate the same settings to other devices in your organization. To explain the procedure better, we divide it into two steps:

Preparing the settings file:

  1. Install SureLock/SureFox on any one device and configure it with your required settings.
  2. Once you have finished the configuration, Go to Import/Export Settings
  3. If you want to activate SureLock/SureFox on your devices automatically, go to Advanced Settings under Import/Export Settings and enable Export Activation Code. The activation code will be encrypted and included in the settings file. Tap on Done to return back to previous screen.
  4. Tap on Export Settings to export your configuration to a settings file. By default, the settings file is exported to the SDCARD's root folder with a .settings extension such as SureLock.settings and SureFox.settings respectively. You can export the file to any location on device storage.

Configuring other devices:

The settings file holds all the configuration. There are multiple methods to configure other devices:

  1. Pushing the settings file: In this method, we need to copy the settings file to the root folder of device's storage. You can use an MDM solution to push the settings file remotely or copy it manually. Both SureLock and SureFox are pre-configured to automatically import new settings every 10 minutes. Once it detects the presence of a new settings file, it'll import and configure itself as per the new configuration received.
  2. Over The Air (OTA) Provisioning: SureLock and Surefox supports automatic import from http file locations too.
    1. Upload the settings file to a web server.
    2. Configure the Automatic Import File location for all the devices to the http path where the settings file has been uploaded.

Make sure the settings file name matches the automatic import file configured.

Tip: Visit Import/Export Settings->Periodically Check to modify the periodicity after which the check is made for new settings file

To learn more on how to secure and manage Android, iOS and Windows Mobile/CE devices efficiently, visit us at www.42gears.com

Read the original blog entry...

More Stories By Onkar Singh

The author is the founder of 42Gears, developer of affordable Mobile Device Management tools.

Latest Stories from Big Data Journal
Enthusiasm for the Internet of Things has reached an all-time high. In 2013 alone, venture capitalists spent more than $1 billion dollars investing in the IoT space. With “smart” appliances and devices, IoT covers wearable smart devices, cloud services to hardware companies. Nest, a Google company, detects temperatures inside homes and automatically adjusts it by tracking its user’s habit. These technologies are quickly developing and with it come challenges such as bridging infrastructure gaps,...
There are 182 billion emails sent every day, generating a lot of data about how recipients and ISPs respond. Many marketers take a more-is-better approach to stats, preferring to have the ability to slice and dice their email lists based numerous arbitrary stats. However, fundamentally what really matters is whether or not sending an email to a particular recipient will generate value. Data Scientists can design high-level insights such as engagement prediction models and content clusters that a...
Whether you're a startup or a 100 year old enterprise, the Internet of Things offers a variety of new capabilities for your business. IoT style solutions can help you get closer your customers, launch new product lines and take over an industry. Some companies are dipping their toes in, but many have already taken the plunge, all while dramatic new capabilities continue to emerge. In his session at Internet of @ThingsExpo, Reid Carlberg, Senior Director, Developer Evangelism at salesforce.com, t...
There is no doubt that Big Data is here and getting bigger every day. Building a Big Data infrastructure today is no easy task. There are an enormous number of choices for database engines and technologies. To make things even more challenging, requirements are getting more sophisticated, and the standard paradigm of supporting historical analytics queries is often just one facet of what is needed. As Big Data growth continues, organizations are demanding real-time access to data, allowing immed...
Cloudian on Tuesday announced immediate availability of Cloudian HyperStore appliances and Cloudian HyperStore 5.0 software. Flash-optimized, rack-ready HyperStore appliances make it easy to economically deploy full-featured, highly scalable S3-compliant storage with three enterprise-focused configurations. HyperStore appliances come fully integrated with Cloudian HyperStore software to assure unlimited scale, multi-data center storage, fully automated data tiering, and support for all S3 applic...
Scene scenario: 10 am in a boardroom somewhere, second round of coffees served, Danish and donuts untouched, a quiet hush settles. “Well you know what guys? (and, by the use of the term guys I mean to include both sexes here assembled) – the trouble that we have as a company is that we are, to put it bluntly, just a little analytics poor,” said the newly appointed Chief Analytics Officer. That we should consider a firm to be analytically deficient or poor is a profound comment on our modern ag...
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization’s assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensitive data remains private and secure? How do you best protect data in mixed use cloud and big data infrastructure sets? Can you still satisfy the full range of reporting, compliance and regulatory requirements? I...
Gridstore has announced that NAC, Inc. and Sky Tech have joined its innovative Accelerate Partner Program. Both new members cite Gridstore's expertise in enabling the Hybrid Cloud and their solution purpose-built for Hyper-V as the key criteria for their decision to join the program. Integrating seamlessly with business clients, these new partners provide industry-proven storage solutions that promote satisfied customers, profitable businesses, and communities that thrive.
General Electric (GE) has been a household name for more than a century, thanks in large part to its role in making households easier to run. Starting with the light bulb invented by its founder, Thomas Edison, GE has been selling devices (“things”) to consumers throughout its 122-year history. Last week, GE announced that it is officially leaving that job to others. While the lighting division will stay, GE will now turn its attention to selling industrial machinery and analytics as a service t...
It's time to condense all I've seen, heard, and learned about the IoT into a fun, easy-to-remember guide. Without further ado, here are Five (5) Things About the Internet of Things: 1. It's the end-state of Moore's Law. It's easy enough to debunk the IoT as “nothing new.” After all, we've have embedded systems for years. We've had devices connected to the Internet for decades; the very definition of a network means things are connected to it. But now that the invariable, self-fulfilling prop...