In: Computer Science
Scenario: The IT leadership team has determined that the college will add another satellite campus.
Students will be allowed to connect to the network from personally-owned mobile devices. Troubleshooting services will be limited for the students so you must provide a Bring Your Own Device (BYOD) best practice guideline for students to help them manage their personal mobile devices. Your task is creating document demonstrating how to configure the mobile device settings as followstaking screenshotsto demonstrate your knowledge:
Android or Apple:
Paste screenshots into a Microsoft® Word document to demonstrate you applied appropriate configurations, and provide a 350-word narrative using Microsoft® Word to assist the student in applying appropriate settings to their device.
Road map to connect on network
As discuss earlier out IT Leadership team already implement a new satellite in our campus every student is allowed to connect with this network through their Mobile devices. This is a private network manage by the collage and BYOD policy template has been implemented in the network for that reason troubleshoot are limited and all user of the network must follow the BYOD policy. To connect the BYOD network your mobile device, need to be configure properly.
In the later slides we are going to discuss what is BYOD and its policy and step need to configure the mobile device.
Bring your own device (BYOD) programs has three critical components: a software application for managing the devices connecting to the network, a written policy outlining the responsibilities for the users, and an agreement that user must sign, acknowledging that they have read and understand the policy.
Any leadership during the planning stage include: Which web browsers should be use? Which security tools offer the best protection for the range of devices that will be allowed to connect to the network? What level of support is IT expected to provide? To make sure nothing is overlooked, put trained people to monitor.
Network provider XYZ grants its user the privilege of purchasing and using smartphones and tablets of their choosing at work for their convenience. XYZ reserves the right to revoke this privilege if users do not abide by the policies and procedures outlined below.
This policy is intended to protect the security and integrity of XYZ’s data and technology infrastructure. Limited exceptions to the policy may occur due to variations in devices and platforms.
XYZ users must agree to the terms and conditions set forth in this policy in order to be able to connect their devices to the company network.
System Software: Android 6.0 or Higher version supported.
Smartphones including iPhone, Android, Blackberry and Windows phones are allowed (the list should be as detailed as necessary including models, operating systems, versions, etc.)
Devices must be presented to IT for proper job provisioning and configuration of standard apps, such as browsers, office productivity software and security tools, before they can access the network.
Back up your data: All the data need to be backup before connect to the network. Pl. refer below backup image. Go to setting backup and reset select backup.
Limit ad tracking under "Privacy, Advertising”: In order to prevent unauthorized access, devices must be password protected using the features of the device and a strong password is required to access the company network. Passwords must be at least six characters and a combination of upper- and lower-case letters, numbers and symbols. Passwords will be rotated every 90 days and the new password can’t be one of 15 previous passwords.
The device must lock itself with a password or PIN if it’s idle for five minutes.
After five failed login attempts, the device will lock. Contact IT to regain access.
Rooted (Android) or jailbroken (iOS) devices are strictly forbidden from accessing the network
Automatically prevented from downloading, installing and using any app that does not appear on the College list of approved apps
Access to network data is limited based on user profiles defined by IT and automatically enforced
Set up SIM card lock: To use the network you have to setup simcard lock.
Go to setting and then simcard and set up the lock for better reference follow the below screenshot name simcard lock.
Disable Bluetooth and/or WIFI when not in use : Disable Bluetooth and WIFI when it not in use .
Go to setting and then connectivity and then turn off the WIFI and Bluetooth.
Set up email on your mobile device: When setup the device first time setup the email account by clicking signup and enter name password, email and other details to open the email account and once its created use the email credential to login.