use mdm to manage a successful 1:1 program

22
Use MDM to Manage a Successful 1:1 Program Manage your networked devices with Mobile Device Management.

Upload: john-tracy

Post on 07-Jul-2015

200 views

Category:

Education


0 download

DESCRIPTION

Learn how to maintain a successful 1:1 program with MDM. Contents include how to add devices, monitor devices, apply group policy, and track assets via MDM>

TRANSCRIPT

Page 1: Use MDM to Manage a Successful 1:1 Program

Use MDM to Manage a

Successful 1:1 ProgramManage your networked devices with Mobile Device Management.

Page 2: Use MDM to Manage a Successful 1:1 Program

About John Tracy

• Associate Director of

Technology at The Montgomery

Academy

• 1:1 College Preparatory

Independent School in

Montgomery, Alabama

• Systems Administrator for ten

years before teaching

technology courses to high

school students for four years.

• Operate 121k12.org

independently as a resource for

schools looking to begin a 1:1

curriculum.

Page 3: Use MDM to Manage a Successful 1:1 Program

What is MDM?

Mobile Device Management is a set

of software and server technologies

that can manage, monitor, locate,

and secure devices of several

different types, deployed across the

world.

Page 4: Use MDM to Manage a Successful 1:1 Program

Why Use MDM?

• Better control over networked devices, even if it is a

BYOD solution.

• Give access to segregated networks without handing out

passwords.

• Track where school owned devices are, anywhere in the

world, in real-time.

• Remotely install applications based on device type, use,

or other trigger.

Page 5: Use MDM to Manage a Successful 1:1 Program

Meraki Dashboard Free MDM

Page 6: Use MDM to Manage a Successful 1:1 Program

Advantages of a cloud

hosted MDM

• Always online.

• Devices do not need to be on your

local network.

• Works with any network.

• Provides location services and

geofencing.

Page 7: Use MDM to Manage a Successful 1:1 Program

Common 1:1 MDM

Tasks (Demo of

Each)

• Assigning devices to specific

networks.

• Assigning Group Policies to

device types or groups.

• Pushing apps to devices based

on rules.

• Clearing passcodes; removing

authentication lock (iOS,

supervision mode)

• Screen sharing

• Reboot, Lock & Report (Macs and

PCs)

• Asset Management

Page 8: Use MDM to Manage a Successful 1:1 Program

Assigning devices to

specific networksDemonstration

Page 9: Use MDM to Manage a Successful 1:1 Program

Network Best Practices

• Separate networks based on use

• Grade level, Division etc.

• If a certain group needs apps that other groups do not,

put them in their own network, or manage them with

tags.

• If these are institution purchased Apple devices, use the

Device Enrollment Program (DEP) to automatically

assign the devices to the network of your choice.

Page 10: Use MDM to Manage a Successful 1:1 Program

Assigning Group Policies

to device types or

groups

Demonstration

Page 11: Use MDM to Manage a Successful 1:1 Program

Group Policy Best Practices

• Use limited content filtering at the network level

• Allow group policy to introduce more granular control of

certain groups for content filtering.

• If your network should only see certain types of devices,

e.g.: iOS or Android, have group policy take devices of

all other types to guest-level access.

• Keep a set of restrictions in a group policy as

consequential treatment for breaking rules in your

Acceptable Use Policy (AUP).

Page 12: Use MDM to Manage a Successful 1:1 Program

Pushing apps to devices

based on rulesDemonstration

Page 13: Use MDM to Manage a Successful 1:1 Program

App Distribution Best Practices

• App Store apps should be purchased using Volume Purchase

Program (VPP) tokens.

• VPP tokens will allow the institution to retain license rights to

the app.

• In a Bring Your Own Device (BYOD) setting, apps can be

given to the student, when they have finished using the app,

the license can be pulled back to be used for another

student.

• Think of this system as a classroom set of books. The

student has access to the book during the course, but when

they are done, the next set of students can use them.

Page 14: Use MDM to Manage a Successful 1:1 Program

Clearing passcodes;

removing authentication

lock

Demonstration

Page 15: Use MDM to Manage a Successful 1:1 Program

Unlocking Best Practices

• Clearing Passcodes should only be done in certain circumstances.

• A student or faculty member has been locked out of their device.

• Student or faculty member is unavailable while device is being

serviced.

• Removing authentication lock should only be done in certain

circumstances.

• Devices must be school-owned and under supervision.

• Reseting the devices for another use or to problem-solve a severe

issue. (Removing authentication lock should be a last resort,

contact with the individual who possesses the device should

happen before bypassing this step. DATA WILL BE REMOVED!)

Page 16: Use MDM to Manage a Successful 1:1 Program

Screen sharing Demonstration

Page 17: Use MDM to Manage a Successful 1:1 Program

Screen Sharing Best Practices

• Screen sharing is only available for full computers. (Not

tablet and mobile devices.)

• An Acceptable Use Policy (AUP) should mention the role

of IT and their use of screen sharing as a tool to help

diagnose and maintain systems.

• Screen sharing should not be used surreptitiously, IT is

there to provide help, not fear.

Page 18: Use MDM to Manage a Successful 1:1 Program

Reboot, Lock & Wipe Demonstration

Page 19: Use MDM to Manage a Successful 1:1 Program

Reboot, Lock & Wipe Best Practices

• Devices should only be locked or wiped when they can

not be immediately found; reported missing.

• Wipe should only be used for devices thought to contain

sensitive institutional data.

• A backup may not have been performed, unless the

data is sensitive, save wiping the device for instances

when theft is the cause.

Page 20: Use MDM to Manage a Successful 1:1 Program

Asset Management Demonstration

Page 21: Use MDM to Manage a Successful 1:1 Program

Asset Management Best Practices

• MDM based asset management is only as good as the

configuration profile.

• If the device has been wiped, or is offline, trust of the

asset information is compromised.

• A separate database should still be maintained. This will

allow history of the devices to be preserved.

• Previous owner history.

• Warranty ticket history.

Page 22: Use MDM to Manage a Successful 1:1 Program

Questions & Discussion