JimMalandruccol's Posts

With the news of the Facebook and Google VPN using an enterprise certificate to get around Apple privacy rules coming out this week (https://techcrunch.com/2019/01/29/facebook-project-atlas/), I w... See more...
With the news of the Facebook and Google VPN using an enterprise certificate to get around Apple privacy rules coming out this week (https://techcrunch.com/2019/01/29/facebook-project-atlas/), I wanted to find out how many of our managed devices (around 700) have installed this and let the InfoSec team have a discussion with them. I did find two previous versions of the Facebook VPN, Onara Protect and Onara Extend, but nothing related to the new version. It looks like Facebook was using a profile called Facebook Research 2.0 to sideload the app, but in testing and verifying with Support, we do not have the ability to pull a report of third party profiles installed on devices. Does anybody have a better idea to find these potentially installed profiles than scroll through every device's profile list? It might be easier to find with the App Name or App Identifier, but no luck finding that information yet.
When adding the assignment for the app, create a new assignment group and change the type to devices or users. Add their device to the list, create a name for the group and save it. Set the other ... See more...
When adding the assignment for the app, create a new assignment group and change the type to devices or users. Add their device to the list, create a name for the group and save it. Set the other app Policy settings as you need and save the assignment.
Hey all, we have run into a snag renewing our Third-Party Proxy and Per-App SSL certificates. When attempting to upload we get an error ' Please upload a valid certificate chain.'  However the cha... See more...
Hey all, we have run into a snag renewing our Third-Party Proxy and Per-App SSL certificates. When attempting to upload we get an error ' Please upload a valid certificate chain.'  However the chain does appear to be valid as it has been uploaded for profile signing and IIS for AWCM with no issues. We are working to get he pfx file recreated to try again but if we cannot get it figured out is there any downside to not using a third-party certificate and using the default AirWatch cert? We are using Proxy for Browser/Web access and Per-App VPN with only a few third party apps. This is an on-prem console version 9.2.3 with a single VMWare Tunnel in Basic configuration. Thanks.
9.2.3.27 and have several of the new devices enrolled no problem.
I updated from 9.2.3.0 to 9.2.3.27 on our single server overnight and everything is working fine. Services automatically came back up and iPhone Xs and Xs Max both enrolled with no issues. Databas... See more...
I updated from 9.2.3.0 to 9.2.3.27 on our single server overnight and everything is working fine. Services automatically came back up and iPhone Xs and Xs Max both enrolled with no issues. Database Admin saw the following error when running the sql file but it ran successfully: Warning! The maximum key length is 900 bytes. The index 'UQ_Application_PkgIdLGIdVerHshDevTypId' has maximum length of 1228 bytes. For some combination of large values, the insert/update operation will fail. Create scheduled job AirWatch - ADP_Export ...cloudProfile.CloudProfileMetaData ...cloudProfile.CloudProfileTemplate ...DeviceSampleMask_MaskUpdate ...AppDeploymentConfiguration_DeleteDuplicateADPKeyForBoxer We did have to rerun the sql file as the console install did not recognize the updated version. Second attempt was successful.
Claude, did you have any luck with your install? We're also on 9.2.3 and will probably do the patching this weekend.
Do you have debug on for vpnd logs? For Linux Tunnel, edit the server.conf file in /opt/VMware/tunnel/vpnd. Change log_level to 4, restart vpnd service and recreate problem. Tunnel.log should the... See more...
Do you have debug on for vpnd logs? For Linux Tunnel, edit the server.conf file in /opt/VMware/tunnel/vpnd. Change log_level to 4, restart vpnd service and recreate problem. Tunnel.log should then have more detailed information.