tailieunhanh - iPhone OS Enterprise Deployment Guide Second Edition phần 3

Nếu bạn sử dụng Microsoft Exchange, bạn cũng có thể bổ sung các chính sách EAS của bạn bằng cách sử dụng chính sách cấu hình. Điều này có thể cung cấp quyền truy cập vào các chính sách mà không có sẵn trong Microsoft Exchange 2003, ví dụ, hoặc cho phép bạn để xác định các chính sách đặc biệt cho các thiết bị hệ điều hành iPhone. | If you use Microsoft Exchange you can also supplement your EAS policies by using configuration policies. This can provide access to policies that aren t available in Microsoft Exchange 2003 for example or allow you to define policies specifically for iPhone OS devices. Configuring Devices You need to decide how you ll configure each iPhone iPod touch or iPad. This is influenced in part by how many devices you plan on deploying and managing over time. If the number is small you may find that it s simpler for you or your users to manually configure each device. This involves using the device to enter the settings for each mail account Wi-Fi settings and VPN configuration information. See Chapter 3 for details about manual configuration. If you deploy a large number of devices or you have a large collection of email settings network settings and certificates to install then you may want to configure the devices by creating and distributing configuration profiles. Configuration profiles quickly load settings and authorization information onto a device. Some VPN and Wi-Fi settings can only be set using a configuration profile and if you re not using Microsoft Exchange you ll need to use a configuration profile to set device passcode policies. Configuration profiles can be encrypted and signed which allows you to restrict their use to a specific device and prevents anyone from changing the settings that a profile contains. You can also mark a profile as being locked to the device so once installed it cannot be removed without wiping the device of all data or optionally with an administrative passcode. Whether or not you re configuring devices manually or using configuration profiles you also need to decide if you ll configure the devices or if you will delegate this task to your users. Which you choose depends on your users locations company policy regarding users ability to manage their own IT equipment and the complexity of the device configuration you intend to .