Recent updates
-
Advanced Endpoint Security with Workspace ONE Mobile Threat Defense
Updated onArticleMobile platforms and their operating systems have proliferated in both public and private sectors. The Windows OS has even taken a back seat to their numbers. In turn, nefarious forces are targeting these mobile platforms to take advantage of potential vulnerabilities.
Deeply integrated with Workspace ONE, Workspace ONE Mobile Threat Defense, powered by Lookout's advanced mobile endpoint security technology, greatly enhances mobile device security by protecting from threats like phishing, root and jailbreak, malicious applications, malware, and many more device, application, and network originated threats.
Mobile Threat Defense (MTD) deeply integrates with the Workspace ONE platform including Workspace ONE UEM (UEM) and Workspace ONE Intelligence (Intelligence), making Mobile Threat Defense best-of-breed for deployment and management.
This guide outlines Workspace ONE Mobile Threat Defense demo flows available in TestDrive.
Knowledge Base Digital Workspace Workspace ONE
-
Sandbox Fundamentals
Updated onArticleHeads up - In the near future, TestDrive's brokering feature for UEM and Access tenants called "sandboxes" will be removed from the TestDrive portal for partners and VMware employees. The following outlines the impact:
- Partners and VMware employees will not have access to enable either a Workspace ONE UEM or Workspace ONE Access sandbox. Use a DWPG.
- Existing sandbox tenants will remain provisioned as long as the associated TestDrive account remains active.
- Customers will have access to enable UEM and Access sandboxes.
Knowledge Base TestDrive Fundamentals Sandbox Experiences
-
The Digital Workspace Proving Ground (DWPG)
Updated onArticleThis is the essential, getting started with a Digital Workspace Proving Ground (DWPG) guide. In this guide, learn what a DWPG is, how to request a DWPG, onboard a DWPG, and answers to frequent questions.
Knowledge Base Digital Workspace Workspace ONE
-
Workspace ONE Intelligence for Horizon and DEEM for Horizon - Limited View
Updated onArticleWorkspace ONE Intelligence for Horizon and DEEM for Horizon have been enabled in the TestDrive Workspace ONE Cloud / Horizon Cloud Next-Gen environment, however, due to current limitations with roles and permissions, TestDrive users are assigned a read-only role which only provides access to the read-only built-in dashboards.
Follow the steps in this guide to learn how to access the dashboards, as your read-only view in this environment is different than what someone would see with the administrator role.
Knowledge Base Digital Workspace Horizon Cloud
-
TestDrive Customer Invitations and Extensions
Updated onArticleThis brief guide shows you how to (1) invite your customers to TestDrive and (2) extend a customer's TestDrive account.
Knowledge Base TestDrive Fundamentals TestDrive Portal & Ready-To-Use (RTU) Environment
-
Getting Started with TestDrive
Updated onArticleTestDrive provides VMware customers, partners, employees, VMUG Advantage members, and vExperts the opportunity to explore VMware products including all Workspace ONE products, Horizon, vSAN, Pivotal Container Service, and SD-WAN. Our environments are fully configured, enterprise grade, and integrated allowing you to use and experience the products as a customer would in their own deployment.
Knowledge Base TestDrive Fundamentals TestDrive Portal & Ready-To-Use (RTU) Environment
-
Provisioning & Supporting Android Rugged Devices
Updated onArticleThis document will guide you through rugged Android device management in TestDrive.
This walkthrough outlines rugged talking points and actions to get a rugged device from out-of-box to an Android Work Managed Device as expeditiously as possible, illustrating the speed and ease of rugged enrollment.
Demonstrating a common rugged use case, the enrolled the device will be provisioned with a passcode, a few apps, and locked down with the Launcher. The Launcher provides access to a few apps, but restricts access to the rest of the device. The device can be remotely assisted via Workspace ONE Assist.
Knowledge Base Industry-Specific Walkthroughs Retail
-
VMware Carbon Black App Control
Updated onArticleCarbon Black App Control combines application control, file integrity monitoring, full-featured device control, and memory/tamper protection into a single agent. App Control is used to lock down critical systems and servers, prevent unwanted changes, and ensure continuous compliance.
App Control is a positive security solution allowing for a "default deny" approach to reduce the attack surface. App Control gives administrators the operational confidence to automatically approve legitimate change and eliminate the burden traditionally seen in allowlist management.
Knowledge Base Networking and Intrinsic Security Walkthroughs VMware Carbon Black Cloud
-
Threat Hunting with Carbon Black XDR (Phishing turned into ransomware)
Updated onArticleThreat hunting is the practice of proactively searching for security threats and vulnerabilities in an environment before they can be exploited by attackers. It involves analyzing data from various sources, such as process events, network traffic, and user behavior, to identify signs of malicious activity that may have evaded traditional security measures such as firewalls and antivirus software.
Carbon Black XDR extends endpoint detection and response by enabling security operations teams to visualize and analyze across network, endpoint, workload, and user data in context. Carbon Black XDR surfaces new results by preserving and extending the endpoint, network, workload, and user contexts during analysis and display, giving you all the information you need to proactively hunt threats, uncover suspicious behavior and lateral movement, disrupt attacks in progress, repair damage quickly, manage vulnerability and address gaps in defenses.
Knowledge Base Networking and Intrinsic Security Walkthroughs VMware Carbon Black Cloud
-
Threat Hunting with Carbon Black EEDR (Phishing turned into ransomware)
Updated onArticleThreat hunting is the pursuit of indicators of compromise (IOCs) within public and private cloud servers, endpoints, and networks that may be symptomatic of a compromise, intrusion, or data exfiltration. Though the concept of threat hunting isn’t new, the practice of threat hunting is for many organizations.
Carbon Black EDR continuously collects comprehensive data, giving you all the information you need to proactively hunt threats, uncover suspicious behavior, disrupt attacks in progress, repair damage quickly, manage vulnerability and address gaps in defenses. It allows you to search through raw unfiltered endpoint data by using a powerful query language, even if the endpoint is offline.
Knowledge Base Networking and Intrinsic Security Walkthroughs VMware Carbon Black Cloud