| Contents at a Glance | 5 |
|---|
| Table of Contents | 6 |
|---|
| About the Authors | 12 |
|---|
| About the Technical Reviewer | 13 |
|---|
| Acknowledgments | 14 |
|---|
| Introduction | 15 |
|---|
| Chapter 1 The Inevitability of the iPhone in the Enterprise | 17 |
|---|
| Three Devices, One Platform | 18 |
| Welcoming Change While Protecting the Enterprise | 20 |
| Sandbox | 21 |
| Long-Term Implications | 21 |
| Mobile Integration Strategies | 22 |
| The Paradigm Shift | 23 |
| Impact to Infrastructure | 23 |
| Integration with the Enterprise | 25 |
| Summary | 27 |
| Chapter 2: Purchasing and Activating | 28 |
|---|
| Making Large-Purchase Considerations | 28 |
| Preparing the Pilot | 29 |
| Purchasing Applications | 30 |
| Understanding the License Agreement | 30 |
| Purchasing in Bulk | 31 |
| Managing Activations | 32 |
| Using StoreActivationMode | 32 |
| Using StoreGeniusMode | 33 |
| Activating Devices | 34 |
| Getting Started | 34 |
| Synchronizing for the First Time | 35 |
| Choosing Synchronization Options | 36 |
| Developing Organizational Policies | 38 |
| Using the App Store | 38 |
| Managing iTunes | 39 |
| Registering Devices | 41 |
| Backing Up and Restoring Devices | 41 |
| Placing Devices Back into Production | 43 |
| Upgrading the Software | 44 |
| Summary | 46 |
| Chapter 3: Applying Basic Configurations to Mobile Devices | 48 |
|---|
| Getting Familiar with iOS 4 | 49 |
| Setting Wireless Network Connections | 50 |
| Configuring Wireless Network Settings | 51 |
| Joining a Wireless Network | 52 |
| Leveraging the Mobile Web Browser | 54 |
| Configuring the Browser (Mobile Safari) | 54 |
| Navigating Through the Browser Environment | 56 |
| Installing SSL Certificates | 59 |
| Setting up E-Mail Accounts | 62 |
| Leveraging the Cloud | 64 |
| Using IMAP, POP, and SMTP | 65 |
| Securing the Device | 69 |
| Restricting Access to Applications | 69 |
| Authenticating with Passcodes | 73 |
| Maintaining Devices | 76 |
| Performing Basic Startup Maintenance | 76 |
| Verifying Network Connectivity | 77 |
| Obtaining Updates | 77 |
| Leveraging the Logs | 81 |
| Performing Backup and Restoration | 82 |
| Bypassing the Passcode | 84 |
| Summary | 84 |
| Chapter 4: Integrating with Groupware | 86 |
|---|
| Integrating with Microsoft Exchange Servers | 87 |
| Ensuring a Proper Exchange Environment | 87 |
| Using Exchange Server Remote Connectivity Analyzer | 88 |
| Looking at Paths in Exchange | 92 |
| Troubleshooting Exchange 2007 and 2010 Virtual Directories | 93 |
| Configuring iOS for ActiveSync | 94 |
| Using Exchange to Manage Policies | 98 |
| Managing Policies from PowerShell | 101 |
| Using Remote Wipe | 102 |
| Using Alternative Groupware Solutions | 104 |
| MobileMe | 104 |
| Leveraging the Cloud | 111 |
| Summary | 113 |
| Chapter 5: Working with Documents and Files | 115 |
|---|
| Sharing Files Using iTunes | 116 |
| Building a File Sharing Environment | 118 |
| Selecting Your Service | 118 |
| AFP | 119 |
| Configuring AFP | 119 |
| Defining AFP Authentication | 120 |
| Setting Limits | 121 |
| Managing Idle User Handling | 122 |
| Setting up Share Points | 123 |
| Accessing Servers With Third-Party Software | 125 |
| EZSharePro | 126 |
| NetPortal and NetPortal Lite | 132 |
| FileBrowser | 136 |
| Using iWork | 138 |
| Leveraging Public Clouds | 139 |
| MobileMe | 140 |