Blog Banner

4 AirWatch Tricks that Will Wow Your Boss

4 AirWatch Tricks that Will Wow Your Boss

What can you gain from mastering VMware AirWatch? The platform is one of the most widely used solutions for mobile device management (also known as enterprise mobility management) and has been a reliable source of revenue for VMware even as the company restructures and de-emphasizes some age-old products such as Fusion and Workstation.

The growth and substantial market share of AirWatch make it a sensible area of study for any IT professional looking to improve their prospects in the MDM/EMM world.

There are many hidden and useful features in AirWatch that you can take advantage of to impress your boss while streamlining your IT department's MDM/EMM efforts. Here are four capabilities that are worth knowing:

1. Use QR codes for simple device enrollment

While ubiquitous and heavily used throughout Asia, QR codes are more of a novelty in the Americas, where they often associated with bulletin board ads, Keurig coffee pods and Juicero juice packs. However, they can be powerful shortcuts for adding mobile devices to AirWatch.

As an admin, you can sent an invite templates containing QR codes to end users. Using a phone or tablet, they can then scan these codes to download the correct AirWatch agent for their operating systems. Each code also contains an enrollment token, if enabled. Once the agent installed, scanning the QR code again will pass the environment and user parameters to AirWatch.

2. Enable enrollment registration tokens

These tokens, which can be passed to users via the QR codes for AirWatch, add an extra layer of security to your device enrollment process. Basically, the token is a one-time credential that must be entered to complete the registration of a device in AirWatch.

AirWatch administrators have the option to set up such tokens as part of a one- or two-factor authentication system:

  1. With one-factor authentication, the token itself is all that is needed to complete the enrollment
  2. With a two-factor setup, the token is required alongside a standard username and password combination for more rigorous security.

3. Limit enrollment to specific groups

In some cases (such as when you are working with a sensitive production environment), you will want to restrict who can enroll devices into your AirWatch deployment. This can be done through the admin console in AirWatch.

"Restrictions can be applied to specified groups that are mapped to Active Directory Groups."

Restrictions can be applied to specified groups that are mapped to Active Directory Groups. The limitations can encompass operating systems, as well as the total number of devices permitted to enroll and whether they are allowed to enroll in AirWatch MDM or in Workspace ONE.

4. Block access to sensitive content and remotely wipe devices

One of the persistent challenges of MDM/EMM is dealing with devices that belong to former employees or to individuals who have overstepped their access privileges. In such scenarios, it is possible that sensitive data may be exfiltrated, leading to damages and embarrassment for the organization.

Fortunately, AirWatch can help you avoid and work through these tough situations. More specifically, it contains capabilities for remote wipe and content blocking. The AirWatch reporting console also automatically generates reports on device lifecycles, so that you can keep track of device inventory and know specifically what types of devices are currently enrolled across your organization.

Become a VMware AirWatch expert at a New Horizons Computer Learning Centers

AirWatch is an important platform to be familiar with, now that bring-your-own-device initiatives are so prevalent in organizations of all kinds. Taking technical courses at a nearby New Horizons Computer Learning Centers can help you build both basic and advanced skills in VMware products, including AirWatch.

You will be in a position to use the tips and tricks we've outlined here, as well as many others not mentioned. Find a New Horizons location near you today to get started.


Categories: Virtualization

Terry Mott

Terry Mott

Other posts by Terry Mott

Contact author

Related articles

Contact author


Subscribe for Future Blog Notifications