
The Community
Stay up to date…
VMware End-User Computing Blog Bringing you the latest VMware EUC news, trends and product innovations.
- Introducing Omnissa, the former VMware End-User Computing businessby Renu Upadhyay on April 25, 2024 at 6:23 pm
As a marketing leader, one of the most exhilarating and rewarding undertakings is to define and activate a new brand. And it’s a rare opportunity to define a brand for an established business with industry-leading solutions. I’m privileged to have the opportunity to do both as the End-User […]
- Conditional access with Workspace ONE integrates seamlessly with Microsoft Entra ID and Google’s Context-Aware Access for macOSby Chris Morelock and Paul Mounkes on April 16, 2024 at 3:37 pm
As cyber threats become more complex, it’s crucial for organizations to implement robust security measures. In today’s treacherous digital landscape, securing users’ access to organizational resources is critical. Workspace ONE Unified Endpoint Management (UEM) includes conditional access […]
- Preparing for the digital evolution: Insights from the 2024 Gartner Digital Workplace Summitby Bryan Vest on April 5, 2024 at 4:55 pm
Representatives from the Broadcom End-User Computing (EUC) Division had the privilege of attending the Gartner Digital Workplace Summit March 18–19, 2024, in Grapevine, Texas. More than 900 attendees comprising digital workplace leaders, architects, and IT execs came from around the globe to […]
- Creating custom macOS security baselines with the macOS Security Compliance Project and Workspace ONEby Chris Morelock and Paul Mounkes on April 2, 2024 at 6:57 pm
Specific types of organizations are required to configure their endpoint security protocols in accordance with designated standards and benchmarks, such as those established by the National Institute of Standards and Technology (NIST) or the Center for Internet Security (CIS). Some organizations […]
- Introducing enhanced integration between Cisco ISE and Workspace ONE Unified Endpoint Managementby Sivapratap Reddy Chintam on March 28, 2024 at 2:19 am
We’re thrilled to announce the limited availability of Cisco Identity Services Engine (ISE) v3.1+ and Workspace ONE Unified Endpoint Management (UEM) integration with the Workspace ONE UEM 2402 release. This integration ensures that your end user’s devices can safely and securely connect and […]
- New management capabilities now available for macOS Activation Lock in Workspace ONEby Paul Mounkes on March 27, 2024 at 7:12 pm
Anyone who has had a laptop stolen knows the great frustration that comes with losing not only an expensive piece of tech but also the precious work and personal information, photos, and everything else that’s stored on it. Apple understands this, and long ago introduced a feature designed to […]
- Beware of CryptoChameleon, the new phishing threat that uses social engineering to trick victimsby Wendy Leung on March 26, 2024 at 3:01 pm
In the ever-evolving landscape of cyber threats, the CryptoChameleon phishing attack has emerged as a new example of how cybercriminals use advanced social engineering to gain access to victim’s accounts. Like a chameleon, the hackers camouflage themselves, but as trusted authorities, to blend in […]
- ViVE 2024: Why healthcare interoperability is key, and how we’re championing itby Amy Young on March 19, 2024 at 10:54 pm
Unmanaged devices. A mix of traditional and cloud-based applications. Data scattered across different cloud environments. This complexity in the healthcare environment can create a nightmare for data security, compliance, and efficient care delivery. Each separate tool adds another layer of chaos. […]
- Apple iOS 17.4 introduces updates, including alternative app stores and payment methodsby Adam Henry and Paul Mounkes on March 12, 2024 at 8:58 pm
In 2022, European Union (EU) watchdogs, the European Commission (EC), launched an ambitious project aimed at “ensuring fair and open digital markets.” Essentially, the goal of the Digital Markets Act (DMA) is to limit the power of designated technology “gatekeepers” and ensure they behave […]
- Workspace ONE continues to lead the charts in unified endpoint managementby Aditya Kunduri on March 8, 2024 at 2:55 am
In a rapidly evolving digital landscape, managing endpoints effectively has become paramount for enterprises worldwide. With the proliferation of diverse devices and the need for seamless connectivity, organizations are seeking robust solutions to streamline their endpoint management processes. […]

Adam Matthews Technology // IAM // EUC // Random Rubbish
- I asked ChatGPT to write me a bash script, and it worked (mostly), why do I need to know how to...by adam on December 18, 2022 at 11:12 pm
By now, ChatGPT has become pretty well known ( as of 18th Dec 2022). I’ve messed around with basic questions, but today I wanted to start to write a script that I could use with “OverSight” on Mac (https://objective-see.org/products/oversight.html). When you turn on your camera/mic, it can fire off a script with arguments. In this … Continue reading "I asked ChatGPT to write me a bash script, and it worked (mostly), why do I need to know how to code?"
- VMware ESXi – How to Remove an NFS Share that’s ‘In Use’by adam on December 14, 2022 at 11:35 am
I recently moved house, and as part of that a few things on my network changed. My NAS (A Synolofy DS8J) changed it’s IP Address. This caused an issue when ESXi was trying to get hold of the datastore. So, now this needs to be removed and replaced – I came across this error: After … Continue reading "VMware ESXi – How to Remove an NFS Share that’s ‘In Use’"
- Easily Automate your Lab with the vCenter APIby adam on February 14, 2022 at 6:00 pm
Learn how to use Python to call the VMware vCenter API to Start and Suspend Virtual Machines easily, and use Crontab to define the times it runs.
- Quickly Compress Video Files on macOSby adam on January 26, 2022 at 11:29 am
When you record your videos with Quicktime and you end up with 1.7 GB of a file, how do you shrink that?! I’ve been using this process for a couple of years now to optimise the output size of my demo videos, to make it easier to share them in presentations, and to keep my … Continue reading "Quickly Compress Video Files on macOS"
- WordPress – How to fix Jetpack connection errors, Fonts and Icons showing as squares with NGINXby adam on March 5, 2021 at 5:24 pm
I recently migrated https://blog.eucse.com/blog from running on Apache to Nginx. I found it helped a lot with utilization and speed (combined with a few more tweaks), but one thing I noticed after was Jetpack wouldn’t load correctly, and some fonts and icons were showing as squares. See examples of what I was seeing below: Resolution … Continue reading "WordPress – How to fix Jetpack connection errors, Fonts and Icons showing as squares with NGINX"

Arsen Bandurian: Technical Blog Digital Workspace, End User Computing, Enterprise Mobility, AutoID, WLANs, OSes and other technical stuff I happen to work with
- Check if a Microsoft Form comes from a trusted sourceby apcsb on November 6, 2023 at 10:14 am
When you open a Microsoft Form asking you for some sensitive data, do you know where will your data land? Could it be phishing? Read on to find out… Recently, I have received an email at work asking me to fill out a form with some of sensitive personal details (voluntary disclosure). I don’t mind... Continue Reading →
- Enhancing Windows Update Catalog metadata Accessibilityby apcsb on September 11, 2023 at 7:30 am
Microsoft has recently released a major update to the Windows Update catalog back-end, adding crucial information such as CVEs (Common Vulnerabilities and Exposures) addressed by the update and the CVE Score directly info API. This information is essential for Threat and Vulnerability Management decisions as well as Patch management and many organizations pay $$ for... Continue Reading →
- Quickly validate and enable manual application uninstall via Intune Company Portal using Graph APIby apcsb on August 3, 2023 at 7:04 am
I am back and the titles are getting longer! If you are an Intune admin, you will probably be happy to know that one of the most required features has landed: Uninstall Win32 and Microsoft store apps using the Windows Company Portal. One thing you need to be aware of, is that this feature is... Continue Reading →
- Building a custom Windows Update Report p1: Parsing HTML via PowerShell on modern systems (no IE)by apcsb on July 28, 2022 at 7:30 am
Wow, it’s been a while! A customer of mine recently wanted a detailed report that should include info such as how many weeks is the Windows on the machine behind the latest available Security Update. We’ve found to a way to combine Intune Data Warehouse and PowerBI to pull data that allows to identify the... Continue Reading →
- A case of OneDrive Personal Vault not coming up (0x8031000a, MDM, GPO and BitLocker)by apcsb on March 18, 2022 at 6:23 pm
Today I wanted to enable the Personal Vault feature on my Home PC. While following the wizard I got an error 0x8031000a “Your organization requires your device to join the domain before you can use the Personal Vault”. What does this have to do with MDM. GPO and BitLocker troubleshooting? Here’s some quick Friday entertainment!... Continue Reading →

- The Android Management API doesn't support pulling managed properties (config) from app tracks....by Jason Bayton on April 23, 2025 at 12:00 am
I've had a use case thrust upon me this week, something I hadn't really paid much attention to as I considered and assumed it to be basic functionality. But wouldn't you know? Nope! If you're one of an increasing number of organisations trying to get to grips with Google Play's app tracks, you'll likely already understand the perceived benefits: Multiple application versions through one app listing in Google Play Customisable tracks for easy identification and naming alignment with internal processes Direct access to said tracks via EMM policy for managed devices All the benefits of Google Play's infrastructure for testing and debugging development builds It's handy, right? The alternative is creating multiple app listings, which can - depending on app visibility - do anything from trigger Play's Repetitive Content Policy to add more workload and management overhead in building, uploading, and maintaining multiple applications on the Play Store (obviously can be countered by CI/CD, but that's not the point). Unfortunately one of the limitations with app tracks, that wouldn't be there if using multiple Play Store listings, is the visibility of managed configuration. Circling back to the use case: A customer has successfully had their ear bent to the benefits of managed config for configuring their application(s) out in the wild, and with quite a robust QA process, has historically had multiple versions of an application being deployed to devices across their estate in tandem as part of it. In onboarding to NinjaOne MDM, with AMAPI (AMAPI still doesn't support APK deployment as of April 2025), the obvious route for this workflow was via app tracks - this is also considering additional requirements not fully described here. All had been well until it came time to test the managed config. The app track was selected, the application version landed on-device, but managed configs remained empty. Why? { "name": "enterprises/xxxx/applications/com.applauncher", "title": "App Launcher", "appTracks": [ { "trackId": "4620480462718573", "trackAlias": "Dev" } ], "playStoreUrl": "https://play.google.com/store/apps/details?id=com.applauncher", "distributionChannel": "PRIVATE_GOOGLE_HOSTED", "appPricing": "FREE", "minAndroidSdkVersion": 31, "updateTime": "2025-01-17T20:51:47.764Z", "availableCountries": [ "AD", ... "ZM", "ZW" ], "appVersions": [ { "versionString": "1.33", "versionCode": 33, "trackIds": [ "4620480462718573" ] }, { "versionString": "1.6", "versionCode": 6, "production": true } ], "fullDescription": "App Launcher" } Notice anything missing in the above applications.get via AMAPI? managedProperties is absent. Despite being available in the track being pushed to test devices, the applications.get API endpoint will only return on PRODUCTION where at this time no managed properties were defined. Here's an example of what could be shown in the above, as taken from my application: "managedProperties": [ { "key": "startPath", "type": "STRING", "title": "Application start page", "description": "Set the page the application relative to the domain. Default is /, so to start on the Android docs page input /android.", "defaultValue": "/" } ], I'm sure Google could fix this by adding another request parameter for trackID (alongside name and languageCode as shown here) but today they don't. OK, so how can this be addressed? # As ever I'll focus on AMAPI here, Play EMM API vendors have a lot more freedom with their custom DPCs to integrate this as desired. When building your AMAPI policy, managed configurations form part of the applications payload, and look something like this - { "installType": "PREINSTALLED", "packageName": "com.applauncher", "autoUpdateMode": "AUTO_UPDATE_MODE_UNSPECIFIED", "accessibleTrackIds": "4620480462718573", "managedConfiguration": { "payment_gateway_url": "https:\/\/bbc.co.uk" }, "defaultPermissionPolicy": "PERMISSION_POLICY_UNSPECIFIED" }, Typically, an EMM will take one of two approaches to managed configurations: Use the managed configuration iFrame, which generates the restrictions form.. within an iFrame. This then returns an ID to the policy. Build a form dynamically from the managedProperties of the applications.get API call - this is my preferred route as it's far more flexible. If the EMM is using option 1, it becomes more difficult to achieve the objective as it would require the clearing of the ID and a full resubmission of MC via managedConfiguration. If EMMs don't clear the ID first, they will be met with an error 400 on policy save, despite the documentation clearly stating ID will be ignored: The managed configurations template for the app, saved from the managed configurations iframe. This field is ignored if managedConfiguration is set. Since EMMs use the iFrame for simplicity, this is less likely to happen. For option 2, as above there's a lot more flexibility. The vendor will have a configuration form (or the concepts of one, Intune) which will dynamically generate the appropriate inputs based on the PRODUCTION track applications.get command the EMM performs. But they don't have to do this. An EMM vendor could add either a custom configuration form, or a JSON editor directly, like that of Intune, which would allow the editing and adding of configurations as desired. Now when an application is known to have managed properties set in an app track version, even if the production version doesn't have anything to generate a form against, the managed config JSON can still be added to the policy, and will be sent down to the application regardless where it will apply successfully. Like this: "managedConfiguration": { "payment_gateway_url": "https:\/\/bbc.co.uk" } To summarise # If a policy can be edited via a JSON/custom config editor, it's simple and straightforward to obtain the restrictions from the application and input them under managed configurations manually rather than leaning on the EMM to build the configuration form. If the EMM doesn't offer this, and equally can't provide access to an API to allow similar, then it may be worth raising it as a feature request. Get in touch if you've any questions on this!
- The Android Management API doesn't support pulling managed properties (config) from app tracks....by Jason Bayton on April 23, 2025 at 12:00 am
I've had a use case thrust upon me this week, something I hadn't really paid much attention to as I considered and assumed it to be basic functionality. But wouldn't you know? Nope! If you're one of an increasing number of organisations trying to get to grips with Google Play's app tracks, you'll likely already understand the perceived benefits: Multiple application versions through one app listing in Google Play Customisable tracks for easy identification and naming alignment with internal processes Direct access to said tracks via EMM policy for managed devices All the benefits of Google Play's infrastructure for testing and debugging development builds It's handy, right? The alternative is creating multiple app listings, which can - depending on app visibility - do anything from trigger Play's Repetitive Content Policy to add more workload and management overhead in building, uploading, and maintaining multiple applications on the Play Store (obviously can be countered by CI/CD, but that's not the point). Unfortunately one of the limitations with app tracks, that wouldn't be there if using multiple Play Store listings, is the visibility of managed configuration. Circling back to the use case: A customer has successfully had their ear bent to the benefits of managed config for configuring their application(s) out in the wild, and with quite a robust QA process, has historically had multiple versions of an application being deployed to devices across their estate in tandem as part of it. In onboarding to NinjaOne MDM, with AMAPI (AMAPI still doesn't support APK deployment as of April 2025), the obvious route for this workflow was via app tracks - this is also considering additional requirements not fully described here. All had been well until it came time to test the managed config. The app track was selected, the application version landed on-device, but managed configs remained empty. Why? { "name": "enterprises/xxxx/applications/com.applauncher", "title": "App Launcher", "appTracks": [ { "trackId": "4620480462718573", "trackAlias": "Dev" } ], "playStoreUrl": "https://play.google.com/store/apps/details?id=com.applauncher", "distributionChannel": "PRIVATE_GOOGLE_HOSTED", "appPricing": "FREE", "minAndroidSdkVersion": 31, "updateTime": "2025-01-17T20:51:47.764Z", "availableCountries": [ "AD", ... "ZM", "ZW" ], "appVersions": [ { "versionString": "1.33", "versionCode": 33, "trackIds": [ "4620480462718573" ] }, { "versionString": "1.6", "versionCode": 6, "production": true } ], "fullDescription": "App Launcher" } Notice anything missing in the above applications.get via AMAPI? managedProperties is absent. Despite being available in the track being pushed to test devices, the applications.get API endpoint will only return on PRODUCTION where at this time no managed properties were defined. Here's an example of what could be shown in the above, as taken from my application: "managedProperties": [ { "key": "startPath", "type": "STRING", "title": "Application start page", "description": "Set the page the application relative to the domain. Default is /, so to start on the Android docs page input /android.", "defaultValue": "/" } ], I'm sure Google could fix this by adding another request parameter for trackID (alongside name and languageCode as shown here) but today they don't. OK, so how can this be addressed? # As ever I'll focus on AMAPI here, Play EMM API vendors have a lot more freedom with their custom DPCs to integrate this as desired. When building your AMAPI policy, managed configurations form part of the applications payload, and look something like this - { "installType": "PREINSTALLED", "packageName": "com.applauncher", "autoUpdateMode": "AUTO_UPDATE_MODE_UNSPECIFIED", "accessibleTrackIds": "4620480462718573", "managedConfiguration": { "payment_gateway_url": "https:\/\/bbc.co.uk" }, "defaultPermissionPolicy": "PERMISSION_POLICY_UNSPECIFIED" }, Typically, an EMM will take one of two approaches to managed configurations: Use the managed configuration iFrame, which generates the restrictions form.. within an iFrame. This then returns an ID to the policy. Build a form dynamically from the managedProperties of the applications.get API call - this is my preferred route as it's far more flexible. If the EMM is using option 1, it becomes more difficult to achieve the objective as it would require the clearing of the ID and a full resubmission of MC via managedConfiguration. If EMMs don't clear the ID first, they will be met with an error 400 on policy save, despite the documentation clearly stating ID will be ignored: The managed configurations template for the app, saved from the managed configurations iframe. This field is ignored if managedConfiguration is set. Since EMMs use the iFrame for simplicity, this is less likely to happen. For option 2, as above there's a lot more flexibility. The vendor will have a configuration form (or the concepts of one, Intune) which will dynamically generate the appropriate inputs based on the PRODUCTION track applications.get command the EMM performs. But they don't have to do this. An EMM vendor could add either a custom configuration form, or a JSON editor directly, like that of Intune, which would allow the editing and adding of configurations as desired. Now when an application is known to have managed properties set in an app track version, even if the production version doesn't have anything to generate a form against, the managed config JSON can still be added to the policy, and will be sent down to the application regardless where it will apply successfully. Like this: "managedConfiguration": { "payment_gateway_url": "https:\/\/bbc.co.uk" } To summarise # If a policy can be edited via a JSON/custom config editor, it's simple and straightforward to obtain the restrictions from the application and input them under managed configurations manually rather than leaning on the EMM to build the configuration form. If the EMM doesn't offer this, and equally can't provide access to an API to allow similar, then it may be worth raising it as a feature request. Get in touch if you've any questions on this!
- Hands-on with CVE-2025-22442, a work profile sideloading vulnerability affecting most Android...by Jason Bayton on April 13, 2025 at 12:00 am
Mr. Cowell made me aware of a Medium article by Bastien Bobe, field CTO at Lookout, this week. His article gave me a good overview of a vulnerability discovered by Alan Zaccardelle that I'd previously not heard about. I'd encourage reading the linked article above for the overview and demo video of the vulnerability, but in a nutshell the issue is as follows: During work profile setup, there's a temporary state as the profile initialises where no policies are applied. It's too early for organisational policy to enforce (in which sideloading is always prevented by default) and there's no default policy in place on Android's side. The work profile is wide open. This means if a user has developer settings enabled, USB debugging turned on, and the device connected up to a computer, applications can be sideloaded via ADB. For those more advanced, a script can be written to check for the presence of the work profile, and immediately adb install package.apk as many apps as desired until continuing on to the point of registration/enrolment and corporate policy application. Here's a video of my own tinkering (I don't pause the process, so policy can be seen blocking further installs), and I'll continue the article below:
What versions of Android are in scope? # Pretty much all Android versions going back 10+ years. Android 16 beta 3 is already patched, so 16 will be the first release in recent times to launch without it. For Android 12-15, a patch has been provided in April's SPL. Everything prior to that is for the respective OEMs to find and fix themselves (though running Android 11 or earlier today comes with many more risks than just this, if not manually maintained by the OEM). What are the ramifications? # The clear risk is the presence of unauthorised applications in the work profile, and the potential for data leakage through them. The entire point of the work profile is to isolate corporate apps and data in a separately encrypted and siloed environment; allowing unauthorised applications can effectively bridge the cross-profile divide, and this is quite obviously bad. Unlike Bastien's take, I'm less concerned about malicious, or Potentially Harmful Applications (PHAs) being a risk, as despite his claim, Google Play Protect scans over 200 billion applications a day across certified Android devices globally, including at-least daily checks for known bad applications, and real-time checks of non-Google Play installed applications. Obviously AOSP doesn't benefit from this, but it's a safe assumption most work profile deployments are using certified devices. So this: By design, MDM won’t be able to detect malicious or unwanted apps in the work profile Is misleading. While MDM isn't necessarily the on-device engine scanning apps (that is GPP), Android's built-in protections work well with, and are enforced by, MDM. Of course vendors like Ivanti also have MTD built in, in which case the MDM will be able to detect these apps directly, in addition to GPP. Suggesting unwanted apps can run amok on the other hand is a fair claim, and data leakage is a concern. What can organisations do to protect themselves? # It just so happens if your EMM leverages the Android Management API and is not Intune, you don't have to do anything. Within a few minutes, as shown by my video above, AMAPI removes any unauthorised applications; arguably before these apps could really get much - if any - data. Why not Intune? # Microsoft, despite being the AMAPI for other use cases, uses Company Portal (custom DPC) with work profile devices, though they may apparently be moving over #soon. As such they do not benefit from the AMAPI behaviour that automatically removes unauthorised apps, and these devices are susceptible when using Intune also. What about non-AMAPI platforms? # If you're an Omnissa (Airwatch/WS1), SOTI or Ivanti (MobileIron) house, or other custom DPC platform, organisations have to be vigilant; keeping tabs on installed applications for work profile devices and locating outliers as they may appear. Although Bastien says: If you don’t have an MTD application deployed in your work profile, you won’t see anything and the malicious user can exfiltrate data for years… This is also misleading. MTD will make things exponentially easier/faster to detect anomalies, but many MDMs show installed applications within application inventories synced from devices. While there may be gaps in this capability across the ecosystem, it's a common feature. While this CVE is active across an estate, taking the time to pour through application inventories synced up could save a lot of hassle later on. This could potentially even be done via automated reports and some basic scripting through a vendor's APIs. Other things you can do? Make sure Google Play Protect is enforced. It'll be enabled, but users will have the ability to adjust settings if not enforced. You can fix that. Build blocklists of known troublesome apps Magisk, SMS Backup & Restore, Dropbox, Seal, etc, etc - build out your lists of known apps to block, and if a user tries to sideload, these will be removed even if the platform isn't AMAPI. Prevent installation from unknown sources That won't technically help to prevent this, but protects an organisation against threats generally. See Why you shouldn't install apps from unknown sources. Or invest in an MTD # The linked article is obviously very heavily biased towards the benefits of MTD, but speaking without bias, I'm all for the additional security on mobile devices providing the solution isn't just a glorified antivirus, as these are generally ineffective in Android - doing little, if anything, more than Google Play Protect. A full-featured MTD can help monitor not only applications, but network traffic, help prevent phishing/smishing) and much more. And for what it's worth, I think Lookout is a great option for this. Here are some considerations I've written previously that should still be relevant. Has this affected you? # I'd very much like to understand the potential impact this CVE has had, or will have, now that it's public and not universally patched. Are you seeing applications showing up in reports you don't expect? How are you handling it? Get in touch, if desired! - Hands-on with CVE-2025-22442, a work profile sideloading vulnerability affecting most Android...by Jason Bayton on April 13, 2025 at 12:00 am
Mr. Cowell made me aware of a Medium article by Bastien Bobe, field CTO at Lookout, this week. His article gave me a good overview of a vulnerability discovered by Alan Zaccardelle that I'd previously not heard about. I'd encourage reading the linked article above for the overview and demo video of the vulnerability, but in a nutshell the issue is as follows: During work profile setup, there's a temporary state as the profile initialises where no policies are applied. It's too early for organisational policy to enforce (in which sideloading is always prevented by default) and there's no default policy in place on Android's side. The work profile is wide open. This means if a user has developer settings enabled, USB debugging turned on, and the device connected up to a computer, applications can be sideloaded via ADB. For those more advanced, a script can be written to check for the presence of the work profile, and immediately adb install package.apk as many apps as desired until continuing on to the point of registration/enrolment and corporate policy application. Here's a video of my own tinkering (I don't pause the process, so policy can be seen blocking further installs), and I'll continue the article below:
What versions of Android are in scope? # Pretty much all Android versions going back 10+ years. Android 16 beta 3 is already patched, so 16 will be the first release in recent times to launch without it. For Android 12-15, a patch has been provided in April's SPL. Everything prior to that is for the respective OEMs to find and fix themselves (though running Android 11 or earlier today comes with many more risks than just this, if not manually maintained by the OEM). What are the ramifications? # The clear risk is the presence of unauthorised applications in the work profile, and the potential for data leakage through them. The entire point of the work profile is to isolate corporate apps and data in a separately encrypted and siloed environment; allowing unauthorised applications can effectively bridge the cross-profile divide, and this is quite obviously bad. Unlike Bastien's take, I'm less concerned about malicious, or Potentially Harmful Applications (PHAs) being a risk, as despite his claim, Google Play Protect scans over 200 billion applications a day across certified Android devices globally, including at-least daily checks for known bad applications, and real-time checks of non-Google Play installed applications. Obviously AOSP doesn't benefit from this, but it's a safe assumption most work profile deployments are using certified devices. So this: By design, MDM won’t be able to detect malicious or unwanted apps in the work profile Is misleading. While MDM isn't necessarily the on-device engine scanning apps (that is GPP), Android's built-in protections work well with, and are enforced by, MDM. Of course vendors like Ivanti also have MTD built in, in which case the MDM will be able to detect these apps directly, in addition to GPP. Suggesting unwanted apps can run amok on the other hand is a fair claim, and data leakage is a concern. What can organisations do to protect themselves? # It just so happens if your EMM leverages the Android Management API and is not Intune, you don't have to do anything. Within a few minutes, as shown by my video above, AMAPI removes any unauthorised applications; arguably before these apps could really get much - if any - data. Why not Intune? # Microsoft, despite being the AMAPI for other use cases, uses Company Portal (custom DPC) with work profile devices, though they may apparently be moving over #soon. As such they do not benefit from the AMAPI behaviour that automatically removes unauthorised apps, and these devices are susceptible when using Intune also. What about non-AMAPI platforms? # If you're an Omnissa (Airwatch/WS1), SOTI or Ivanti (MobileIron) house, or other custom DPC platform, organisations have to be vigilant; keeping tabs on installed applications for work profile devices and locating outliers as they may appear. Although Bastien says: If you don’t have an MTD application deployed in your work profile, you won’t see anything and the malicious user can exfiltrate data for years… This is also misleading. MTD will make things exponentially easier/faster to detect anomalies, but many MDMs show installed applications within application inventories synced from devices. While there may be gaps in this capability across the ecosystem, it's a common feature. While this CVE is active across an estate, taking the time to pour through application inventories synced up could save a lot of hassle later on. This could potentially even be done via automated reports and some basic scripting through a vendor's APIs. Other things you can do? Make sure Google Play Protect is enforced. It'll be enabled, but users will have the ability to adjust settings if not enforced. You can fix that. Build blocklists of known troublesome apps Magisk, SMS Backup & Restore, Dropbox, Seal, etc, etc - build out your lists of known apps to block, and if a user tries to sideload, these will be removed even if the platform isn't AMAPI. Prevent installation from unknown sources That won't technically help to prevent this, but protects an organisation against threats generally. See Why you shouldn't install apps from unknown sources. Or invest in an MTD # The linked article is obviously very heavily biased towards the benefits of MTD, but speaking without bias, I'm all for the additional security on mobile devices providing the solution isn't just a glorified antivirus, as these are generally ineffective in Android - doing little, if anything, more than Google Play Protect. A full-featured MTD can help monitor not only applications, but network traffic, help prevent phishing/smishing) and much more. And for what it's worth, I think Lookout is a great option for this. Here are some considerations I've written previously that should still be relevant. Has this affected you? # I'd very much like to understand the potential impact this CVE has had, or will have, now that it's public and not universally patched. Are you seeing applications showing up in reports you don't expect? How are you handling it? Get in touch, if desired! - AAB support for private apps in the managed Google Play iFrame is coming, take a first look hereby Jason Bayton on March 22, 2025 at 12:00 am
The Android App Bundle (AAB) is a modern application packaging format introduced by Google to streamline and optimise Android app distribution. Unlike the traditional APK, an AAB contains all the necessary compiled code, resources, and assets for an app only for the purpose of permitting dynamic packaging; it cannot be directly installed through Android's package manager on-device (3rd party options exist though!). Instead, it is uploaded to Google Play, which dynamically processes & bundles the respective code into highly-optimised APKs specific to the device(s) downloading the app. The AAB format has been available to Android developers since 2018, and mandatory for new app uploads from the Google Play console since 2021. The Google Play iFrame, used by enterprises for private app distribution, has however historically mandated APK uploads. Based on a recently-updated help doc, support for AAB in enterprise scenarios appears to be now possible, although it doesn't seem fully rolled out yet. It's live! Not a day or so after this article went up, Google announced general availability, including answering some questions and touching on scenarios raised below. I'll dot additional thoughts in callouts like this one where relevant with updated data. All the same, I spent some time figuring out what's possible so you don't have to! How AAB and APKs differ # First thing's first, is this a pitch to organisations to immediately push all private applications over to AAB? No. There are valid use cases for both, which presumably (in addition to understanding the effort it may take organisations to convert over) is why Google will continue supporting APKs in the iFrame. That said, here's a brief overview of each. APKs # An APK is a single package file containing all the resources, assets, and compiled code for all supported device configurations. While this offers the greatest compatibility across a device estate, it means APK files are often larger than necessary as they include resources irrelevant to the downloading device. APKs offer simplicity and convenience for developers who want a quick, straightforward way to package and share their applications. They ensure broad compatibility across all Android devices without additional processing or conversion. Additionally, APKs support offline installation, making them ideal for environments with limited or no connectivity. Their self-contained nature enables immediate deployment and rapid testing, which accelerates development and iteration cycles. Furthermore, APKs provide flexibility by allowing distribution through various channels beyond Google Play, including alternative app stores or direct downloads. Finally, because APKs don't rely on Google Play explicitly, they're suitable for devices lacking Google Play access, or regions where it isn't available. That covers everything from deployment to devices in restricted countries such as China, to closed-network environments without direct access to Google Play. AOSP is a consideration also, but there's a lot more to managing AOSP that I won't dive into here. Android App Bundles (AAB) # Like an APK, an AAB is a publishing format containing all the necessary components in a single file, the difference is in the processes that occur after uploading to Google Play, as I opened with above. As well as significantly reducing app sizes through dynamically generated, optimised APKs tailored to each user's device, AABs also support dynamic delivery of features and resources, enabling efficient feature rollouts and resource management. Release management is also simplified, as developers maintain only a single upload file, eliminating the need to manually handle multiple APK variants for different architectures or feature sets. Additionally, AAB leverages App Signing by Google Play, centralising key management, potentially increasing security, and simplifying key recovery - particularly sometimes beneficial in organisations who have struggled with key storage and management in the past. Finally, AABs allow for larger uploads to Google Play, exceeding the 100MB APK limit that appears to be a blocker for the organisations I've worked with quite often. Leveraging AABs with Android Enterprise # In enterprise scenarios, Android App Bundles enable organisations to deliver tailored application experiences by dynamically serving device-specific features, languages, and resources as needed. This customisation simplifies version management, reduces deployment overhead, and leads to streamlined app lifecycle management, significantly improving end-user experiences. For organisations operating under tight data budgets, the optimised app sizes alone can justify migrating to the AAB format due to significantly reduced download sizes and improved efficiency. Enough talk, AABs in action # For the context of this article, I opted to take an existing APK and convert it to AAB. There are two reasons for this: It seemed like the more complex approach, so makes for more interesting reading. Google hadn't yet turned on AAB uploads for new private apps from the iFrame for my enterprises. General availability update I have added the experience for new AAB uploads towards the end. Here's where we start; I have a private application uploaded as an APK: Clicking into the application, I can select Advanced editing options to head to the Google Play Console: I can then head into the application, click Test and release > Production and create a new release. All so far, so normal. Other tracks are available if Production isn't desired. On any other day, if I were to manage an app update from within the Play Console - which is a perfectly valid approach for organisations with advanced knowledge of developing and distributing applications - I would upload an APK via the upload link. We're not here for APKs though. To go further, I need to enrol into Play app signing. Enrol into Play app signing # Play app signing is a requirement for AABs, as Google needs to be able to sign generated APKs on behalf of the organisation when distributing them to devices. I'm clicking Use Play app signing to continue: For organisations/developers using a Java KeyStore to facilitate application signing, either via Android Studio or otherwise, this next step offers a guide for extracting the private key from it to allow Google to manage it. I'm using Android Studio and want to upload the key I used to originally sign the APKs, so that's what I'm configuring here: Give Google our keys!? This is down to the organisation and/or the personal views of the developer. I can appreciate this isn't a desirable choice for some, and that's OK. Google offers alternatives for setup, including dual-releases, but you can stop here and return to APK management if desired. If you're on the fence, pros and cons: Pros: Simplified key management: Google securely stores and manages your app signing keys, reducing the complexity and risk of losing keys. They're stored securely: Google uses strong cryptographic security standards to store keys securely, minimising potential breaches or key leaks. Easy key recovery: In case of compromised or lost upload keys, Google provides a straightforward and secure method for recovery without losing your app’s listing and user base. General availability update According to App bundle FAQs, key recovery is not supported for iFrame-uploaded applications at this time, which is a significant omission to the benefits of AAB. Instead, for this feature, a full developer account is required. Optimised distribution: Google Play can leverage advanced features like dynamic feature modules and optimised delivery because they control the final signing process. Cons: Loss of direct control: You relinquish direct control over your signing keys to Google, leaving your app's distribution and security dependent on Google's practices and infrastructure (via Play). Dependence on Google: You'll require careful planning if you choose to distribute your app via alternative channels (non-Play) to ensure friction points are minimised. Security concerns: Organisations with strict security or compliance policies might find Google's key management approach incompatible with their internal security practices. Ultimately, whether Google Play App Signing is suitable depends on your organisation’s requirements for security, flexibility, compliance, and control. That isn't a finite list, and I'm also not an expert, so feel free to read more into this through other sources. Still here? Let's continue! The script in the above image is: java -jar pepk.jar --keystore=foo.keystore --alias=foo --output=encrypted_private_key_path --rsa-aes-encryption --encryption-key-path=/path/to/encryption_public_key.pem Note: The KeyStore and alias - if you're unfamiliar - should match what's shown in Android Studio when prompted during the building of a signed application. If you know what you're doing, do your thing. Once the private key .PEM file is output, it can be uploaded to Google via Upload private key: After which I'm then prompted to agree to Play app signing terms. I glanced at it for a good 15 seconds. And we're enrolled: Upload the AAB # There are two ways to now get the AAB up, via console and via iFrame. To ensure it works as I'd expect it to, I opted first to test it in the console where I am confident AAB uploads would be supported. Not least because there's a draft release still pending. I headed back to Test and release > Production, and clicked the Releases tab, allowing me to Edit release: As now pictured, Releases signed by Google Play is showing, so I'm good to select and upload an AAB in the upload area below: If you scroll up, you'll note the version in the managed Play iFrame was on version 1.0, and the console here is now showing version 2 (1.1). I carried on through the process, paying attention to any damning errors, warnings, and messages (the Play Console is missing an Oxford comma, there). I chose to ignore two warnings about obfuscation and a government declaration, because I haven't needed to worry about them in the iFrame. I'll update here if that becomes a problem later: Send the change(s) for review.. ..and voilà! 8 nail-biting minutes later, the iFrame also updated to the latest build. And finally, it pushed to my test device nice and quickly, no fuss at all. Note the size difference between versions below. All I did was bump the version in build.gradle and build an AAB rather than an APK for the newer version! Note: I'm aware this is not the same device, their version sizes matched on 1.0, though. Updating from the iFrame # While in the iFrame, I'd be remiss if I didn't test it here also. It's literally a case of editing the app as normal, and just selecting the AAB instead: Done. Upload a new AAB from the iFrame # With AAB support fully rolled-out, testing AAB uploads via the iFrame directly turned out to be a lot simpler. First, I add a new app: Then, I upload my AAB and accept the terms. I definitely read these again. Create! And as quickly as that, my AAB is uploaded: What needs work? # General availability update The first two of the following issues are resolved, as noted by the demonstration of uploading a new AAB added above. Feel free to skip to key management. While in the iFrame, I'd be remiss if I didn't test it here also. Here's one of a few snags with the process currently, which I'll state after the image: Did you see it? It still references APK file, but it does in fact allow the upload of an AAB. Luckily the file extension is conveniently left in place (thanks, Google!) so you can see it is, indeed, an AAB. Based on Google's help doc, what we can expect to see, at some point, is a more generic label replacing APK file: One of the other snags that currently exists is the inability to upload an AAB as a new application from the iFrame, even having followed Google's guidance in enabling Play app signing. The upload allows the selection of an AAB, but the submit button remains greyed out. I went into browser tools and manually enabled the button, only to be met with another error: Key management # It's worth pointing out when doing AAB uploads from the iFrame, Google will generate the key: Note: Private apps that are created for the first time by uploading an AAB to the iframe will use a Google-generated app signing key. Use one of the options below to use your own signing key: Use the Play Console to create the private app with an AAB Use the iframe to create the private app with an APK then switch to AAB. Tying back to the callout above, if you have desires to use your own key with all uploaded apps, follow their advice and use the console with a full developer account to upload a new application. Finally, and hopefully another symptom of this not yet being fully rolled out, is the lack of permissions for key management: General availability update Unfortunately this won't change. Google have, as above, limited the options admins have for key management with iFrame-uploaded AABs. It's too bad, as it looks like the below concern has been further validated once again. It's an ongoing frustration generally, actually; permissions are overly restrictive across the portal due to the unique way Android Enterprise app management is set up. I'd like to be able to have my delegated accounts (i.e. [email protected], not the Google service account) act like an admin when it is granted admin permissions: create apps here, rotate keys in this instance, and so on. I haven't been able to get that working as yet. In summary # Google's move toward supporting Android App Bundles for private app distribution in the managed Google Play iFrame is well overdue, but great to see. While clearly still in the rollout phase, early exploration shows what's already possible and highlights some areas needing further refinement. For organisations ready to embrace smaller app sizes, streamlined deployments, and more flexible/redundant key management, the transition from APK to AAB is worth considering, at least when it becomes fully available; full support within the iFrame will undoubtedly make this process smoother and more broadly accessible in the near future. As always, plan your strategy carefully - particularly around key management and app distribution - to align with your organisation's security, compliance, and operational requirements.

Brooks Peppin's Blog Managing Windows in the Modern Workplace
- How to Create a no-prompt bootable WinPE ISO – Crowdstrike Fixby Brooks Peppin on July 20, 2024 at 8:33 pm
With the massive Crowdstrike outage this week, we looked for a way to automate fixing virtual machines in our environment. Since our VMs were not ... Read more
- A Beginners Guide to Azure AD Join – Everything you Need to Knowby Brooks Peppin on April 26, 2023 at 6:58 pm
Welcome to the beginner’s guide to Azure AD join! As businesses increasingly rely on cloud-based solutions, Azure Active Directory has become an essential tool for ... Read more
- Understanding Windows Feature Updates in Microsoft Intuneby Brooks Peppin on December 19, 2022 at 10:07 pm
Deploying Windows 10/11 feature updates with Microsoft Intune is much simpler than traditional methods. You no longer have to “push” out the full patch or ... Read more
- Intune vs. Workspace ONE: 15 Pros and Cons (2022 Edition)by Brooks Peppin on October 17, 2022 at 4:53 pm
Microsoft Intune and VMware Workspace ONE are both industry-leading Unified Endpoint Management (UEM) solutions. If you look at any Gartner Magic Quadrant chart from the ... Read more
- How to Fix Hybrid Azure AD Join Error 0x801c005b: error_computer_signature_check_failureby Brooks Peppin on September 30, 2022 at 12:34 am
Seeing error 0x801c005b alongside error_computer_signature_check_failure when attempting to Hybrid Azure AD join your Windows devices? This error will prevent the hybrid join process from completing. ... Read more

Many Miles Away Helping you succeed with end user computing technologies
- Leverage the new SSO Extensions in Apple iOS with Mobile SSO (for Apple)by Darryl Miles on March 10, 2025 at 2:22 am
If you’re using the existing Mobile SSO for iOS devices in your Workspace ONE environment, you’re likely aware that setting … More
- Integrating Workspace ONE UEM with Entra IDby Darryl Miles on March 9, 2025 at 11:30 am
Customers often integrate Workspace ONE Access with Microsoft Entra ID (formerly Azure AD) to enhance identity and access management, improve security, and streamline … More
- Implementing Workspace ONE Relay Server Cloud Connectors (RSCC) with an existing Pull Relay...by Darryl Miles on June 1, 2024 at 2:09 am
The Workspace ONE UEM Relay Server Cloud Connector (RSCC) is a hybrid solution that pulls content (products only) from a … More
- Setting up a Workspace ONE UEM Relay Server for Android Rugged devicesby Darryl Miles on May 24, 2024 at 3:38 am
A Workspace ONE relay server acts as a middleman in distributing content within a Workspace ONE UEM environment to Android … More
- Enabling Advanced Device Telemetry for mobile devices through Workspace ONE Intelligence SDKby Darryl Miles on May 16, 2024 at 11:07 am
Spotting what’s causing a bad experience for mobile workers starts with a deep dive into device problems. The latest Workspace … More

- Workspace ONE UEM Sensors and custom Registry valuesby techhub981158167 on June 10, 2024 at 12:58 pm
I had a customer enquiry recently where they were looking to pull some custom fields from a device to identify a device location, well at least where it was deployed, as well as come custom tags and other information they associate with a device at the time of deployment. If you have used Workspace ONE … Continue reading Workspace ONE UEM Sensors and custom Registry values →
- VMware App Volumes Apps on Demandby techhub981158167 on January 8, 2024 at 3:26 pm
There are plenty of articles explaining what VMware App Volumes Apps on Demand are and the benefits, for example https://www.vmware.com/uk/topics/glossary/content/apps-on-demand.html. This video demonstrates how quick and east it is to associate an App Volumes Server with an RDS Host in VMware Horizon and subsequently deliver a package using Apps on Demand.
- End of Yearby techhub981158167 on December 20, 2023 at 10:14 am
When I started this blog and YouTube channel a few years back I never really had a target other than to share any tips, tricks, information and how to for various EUC products. It’s always nice to see the end of year stats and know that people are looking at your content. Diving into the … Continue reading End of Year →
- The next phase of Workspace ONE UEM Sensorsby techhub981158167 on December 8, 2023 at 11:14 am
Earlier this year I wrote a blog article about using ChatGPT to write PowerShell scripts that could be used in Workspace ONE UEM to create Sensors. This works fine, but bear in mind that ChatGPT created PowerShell scripts for me based on best endeavours, there is no guarantee they would work or would not contain … Continue reading The next phase of Workspace ONE UEM Sensors →
- Workspace ONE UEM and Windows Multi Userby techhub981158167 on August 23, 2023 at 3:48 pm
Multi User or Shared Device, if you want to look at it that way, is something that has been supported with VMware Workspace ONE UEM but more so for Mobile Operating Systems rather than Windows. VMware has received feedback from several customers on wanting to be able to support a Windows Multi User use case. … Continue reading Workspace ONE UEM and Windows Multi User →

Thomas Cheng Welcome to my digital home!
- Proofpoint Certified Insider Threat Specialist Course 3 – A Day in the Life of an Insider Threat...by techiecheng on March 29, 2023 at 8:38 pm
Proofpoint recently released a three-part training webinar on identifying and mitigating insider threats. By viewing and taking the exam after all the sessions, Proofpoint will award you with a certificate. This post will recap what I learned in course 3 of this series.
- Proofpoint Certified Insider Threat Specialist Course 2: Building a Successful Insider Threat...by techiecheng on March 29, 2023 at 6:59 pm
Proofpoint recently released a three-part training webinar on identifying and mitigating insider threats. By viewing and taking the exam after all the sessions, Proofpoint will award you with a certificate. This post will recap what I learned in course 2 of this series.
- Proofpoint Certified Insider Threat Specialist Course 1 – Getting Started with Insider Threatsby techiecheng on March 26, 2023 at 4:47 am
Proofpoint recently released a three-part training webinar on identifying and mitigating insider threats. By viewing and taking the exam after all the sessions, Proofpoint will award you with a certificate. This post will recap what I learned in course 1 of this series.
- ‘Invalid credentials. Try again.’ when signing onto Workspace ONE UEM console with Active...by techiecheng on September 23, 2022 at 4:00 pm
Awhile back, I wrote a post on the error when signing into UEM with my AD credential. “Please contact Administrator” when signing onto Workspace ONE UEM console version with Active Directory credential Today, I got a different error when signing in with my AD credential to our shared SaaS/sandbox CN135: ‘Invalid credentials. Try again.’ I
- The true beauty of the Apple Beta Software Programby techiecheng on June 6, 2022 at 4:00 pm
Throughout the years, I’ve written many blog posts related to iOS update. Prevent users from installing iOS beta software in VMware Workspace ONE UEM by AirWatch Managing iOS update with Workspace ONE UEM Schedule iOS Update with VMware AirWatch Stop iOS update on its track with VMware AirWatch iOS 12.2 is here and how it

VirtuallyUnboxed Lifting the lid on everything virtual
- End of support for vSphere 6.5.x and 6.7.xby virtuallyunboxed on October 20, 2022 at 4:31 pm
In case you missed it, last week marked the end of general support for vSphere 6.5 and 6.7. This is the same regardless of whether you were using it for data centre services or EUC services like Horizon.
- Desktop Repurposing v4by virtuallyunboxed on October 20, 2022 at 4:23 pm
This year, myself and Matt Evans joined forced again, along with newcomer, Jonathan D'arcy to review some of the best desktop repurposing tools on the market. As with previous years we reviewed imaging and performance. However, this year we also took a look at the accompanying management solutions.
- VMware SASE and Cloud Web Securityby virtuallyunboxed on January 22, 2022 at 3:11 pm
Let's start with the basics! SASE is a Gartner term and is an abreviation of Secure Access Service Edge. Still not much help right? Well lets start explaining this by looking at how people typically work, espeically remotely, and how their traffic is secured. Most of you that ever work remotely will most likely use a device level VPN. This uses software on your device to create a tunnel into your company data centre and allows you to remotely access internal resources. This is how most companies have done it for many years, and it really dates back to the days when all a companies resources were in their own data centre. Tunnelling all the traffic back into the data centre was the perfect way to reach everything a remote user would need.
- Workspace ONE UEM and Workspace ONE Access Integration for Hub Servicesby virtuallyunboxed on March 2, 2021 at 4:06 pm
I know there are a lot of SaaS customers out there who have only been using basic MDM functionality within Workspace ONE. The platform has moved on a lot in the last few years and if you haven't already seen it i strongly suggest you check out hub services. This takes the Workspace ONE agent that is used for device management and adds additional functionality to the application such as a unified app catalogue, people search and a notifications platform to name but a few!
- Workspace ONE Access FIDO2 integrationby virtuallyunboxed on February 19, 2021 at 2:33 pm
As of this month (Feb 2021) All Workspace ONE Access SaaS tenants, now supports FIDO2 as an authentication method. So, I thought i'd put together a short video showing how easy it is to configure it and some different device types using the solution.

Mobile Jon's Blog My WordPress Blog
- Troubleshooting and Fixing Personalization Policies in Microsoft Intuneby MobileJon on May 28, 2025 at 1:29 pm
The obvious thing about this article is that it seems oddly specific. It absolutely is! Awhile back, I wrote a
- Windows Autopatch: Revisited Part 1by MobileJon on May 16, 2025 at 1:11 am
Last year, I released a super popular article that was my top article on 2024. It’s time to update things
- Extending Cloud Native PC Wireless Authentication to Cloud RADIUSby MobileJon on March 17, 2025 at 4:43 pm
This article discusses RADIUSaaS, a cloud-hosted solution for device authentication using EAP-TLS, highlighting its components, including username/password and MAC authentication support. It explains integration with Microsoft Cloud PKI, RadSec for secure communication, and Cisco Meraki. The author emphasizes RADIUSaaS's user-friendly interface and enhanced wireless authentication capabilities.
- Robopack Elevates Microsoft Intune Application Lifecycle Managementby MobileJon on March 10, 2025 at 5:33 pm
Robopack is an innovative product aimed at simplifying application deployment and updates within Microsoft Intune. It enhances management through features like Instant App Deploys, Custom App Settings, and Robopatch for effective patching. The platform promises to streamline the application lifecycle, making it easier for Intune administrators to manage and update apps effortlessly.
- Troubleshooting and Logging Intune Remediationsby MobileJon on February 24, 2025 at 4:00 am
The post discusses the author's experience with Intune Remediations, highlighting the importance of well-crafted remediation scripts and thorough logging. Key topics include proper script writing, local log reviews, and log monitoring within the Intune Console. The author emphasizes an iterative testing approach to enhance script efficacy and reduce troubleshooting efforts.
VMware Workspace ONE The un-official subreddit for VMware Workspace ONE. I recently started learning/managing Workspace One for the company I work for, I came to reddit to find others and saw that there wasn’t a community, so I started one. Our discord is here https://discord.gg/Zhr3TqMMf6
- WS1 - Unable to mass deploy profiles to MacOSby /u/guyinco6nito on May 28, 2025 at 9:42 pm
Hi All, Omnissa just archived my case, I wanted to post here as a way of warning MacOS system administrators about the limitations of Workspace One. We had an outage prevent 50+ MacOS machines from logging in. I had a eureka moment and realized we could be saved by MDM, and I pushed out an updated profile that would fix the problem, but it didn't deploy! It turns out to be a known issue detailed here: https://kb.omnissa.com/s/article/50121264 Summary: If nobody is logged into a MacOS machine, it won't get new profiles. They're just stuck at "Pending Install" because MacOS won't apply those updates until somebody logs on. So I guess if this happens again I can use Workspace One to deploy a fixed profile, I'll just need to log into each and every one of the impacted machines to fix it. Bummer! If I'm wrong here, or if I've missed some other option, I'd love to be corrected. But otherwise people running MacOS and considering WS1 should keep that in mind. Have good ones! submitted by /u/guyinco6nito [link] [comments]
- [18 June] Omnissa Tech Deep Dive: Bringing VDI goodies to your physical desktops and laptopsby /u/R_inspired on May 27, 2025 at 3:03 pm
submitted by /u/R_inspired [link] [comments]
- [18 June] Omnissa Tech Deep Dive: Bringing VDI goodies to your physical desktops and laptopsby /u/R_inspired on May 27, 2025 at 3:02 pm
submitted by /u/R_inspired [link] [comments]
- Having trouble getting a feature update to run.by /u/theslats on May 23, 2025 at 4:21 pm
I am trying to catch up some stubborn Win 11 22H2 devices using a profile. Defer Features Updates is set to 0 and Target release is set to 23H2 but my count of 22H2 devices has not changed in weeks. Are there any gotchas I am missing with the profiles? submitted by /u/theslats [link] [comments]
- How to enable "Recent App" button in Android 14 for Zebra devices through OEMConfigby /u/Supi09 on May 22, 2025 at 12:18 pm
We recently started using OEMConfig for the new Zebra devices we are buying which have A14. In the App configuration>Keyboard configuration>Auto trigger configuration>"Use Recent Apps" is enabled. Previously we use MXConfig for Zebra for our old A8 to A13 devices. "Recent App" button is enabled there. I'm unable to enable it through OEMConfig and unable to find any answers in the Zebra tecdoc as well. Please help me here if anyone have any knowledge on this. submitted by /u/Supi09 [link] [comments]
- Windows profiles (beta) installation issueby /u/Atom8553 on May 21, 2025 at 8:59 pm
Has anyone tried Windows beta profiles? I tried to create a profile for the kiosk browser on Windows 11 devices, but it won't install on my devices. I see it under my device's profiles tab, but its status is "not installed". Selecting it and clicking "install" does nothing. I managed to install one of these beta profiles a few months ago on one device, but new profiles won't install on that device either. Any idea if Windows or WS1 update has broken something? As this is in beta, I ques there is no point contacting Omnissa. Affected devices are running Windows 10.0.26100 Edit: Removed an extra word submitted by /u/Atom8553 [link] [comments]
- Android 13 Break MDM Confirmed -> Unenrolledby /u/darklance_nl on May 21, 2025 at 9:18 am
Anybody else seeing similar issues? In the last couple of hours, our WS1-managed fleet running Android 13 is being unenrolled. I've already opened a case with Omnissa, but no fix yet. https://preview.redd.it/fwcb868vq32f1.png?width=1558&format=png&auto=webp&s=85d4a3cbbb21ecac004aec891e4d502caddfe544 submitted by /u/darklance_nl [link] [comments]
- Issues with public app install on Android tabletsby /u/Empty_Rhubarb_126 on May 20, 2025 at 4:20 pm
I'm coming across a weird issue and I can't seem to find anyone with a similar issue anywhere. We have a public application available to our users that needs to be updated to use. We have this app set to auto update, but for some reason it is not updating. When I try to push the app to update from UEM I get an error that states "No user was found for the given ID". when the user attempts to open the application from the tablet, they are advised that the app needs to be updated in order to run. when they select "Update" they are given the error message "Your administrator has restricted access to the Google Play Store". Has anyone seen this error before? Or does anyone have any idea what it means? Restricted access to the Google Play Store isn't unusual as we have these tablets pretty well locked down. However, not being able to install the app from the UEM is not usual. I am not in anyway that familiar with UEM or MDM for that matter, I know enough to create profiles and approve and assign applications but I would not consider myself an expert in any sense of the word so any help would be appreciated. I should add that on some devices a factory reset and re-enroll will work to update the application but I'm hoping to avoid that. Thanks submitted by /u/Empty_Rhubarb_126 [link] [comments]
- Workspace ONE UEM on-premises End of Support (EOS) (6000887)by /u/Erreur_420 on May 14, 2025 at 1:10 pm
submitted by /u/Erreur_420 [link] [comments]
- Cell Data usageby /u/evilteddibare on May 13, 2025 at 9:10 pm
We have quite a few users that go way over cell data usage in our environment (200+gb per month) trying to find a way to figure out how to manage this or if there was a way to see what app is taking up the most data & taking some sort of action. Looking for some advice on how anyone else manages this. Thanks! submitted by /u/evilteddibare [link] [comments]
- Differences to confirm if migration to Hub Services and new Catalog was successful ?by /u/GeekgirlOtt on May 13, 2025 at 4:21 pm
What changes are visible to end users on PC and iOS and to an admin in console to indicate if this has been done and completed ? https://kb.omnissa.com/s/article/95774 Version number? specific app visible or removed ? Something in a user's hub that only appears if migrated? submitted by /u/GeekgirlOtt [link] [comments]
- Android BYOD enrollment in Chinaby /u/rcqwq on May 13, 2025 at 6:30 am
Hi everyone, I am doing BYOD for Chinese devices in our company. After creating a workspace using the Hub App it forces a Google account login - we are having issues here. We have a dedicated corporate VPN, but the proxy it creates in the personal space doesn't work. I'm curious if it's possible to pull the VPN for the personal space without logging into the Google account in the workspace and logging into the Google account once the VPN is enabled in the workspace? submitted by /u/rcqwq [link] [comments]
- If a purchased app is updated, but app deployment is set to on demand, will the app automatically update on devices?by /u/Multisensory on May 12, 2025 at 5:41 pm
This is for iOS devices. So, I am trying to make sure an upcoming app update is only pushed out to a couple users first. I created a new user group, set the app to auto deploy for the group. I changed the old group to On Demand. We have a separate user/account for each customer, and they are all assigned to the same user group. The idea is, I change the app deployment for that group to on demand. I remove the customers who are getting the update from that group. I add them to the auto app deployment group. Then, when the app in question is updated, it will only auto update on the devices in the new auto update group, while the on demand group remains unchanged. Does that sound right? submitted by /u/Multisensory [link] [comments]
- Online drop ship tool finishes and after reboot device is no longer boot able.by /u/theslats on May 9, 2025 at 10:15 pm
Title sums it up. Fresh install of windows configured with the drop ship provisioning tool. The tool runs to completion with the happy green screen. Shut down, no more OS. submitted by /u/theslats [link] [comments]
- Is the hosts file still necessary for UAG in latest release?by /u/Suspicious_Level_342 on May 9, 2025 at 10:04 am
Hi there, we have updated our UAGs to the current release 2503 but everytime I update the UAG the export/import of settings works fine except for the hosts file. Everytime there are old IP adresses connected to our .local urls. Now I know back in the day the uag needed those entries for obvious dns reasons is this still the case? Or is there a way that the uag use our dns servers for that matter? Anyone has an idea? submitted by /u/Suspicious_Level_342 [link] [comments]
- Cert based WiFi Profile - Microsoft NPS RADIUSby /u/Ashamed-Ninja-4656 on May 7, 2025 at 2:00 pm
I can't get my workspace one Microsoft machines to work with eap-tls. I've set my domain joined machines up and they join wifi just fine. I've got the root, intermediate, and cli certs pushed to the device. However, NPS keeps giving an error 265 that the cert chain isn't trusted. It's almost like the right cert isn't being chosen even though I've specified it in the workspace one profile. Has anyone set this up successfully with Microsoft NPS ? submitted by /u/Ashamed-Ninja-4656 [link] [comments]
- Can "per app" VPN be made to work for iOS Files app ?by /u/GeekgirlOtt on May 7, 2025 at 12:40 pm
would like to tunnel when offsite to allow access to our internal SMB shares. The file server is not a DC. submitted by /u/GeekgirlOtt [link] [comments]
- iOS wifi profile - do they get reapplied randomly?by /u/Pomelo_Bitter on May 7, 2025 at 4:17 am
Hi everyone. This is nearly the first time posting on Reddit. Maybe I can get some help. We are on premises with our WS1 environment. Real current version. Not sure which but the behavior should be all the same. We run about 35 Devices in kiosk mode for some logistics app. All our company devices got the same (kinda old but working) wifi profile. The Profile includes some proxy setting which became unfortunately false. The given address exists but there is no wpad/dat file to be found. The day we changed the proxy about a month ago we became aware that the devices had massive trouble communicating / regardless of the setting "use network if proxy not found". So we changed the OG to an upper level where the kiosk mode doesn't apply. A few reboots later all of them got the change and we could kick the proxy setting out of the devices manually. We didn't change the wifi-profile because a) it would impact all our corporate devices at once. b) We want to discuss the behavior with Omnissia PSO in two weeks from now. Coming to the point... Yesterday I got to know some devices lost network again. Regardless of the none proxy setting it seems. The wifi profile didn't change. The big question(s): Do profiles / wifi profile settings get reapplied after some time? Didn't find any scheduler task I could easily identify as the longest scheduled task seems to be 48 hours. The proxy change was about a month ago. Will check on site today but any help would be highly appreciated to get my head around this issue. submitted by /u/Pomelo_Bitter [link] [comments]
- Default action for rooted jail broken devicesby /u/evilteddibare on May 5, 2025 at 4:41 pm
I know in the dashboard overview it shows what devices are compromised but is there a default action that the console does automatically to prevent these devices into the ws1 environment or do we need to create a compliance policy to accomplish this? submitted by /u/evilteddibare [link] [comments]
- UAG Per-App VPN for Chrome and Edgeby /u/snewton_8 on May 2, 2025 at 2:13 pm
SaaS version 24.10.207.7(2410) All devices are on most recent OS (3 Android, 1 iOS) I created per-app vpn traffic rules for "Microsoft Edge: AI browser - Android", "Microsoft Edge: AI Browser - iOS", "Google Chrome: Fast & Secure - Android" and "Google Chrome - iOS" with the same destinations. I added a version to the Android and iOS per-app VPN profile and ensured they were installed Verified the assignment has the tunnel configuration and the app on the devices indicate tunnel is required We have multiple other apps working correctly with per-app vpn on Android iOS Edge and Chrome works as expected. This is the first time we've done VPN with iOS and I found it odd that the list of apps doesn't appear in the Tunnel app like they do for Android. Expected? Android Neither Chrome or Edge show up in the Tunnel app list and I can't get Chrome or Edge to connect to the destination. I get ERR_NAME_NOT_RESOLVED in both. I have verified the key icon appears and the Tunnel app shows Connection Available. I am able to connect to the destination on Android with full device VPN. I'm also able to connect to the destination with Workspace ONE Web (which shows up in the Tunnel app list) using the same destinations in the traffic rules. That tells me there isn't an issue with DNS. I'm sure I'm missing something simple but I've worked on this for 2 days and I can't figure out what that is. Any suggestions? UPDATE So I figured out my issue. I was on "autopilot" creating these assignments and there is a bug in 24.10.207.7(2410). If you go to Resources => Native Apps => Public => [Any app] => Assign => [existing or new assignment] => Tunnel.... It only shows "Android Legacy Select a Profile". In order to see the option for Android (Custom DPC), you must go to Resources => Native Apps => Public => [Any app] => Edit => Save & Assign => [existing or new assignment] => Tunnel. Granted, I should have known that Android Legacy was the wrong field but it was the only field available and I was on autopilot.. I've submitted a case to Omnissa on this. Hope this helps someone experiencing the same type of tunnel issue. submitted by /u/snewton_8 [link] [comments]
The Support Insider VMware Support News, Alerts, and Announcements
- Simpler Licensing with VMware vSphere Foundation and VMware Cloud Foundation 5.1.1by Kelcey Lemon on March 21, 2024 at 5:28 pm
Tweet VMware has been on a journey to simplify its portfolio and transition from a perpetual to a subscription model to better serve customers with continuous innovation, faster time to value, and predictable investments. To that end, VMware recently introduced a simplified product portfolio that consists of two primary offerings: VMware Cloud Foundation, our flagship … Continued The post Simpler Licensing with VMware vSphere Foundation and VMware Cloud Foundation 5.1.1 appeared first on VMware Support Insider.
- VMware Skyline Advisor Pro Proactive Findings – January 2024 Editionby James Walker on January 24, 2024 at 11:16 am
Tweet VMware Skyline Advisor Pro releases new proactive Findings every month. Findings are prioritized by trending issues in VMware Technical Support, issues raised through post escalation review, security vulnerabilities, issues raised from VMware engineering, and nominated by customers. For the month of January, we released 60 new Findings. Of these, there are 37 Findings based … Continued The post VMware Skyline Advisor Pro Proactive Findings – January 2024 Edition appeared first on VMware Support Insider.
- Skyline Advisor Pro: Introducing Inventory Export Reportsby Kelcey Lemon on January 16, 2024 at 12:00 pm
Tweet You’ve asked for the ability to export inventory information, including licensing, and we’ve listened. The Skyline Team is proud to introduce this highly requested feature, Inventory Export Reports. Inventory Export Reports allow you to generate reports on your inventory, licensing, and configuration data. These reports can help you to identify potential problems, track changes … Continued The post Skyline Advisor Pro: Introducing Inventory Export Reports appeared first on VMware Support Insider.
- VMware Skyline Advisor Pro Proactive Findings – December 2023 Editionby James Walker on December 15, 2023 at 6:56 pm
Tweet VMware Skyline Advisor Pro releases new proactive Findings every month. Findings are prioritized by trending issues in VMware Technical Support, issues raised through post escalation review, security vulnerabilities, issues raised from VMware engineering, and nominated by customers. For the month of December, we released 56 new Findings. Of these, there are 35 Findings based … Continued The post VMware Skyline Advisor Pro Proactive Findings – December 2023 Edition appeared first on VMware Support Insider.
- VMware Skyline Advisor Pro: Proactive and Diagnostic Findings Demystifiedby Kelcey Lemon on December 13, 2023 at 3:07 pm
Tweet While supporting VMware Explore 2023 in Barcelona, a customer asked me, “What’s the difference between Proactive Findings and Diagnostic Findings in Skyline Advisor Pro and how are each one produced?” So, I’d like to take this moment to elaborate more on my original blog that introduced Diagnostic Findings. Proactive Findings Proactive Findings are potential … Continued The post VMware Skyline Advisor Pro: Proactive and Diagnostic Findings Demystified appeared first on VMware Support Insider.
- VMware Skyline Advisor Pro Proactive Findings – October 2023 Editionby James Walker on October 27, 2023 at 4:33 pm
Tweet VMware Skyline Advisor Pro releases new proactive Findings every month. Findings are prioritized by trending issues in VMware Technical Support, issues raised through post escalation review, security vulnerabilities, issues raised from VMware engineering, and nominated by customers. For the month of October, we released 39 new Findings. Of these, there are 30 Findings based … Continued The post VMware Skyline Advisor Pro Proactive Findings – October 2023 Edition appeared first on VMware Support Insider.
- From upgrading vSphere to troubleshooting issues with Tanzu Kubernetes Grid: Top 10 VMware Tanzu Knowledge Base Articles in September 2023.by Marcela Gleixner on October 11, 2023 at 12:18 pm
From upgrading vSphere to troubleshooting issues with Tanzu Kubernetes Grid: Top 10 VMware Tanzu Knowledge Base Articles in September 2023. The post From upgrading vSphere to troubleshooting issues with Tanzu Kubernetes Grid: Top 10 VMware Tanzu Knowledge Base Articles in September 2023. appeared first on VMware Support Insider.
- 10 most popular KB articles in September 2023, for VMware Tanzu Application Service, BOSH and more.by Marcela Gleixner on October 9, 2023 at 9:54 pm
10 most popular KB articles in September 2023, for VMware Tanzu Application Service, BOSH and more. The post 10 most popular KB articles in September 2023, for VMware Tanzu Application Service, BOSH and more. appeared first on VMware Support Insider.
- Top 10 Most Popular Knowledge Articles for Horizon, WorkspaceONE, End User Computing (EUC), Personal Desktop for September, 2023 by Jamie Gravatte on October 6, 2023 at 4:31 pm
Tweet Get answers and solutions instantly by using VMware’s Knowledge Base (KB) articles to solve known issues. Whether you’re looking to improve your productivity, troubleshoot common issues, or simply learn something new, these most used and most viewed knowledge articles are a great place to start. Here are the top 5 most viewed KB articles … Continued The post Top 10 Most Popular Knowledge Articles for Horizon, WorkspaceONE, End User Computing (EUC), Personal Desktop for September, 2023 appeared first on VMware Support Insider.
- Top 10 Most Popular Knowledge Articles for HCX, SaaS, EPG Emerging Products Group for September, 2023 by Jamie Gravatte on October 5, 2023 at 2:26 pm
Tweet Get answers and solutions instantly by using VMware’s Knowledge Base (KB) articles to solve known issues. Whether you’re looking to improve your productivity, troubleshoot common issues, or simply learn something new, these most used and most viewed knowledge articles are a great place to start. Here are the top 5 most viewed KB articles … Continued The post Top 10 Most Popular Knowledge Articles for HCX, SaaS, EPG Emerging Products Group for September, 2023 appeared first on VMware Support Insider.