EUCUsability & Security in the Enterprise 2023 / 24Day 43. Workspace ONE Mobile Threat Defense

3. Workspace ONE Mobile Threat Defense

VMware Workspace ONE Mobile Threat Defense (MTD) is our latest UEM-integrated advanced mobile endpoint security solution for Android, iOS, and Chrome. Powered by Lookout, Mobile Threat Defense helps organizations detect and respond to mobile threats and increases attention to mobile security best practices and standards. In this lab you will integrate Workspace ONE UEM with the Mobile Threat Defense.

Part 1: Activate Workspace One Mobile Threat Defense (Lookout) Account

Part 2: Install Intelligent Hub Onto Your Device

Part 3: Setup Workspace ONE UEM

Part 4: MTD & UEM integration

Part 5: Enrollment and Test

Part 6: Configure Phishing & Content Protection (PCP)

Part 7: Protect your Organization from Unapproved Applications

Part 1: Activate Workspace One Mobile Threat Defense (Lookout) Account
  1. In your email, find an invitation from [email protected]
  1. Click the Set my password link
    • Configure and Confirm your new password
    • Click Back to sign in.

 

  1. Launch https://mtp.lookout.com/a/ to sign into your VMware Workspace One Mobile Threat Defense admin console.
Part 2: Install Intelligent Hub Onto Your Device
  1. Launch the Android Studio and, if necessary, start your Device.
  1. Maximize your Android Emulator device by clicking the Undock icon.
  1. Launch Chrome
    • Accept prompts and configure Chrome
    • Browse to https://getwsone.com
  1. Click  the Google Play link
    • Click Sign-in
    • Accept all prompts to configure Chrome on the device
    • Click Install to install the Intelligent Hub app on the device
    • Click Open to launch Intelligent Hub
  1. Once you are able to view the field to add the Email address or server, the VMware Workspace ONE UEM Intelligent Hub app has been installed successfully
    • Close the Intelligent Hub app
  1. Launch the Chrome Browser
    • In the upper right corner, click the white arrow (red circle) and choose Update Chrome.
    • Click Update.

Once Chrome has successfully been updated, you may continue with the next section.

Part 3: Setup Workspace ONE UEM

You need to configure the appropriate API access role and account in order for the Mobile Threat Defense environment to communicate with Workspace ONE UEM. You will then setup a smart group and tags to be leveraged as part of the integration.

  1. Open Chrome on the ControlCenter in your pod.  Open the Workspace ONE UEM admin console (https://dw-livefire.awmdm.com) and navigate to ACCOUNTS > Administrators > Roles and Click ADD ROLE
  1. Give the Role a name: MTD_API_Admin_{Your Initials}
    • Description: Used for MTD
    • Find the Category > API > REST
      • Configure the following:
        • Admins - Read
        • Apps - Read
        • Devices - Read
        • Groups - Read
        • Users - Read
  1. Then navigate to Device Management > Bulk Management
    • Click Read and Edit
  1. Scroll down and navigate to Settings > Tags
    • Click on Read and Edit
    • Click SAVE
  1. In the Workspace ONE UEM admin console, navigate to ACCOUNTS > Administrators > List View and Click ADD > Add Admin > Basic
  1. Fill in the following and click NEXT:
    • Username: MTD_Admin_{Your Initials}
    • Password: VMware1!
    • Confirm Password: VMware1!
    • First: MTD
    • Last Name: Admin
    • Email Address: [email protected]

 

  1. In Add Admin select your Organization Group (Should be your e-mail address) and the MTD_API_Admin_{Your Initials} Role you created earlier. Click NEXT.
  1. In the Details pane, leave the default settings and click NEXT
  1. In the Settings pane, click the None radio button next to Message type and click CERTIFICATES.
    • Type VMware1! for the Certificate Password and click SAVE.
    • If you receive a Warning message that an administrator has access to an Organization Group ... click Continue.
  1. Click on the three vertical dots and Edit your MTD_Admin account.
  1. Click NEXT until you get to Settings.  Type VMware1! in the Certificate Password field and click EXPORT CLIENT CERTIFICATE. This should begin the download of the certificate p12 format. (We will use this later in the lab) Click SAVE to store the admin account.
    • If you receive a Warning message that an administrator has access to an Organization Group ... click Continue.
  1. Navigate in the Workspace ONE Admin console to Groups & Settings > All Settings
  1. Now navigate to System > Advanced > API > REST API > Select Override > Click on + ADD
  1. Name WS1_MTD_{Your Initials} for the service.  Account type:  Admin. Copy the API Key to a notepad. Click Save at the bottom of the window.

NOTE: We will use this API key later in the integration with the Mobile Threat Defense Console.

  1. Close the settings page and navigate to Groups & Settings > Groups > Assignment Groups > Click + ADD SMART GROUP
  1. Name the Smart Group: MTD_Group_{Your Initials) then ensure that your Organization Group (Your e-mail address) is selected and click SAVE in the bottom right of the window.
  1. Click on your newly created Smart Group: MTD_Group_{Your Initials)
  1. Click Devices or Users
    • In the warning message box, click OK
    • In the Users field, type or select Craig and click ADD
    • Click Save
  1. Navigate in the Workspace ONE Admin console to Groups & Settings > All Settings
  1. In the left navigation menu click on Device & Users > Advanced > Tags in the navigation. Click + CREATE TAG
  1. Name the first tag MTD - Activated and click SAVE. Repeat the process for the following tags.:
  • MTD - Deactivated
  • MTD - Disconnected
  • MTD - Pending
  • MTD - Unreachable
  • MTD - Threats Present
  • MTD - Secured
  • MTD - Low Risk
  • MTD - Moderate Risk
  • MTD - High Risk

*Ensure you have all 10 tags added in the Workspace ONE UEM Admin console.

  1. Navigate back to Groups & Settings > Groups > Assignment Groups > Click + Add Smart Group
    • Ensure that the Criteria tab is selected
    • In the Name field, type High Risk Devices
    • Expand Tags, click in the available field, select MTD-High Risk - {Your Org Name}, and click Add
    • Click Save
  1. Navigate to Resouces > Native
    • Select the Public tab
    • Click Add Application
  1. In the Platform field drop down box, select Android
    • In the Source field, select Import From Play
    • Click Next
  1. Put a check in the box next to the following applications:
    • Adobe Acrobat Reader: Edit PDF
    • Microsoft Excel: Spreadsheets
    • Salesforce
    • Tunnel - Workspace ONE
    • Click IMPORT
  1. Next Adobe Acrobat Reader click Assign
  1. Input the following in the appropriate fields:
    • Name: Adobe Acrobat Reader
    • Assignment Groups: MTD_Group_{Your Initials} <-- this is your Smart Group
    • App Delivery: Auto
    • Auto-Update Priority: (Leave Default)
    • Click Create
  1. Click the Exclusions tab
    • Select High Risk Devices {Your Org}
    • Click Save
    • Click Publish
  1. Return to Resources  > Native > Public
    • Click Add Application and repeat the above steps for Microsoft Excel, Salesforce, and Tunnel - Workspace ONE
  1. Ensure that the Install Status for all three apps reads View.
Part 4: MTD & UEM Integration

Now that we have done the prerequisites for the Workspace ONE UEM settings, we will now make the necessary preparations on the Mobile Threat Defense console in order to complete the integration.

  1. Open a new tab in your browser on Control Center and navigate to https://mtp.lookout.com/a/
    • Authenticate using the credentials that you received via email (in your email, find an invitation from [email protected]).
  1. In the Mobile Threat Defense console navigate to Devices.
    • Select Device Policy Groups
  1. In upper right corner, click Create Group.
    • In the Name field type Developers and in the Description field type Group for Developers
    • Click Create Group

 

  1. In the Mobile Threat Defense console, navigate to Integrations.
  1. On the Integrations page click on WorkspaceONE, this will allow us to setup a new connector.
  1. File in the following values:
    • Label: WS1-Integration-{initials}
    • Workspace ONE URL : https://as1605.awmdm.com/
    • API Token: Paste the token that was captured above. (This is the API Token that you created in UEM previously, Step 12)
    • Authentication: Certificate Authentication (default)
    • Below Certificate (required), Choose File... : Upload your MTD_Admin user certificate you downloaded above. (Step 5)
    • Passphrase: VMware1! 
  1. In the upper-right corner, select Connector Settings then click CREATE INTEGRATION.
  1. Scroll down and find Automatically drive lookout for Work enrollment on Workspace ONE managed devices and set it to ON.
    1. Select the MTD_Group_{Your Initials} from the drop down of the smart groups.
    2. Set sync newly enrolled devices and unenrolled devices from UEM every 5 minutes (default).
    3. Automatically push activation emails to Workspace ONE managed devices >  Ensure that it is set to OFF.
    4. Delete device on unenrollment > Ensure that is is set to ON
    5. Treat devices which are removed from the enrollment smart group as unenrolled from Workspace ONE >  Ensure that it is set to OFF
  1. Scroll down and Enable "Synchronize device status to Workspace ONE"
    • Match the State Sync to the Tags created in Workspace ONE UEM as shown above.
  1. Set an e-mail address kim@corpXXX.euc-livefire where XXX is your assigned domain identifier for error handling and then click SAVE CHANGES at the top of the page.
Part 5: Enrollment & Test

Now that we have successfully integrated the Mobile Threat Defense Console with WorkspaceONE UEM, and enabled Phishing & Content Protection, let's proceed to get the Intelligent hub to communicate with the Mobile Threat Defense Console.

  1. In the Mobile Threat Defense Console, navigate to System > Manage Enrollment > Enroll with code
  1. Click the device group enrollment code link
  1. Select the Developers Enrollment Code
    • Copy this code to a notepad
  1. Return to your WorkspaceOne UEM Admin console (https://dw-livefire.awmdm.com/)
  1. Navigate in the Workspace ONE Admin console to Groups & Settings > All Settings
    • In the Settings page navigate to Apps > Settings and Policies > Settings and paste the below  with the enrollment code from MTD console to Custom Settings and click SAVE
{
   "mtdSettings":{    
         "isEnabled":true, "enrollmentCode":"ENROLLMENT CODE GOES HERE"
   }
}

Configure the Intelligent Hub and Tunnel on your Android device.  The minimum requirements include the following: Intelligent Hub (minimum 23.03.0.49), Tunnel 23.01.0 Build 13 on iOS (minimum iOS 13, PCP in Beta)  or Android (minimum Android 9)

  1. Return to your Android emulator and, if necessary, swipe up to view the Intelligent Hub app.
  1. Click Intelligent Hub app.
  1. In the Email address or server field, type craig@corpXXX.euc-livefire.com (where XX is your assigned domain identifier) for the URL and click Next.  
    • You will then be redirected to Azure.
    • Re-enter your email craig@corpXXX.euc-livefire.com with a password of VMware1!
    • Click Yes to stay signed in.
  1. Complete the enrollment process by approving the requested permissions.
    • Click Support
  1. In My Devices, note the device status of All Good.
    • Click the Android device
  1. Note the device status.
    • Device status may include: No risk, Enrolled, Compliant and Connectivity Normal
    • Click Mobile Threat Defense
      • Note that the device reads safe (but it "safe"? You may see something different in the Mobile Threat Defense Admin Console shortly, Step 13 )
    • Click the back arrow
    • Again, click the back arrow
  1. Click Apps
    • Note that applications that are available on the device.
  1. Return to the  MTD Admin Console https://mtp.lookout.com/a/ and navigate to Devices.  Initially it will report the device as Pending. Once it has successfully assessed the device it will report its Status.
  1. In this case the device is not reporting any issues, however if we navigate to Vulnerabilities, we can observe that the Android device running has 673 vulnerabilities
    • Click the Severity Ration Percentage bar.  We can see that 57 are Critical.

**Your details may vary

  1. Return to the Android emulator, click Work and launch the Chrome browser (You may have to click ESC a few times on your keyboard)
  1. If necessary, complete the Chrome setup process.
  1. In the URL field, type http://okay.ac and press Enter
    • Note how there is no protection against users accessing known bad phishing sites
  1. In the URL field, type http://newid.com and press Enter
    • Note how there is no protection against known criminal activity sites

Try connecting to the following sites, as well:

  • www.instagram.com
  • www.facebook.com
Part 6: MTD Phishing & Content Protection (PCP)

 Workspace ONE Mobile Threat Defense Phishing and Content Protection is unique in that it is built directly into Workspace ONE Tunnel and works seamlessly with other Tunnel capabilities.  This addresses conflicts that organizations may encounter with multiple VPN configurations — one for filtering and one for VPN — on a single device.  In this lab we will configure PCP  to protection from web and content vulnerabilities.

  1. In the Mobile Threat Defense console navigate to Protections.
    • In the Manage settings for, click the drop down and select Developers.
  1. Select the Phishing and Content Protection tab
    • Remove the check next to Inherit from parent group
    • Set the Enable Phishing and Content Protection to ON
    • If necessary, put a check in the box next to enable Secure DNS
    • Set Make Phishing and Content Protection mandatory to ON
    • Click Save Changes
    • Click Save

Make Phishing and Content Protection mandatory is optional, and if enabled, PCP will be activated automatically on the device and a PCP disabled threat is generated in the Mobile Threat Defense console and on the device if PCP fails to activate.

However, if not set to mandatory, the device receives a notification that PCP is available to be activated and requires end user set up on the device.

  1. Scroll up, and ensure that the Phishing and Content Protection tab is selected
    • Click Configure Content Policies

Modify the following FOUR (4) Web and Content Policies and change the Risk Level to Low and Response to Block and Alert Device

  1. Web and Content Malicious Content
    • Web and Content Unauthorized Content
    • Web and Content Phishing Content
    • Web and Content  Denylisted Content
    • Put a check in the box next to Policy Type to select all of the Web and Content Policies
      • Click Enable                          
    • Click Save Changes
      • Click Save Changes
  1. Click the Gear icon next to Web and Content Unauthorized Content
    • Deselect Inherit from Parent Policy
    • Navigate to Personal Content and put a check in the box next to Social networking
    • Click Save Changes
  1. Return to the Android emulator, click Work and launch the Intelligent Hub app
    • Click your enrolled device
    • Click Safe Browsing ON
    • Click OK to acknowledge the Safe Browsing notification, if prompted.
  1. Return to the Work profile tab and select Tunnel
  1. Complete the setup process by approving the requested permissions.                                                            

If you see that the VMware Tunnel reads "Not Configured, Contact your IT admin":

  1. Ensure that you have enabled Phishing and Content Protection in the Workspace One MTD admin console https://mtp.lookout.com/a/.
  2. Ensure that you configured the proper Enrollment Code in Part 5, Step 5.
  1. Ensure that your that Safe Browsing has been successfully enabled and reads ON.
  1. In your Work profile, launch Chrome
  2. In the URL field, type http://okay.ac and press Enter
    • Note how users are protected against accessing known bad phishing sites

It can take quite a while for the settings to be updated.  

  1. In the URL field, type http://newid.com and press Enter
    • Note how users are protected against accessing known bad fraud sites

Try connecting to the following sites, as well:

  • www.instagram.com
  • www.facebook.com
  • www.twitter.com
  • phishing.lookoutsafebrowsingtest.com
  1. Return to the Intelligent Hub app
    • If necessary, click Support
    • Click Your Android Device
    • Next to Safe Browsing ON, click the arrow
      • Note that there are several sites that have now been flagged.
    • Click the arrow next to Unauthorized Content.
    • Note each entry
  1. Return to your MTD admin console https://mtp.lookout.com/a/
    • In the left pane, click Issues
      • Note the list of issues that have been found in the last 30 days.
Part 7: Protect your Organization from Unapproved Applications

We can configure Workspace One UEM Smart Groups, in conjunction with Workspace One Mobile Threat Defense, to ensure that published resources are only available to those devices that are not tagged as High Risk.

  1. Return to Mobile Threat Defense admin console https://mtp.lookout.com/a/
    • In the left pane, select Protections
    • In the Manage Settings for field, ensure that Developers is selected.
    • Select the Policies tab
    • Find and select Device: Sideloaded App
      • Set the Risk level to High
      • Ensure that the Response is set to Block and alert device
    • Click the Gear Next to the High Risk level field
    • Deselect Inherit from parent policy
      • Note how apps sideloaded with Android Debug Bridge (adb) installers will be blocked
    • Click Save changes
      • Click Save changes
  1. In Teams, click on the Files Tab
    • Open the VMware Mobile Threat Defense Files > Side-loading Test Files folder
    • Download HelloWorld.apk

WINDOWS or MAC

  • Click the Terminal tab located at the bottom of your window.
  • Navigate to %your download location%\platform-tools  
  • Run the following command from the terminal:

platform-tools% ./adb shell pm list users

Note the Work Profile ID (typically 10 or 11)

platform-tools % ./adb install --user {Work Profile ID number}  HelloWorld.apk 

 

  1. Click the Work tab
    • Note that the Hello World app has been sideloaded successfully
  1. Note that the Adobe Acrobat Reader, Microsoft Excel, and Salesforce apps no longer appear in  the Work profile. (It may take a moment for the this to occur)
  1. On the Android device, return to the Intelligent Hub app and click Support in the lower left corner.
    • In the Your device is at risk section, click the arrow to view more information
  1. This sideloaded application has been tagged as High Risk
  1. Return to the Workspace ONE UEM admin console (https://dw-livefire.awmdm.com) and navigate to Devices > List View
    • Click Craig Android
    • Note the HIGH RISK tag that has now been assigned
  1. Return to the  MTD Admin Console https://mtp.lookout.com/a/
    • Navigate to Devices.  
      • Click High Risk
    • Click Hello World on the High Risk device
  1. Click the Allow sideloaded app command button
    • Note the Signature Hash
      • Click Allow sideloading
        • Click Ok
  1. Click Configure Policy
    • Note that sideloading for the Hello World app has been allowed
      • Click Cancel
  1. Return to your Android emulator
    • Delete the Hello World app from both Personal and Work tabs
    • Click OK
  1. After uninstalling the Hello World app from both the Personal and Work tabs, your published apps will reappear. (It may take up to 2 hours for all apps to reappear)

This completes the Workspace ONE Mobile Threat Defense lab.

Part 8: Workspace One Trust Network Integration

Workspace ONE Trust Network integrates threat data from security solutions including endpoint detection and response (EDR) solutions, mobile threat defense (MTD) solutions, and cloud access security brokers (CASB). This integration provides Workspace ONE Intelligence users with insights into the risks to devices and users in their environment. See how to register your specific Trust Network system with Intelligence.

  1. Return to Mobile Threat Defense admin console https://mtp.lookout.com/a/
    • In the left pane, select Protections
    • In the Manage Settings for field, ensure that Developers is selected.
    • Select the Policies tab
    • Find and select Device: Sideloaded App
      • Set the Risk level to High
      • Ensure that the Response is set to Block and alert device
    • Click the Gear Next to the High Risk level field
    • Deselect Inherit from parent policy
      • Note how apps sideloaded with Android Debug Bridge (adb) installers will be blocked
    • Click Save changes
      • Click Save changes

This completes the Workspace ONE Mobile Threat Defense lab.

0 Comments

Add your comment

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.