Recover a Deleted Device to Restore its Previous Settings
Deleted devices are added to the System > Deleted node pending permanent deletion or recovery. The next time that device pings the server, it will re-appear in the devices node.
At this point, selecting to restore this device from the ‘Deleted’ node will present you with the option to also...
Force an iOS Application Refresh to Prompt Applications Which are Pending Install or Violating an App Control Policy
From the Parallels MDM Portal > ‘Applications’ tab, click ‘Refresh’ to instantly prompt iOS device users with applications that are pending install and violating application control policies. This will also update the application list content and status to match that of their current...
Trace Android and iOS Device Locations
2X MDM provides administrators with the ability to trace connected mobile devices and further fine tune tracking parameters per group or even individual devices depending on the scenario.
We shall now walk through a ‘how to’ guide aimed at fine tuning 2X MDM for use within a high...
What happens when the 2X MDM client is not able to connect to the server?
There are two scenarios which should be considered:
1. Session time out applies
Wifi/3G/LTE is enabled on the device but cannot connect to the 2X MDM server.
In this case, the 2X MDM client shall attempt to connect to the 2X MDM server over port 587. If port 587 is being blocked by a firewall or...
What is PUSH used for?
PUSH is the technology used by the 2X MDM server to communicate instantly with the 2X MDM client.
This allows the 2X MDM administrator to instantaneously send actions to 2X MDM client devices, rather than wait for the next update interval for these changes to take effect.
If the device is not...
2X SecureRemoteDesktop User Cases
Scenarios where 2X SecureRemoteDesktop is essential in securing your RDP network
— Brought to you by the 2X Cloud Computing Team –
With the increasing amount of network threats and online intrusions on RDP networks, there is a greater need for a powerful security tool to protect RDP...
The Benefits of Using 2X SecureRemoteDesktop
2X SecureRemoteDesktop combats hacking attacks, allowing you to securely work over a remote network.
— Brought to you by the 2X Cloud Computing Team —
2X SecureRemoteDesktop is an innovative and effective security tool that proactively protects RDP networks from all types of online...
A Deep Dive into 2X SecureRemoteDesktop
What is 2X SecureRemoteDesktop?
— Brought to you by the 2X Cloud Computing Team —
The increasing use of smart phones and mobile devices, along with the implementation of BYOD policies in corporate environments, has enabled businesses to leverage resources and increase productivity...