Share via


How To Topics for Managing Devices

4/8/2010

Many settings can be customized for branding, security, or convenience. The topics in this section will help you understand what can be configured and how to modify the configuration.

In This Section

  • Bootstrapping a Device
    Provides information about how to configure a device so that it can be continuously provisioned by a privileged agent.
  • How To Configure a Device After Manufacture
    Lists the steps you must take to configure a device after the manufacturing process is complete. This includes instructions about deciding on a method of delivery, creating a provisioning XML file, packaging and delivering the file to the device.
  • How to Query Security Policies
    Walks you through the process of querying Security Policies, including choosing a method of delivery, creating an XML file, packaging the file if needed, and delivering the file to the device. You should query device policies before changing them.
  • How to Change Security Policies
    Walks your through the process of changing Security Policies, including choosing a method of delivery, querying device policies before you change them, determining the settings that you want to make, creating an XML file, packaging the file if needed, and delivering the file to the device.