Introducing AirWatch 8.4.7

Introducing AirWatch 8.4.7

The AirWatch® team is excited to announce that AirWatch 8.4.7 is now publicly available.  

This release is now available for download on myAirWatch.

Software Delivery Notification

SDN # - AW_8.4.7

Release - 8.4

Work Items Addressed

  • CMEM-182475: Enabled user management of attachment encryption for Boxer via SEG.  In AirWatch v.8.4.7 and above, the attachment encryption compliance policy enforced via the Secure Email Gateway will no longer encrypt attachments that are being transmitted to VMware Boxer on both Android and Apple iOS devices. Instead, Boxer’s built-in security model will secure attachment data. By default, Boxer automatically encrypts and stores attachments when it is configured with a mail account from the AirWatch Admin Console. To ensure that attachments are only opened in approved applications, enable and configure the Sharing policy in the Boxer email settings on the AirWatch Console. Set the Sharing policy to Whitelist and specify the IDs of the approved applications.
  • AAPP-639: Enabled users to delete an existing class in AirWatch School Manager.

  • AAPP-1141: Improved user authentication during enrollment with the AirWatch Agent.

  • AAPP-1236: Implemented DB script to enable iOS 10 and macOS Sierra management by AirWatch.

  • AAPP-1321: Added seed script for iOS 10.0.1 and tvOS 10.

  • AAPP-1346: Added seed script for iPhone 7 models.

  • AAPP-1235: Improved Lost Mode enabling for iOS 10 Supervised devices.

  • AGGL-257: Improved SSL setting parameters for AirWatch Inbox for Android for Work.

  • AGGL-475: Added ability to assign Products to devices based on manufacturer and enterprise version.

  • AGGL-138: Implemented LaForge Admin Flow phase 2.

  • AMST-533: Improved EAS profiles for Redstone Phone builds native mail client.

  • AMST-215: Added ability to silently deploy BSP apps to end user devices.

  • ARES-1221: Improved Require Management flag functionality for internal apps on Windows Phone and Android devices.

  • CMCM-186235: Improved file version management during Content Locker sync using the Remote File Server.

  • CMCM-186358: Improved Content Locker content sync on Android devices.

  • CMCM-185831: Improved Read-Only admin security restrictions for content management.

  • CMDM-204309: Improved Single-App Mode app removal functionality for Launcher payload.

  • CMDM-204604: Seeded Launcher v2.4 app script to the AirWatch Console.

  • CMEM-182048: Improved email settings configuration page for Android Boxer app in the AirWatch Admin Console.

  • CMEM-182493: Enhanced mail download for Windows native mail client via SEG when attachment encryption is enabled.

  • CMEM-182110: Improved email attachment name display in iOS native mail client via SEG.

  •  CMSVC-661: Enhanced device level group reporting for Smart Groups created with User Group criteria.

  • CMSVC-826: Improved user and device information displays, and privacy management in the AirWatch Admin Console.

  • CMSVC-889: Enhanced User Group sync performance in the AirWatch Admin Console.

  • CMSVC-896: Improved email formatting for Admin account creation via Batch Import on AirWatch Admin Console.

  • CONSVR-854: Enhanced Read-Only User access to files through Mobile Access Gateway.

  • CRSVC-379: Improved platform name reporting for iOS and Android devices in the Device Service endpoint.

  • CRSVC-439: Improved Certificate Revocation status reporting in AirWatch Admin Console when a device is unenrolled or enterprise-wiped.

  • SINST-174146: Encrypted SQL database information on the Reports Installer.

Installation Procedure

Use the following step-by-step instructions to apply a feature pack or other patch to your version of AirWatch.

Important: Contact AirWatch if your SEG is on the same server as your AirWatch Admin Console or Device Services servers for instructions on how to proceed.

Consider retaining *.exe installation files in case there are issues.

  1.  Stop all the AirWatch services and websites on AirWatch Admin Console and Device Services servers.
  2. Back up your AirWatch Application Servers and AirWatch Database.
  3. Obtain the AirWatch_Application_8.4._FPXX_Install.exe and AirWatch_Database_8.4_FPXX_Setup.exe files from AirWatch Resources ( These are the full installer files, which you run on your servers to apply the upgrade.
  4. Execute the AirWatch_Application_8.4_FPXX_Install.exe by right-clicking and running as administrator on each Console and Device Services server up until the point where all application servers state "IIS and all services are now stopped. Please upgrade your AirWatch database using the provided script", then immediately proceed to the next step.
  5. Run the AirWatch_Database_8.4_FPXX_Setup.exe executable on the AirWatch database server.
  6. Finish running the installers on each Console and Device Services server.
Have more questions? Submit a request


Article is closed for comments.