100% found this document useful (2 votes)
26 views

Download ebooks file Pro iOS Security and Forensics Eric Butow all chapters

iOS

Uploaded by

gonfajaddu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
26 views

Download ebooks file Pro iOS Security and Forensics Eric Butow all chapters

iOS

Uploaded by

gonfajaddu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 55

Experience Seamless Full Ebook Downloads for Every Genre at textbookfull.

com

Pro iOS Security and Forensics Eric Butow

https://textbookfull.com/product/pro-ios-security-and-
forensics-eric-butow/

OR CLICK BUTTON

DOWNLOAD NOW

Explore and download more ebook at https://textbookfull.com


Recommended digital products (PDF, EPUB, MOBI) that
you can download immediately if you are interested.

Programming Interviews For Dummies 1st Edition John Sonmez


Eric Butow

https://textbookfull.com/product/programming-interviews-for-
dummies-1st-edition-john-sonmez-eric-butow/

textboxfull.com

Pro iOS Testing: XCTest Framework for UI and Unit Testing


Avi Tsadok

https://textbookfull.com/product/pro-ios-testing-xctest-framework-for-
ui-and-unit-testing-avi-tsadok/

textboxfull.com

Practical Mobile Forensics A hands on guide to mastering


mobile forensics for the iOS Android and the Windows Phone
platforms 3rd Edition Rohit Tamma
https://textbookfull.com/product/practical-mobile-forensics-a-hands-
on-guide-to-mastering-mobile-forensics-for-the-ios-android-and-the-
windows-phone-platforms-3rd-edition-rohit-tamma/
textboxfull.com

iOS Penetration Testing: A Definitive Guide to iOS


Security 1st Edition Kunal Relan

https://textbookfull.com/product/ios-penetration-testing-a-definitive-
guide-to-ios-security-1st-edition-kunal-relan/

textboxfull.com
Pro iOS Testing: XCTest Framework for UI and Unit Testing
1st Edition Avi Tsadok

https://textbookfull.com/product/pro-ios-testing-xctest-framework-for-
ui-and-unit-testing-1st-edition-avi-tsadok/

textboxfull.com

Pro Spring Security 3rd Edition Masimo Nardone

https://textbookfull.com/product/pro-spring-security-3rd-edition-
masimo-nardone/

textboxfull.com

Financial Security For Dummies® Eric Tyson

https://textbookfull.com/product/financial-security-for-dummies-eric-
tyson/

textboxfull.com

Security Privacy and Forensics Issues in Big Data Advances


in Information Security Privacy and Ethics 1st Edition
Ramesh C. Joshi
https://textbookfull.com/product/security-privacy-and-forensics-
issues-in-big-data-advances-in-information-security-privacy-and-
ethics-1st-edition-ramesh-c-joshi/
textboxfull.com

Mobile Phone Security and Forensics A Practical Approach


2nd Edition Iosif I. Androulidakis (Auth.)

https://textbookfull.com/product/mobile-phone-security-and-forensics-
a-practical-approach-2nd-edition-iosif-i-androulidakis-auth/

textboxfull.com
Pro iOS
Security and
Forensics
Enterprise iPhone and iPad Safety

Eric Butow
Pro iOS Security
and Forensics
Enterprise iPhone and
iPad Safety

Eric Butow
Pro iOS Security and Forensics
Eric Butow
Jackson, California, USA

ISBN-13 (pbk): 978-1-4842-3756-4 ISBN-13 (electronic): 978-1-4842-3757-1


https://doi.org/10.1007/978-1-4842-3757-1
Library of Congress Control Number: 2018952358
Copyright © 2018 by Eric Butow
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or
part of the material is concerned, specifically the rights of translation, reprinting, reuse of
illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way,
and transmission or information storage and retrieval, electronic adaptation, computer software,
or by similar or dissimilar methodology now known or hereafter developed.
Trademarked names, logos, and images may appear in this book. Rather than use a trademark
symbol with every occurrence of a trademarked name, logo, or image we use the names, logos,
and images only in an editorial fashion and to the benefit of the trademark owner, with no
intention of infringement of the trademark.
The use in this publication of trade names, trademarks, service marks, and similar terms, even if
they are not identified as such, is not to be taken as an expression of opinion as to whether or not
they are subject to proprietary rights.
While the advice and information in this book are believed to be true and accurate at the date of
publication, neither the authors nor the editors nor the publisher can accept any legal
responsibility for any errors or omissions that may be made. The publisher makes no warranty,
express or implied, with respect to the material contained herein.
Managing Director, Apress Media LLC: Welmoed Spahr
Acquisitions Editor: Aaron Black
Development Editor: James Markham
Coordinating Editor: Jessica Vakili
Cover designed by eStudioCalamar
Cover image designed by Freepik (www.freepik.com)
Distributed to the book trade worldwide by Springer Science+Business Media New York,
233 Spring Street, 6th Floor, New York, NY 10013. Phone 1-800-SPRINGER, fax (201) 348-4505,
e-mail [email protected], or visit www.springeronline.com. Apress Media, LLC is a
California LLC and the sole member (owner) is Springer Science + Business Media Finance Inc
(SSBM Finance Inc). SSBM Finance Inc is a Delaware corporation.
For information on translations, please e-mail [email protected], or visit http://www.apress.
com/rights-permissions.
Apress titles may be purchased in bulk for academic, corporate, or promotional use. eBook
versions and licenses are also available for most titles. For more information, reference our Print
and eBook Bulk Sales web page at http://www.apress.com/bulk-sales.
Any source code or other supplementary material referenced by the author in this book is available
to readers on GitHub via the book’s product page, located at www.apress.com/978-1-4842-3756-4.
For more detailed information, please visit http://www.apress.com/source-code.
Printed on acid-free paper
For my grandmother,
Clara Butow (1912-2008), whose lessons,
spoken and unspoken, continue to teach me
Table of Contents
About the Author���������������������������������������������������������������������������������ix
Acknowledgments�������������������������������������������������������������������������������xi

Chapter 1: Preparing Security Features�����������������������������������������������1


What iPhones Are Eligible?�����������������������������������������������������������������������������������1
Enroll Your Devices�����������������������������������������������������������������������������������������������3
Create Your New Apple ID��������������������������������������������������������������������������������3
Add Your Business Details�������������������������������������������������������������������������������8
Wait Your Turn������������������������������������������������������������������������������������������������12
The Final Steps����������������������������������������������������������������������������������������������13
Now You Can Start����������������������������������������������������������������������������������������������14
Find Your MDM����������������������������������������������������������������������������������������������������15
Add Your MDM to DEP������������������������������������������������������������������������������������17
What’s Next?�������������������������������������������������������������������������������������������������19
Enroll a Device to Your MDM�������������������������������������������������������������������������������20
Sync with Apple DEP�������������������������������������������������������������������������������������������24
Setting Up Apps��������������������������������������������������������������������������������������������������24
Deploy Your App Catalog�������������������������������������������������������������������������������������26
Add an App����������������������������������������������������������������������������������������������������26
Add App Groups and Deploy��������������������������������������������������������������������������27
Push Assigned Apps��������������������������������������������������������������������������������������29
Manage Your Configurations�������������������������������������������������������������������������������30

v
Table of Contents

Chapter 2: Using Security Apps and Backup��������������������������������������33


Taking Specific Security Actions�������������������������������������������������������������������������34
Send a Message��������������������������������������������������������������������������������������������35
Lock the Screen���������������������������������������������������������������������������������������������36
Clear the Passcode����������������������������������������������������������������������������������������37
Wipe Data������������������������������������������������������������������������������������������������������38
Finding Security Apps in the App Store���������������������������������������������������������������39
Backing Up with iCloud and iTunes���������������������������������������������������������������������40
Backup to iCloud�������������������������������������������������������������������������������������������41
Backup to a Computer�����������������������������������������������������������������������������������42
Setting Up Supervision Mode������������������������������������������������������������������������������44
Add Devices to DEP���������������������������������������������������������������������������������������46
Add Devices in Apple Configurator����������������������������������������������������������������49
Create a New Group for Supervised iPhones������������������������������������������������56

Chapter 3: Connect to Your Network Securely������������������������������������63


Different Connection Types���������������������������������������������������������������������������������64
Virtual Private Networks (VPNs)��������������������������������������������������������������������65
Select and Install a VPN App�������������������������������������������������������������������������������66
Manage Your VPN from Your MDM�����������������������������������������������������������������69
Push Your Wi-Fi Connection��������������������������������������������������������������������������������73
Keep Your Employees Safe and Connected���������������������������������������������������������76
VPN over Wi-Fi�����������������������������������������������������������������������������������������������76
Using Wi-Fi in Public��������������������������������������������������������������������������������������77
How to Protect Your Employees���������������������������������������������������������������������78
Manage Your 4G Connections�����������������������������������������������������������������������������81

vi
Table of Contents

Chapter 4: Creating Policies���������������������������������������������������������������83


Company vs. Personal iPhones���������������������������������������������������������������������������84
Company iPhones������������������������������������������������������������������������������������������84
Personal iPhones�������������������������������������������������������������������������������������������86
Provisioning Policies for User Management�������������������������������������������������������87
Adding Roles in SimpleMDM�������������������������������������������������������������������������88
Adding a User in SimpleMDM������������������������������������������������������������������������90
Setting Advanced User Security Options�������������������������������������������������������91
Policies for Loss, Theft, and Damage������������������������������������������������������������������97
Before You Start Shopping�����������������������������������������������������������������������������97
AppleCare and Extended Plans����������������������������������������������������������������������99
Insurance�������������������������������������������������������������������������������������������������������99

Chapter 5: Communicating About Security��������������������������������������103


Communicate Your Policies�������������������������������������������������������������������������������104
Check Your Existing Policies������������������������������������������������������������������������104
Creating Policy Documents��������������������������������������������������������������������������105
Communicating Your Policy�������������������������������������������������������������������������111
Phishers are Fishing for You�����������������������������������������������������������������������������114
Look for the Hooks��������������������������������������������������������������������������������������114
Check and Communicate�����������������������������������������������������������������������������116
Staying Safe Browsing the Web������������������������������������������������������������������������117
Private Browsing in Safari���������������������������������������������������������������������������117
Block or Approve Websites in Supervised Mode�����������������������������������������122
Manage Passwords�������������������������������������������������������������������������������������126
Managing App Permissions�������������������������������������������������������������������������������127

vii
Table of Contents

Updating iOS and Apps Regularly���������������������������������������������������������������������128


Unsupervised Mode�������������������������������������������������������������������������������������129
Update from SimpleMDM����������������������������������������������������������������������������131

Chapter 6: Recovering from Loss or Attack�������������������������������������135


Using Find My iPhone���������������������������������������������������������������������������������������136
Adding iCloud����������������������������������������������������������������������������������������������136
Restricting iCloud Access����������������������������������������������������������������������������137
Activate Find My iPhone������������������������������������������������������������������������������137
Launch Find My iPhone�������������������������������������������������������������������������������140
Restrict Hackers from Turning Off Location Services����������������������������������142
Take Actions������������������������������������������������������������������������������������������������145
Using Recovery Mode���������������������������������������������������������������������������������������147
iPhone 8, iPhone 8 Plus, and iPhone X��������������������������������������������������������148
iPhone 7 and 7 Plus�������������������������������������������������������������������������������������150
iPhone 6s and 6s Plus���������������������������������������������������������������������������������151
Restoring the iPhone from DFU Mode���������������������������������������������������������������151
iPhone 8 and X Models��������������������������������������������������������������������������������152
iPhone 7 Models������������������������������������������������������������������������������������������153
iPhone 6 Models������������������������������������������������������������������������������������������153
If Nothing’s Working������������������������������������������������������������������������������������������155

Index�������������������������������������������������������������������������������������������������157

viii
About the Author
Eric Butow is the owner and CEO of Butow
Communications Group (BCG) in Jackson,
California, which offers online marketing
ROI improvement services for businesses.
He has used iPhones in his business since he
bought the 3G in 2008. Eric has authored
or co-authored 31 books, most recently
My Samsung Galaxy S7, Samsung Gear S2
for Dummies, and Instagram for Business
for Dummies. He has also developed and
taught networking, computing, and usability
courses for Ed2Go, Virtual Training Company,
California State University, Sacramento,
and Udemy.

ix
Acknowledgments
My thanks to the best literary agent on the planet, Carole Jelen. I also thank
and appreciate my editors, Jessica Vakili and Aaron Black, for all their help
and support. And I thank you for buying and reading this book.

xi
CHAPTER 1

Preparing Security
Features
With iOS security features as with most of Apple’s efforts, the company
strives to make it easy for its customers to use its products. In the case of
managing a large number of its devices in a corporate setting, Apple makes
the Device Enrollment Program (DEP) available on its website for network
administrators to set up iPhones (as well as iPads and Macs) without
having to configure each physical device.
After you sign up with DEP, you’ll talk with an Apple business
representative on the phone, as you’ll learn about later in this chapter.
During the call, you’ll learn whether you’re ready to go or if you need to
make some changes to qualify for DEP.

What iPhones Are Eligible?


Before you start enrolling in DEP, you need to take stock of the iPhones
you’re going to administer in your organization.
If your business purchased iPhones through its Apple business account
for business use only, and those devices were purchased after March 1,
2011, then you’re ready to enroll.

© Eric Butow 2018 1


E. Butow, Pro iOS Security and Forensics, https://doi.org/10.1007/978-1-4842-3757-1_1
Chapter 1 Preparing Security Features

Your business may have a Bring Your Own Device (BYOD) policy for
some or all its employees. If so, you can enroll each user’s personal iPhone
in DEP to manage. Apple determines if an iPhone is eligible for DEP by the
location where that iPhone was purchased. For example, if the iPhone was
purchased through a cellular carrier such as Verizon or AT&T, then Apple
may accept that iPhone into DEP.
An iPhone purchased directly from Apple using a consumer account is
not eligible. Your employee may be able to get their phone number moved
from a consumer to a business account so the phone can be added to
DEP. They will have to contact their cellular carrier to find out if they are
eligible and to go through the transfer process, which may take some time.

Note Check your employees’ phones to ensure they have the latest
version of iOS 11 installed so they have access to the latest security
and management features. If your company requires all the features
iOS 11 offers and one or more employees have older iPhones that
can’t run iOS 11, you will need to speak with those employees and/
or management to determine if those employees need to purchase a
new iPhone or be supplied with an iPhone assigned by your business.

2
Chapter 1 Preparing Security Features

Enroll Your Devices


Access the Device Enrollment Program website at https://www.apple.
com/business/dep/. Scroll down the page to view more information about
the program. Enrollment is a multi-part process, so get comfortable and
have your favorite beverage nearby before you start.

Create Your New Apple ID


The first step in the process is to create a new Apple ID. As part of the
application, you will have to enter a new email address for DEP that is
different from any other email address you use.

1. Click or tap Enroll Now shown in Figure 1-1.

Figure 1-1. The Enroll Now link appears near the top of the page

3
Chapter 1 Preparing Security Features

2. In the Welcome webpage, click or tap Enroll to the


right of the Device Enrollment Program description.
See Figure 1-2.

Figure 1-2. The Device Enrollment Program entry appears at the top
of the webpage

4
Chapter 1 Preparing Security Features

3. In the Your Details webpage, type your company


details into the appropriate boxes and then click
Next as shown in Figure 1-3.

Figure 1-3. The Your Details webpage is the first of four steps in the
application

4. When you receive an email message from Apple that


contains the next steps to enroll in DEP, click the
Sign In button within the email message.

5. In the new browser tab, type the user name and


temporary password that appears in the email
message and then press Enter (or tap Return) on
your keyboard.

5
Chapter 1 Preparing Security Features

6. Update your Apple ID with your new password and


then click or tap Change Password.

7. Click or tap Continue to verify your email address.


In a short while, a message from Apple appears in
your email inbox. This message contains a six-digit
code.

8. Return to your browser, type the code into the


browser, and then click or tap Continue.

9. Now enter your complete birthdate and the three


security questions (and answers) you want to use in
case you can’t remember your password.

10. When you’re done, click or tap Update.

11. Once Apple updates your ID, click or tap Continue.

12. Now type your name and password and then press
Enter (or tap Return).

13. Answer two of the three security questions you


added earlier and then click or tap Continue.

14. Within the Security section in the Apple ID


webpage, click Get Started under Two-Step
Verification. See Figure 1-4.

Figure 1-4. The Get Started link appears in the lower-right of the
Security section

6
Chapter 1 Preparing Security Features

15. When you finish reading about two-step verification


in the window, click Continue.

16. Type the phone number you want to use to receive


verification codes when you sign in with your Apple
ID, and then click or tap Continue.

17. Type the four-digit code you received in the text


message on your phone and then click or tap
Continue.

18. If you have another Apple mobile device that has


Find My iPhone, iPad, or iPod touch enabled, you
will have to verify your devices in the same way you
did in the previous step. When you finish verifying
those devices, or you don’t see any devices to verify,
click or tap Continue.

19. Print or write down your recovery key in case you


can’t remember your password or you lose the
iPhone you’re using to set up your DEP account.

20. When you’re done, click or tap Continue.

21. Type your Recovery Key and then click or tap


Confirm.

22. Review the Two-Step Verification conditions and


then click or tap the I Understand the Conditions
Above check box.

23. Click or tap Enable Two-Step Verification.

24. Click or tap Done.

7
Chapter 1 Preparing Security Features

In a few minutes, you’ll receive a verification message from Apple in


your email app.

Add Your Business Details


Once you’ve created your new Apple ID, click or switch to the Apple
Deployment Programs tab in your browser. Click or tap Deploy.apple.com
as you see in Figure 1-5.

Figure 1-5. The link to deploy and continue appears below step 3 on
the webpage

8
Chapter 1 Preparing Security Features

Now you need to add your business details to your DEP application as
follows:

1. In the Deployment Programs webpage, type your


Apple ID and password, and then click or tap Sign
In.

2. Verify your identity using two-step verification by


clicking or tapping the phone number you want to
use (if necessary), and then click or tap Continue.

3. Type the four-digit verification code you received in


the text message on your iPhone and then click or
tap Continue.

4. In the Add Verification Contact Details webpage,


enter the contact information for the person who
can verify that you have the legal authority to sign
up for DEP.

Note If you signed up for DEP and can also supply legal authority,
you need to type a different email address in Step 4 than the one you
used to sign up for DEP.

9
Chapter 1 Preparing Security Features

5. When you’re done, click or tap Next.

6. In the Add Institution Details webpage shown in


Figure 1-6, type your institution information and the
DUNS number.
7. When you’re finished, tap Next.

Figure 1-6. Begin adding your institutional details by typing your


company name in the Company Name box

10
Chapter 1 Preparing Security Features

Tip You can find your DUNS number by clicking the blue help
icon to the right of Company D-U-N-S and then clicking or tapping
“Locate your company’s D-U-N-S Number” in the window. The Dun
& Bradstreet website opens in a new browser tab opens so you can
read all the information the website requires to obtain your DUNS
number.

8. When you receive your DUNS number, copy


the number from the Dun & Bradstreet website
page, return to the Deployment Programs tab in
your browser, and then paste the number in the
Company D-U-N-S box.

9. Return to the Dun & Bradstreet tab, log out, and


then return to the Deployment Programs tab.

10. After you enter the reseller ID number, click or tap


Verify under the number to verify that the number is
correct.

11. Type your address, city, ZIP code, and website


address in the appropriate boxes.

12. Select your state and country from the State and
Country drop-down boxes, respectively.

13. Click the Devices Purchased From check box and


then select whether you purchased your phones
from a reseller (such as Verizon or AT&T) or from
Apple Direct.
14. Enter your Apple customer ID or DEP Reseller ID
number.

11
Chapter 1 Preparing Security Features

Note If you don’t have your DEP Reseller ID number, you can search
for this information on your reseller website.

15. When you’re finished, click or tap Next.

16. After you finish reviewing your enrollment details,


click or tap Submit.

17. Now you need to verify your identity with two-step


notification, so select the phone number you want
to use to verify your identity (if necessary) and then
click or tap Continue.

18. Type the verification code you received in the


messaging app of the device you used, and then
click or tap Continue.

Wait Your Turn


Now the Deployment Programs webpage shows you that your Device
Enrollment Program application is in review. It may take Apple up to five
business days to review your application. When the review is complete,
you’ll receive a phone call from Apple at the number you entered in the
Your Details webpage.
A helpful Apple representative will ask you a few follow-up questions
to ensure that you are who you say you are and that you can meet all
of Apple’s requirements. Once you answer the questions to Apple’s
satisfaction, the representative will tell you that you’re approved, and a
day or two later you’ll receive an email message (see Figure 1-7) telling you
what to do now that you’re approved.

12
Chapter 1 Preparing Security Features

Figure 1-7. A sample DEP approval e-mail from Apple

The Final Steps


Once you’re approved, begin the setup process by clicking or tapping
Sign In within the email message. In the Deployment Programs webpage
in your browser, type your username and password into the appropriate
boxes and then click or tap Sign In.
In the Verify Your Identity webpage, select the phone number where
you want to receive your access code and then click or tap Continue.
(If you only have one phone number, it’s selected automatically.)
After you type the new code in the Enter Verification Code window,
click or tap Continue. Now go through the last four setup steps: The fun
tasks of agreeing to the terms and conditions for the DEP, macOS, iOS, and
tvOS Software License Agreements. It’s up to you if you want to read any of
the Terms and Conditions on each page.
In every page, you need to click or tap the check box to the left of the
“I have read and agree to…” sentence below the terms and conditions, and
then click or tap Agree.

13
Chapter 1 Preparing Security Features

Now You Can Start


Once you’ve agreed to all the terms and conditions, the Welcome webpage
appears (see Figure 1-8). On the left side of the webpage, you can click
links to show a list of company administrators, view more information
about DEP, and refresh your memory about the terms and conditions.
Return to the Welcome webpage by clicking or tapping Deployment
Programs in the upper-left corner of the page.

Figure 1-8. The Get Started link appears to the right of the Device
Enrollment Program logo

In the upper-right corner of the webpage shown in Figure 1-9, click


your name to view a drop-down menu to get your organizational details,
send feedback to Apple, or sign out. You can also click or tap the Help icon
to open the help documentation window.

Figure 1-9. The Help icon is a question mark inside a circle


14
Chapter 1 Preparing Security Features

When you’re ready to start, click or tap Get Started.

Note If the webpage is idle for about 10 minutes, you’re logged out
automatically; if you want to get back in, you’ll need to re-enter your
username, password, and verification code.

Find Your MDM


One of the issues that the Apple representative will remind you about in
your phone conversation is the need to acquire and set up a Mobile Device
Management (MDM) server on your Windows PC or Mac, or from an
MDM provider’s server if you decide to use a cloud-based solution.
An MDM server is an app you need to perform a wide variety of tasks
to manage your company iPhones, including, but not limited to these:

• Securing email messages

• Securing corporate documents

• Remote device locking

• Creating predefined Wi-Fi settings for your office

• Enforcing any other computing policies such as


Internet use

It’s easy to find a list of MDM providers online. Each solution provides
a list of features so you can ensure that it meets your company’s needs.
After you select an MDM provider, you need to add the MDM server to the
DEP so you can configure your iPhone management settings.

15
Chapter 1 Preparing Security Features

For this book, I’ll use SimpleMDM, which is a cloud-based MDM app
you can use from any computer or tablet, and it has a good combination
of features at a low price. It even has a 30-day free trial (see Figure 1-10)
after you sign up. You can access the website and view more information at
https://simplemdm.com/.

Figure 1-10. Scroll up and down the SimpleMDM home page to


learn more about the app

Download, install, and set up your MDM server before you proceed to
the next section.

Note If you decide SimpleMDM is not the right solution for your
business, just type mobile device management into your favorite
search engine to see other MDM app websites and reviews.

16
Chapter 1 Preparing Security Features

Add Your MDM to DEP


Switch or open a new browser tab and open the DEP webpage and
then click or tap Get Started in the Welcome page. The Manage Servers
webpage appears (see Figure 1-11) so you can add your MDM server.

Figure 1-11. There are no MDM servers listed when you open the
Manage Servers screen for the first time

In the upper-left area of the webpage, you see an expanded menu that
includes options to manage your servers and devices, and to view your
assignment history, such as when you assigned an iPhone to your list of
devices to manage.

Note Once you have set up your MDM server, the server may allow
you to add the MDM from its website. Since every MDM is different,
this example uses the Apple DEP website to add your MDM.

Click or tap Add MDM Server to open the Add MDM Server window
and begin the three-step addition process.

17
Chapter 1 Preparing Security Features

Step 1: Enter Your MDM Server Name


Type your MDM server name as shown in Figure 1-12, and then click or
tap Next.

Figure 1-12. Step one of the three-step MDM server addition process

Now you need to download your DEP Public Key from your MDM app.
To do this, click Settings in the menu on the left side of the webpage (see
Figure 1-13) and then click or tap DEP.

Figure 1-13. You only need to pay attention to step 5 in the Add DEP
Account instructions

18
Chapter 1 Preparing Security Features

In the Add DEP Account webpage, click DEP Public Key, which you see
in step 5 within the list of instructions. SimpleMDM downloads the key file
to your browser’s default downloads folder.

Step 2: Add the Key


Return to the DEP webpage tab and add the public key within the Add
window as follows:

1. Click or tap Choose File.

2. Navigate to the downloads folder if necessary and


open the file.

3. Click or tap Next.

Step 3: Get Your Token


After you add the key, click or tap Your Server Token to download from
Apple the server token that you can install on your MDM server. The token
file downloads to your browser’s default downloads folder. When you’re
finished, click or tap Done.

What’s Next?
The Manage Servers webpage list now shows your server name, the
number of devices connected (0), and when the devices were last
connected (Never). Now you need to add the server token to your MDM.
In the Add DEP Account webpage within SimpleMDM, click or tap
Choose File, open the server token file, and then click or tap Upload. Now
you see your DEP account information, which you can update. When
you’re done, click or tap Save. Now you see your DEP account within the
list in the DEP Accounts webpage.

19
Exploring the Variety of Random
Documents with Different Content
36
Ingersoll’s History, i. 120.
37
Serurier to Bassano, July 21, 1813; Archives des Aff. Étr. MSS.
38
National Intelligencer, July 17, 20, 22, 1813.
39
Madison to Gallatin, Aug. 2, 1813; Works, ii. 566.
40
Executive Journal, ii. 388.
41
Monroe to Jefferson, June 28, 1813; Adams’s Gallatin, p. 484.
42
Monroe to Jefferson, June 28, 1813; Adams’s Gallatin, p. 484.
Cf. Madison to the Senate, July 6, 1813; Executive Journal, ii.
381.
43
Hanson to Pickering, Oct. 16, 1813; Pickering MSS.
44
Harrison to Eustis, Aug. 10, 1812; Dawson, p. 273.
45
Harrison to Eustis, Aug. 28, 1812; Dawson, p. 283.
46
Harrison to Eustis, Aug. 28, 1812; Dawson, p. 283.
47
Dawson, p. 296.
48
Winchester to the “National Intelligencer,” Sept. 16, 1816.
49
Eustis to Harrison, Sept. 17, 1812; Dawson, p. 299. Eustis to
Governor Shelby, Sept. 17, 1812. McAffee, p. 117.
50
Dawson, p. 312.
51
McAffee, p. 184.
52
Armstrong to Harrison, April 4, 1813; Armstrong’s Notices, i.
245.
53
Harrison to Secretary of War, Jan. 4, 1813; Dawson, p. 337.
54
Dawson, p. 333. Armstrong’s Notices, i. 63, 86.
55
Dawson, p. 454.
56
Harrison to the Secretary of War, Jan. 4, 1813; Dawson, p.
339.
57
Harrison to the Secretary of War, Jan. 4, 1813; Dawson, p.
339.
58
Harrison to the Secretary of War, Jan. 4, 1813; Dawson, p.
339.
59
Harrison to the Secretary of War, Jan. 8, 1813; Dawson, p.
339.
60
Winchester to the “National Intelligencer,” Sept. 16, 1817;
Major Eves’s Statement; Armstrong’s Notices, i. 203. Cf.
Dawson, p. 443.
61
Winchester’s Statement; Armstrong’s Notices, i. 197.
62
McAffee, p. 230.
63
McAffee, p. 237.
64
Winchester’s Statement; Armstrong’s Notices, i. 199.
65
Winchester to the “National Intelligencer,” Dec. 13, 1817.
66
Winchester to the “National Intelligencer,” Dec. 13, 1817.
67
James, i. 185; Richardson, p. 74.
68
Richardson, p. 75.
69
Winchester’s Statement; Armstrong’s Notices, i. 198.
70
Winchester to the “National Intelligencer,” Dec. 17, 1817.
71
Harrison to the Secretary of War, Jan. 26, 1813; Official
Letters, p. 125.
72
Harrison to Governor Meigs, Jan. 19, 1813; “National
Intelligencer,” Feb. 11, 1813.
73
McAffee, p. 210; Armstrong’s Notices, i. 200.
74
Harrison to the Secretary of War, Feb. [Jan.] 20, 1813; MSS.
War Department Archives.
75
McAffee, p. 233.
76
Dawson, p. 364.
77
Life of Sir George Prevost; App. xxv. p 74. Christie, ii. 115.
78
Return of the whole of the troops engaged at Frenchtown, Jan.
22, 1813; MSS. Canadian Archives, c. 678, p. 18.
79
Christie, ii. 69; James, i. 186; Richardson, p. 75.
80
Proctor’s Report of Jan. 25, 1813; James, i. 418.
81
James, i. 185, 186.
82
Return, etc.; MSS. Canadian Archives, c. 648, p. 18.
83
Richardson, p. 76.
84
Statement of Madison, March 13, 1813; Niles, iv. 83.
85
Richardson’s War of 1812, p. 79.
86
Dawson, p. 362.
87
Dawson, p. 356.
88
Armstrong’s Notices, i. 85.
89
Dawson, p. 370.
90
McAffee, p. 240.
91
Dawson, p. 375.
92
Dawson, p. 373.
93
Armstrong’s Notices, i. 242.
94
Dawson, p. 337.
95
Proctor’s Report of May 4, 1813; Richardson, p. 94; James, i.
196, 429.
96
Lossing, p. 486, note.
97
Richardson, p. 86; James, i. 198.
98
Harrison to Armstrong, May 13, 1813; MSS. War Department
Archives.
99
Richardson, pp. 87, 88. Harrison to Armstrong, May 9, 1813;
MSS. War Department Archives.
100
Richardson, p. 88.
101
Harrison to Armstrong, May 13, 1813; MSS. War Department
Archives.
102
Proctor’s Report of May 14, 1813; James, i. 428; Richardson,
pp. 93, 94.
103
Prevost to Proctor, July 11, 1813; Armstrong’s Notices i. 228.
104
Richardson, p. 111.
105
James, i. 264, 265; Richardson, p. 104; Christie, p. 117.
106
Dawson, p. 408.
107
McAffee, p. 322.
108
McAffee, p. 323.
109
Governor Duncan’s Report, 1834; Armstrong’s Notices, i. 230.
110
Dawson, p. 408.
111
Richardson, p. 105.
112
Proctor to Prevost, Aug. 9, 1813; MSS. Canadian Archives.
113
Life of Prevost, p. 106, note.
114
Governor Duncan’s Report, 1834; Armstrong’s Notices, i. 230.
115
Richardson, p. 104.
116
James, ii. 264.
117
Dawson, p. 407; McAffee, p. 302.
118
Armstrong’s Notices, i. 166, note.
119
Harrison to Armstrong, March 17, 1813; Notices, i. 242.
120
Richardson, p. 110; James, Naval Occurrences, p. 285.
121
Barclay’s Report of Sept. 12, 1813; James, Naval
Occurrences. Appendix, no. 54.
122
McAffee, p. 334.
123
Harrison to Meigs, Oct. 11, 1813; Official Letters, p. 239.
124
Armstrong, i. 171, note; McAffee, p. 286.
125
R. M. Johnson to Armstrong, Dec. 22, 1834; Armstrong, i. 232.
126
Perry to Secretary Jones, Sept. 24, 1813; Official Letters, p.
215.
127
James, i. 269.
128
Richardson, p. 119.
129
Harrison to Meigs, Oct. 11, 1813; Official Letters, p. 239.
130
Richardson, pp. 126, 133, 134.
131
Perry to Secretary Jones, Sept. 27, 1813; Official Letters, p.
220.
132
Harrison to Armstrong, Sept. 27, 1813; Dawson, p. 421.
133
Harrison to Armstrong, Oct. 9, 1813; Official Letters, p. 233.
134
Report of Oct. 23, 1813; MSS. British Archives. Lower Canada,
vol. cxxiii.
135
Richardson, pp. 133, 134.
136
Harrison’s Report, Oct. 9, 1813; Official Letters, p. 234.
137
Narrative of Lieutenant Bullock, Dec. 6, 1813; Richardson, p.
137.
138
Proctor’s Report of Oct. 23, 1813; MSS. British Archives.
139
Richardson, pp. 122, 139.
140
Richardson, p. 136.
141
James, i. 278.
142
Report of Lieutenant Bullock, Dec. 6, 1813; Richardson, p.
140.
143
Harrison’s Report of Oct. 9, 1813; Official Letters, p. 233.
144
R. M. Johnson to Armstrong, Dec. 22, 1834; Armstrong’s
Notices, i. 232.
145
Report of Lieutenant Bullock, Dec. 6, 1813; Richardson, p.
140.
146
Richardson, p. 136.
147
R. M. Johnson to Armstrong, Nov. 21, 1813; MSS. War
Department Archives.
148
Richardson, p. 125. Lewis Cass to Armstrong, Oct. 28, 1813;
MSS. War Department Archives.
149
Return of Right Division, Richardson, p. 129.
150
Prevost to Bathurst, Feb. 14, 1815; MSS. British Archives.
151
W. H. Robinson to Prevost, Aug. 27, 1814; MSS. British
Archives.
152
Prevost to Bathurst, Aug. 27, 1814; MSS. British Archives,
Lower Canada, vol. cxxviii. no. 190.
153
James, i. 140.
154
Report of Major Macdonnell, Feb. 23, 1813; James, i.
Appendix no. 16.
155
State Papers, Military Affairs, i. 608.
156
Armstrong to Dearborn, Feb. 10, 1813; Armstrong’s Notices, i.
221.
157
Note presented to Cabinet, Feb. 8, 1813; Wilkinson’s Memoirs,
iii. Appendix xxvi.; State Papers, Military Affairs, i. 439.
158
State Papers; Military Affairs, i. 440.
159
Distribution of Forces in Canada; Canadian Archives, Freer
Papers, 1812–1813, p. 47.
160
Dearborn to Armstrong, March 9, 1813; State Papers, Military
Affairs, i. 441.
161
Dearborn to Armstrong, March 9, 1813; State Papers, Military
Affairs, i. 442.
162
State Papers, Military Affairs, i. 442.
163
Armstrong to Dearborn, April 19, 1813; State Papers, Military
Affairs, i. 442.
164
State Papers, Military Affairs, i. 442.
165
James, i. 143, 149.
166
Letter of Dearborn, Oct. 17, 1814; Niles, viii. 36.
167
Niles, iv. 238.
168
Table of Land Battles; Niles, x. 154.
169
Dearborn to Armstrong, April 28, 1813; State Papers, Military
Affairs, i. 443.
170
Dearborn to Armstrong, May 13, 1813; State Papers, Military
Affairs, i. 444.
171
James, i. p. 151.
172
Vincent to Sir George Prevost, May 28, 1813; James, i. 407;
Appendix no. 21.
173
Return of killed, etc.; James, i. 410.
174
Morgan Lewis to Armstrong, July 5, 1813; MSS. War
Department Archives.
175
James, i. 203.
176
Armstrong to Dearborn, June 19, 1813; State Papers, Military
Affairs, i. 449.
177
Table of land battles; Niles, x. 154.
178
Morgan Lewis to Armstrong, June 14, 1813; Official Letters, p.
165. Chandler to Dearborn, June 18, 1813; Official Letters, p.
169.
179
Vincent to Prevost, June 6, 1813; James, i. p. 431.
180
Chandler’s Report of June 18, 1813; State Papers, Military
Affairs, i. p. 448.
181
Report of Colonel Harvey, June 6, 1813; Canadiana, April,
1889. Report of General Vincent, June 6, 1813; James, i. p.
431.
182
Morgan Lewis to Armstrong, June 14 (8?), 1813; Official
Letters, p. 165.
183
State Papers; Military Affairs, i. 445.
184
State Papers; Military Affairs, i. 447.
185
State Papers; Military Affairs, i. 448.
186
State Papers; Military Affairs, i. 446.
187
State Papers; Military Affairs, i. 449.
188
Morgan Lewis to Armstrong, July 5, 1813; MSS. War
Department Archives.
189
Memoir of Dearborn, etc., compiled by Charles Coffin, p. 139.
190
Court of Inquiry on Colonel Boerstler, Feb. 17, 1815; Niles x.
19.
191
James, i. 216.
192
Dearborn to Armstrong, June 25, 1813; State Papers, Military
Affairs; i. 449.
193
James, i. 165; Colonel Baynes to Prevost, May 30, 1813;
James, i. 413.
194
Report of Sir George Prevost, June 1, 1813; MSS. British
Archives.
195
Prevost to Bathurst, June 1, 1813; MSS. British Archives.
Prevost’s Life, p. 82, 83.
196
James, i. 165, 166. Brenton to Freer, May 30, 1813; MSS.
Canadian Archives, Freer Papers, 1812–1813, p. 183.
197
Report of Colonel Baynes, May 30, 1813; James, i. 413.
198
Brown to Dearborn, July 25, 1813; Dearborn MSS.
199
Prevost’s Report of June 1, 1813; MSS. British Archives.
200
James, i. 175.
201
Report of Colonel Baynes, May 30, 1813; James, i. 413.
202
Brenton to Freer, May 30, 1813; MSS. Canadian Archives.
Freer Papers, 1812–1813.
203
Quarterly Review, xxvii. 419; Christie, ii. 81; James, i. 177.
204
Brown’s Report of June 1, 1813; Niles, iv. 260.
205
Brown to Dearborn, July 25, 1813; Dearborn MSS.
206
James, i. 165.
207
Return, etc.; James, i. 417.
208
Baynes’s Report of May 30, 1813; James, i. 413.
209
Strictures on General Wilkinson’s Defence; from the Albany
“Argus.” Niles, ix. 425.
210
Armstrong to Wilkinson, March 10, 1813; Wilkinson’s Memoirs,
iii. 341.
211
Armstrong to Wilkinson, March 12, 1813; Wilkinson’s Memoirs,
iii. 342.
212
Autobiography, p. 94, note.
213
Strictures; Niles, ix. 425.
214
Wilkinson, to Armstrong, May 23, 1813; Wilkinson’s Memoirs,
iii. 341.
215
Armstrong’s Notices, ii. 23.
216
Armstrong’s Notices, ii. 23.
217
Scott’s Autobiography, p. 50.
218
Scott’s Autobiography, p. 36.
219
Hampton to Armstrong, Aug. 23, 1813; Wilkinson’s Memoirs,
iii. Appendix xxxvi.
220
Memorandum by Armstrong, July 23, 1813; Wilkinson to
Armstrong, Aug. 6, 1813; State Papers, Military Affairs, i. 463;
Armstrong’s Notices, ii. 31.
221
Armstrong to Wilkinson, Aug. 8, 1813; State Papers, Military
Affairs, i. 464.
222
Armstrong’s Notices, ii. 32.
223
Wilkinson’s Memoirs, iii. Appendix xxxv.
224
Hampton to Armstrong, Aug. 23, 1813; Memoirs, iii. Appendix
xxxvi.
225
Wilkinson’s Memoirs, iii. 358.
226
Hampton to Armstrong, Aug. 31, 1813; MSS. War Department
Archives. Armstrong to Wilkinson, Sept. 6, 1813; Wilkinson’s
Memoirs, iii. Appendix xxxvii.
227
Armstrong’s Notices, ii. 33; Memorandum of July 23, 1813;
State Papers, Military Affairs, i. 463.
228
Minutes, etc.; Wilkinson’s Memoirs, iii. Appendix no. 1.
229
Wilkinson to Swartwout, Aug. 25, 1813; Wilkinson’s Memoirs,
iii. 51.
230
Cf. Wilkinson to Armstrong, Oct. 19, 1813; State Papers,
Military Affairs, i. 472.
231
Armstrong to Wilkinson, Sept. 6, 1813; Wilkinson’s Memoirs, iii.
Appendix xxxvii.
232
Testimony of Brigadier-General Boyd; Wilkinson’s Memoirs, iii.
80.
233
Wilkinson’s Memoirs, iii. 354.
234
Wilkinson’s Memoirs, iii. 357.
235
Wilkinson’s Memoirs, iii. 353.
236
Wilkinson’s Memoirs, iii. 190; Paper A, note.
237
Armstrong to Hampton, Oct. 16, 1813; Wilkinson’s Memoirs, iii.
361.
238
Armstrong to Wilkinson, Oct. 19, 1813; State Papers, Military
Affairs, i. 472.
239
Wilkinson to Armstrong, Oct. 19, 1813; State Papers, Military
Affairs, i. 472.
240
Armstrong’s Notices, ii. 63.
241
Armstrong to Swartwout, Oct. 16, 1813; Wilkinson’s Memoirs,
iii. 70.
242
Council of War, Nov. 8, 1813; Wilkinson’s Memoirs, iii.
Appendix xxiv. Report of Adjutant-General, Dec. 1, 1813,
Appendix vii.
243
Wilkinson to Armstrong, Oct. 28, 1813; MSS. War Department
Archives.
244
General Order of Encampment; Wilkinson’s Memoirs, iii. 126;
Order of October 9, Appendix iii.
245
Minutes etc.; Wilkinson’s Memoirs, iii. Appendix xxiv.
246
Armstrong to Wilkinson, Oct. 27, 1813; Wilkinson’s Memoirs,
iii. Appendix xli.
247
Armstrong to Wilkinson, Oct. 30, 1813; State Papers, Military
Affairs, i. 474.
248
Armstrong to Wilkinson, Nov. 12, 1813; State Papers, Military
Affairs, i. 474.
249
Journal etc.; State Papers, Military Affairs, i. 477.
250
Evidence of General Boyd; Wilkinson’s Memoirs, iii. 84;
Evidence of Doctor Bull; Wilkinson’s Memoirs, iii. 214.
251
Wilkinson’s Memoirs, iii. 364.
252
Autobiography, pp. 93, 94.
253
Wilkinson’s Defence, Memoirs, iii. 451; Ripley’s Evidence,
Wilkinson’s Memoirs, iii. 139.
254
Evidence of General Boyd; Wilkinson’s Memoirs, iii. 85.
255
Wilkinson to Armstrong, Nov. 18, 1813; Niles, v. 235.
256
Evidence of Colonel Walbach; Wilkinson’s Memoirs, iii. 151.
257
James, i. 323–325, 467.
258
Return, etc., State Papers, Military Affairs, i. 476.
259
Morrison’s Report of Nov. 12, 1813; James, i. 451.
260
Journal, Nov. 11, 1813; State Papers, Military Affairs, i. 478.
261
Evidence of Colonel Walbach; Wilkinson’s Memoirs, iii. 145;
Evidence of Colonel Pinkney, iii. 311.
262
Evidence of Brigadier-General Boyd; Wilkinson’s Memoirs, iii.
91.
263
James, i. 242; Christie, ii. 94.
264
Wilkinson to Armstrong, Aug. 30, 1813; State Papers, Military
Affairs, i. 466.
265
Armstrong to Hampton, Sept. 28, 1813; State Papers, Military
Affairs, i. 460. Cf. Armstrong’s Notices, ii. 25.
266
State Papers, Military Affairs, i. 461.
267
Prevost to Bathurst, Oct. 8, 1813; MSS. British Archives.
268
Weekly General Return, Sept. 15, 1813; MSS. Canadian
Archives, Freer Papers, 1813, p. 35.
269
Cf. Wilkinson’s Memoirs, iii. Appendix xxiv.; Council of War,
Nov. 8, 1813; Wilkinson’s Defence, Memoirs, iii. 449.
270
Hampton to Armstrong, Oct. 12, 1813; State Papers, Military
Affairs, i. 460.
271
James, i. 307.
272
Hampton to Armstrong, Nov. 1, 1813; State Papers, Military
Affairs, i. 461.
273
Prevost to Bathurst, Oct. 30, 1813; James, i. 462.
274
Hampton to Armstrong, Nov. 1, 1813; State Papers, Military
Affairs, i. 461.
275
Hampton to Armstrong, Nov. 1, 1813; Wilkinson’s Memoirs iii.
Appendix lxix.
276
Wilkinson to Hampton, Nov. 6, 1813; State Papers, Military
Affairs, i. 462.
277
Hampton to Wilkinson, Nov. 8, 1813; State Papers, Military
Affairs, 462.
278
Wilkinson to Hampton; Wilkinson’s Memoirs, iii. Appendix v.
Wilkinson to Armstrong, Nov. 24, 1813; State Papers, Military
Affairs, i. 480.
279
Wilkinson to Armstrong, Nov. 17, 1813; State Papers, Military
Affairs, i. 478.
280
Armstrong’s Notices, ii. 43.
281
Wilkinson’s Memoirs, iii. 362, note.
282
McClure to Armstrong, Dec. 10, 1813; State Papers, Military
Affairs, i. 486.
283
Armstrong to McClure, Oct. 4, 1813; State Papers, Military
Affairs, i. 484.
284
Wilkinson to Armstrong, Sept. 16, 1813; Sept. 20, 1813; State
Papers, Military Affairs, i. 467, 469.
285
Armstrong to McClure, Nov. 25, 1813; State Papers, Military
Affairs, i. 485.
286
McClure to Armstrong, Dec. 10 and 13, 1813; State Papers,
Military Affairs, i. 486.
287
James, ii. 77.
288
McClure to Armstrong, Dec. 22, 1813; State Papers, Military
Affairs, i. 487.
289
Christie, ii. 140.
290
James, ii. 20, 21.
291
James, ii. 23.
292
Christie, ii. 143; Niles, v. 382.
293
Parton’s Jackson, i. 372.
294
Monroe to Pinckney, Jan. 13, 1813; MSS. War Department
Records.
295
Monroe to Wilkinson, Jan. 30, 1813; MSS. War Department
Records.
296
Annals of Congress, 1812–1813, p. 124.
297
Annals of Congress, 1812–1813, p. 127.
298
Act of Feb. 12, 1813; Wilkinson’s Memoirs, iii. 339.
299
Parton’s Jackson, i. 377.
300
Armstrong to Jackson, March 22, 1813; MSS. War Department
Records.
301
Armstrong to Pinckney, Feb. 15, 1813; MSS. War Department
Records.
302
Armstrong to Pinckney, March 7, 1813; MSS. War Department
Records.
303
Gallatin’s Works, i. 539, note.
304
Gallatin to Monroe, May 2, 1813; Gallatin’s Writings, i. 539.
305
Monroe to Gallatin, May 5, 1813; Gallatin’s Writings, i. 540.
306
Monroe to Gallatin, May 6, 1813; Gallatin’s Writings, 1. 542.
307
Gallatin to Monroe, May 8, 1813; Gallatin’s Writings, i. 544.
308
Armstrong to Wilkinson, Feb. 16, 1813; Wilkinson’s Memoirs,
iii. 339.
309
Minutes of a Council of War, Aug. 4, 1813; Wilkinson’s
Memoirs, i. 498–503.
310
Eustis to Wilkinson, April 15, 1812; Wilkinson’s Memoirs, i.
495.
311
Wilkinson’s Memoirs, i. 507–522.
312
Armstrong to Wilkinson, May 22, 1813; Wilkinson’s Memoirs, i.
521.
313
Armstrong to Wilkinson, May 27, 1813; MSS. War Department
Records.
314
Hawkins’s Sketch, p. 24.
315
U. S. Commissioners to Governor Irwin, July 1, 1796; State
Papers, Indian Affairs, i. 611.
316
Talk of the Creek Indians, June 24, 1796; State Papers, Indian
Affairs, i. 604.
317
Life of Sam Dale, p. 59.
318
Hawkins to the Creek Chiefs, June 16, 1814; State Papers,
Indian Affairs, i. 845.
319
Report of Alexander Cornells, June 22, 1813; State Papers,
Indian Affairs, i. 845, 846.
320
Hawkins to General Pinckney, July 9, 1813; State Papers,
Indian Affairs, i. 848.
321
Hawkins to the Creek Chiefs, March 29, 1813; State Papers,
Indian Affairs, i. 839.
322
Hawkins to Armstrong, Aug. 23, 1813; State Papers, Indian
Affairs, i 851.
323
Report of Alexander Cornells, June 23, 1813; State Papers,
Indian Affairs, i. 846.
324
Letter from Kaskaskias, Feb. 27, 1813; Niles, iv. 135.
325
Hawkins to the Creek Chiefs, March 29, 1813; State Papers,
Indian Affairs, i. 839.
326
Hawkins to Armstrong, March 25, 1813; State Papers, Indian
Affairs, i. 840.
327
Report of the Big Warrior, April 26, 1813; State Papers, Indian
Affairs, i. 843.
328
Report of Nimrod Doyell, May 3, 1813; State Papers, Indian
Affairs, i. 843.
329
Report of Alexander Cornells, June 22, 1813; State Papers,
Indian Affairs, i. 845.
330
Talosee Fixico to Hawkins, July 5, 1813; State Papers, Indian
Affairs, i. 847.
331
Hawkins to Armstrong, July 20, 1813; State Papers, Indian
Affairs, i. 849.
332
Hawkins to Armstrong, Aug. 23, 1813; State Papers, Indian
Affairs, i. 851.
333
Carson to Claiborne, July 29, 1813; Life of Dale, p. 78.
334
Hawkins to Floyd, Sept. 30, 1813; State Papers, Indian Affairs,
i. 854.
335
Pickett’s Alabama, ii. 264.
336
Life of Dale, 106.
337
Hawkins to Armstrong, July 20, 1813; State Papers, Indian
Affairs, i. 849.
338
Hawkins to Floyd, Sept. 30, 1813; State Papers, Indian Affairs,
i. 854.
339
Big Warrior to Hawkins, Aug. 4, 1813; State Papers, Indian
Affairs, i. 851.
340
Report of General Coffee, Nov. 4, 1813; Niles, v. 218.
341
Jackson to Blount, Nov. 11, 1813; Niles, v. 267.
342
Parton’s Jackson, i. 445.
343
Blount to Jackson, Dec. 22, 1813; Parton’s Jackson, i. 479,
480–484.
344
Hawkins’s Sketch, pp. 43, 44.
345
Cocke to the Secretary of War, Nov. 28, 1813; Niles, v. 282,
283.
346
Cocke to White; Parton’s Jackson, i. 451.
347
Floyd to Pinckney, Dec. 4, 1813; Niles, v. 283.
348
Pinckney to Armstrong, Dec. 28, 1813; MSS. War Department
Archives.
349
Pinckney to Jackson, Jan. 19, 1814; MSS. War Department
Archives.
350
Parton, i. 864.
351
Hawkins’s Sketch, p. 45.
352
Jackson to Pinckney, Jan. 29, 1814; Niles, v. 427.
353
Jackson to Pinckney, Jan. 29, 1814; Niles, v. 427.
354
Jackson to Pinckney, Jan. 29, 1814; Niles, v. 427.
355
Pickett’s Alabama, ii. 336.
356
Jackson to Pinckney, Jan. 29, 1814; Niles v. 427.
357
Letter from Milledgeville, March 16, 1814; “The War,” April 5,
1814.
358
Floyd to Pinckney, Jan. 27, 1814; Niles, v. 411.
359
Floyd to Pinckney, Feb. 2, 1814; Military and Naval Letters, p.
306. Hawkins to Armstrong, June 7, 1814; State Papers,
Indian Affairs, i. 858.
360
Pinckney to the Governor of Georgia, Feb. 20, 1814; Niles, vi.
132.
361
Pinckney to Colonel Williams, Dec. 23, 1813; MSS. War
Department Archives.
362
Parton’s Jackson, i. 503.
363
Parton’s Jackson, i. 454.
364
Cocke’s Defence; “National Intelligencer,” October, 1852.
Parton’s Jackson, i. 455. Eaton’s Jackson, p. 155.
365
Parton’s Jackson, i. 511.
366
Col. Gideon Morgan to Governor Blount, April 1, 1814; Niles,
vi. 148.
367
Eaton’s Jackson, p. 156.
368
Jackson to Pinckney, March 28, 1814; Military and Naval
Letters, p. 319.
369
Coffee to Jackson, April 1, 1814; Niles, vi. 148.
370
Colonel Morgan to Governor Blount, April 1, 1814; Niles, vi.
148.
371
Jackson to Governor Blount, March 31, 1814; Niles, vi. 147.
372
Jackson to Governor Blount, April 18, 1814; Niles, vi. 212. April
25, 1814; Niles, vi. 219.
373
Hawkins to Pinckney, April 25, 1814; State Papers, Indian
Affairs, i. 858.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

textbookfull.com

You might also like