Views:

For iOS Devices

Protection Strength:

  • HIGH - This is the most rigorous level of mobile threat detection. Mobile Security scans all apps and/or files for potentially suspicious threats, but there is greater
  • chance of false positives.
  • MEDIUM ( Recommended) - This is the default and recommended setting. Mobile Security scans at a high level of mobile threat detection with a moderate chance of producing false positives.
  • LOW - This is the most lenient level of mobile threat detection. Mobile Security will only scan for the most obvious and common threats, but there is a very low chance that it will produce false positives.
  • CUSTOM - Customize your policy based on your own needs and requirements.

Wi-Fi scan criteria:

  • Enable / Disable Network Traffic Decryption
  • Enable / Disable Unsafe Access Point

Configuration scan criteria:

  • Jailbroken device - Mobile Security scans the iOS device if it had been jailbroken.
  • Lock screen disabled - scans the iOS device if the iOS lock screen is disabled or not working.
  • Outdated OS - Scans the iOS version of the device and matches it with the latest supported version available.
  • Vulnerable OS - Checks for possible vulnerabilities in the operating system of the device.
  • Web Reputation Security Levels:
  • High - Block websites that are:
    • Dangerous - Verified to be fraudulent or known sources of threats
    • Highly suspicious - Suspected to be fraudulent or possible sources of threats
    • Suspicious - Associated with spam or possibly compromised
  • Medium ( Recommended) - Block websites that are:
    • Dangerous - Verified to be fraudulent or known sources of threats
    • Highly suspicious - Suspected to be fraudulent or possible sources of threats
  • Low - Block websites that are:
    • Dangerous - Verified to be fraudulent or known sources of threats
  • Web URL Exceptions
    Administrators can Add and Delete the specific URL/s on any of the following categories:
    • Allowed lists
    • Blocked lists
The policy will not be necessarily applied to all the targets specified below. If a user belongs to multiple groups and assigns multiple policies, the system will use the policy with a higher priority.

For Android Devices

Protection strength:

  • HIGH - This is the most rigorous level of mobile threat detection. Mobile Security scans all apps and/or files for potentially suspicious threats, but there is greater chance of false positives.
  • MEDIUM ( Recommended) - This is the default and recommended setting. Mobile Security scans at a high level of mobile threat detection with a moderate chance of producing false positives.
  • LOW - This is the most lenient level of mobile threat detection. Mobile Security will only scan for the most obvious and common threats, but there is a very low chance that it will produce false positives.
  • CUSTOM - Customize your policy based on your own needs and requirements.
  • Available scan options
    • Scan installed apps only
    • Scan installed apps and APK files
    • Scan installed apps and all files
  • Malware scan criteria lists
    • Malicious behavior
    • Repackaging
    • Privacy leakage
    • Vulnerability

Wi-Fi scan criteria:

  • Enable / Disable Network Traffic Decryption
  • Enable / Disable Unsafe Access Point

Configuration scan criteria - Checks the following if these configurations are active on the Android Devices:

  • Developer mode enabled
  • Rooted device
  • Lock screen disabled
  • Outdated OS
  • Outdated security patch
  • USB debugging enabled
  • Web Reputation Security Levels:
  • High - Block websites that are:
    • Dangerous - Verified to be fraudulent or known sources of threats
    • Highly suspicious - Suspected to be fraudulent or possible sources of threats
    • Suspicious - Associated with spam or possibly compromised
  • Medium (Recommended) - Block websites that are:
    • Dangerous - Verified to be fraudulent or known sources of threats
    • Highly suspicious - Suspected to be fraudulent or possible sources of threats
  • Low - Block websites that are:
    • Dangerous - Verified to be fraudulent or known sources of threats
  • Web URL Exceptions
    Administrators can Add and Delete the specific URL/s on any of the following categories:
    • Allowed lists
    • Blocked lists
The policy will not be necessarily applied to all the targets specified below. If a user belongs to multiple groups and assigns multiple policies, the system will use the policy with a higher priority.