Avalanche powered by Wavelink

> Devices > Smart Mobile Device Profiles > Smart Mobile Device Profiles > Compliance Policy (Android/iOS)

Compliance Payload (Android/iOS)

A compliance payload is used to monitor devices to make sure they are in compliance with your company policies. If a device violates one of the rules established in a compliance payload, take actions such as sending a message to the device or restricting access to company resources. Information about device compliance is displayed in the Device Compliance widget on the Dashboards tab.

You can choose more than one vulnerability to monitor in a payload, and you can perform more than one remediation task when a vulnerability is detected. The following section provides sample scenarios of how a compliance policy may be used.

ClosedScenarios

1.The internal expense tracking system should not be accessible by people outside of a physical office for security reasons. The administrator provides a link to the expense tracking system in LD Portal, and then creates a compliance policy that detects if a device is taken outside of a company office (geofence), and disables the links provided in LD Portal so that they are not accessible. When the device re-enters the office, the links are enabled again.

2.Mobile devices provided to end users must have location services enabled so that critical software can use the location information. The administrator creates a compliance policy that detects when location services are disabled, and displays a message on the device informing the end user to enable location services.

3.Enterprise applications shouldn't be allowed on rooted Android devices. The administrator provides those applications using LD Portal, and then creates a compliance policy that detects if an Android device is rooted and denies access to the applications in LD Portal. In addition, a warning message is displayed informing the end user why those applications cannot be used.

A compliance payload has the following options:

Payload Name The name of the payload.

ClosedVulnerabilities

ClosedRemediation


Was this article useful?    

The topic was:

Inaccurate

Incomplete

Not what I expected

Other