Configuring Mobile Policies

Configure mobile policies for your organization based on your security requirements.

  1. On the Trend Micro Vision One console, go to Mobile Security > Mobile Policy.
  2. Click the Android or iOS tab.
  3. Click Create or click the name of an existing policy.
  4. On the General screen, specify a policy name and select the protection strength that best suits your needs, or click Custom to customize your own policy.

    If you select your preferred protection strength, the system will provide predefined settings accordingly in subsequent steps. You can still modify them during later configuration. Once you modify them, the protection strength will change to Custom.

  5. (For Android only) Configure Malware Detection settings.
    1. Click Malware Detection.
    2. Choose the scan scope.
    3. Configure malware scan criteria.
      • Malicious behavior

      • Repackaging

      • Privacy leakage

      • Vulnerability

  6. Configure Wi-Fi Protection settings.
    1. Click Wi-Fi Protection.
    2. Configure Wi-Fi scan criteria.
      • Network traffic decryption

        The Wi-Fi network traffic is decrypted, which may result in data leakage.

      • Unsafe access point

        The device is connected to an insecure Wi-Fi network.

  7. Configure Configuration Manager settings.
    1. Click Configuration Manager.
    2. Configure configuration scan criteria.

      Criteria

      Description

      Android/iOS

      Developer mode enabled

      The developer mode is enabled.

      Android only

      Rooted device

      The device is rooted.

      Android only

      Outdated security patch

      The device security patch is out of date.

      Android only

      USB debugging enabled

      USB debugging is enabled.

      Android only

      Jailbroken device

      The device is jailbroken.

      iOS only

      Lock screen disabled

      • (For Android) The device is not locked with a PIN, pattern, or password.

      • (For iOS) The device is not locked with a passcode, Touch ID, or Face ID.

      Both

      Outdated OS

      The device operating system is out of date.

      Both

      Vulnerable OS

      The device operating system is vulnerable.

      Both
  8. Configure Web Reputation settings.

    Trend Micro Web Reputation technology assigns websites a "reputation" based on an assessment of the trustworthiness of a URL, derived from an analysis of the domain.

    1. Click Web Reputation.
    2. Select a security level.
    3. (Optional) To automatically approve or block certain websites, specify the URLs and add them as exceptions.
  9. Configure policy targets.
    1. Click Targets.
    2. Specify one or more users or Active Directory groups.
  10. Click Save.
  11. (Optional) Click Continue if you are prompted to confirm the policy changes.
    Note:

    This step is required only if you have added or deleted policy targets when editing a policy.