Configure mobile policies for your organization based on your security requirements.
If you select your preferred protection strength, the system will provide predefined settings accordingly in subsequent steps. You can still modify them during later configuration. Once you modify them, the protection strength will change to Custom.
Malicious behavior
Repackaging
Privacy leakage
Vulnerability
Network traffic decryption
The Wi-Fi network traffic is decrypted, which may result in data leakage.
Unsafe access point
The device is connected to an insecure Wi-Fi network.
Criteria |
Description |
Android/iOS |
---|---|---|
Developer mode enabled |
The developer mode is enabled. |
Android only |
Rooted device |
The device is rooted. |
Android only |
Outdated security patch |
The device security patch is out of date. |
Android only |
USB debugging enabled |
USB debugging is enabled. |
Android only |
Jailbroken device |
The device is jailbroken. |
iOS only |
Lock screen disabled |
|
Both |
Outdated OS |
The device operating system is out of date. |
Both |
Vulnerable OS |
The device operating system is vulnerable. |
Both |
Trend Micro Web Reputation technology assigns websites a "reputation" based on an assessment of the trustworthiness of a URL, derived from an analysis of the domain.
This step is required only if you have added or deleted policy targets when editing a policy.