
Enter relevant name in the Content Name field. Select the desired Type. The available content types that
you can upload are Certificates, Images and Device Settings.
• Certificates: the Certificate type allows you to authenticate and register your mobile devices in
the MaaS360 system.
• Images: the Image type allows you to associate an image or a picture file with your document.
• Device Settings: selecting the Device Settings option allows you to upload a policy file that
contains the VPN, EAS and Wi-Fi policy parameters that you wish to apply to all devices that are
registered using the certificate.
Click Browse to select the content file from your local drive, and then click Upload Content. The Upload
Status box displays. Click OK, and the file will appear on the list of policy files.
Click the delete icon under the Actions column if you wish to remove an uploaded policy file.
Compliance Rules
MaaS360 allows you to apply compliance rules on mobile devices. Compliance Rule sets are conditions that
are checked on devices on real-time basis. If a device is not in compliance with the defined rule sets or
conditions, then appropriate enforcement actions will be taken on the device.
Most mobile device platforms allow users to ignore and override passcode policies and application
restrictions. Rules such as the Enforce MaaS360 Control are useful, especially to track users who
accidentally or willfully try to remove their organization’s device management and control capabilities.
It’s a good idea to use Compliance Rules to enforce actions, even if you already publish policies to your
devices.
Compliance rules allow you to take automated actions when a device is out of compliance. For example,
the following rule will be invoked when a user installs a blacklisted app on a device:
Only devices marked as Important on the View All Devices screen will be exempt from the automated
actions that will occur when a device is out of compliance. It is a custom attribute
.
You can choose what action to take, a timeframe for the action (where applicable), and you can send a
custom message to the user.
Select Security > Compliance Rules to access the Compliance Rules screen.
52
Kommentare zu diesen Handbüchern