Skip Navigation

Configure compliance actions to take when network threats are detected

When an insecure network or insecure
Wi-Fi
access point is detected,
UEM
considers the device to be out of compliance. You can configure and assign a compliance profile to users so that
UEM
can take the appropriate action. For more information about creating and configuring compliance profiles, see Enforcing compliance rules for devices in the
UEM
administration content.
When you first implement insecure network or
Wi-Fi
access point detection, it is recommended that you use the monitor and log option before you implement actions that are potentially more disruptive. After monitoring compliance activity for an appropriate amount of time, you can then implement the desired actions (for example, preventing users from using
BlackBerry Dynamics
apps until the device is compliant).
  1. In the management console, on the menu bar, click
    Policies and profiles > Compliance > Compliance
    .
  2. Create a new compliance profile or select and edit an existing compliance profile.
  3. Configure compliance actions:
    Task
    Steps
    Configure compliance actions for insecure network detection
    1. On the
      iOS
      and
      Android
      tabs, in the
      CylancePROTECT
      section, select the
      Insecure network detected
      check box.
    2. For
      Android
      devices, in the
      Enforcement action for device
      drop-down list, choose one of the following:
      • To log information about the compliance issue without taking a compliance action, click
        Monitor and log
        .
      • To prevent the user while it is out of compliance, click
        Untrust
        . Note that this option does not impact
        BlackBerry Dynamics
        apps. Data and apps are not deleted from the device.
    3. In the
      Enforcement action for BlackBerry Dynamics apps
      drop-down list, choose one of the following options:
      • To log information about the compliance issue without taking a compliance action for
        BlackBerry Dynamics
        apps, click
        Monitor and log
        .
      • To prevent the user from accessing
        BlackBerry Dynamics
        apps while the device is out of compliance, click
        Do not allow BlackBerry Dynamics apps to run
        .
    Configure compliance actions for insecure
    Wi-Fi
    access point detection
    1. On the
      iOS
      and
      Android
      tabs, in the
      CylancePROTECT
      section, select the
      Insecure Wi-Fi network detected
      check box.
    2. In the
      Enforcement action for device
      drop-down list, choose one  of the following:
      • To log information about the compliance issue without taking a compliance action, click
        Monitor and log
        .
      • To prevent the user from accessing work resources and apps on the device while it is out of compliance, click
        Untrust
        . Note that this option does not impact
        BlackBerry Dynamics
        apps. Data and apps are not deleted from the device.
    3. In the
      Enforcement action for BlackBerry Dynamics apps
      drop-down list, choose one of the following options:
      • To log information about the compliance issue without taking a compliance action for
        BlackBerry Dynamics
        apps, click
        Monitor and log
        .
      • To prevent the user from accessing
        BlackBerry Dynamics
        apps while the device is out of compliance, click
        Do not allow BlackBerry Dynamics apps to run
        .
  4. Click
    Save
    .
  • Assign the profile to users and groups.
  • For users with the user privacy and
    Samsung Knox
    activation types, the
    UEM Client
    and
    BlackBerry Dynamics
    apps will not show compliance notifications for this feature on the device, but compliance notifications will display as expected in the management console.
  • In the management console, you can view information about compliance violations, including the unsafe network SSID, the unsafe
    Wi-Fi
    protocol, and the breach condition. You can also use the compliance event screen to monitor and track compliance events.