Skip Navigation

Enforcing compliance rules for devices

You can use compliance profiles to encourage users to follow your organization’s standards for the use of devices. A compliance profile defines the device conditions that are not acceptable in your organization. For example, you can choose to disallow devices that are jailbroken, rooted, or have an integrity alert due to unauthorized access to the operating system.
A compliance profile specifies the following information:
  • Conditions that would make a device non-compliant
  • Email messages and device notifications that users receive if they violate the compliance conditions
  • Actions that are taken if users do not correct the issue, including limiting a user’s access to the organization's resources, deleting work data from the device, or deleting all data from the device
For 
Samsung Knox
 devices, you can add a list of restricted apps to a compliance profile. However, 
BlackBerry UEM
 does not enforce the compliance rules. Instead, the restricted app list is sent to devices and the device enforces compliance. Any restricted apps cannot be installed, or if they are already installed, they are disabled. When you remove an app from the restricted list, the app is re-enabled if it is already installed. 
BlackBerry UEM
 includes a Default compliance profile. The Default compliance profile does not enforce any compliance conditions. To enforce compliance rules, you can change the settings of the Default compliance profile or you can create and assign custom compliance profiles. Any user accounts that are not assigned a custom compliance profile are assigned the Default compliance profile.