![]() After the creation of the app protection policy, simply assign it the applicable user group. These steps are shown below, with an extra focus on the policy settings (see step 5a and 5b). I’ll do that by walking through the steps for creating and configuring an app protection policy. Now let’s start by having a look at the available configuration options. In this post I’ll show the available configuration options, followed by the end-user experience. Really useful, as we all can think of some low-end devices (loaded with malware, almost for free) that should not be used for accessing corporate data. This capability will help with preventing access from untrusted devices to corporate data. That capability actually has two separate actions to choose from, 1) block app access and 2) selective wipe of corporate data within the app. More specifically, this week is all about the just introduced capability to block app access for Android devices with unapproved device manufactures, or for iOS devices with unapproved device models.
0 Comments
Leave a Reply. |