Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Introduction > New account configuration > Customize user policies and device profiles
Customize user policies and device profiles
TRITON Mobile Security Help | Mobile Security Solutions
Related topics:
Policies govern end users' device usage. A policy is made up of 2 device profiles where you can configure security requirements, allowed device and application functions, and Wi-Fi and email settings. For more information on policies, see Policy Management.
The Mobile tab of the Cloud TRITON Manager includes a predefined policy template that can be customized to meet your needs, see The Default policy. You can also create your own custom policies, see Adding a policy.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Introduction > New account configuration > Customize user policies and device profiles
Copyright 2016 Forcepoint LLC. All rights reserved.