Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Managing devices > Device jailbreaking
Device jailbreaking
TRITON Mobile Security Help | Mobile Security Solution
Occasionally users want to remove the limitations imposed on their devices by the iOS operating system or circumvent security features on their devices. One way to do so is by hacking into their device operating system using hardware or software exploits. This is known as jailbreaking.
Jailbreaking gives users root access to the operating system so they can configure their Exchange or corporate VPN access privileges or erase the TRITON Mobile Security profile if they want. They can also download apps, extensions, and themes that are unavailable through the Apple App Store.
Jailbroken devices compromise your enterprise security.
To safeguard your information assets, Mobile Security prevents jailbroken devices from registering with the system.
In addition, if it detects that a registered device becomes jailbroken, it does several things:
1.
2.
It adds an alert to the General > Alerts page on the Cloud Security portal. On this page, it lists the number of compromised devices and gives a link to a filtered device view.
3.
It logs the incident for reporting purposes. You can view reports to see who has jailbroken (General > Reporting > Jailbroken Devices). Once you see which devices have been compromised, you may choose to perform a remote wipe to protect your assets. The system resets devices when they are wiped so they can reregister with the system.
 

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Managing devices > Device jailbreaking
Copyright 2016 Forcepoint LLC. All rights reserved.