Go to the table of contents Go to the previous page Go to the next page View or print as PDF
TRITON Mobile Security Evaluation Guide > Mobile Device Management (MDM)
Mobile Device Management (MDM)
Evaluation Guide | Mobile Security Solutions
With Mobile Security, you can view the device type and operating system of registered devices, customize logging and filtering for corporate and personal devices, allow end users to remotely wipe, lock, or clear the passcode from their mobile devices, and device controls for compliance and data loss/theft prevention.
Managing Devices
Devices must first be registered with Mobile Security before they can be managed. Users register their devices by clicking a link on a notification email message they receive and following a wizard on a registration portal. See the Getting Started Guide for complete instructions.
After devices are registered, you can view information about the device by clicking on the Devices tab. This page lists all your devices, as well as some basic information about the device, user, and policy currently associated with that device.
You can view more detailed information by clicking on the device name. This information is updated daily when the device is available, but can also be refreshed by clicking Update Device Information on this page.
Customizing Profiles
Mobile Security allows the option to use separate profiles for corporate and personal devices (BYOD). These can be managed by navigating to Policies > [policy name] > Corporate/Personal Profile. Profiles are installed on the device at the time of registration.
If you need to be more granular in how you manage policies for different devices, you can customize the profile for individual devices. On the Devices > Edit Device page, click Customize Selected Profile to open the Customize profile page. Changes you make on the Customize profile page will only affect the selected device and the new customized profile is not available to assign to other devices.
End-User Device Management
End users can be allowed to perform a remote wipe, lock, and clear passcode from the end-user Device Management portal.
These settings are configured on the General > End-User Settings page. The features that can be enabled are:
*
*
*
Here you can also modify the text for the registration email, as well as upload a custom end-user usage agreement. After adding a custom usage agreement, you must select the agreement on the edit profile page.
The end-user Device Management portal can be accessed by navigating to https://mobile.websense.net/hosted/selfservice.html. Users can log on with either their Cloud Security or network credentials.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
TRITON Mobile Security Evaluation Guide > Mobile Device Management (MDM)
Copyright 2016 Forcepoint LLC. All rights reserved.