Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Administration
Evaluation Guide | Mobile Security Solutions
Mobile Security provides extensive logging and reporting, and can track events that may require your immediate attention, alerting you when necessary.
Logging and Reporting
You may have a privacy policy that forbids the logging of traffic from personal owned devices. By default, logging is enabled for devices with the corporate profile, but is disabled for devices with the personal profile. This can be configured by navigating to General > Policies > [policy name] > Corporate/Personal profile and selecting or deselecting Log all traffic.
Mobile Security provides several reporting tools for viewing trends and statistics for registered users, devices, and administrative actions. On the General > Reporting screen you can generate reports based on users, devices, and administrative actions.
*
User Summary reports: User reports display information about users with registered mobile devices. With user reports, you can generate summaries of mobile users per user group, top bandwidth users, and bandwidth use trends by user and user group.
*
Device Summary reports: Use device reports to review summaries of registered devices. With device summary reports, you can generate reports on devices by type, the most installed applications, and device details by user.
*
Actions Summary reports: Use actions reports to generate summaries of administrative actions (For example: wiping or locking a device, or clearing the passcode on a device) completed per device or user group over time, top devices for a specific administrative action, and completed action details.
For more information on generating reports, see the Reporting section of the TRITON Mobile Security Help document.
Job Queue and Alerts
The General > Job Queue page lists the currently scheduled jobs (or administrative actions) for users and devices. From this page you can view and delete scheduled jobs. You can search for a particular job by Device Name, User, or Job Type. Enter a search term and click Search to begin the search. Click Show all to remove the current search term.
You are also notified via email of events that may adversely affect your enterprise security. For example, email notifications are sent:
*
*
*
*
*
*
*
*
The notification includes details about the job. You can verify the device status and decide to ignore the tasks or re-initiate them.
*
*
*
*

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Copyright 2016 Forcepoint LLC. All rights reserved.