Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Getting Started with TRITON Mobile Security > Step 6: Customize policies and device profiles
Step 6: Customize policies and device profiles
Getting Started Guide | Mobile Security Solutions
Policies govern end users' device usage. TRITON Mobile Security includes a predefined policy template that can be customized to meet your needs. You can also create your own custom policies.
Policies are made up of corporate and personal device profiles. These govern what functions will be allowed or blocked on each device as well as things like Wi-Fi and email settings.
Corporate profiles are typically more strict than personal profiles. By default, corporate profiles are assigned to corporate devices and personal profiles to personal devices.
Before you get started, configure the corporate and personal profiles used by your policies.
1.
In the Mobile tab, select General > Policies.
2.
 
3.
 
4.
Under Restrictions > Traffic and Filtering:
a.
Select Use a PAC file to apply your company Web policy.
b.
For the cloud service, if you want to copy the policy-specific PAC file URL, go to the General tab for that policy.
*
Go to Web Security > Policy Management > Policies.
*
For the hybrid solution, retrieve the PAC file URL from the Hybrid User Identification page under Settings > Hybrid Configuration.
5.
6.
Click Save.
7.
8.
When you're done, proceed to Step 7: Register mobile devices with the system.
 
Note 

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Getting Started with TRITON Mobile Security > Step 6: Customize policies and device profiles
Copyright 2016 Forcepoint LLC. All rights reserved.