Configuring MTD local actions for Cloud
Using the MobileIron Threat Defense Local Actions configuration, you can set specific local actions to be taken on supported iOS and Android devices when the MTD-enabled client detects a threat. Local actions will only be taken on devices that are licensed and activated for MTD.
Before you begin
Be sure you have configured the items listed in Activating MobileIron Threat Defense.
Procedure
- Log in to MobileIron Cloud.
- Go to Configurations.
- Click +Add.
- Click MobileIron Threat Defense Local Actions.
- In the Create MobileIron Threat Defense Local Actions Configuration page, enter a Name for the configuration.
- Enter an optional Description.
-
In the Configuration Setup section, scroll to the category containing the threat you want to enable.
- Network Threats
- Device Threats
- App Threats
The number of threats are indicated for each threat category.
-
(Optional) Select specific threats and turn notifications on or off for them. To do so:
- Expand the threat category.
- Click the check box for the threats you want to configure. See the following tables for iOS and Android devices.
- Threats with available actions for iOS clients will have a drop-down menu in the Local IOS Action category.
- Threats with available actions for Android clients will have a drop-down menu in the Local Android Action category.
- Click the Show Notification slider to the right of the action menus to enable notification for the threat.
- (Optional) Select multiple threats and click the Set Bulk Local Actions to perform Local Android Action, Local iOS Action, or set Notification on or off. The total number of enabled local actions is displayed for your reference.
- Click Next.
- Select the Enable this configuration option, if it is not already enabled.
-
Select one of the following distribution options:
- All Devices
- No Devices (default)
- Custom
- Click Done.
The following table lists the actions that are available for MTD threats on iOS devices:
Local Compliance Action |
Definition |
None |
No action will be taken on the device. |
Block Email Access and AppConnect Apps |
|
Network Sinkhole |
Isolates the device from the network. |
NOTE: | MobileIron recommends ONLY selecting the Network Sinkhole action for network-related threats. Use of Network Sinkhole action for device and application threats can result in disabling network connectivity to the device without the ability to restore network connectivity. |
The following table lists the actions that are available for MTD threats on Android devices:
Local Compliance Action |
Definition |
None |
No action will be taken on the device. |
Wipe the device |
Retires the device. |
Quarantine - Remove all configurations |
Removes configurations that provide access to corporate resources, such as certificates. Configurations that secure the device are not removed. |
Quarantine - Do not remove Wi-Fi settings for Wi-Fi only devices |
Removes configurations that provide access to corporate resources, such as certificates, with the exception of the Wi-Fi settings on Wi-Fi only devices. Configurations that secure the device are not removed. |
Quarantine - Do not remove Wi-Fi settings for all devices |
Removes configurations that provide access to corporate resources, such as certificates, with the exception of Wi-Fi settings on all devices. Configurations that secure the device are not removed. |
Quarantine - Remove managed apps and block new downloads |
Removes access to the company App Catalog and/or work apps. |
Disable Bluetooth |
Disables Bluetooth to the company App Catalog and/or work apps. |
Disconnect from Wi-Fi |
Disables Wi-Fi to the company App Catalog and/or work apps. |
Editing an MTD local actions configuration
The threat detection list is updated when new threats are identified or existing threats are removed. To edit an MTD local actions configuration to update the threats, use the following procedure:
- Log in to MobileIron Cloud.
- Go to Configurations.
- Select the check box next to the MTD configuration that you want to edit.
- Click Edit. The Edit MobileIron Threat Defense Solution Local Actions Configuration page is displayed.
- Click ^ next to Network, Device, or App Threats to edit the actions for a threat category. This selection controls which notifications are enabled on the device and which mitigation actions are taken locally on the device when a threat is detected. For more information about each threat, hover over the info icon next to the name of the threat.
- (Optional) Select multiple threats and click the Set Bulk Local Actions to perform Local Android Action, Local iOS Action, or set Notification on or off. The total number of enabled local actions is displayed for your reference.
- Click Next.
- Select the Enable this configuration option if required.
-
Select one of the following distribution options:
- All Devices
- No Devices (default)
- Custom
- Click Done.