Advanced phishing protection for iOS devices

From Core 10.7.0.0 through the most recently released version as supported by MobileIron, you can enable Threat Management Console advanced phishing protection to MTD-enabled iOS devices without any client user action. This tool provides full coverage against risky URLs through an automatically enabled, on-device VPN.

Procedure 

  1. Log into Threat Management Console.
  2. Click the Policy tab.
  3. From the Policy page, click Phishing Policy. The phishing policy configuration page displays.
     

  4. In the Selected Group field, select from the groups you created in Creating compliance policy rules and groups.

  5. Select from the following options:

    • Enable phishing protection and activate zIPS URL sharing - Enabled by default. Check this option to enable phishing protection.

    • Local VPN for Phishing
      • Enable phishing protection and activate zIPS local VPN - Enabled by default. Check this option to enable a local phishing VPN.
      • Allow user control - Disabled by default. This option cannot be enabled.
      • Block detected phishing URLs - Enabled by default. Check this option to block phishing URLs when they are detected on a device.

        NOTE: Do not disable Phishing Policy option "Block detected phishing URLs." If disabled, users will see a non-working notification.
    • Enable content inspection on remote server - Enabled by default. This option allows the Threat Management Console to access a much larger database of blacklisted sites than the sites available on the device, providing multi-level protection.

  6. Click Deploy to distribute the phishing protection policy to the selected device group.