Advanced phishing protection for managed devices
From MobileIron
Enable Threat Management Console anti-phishing VPN
Procedure
- Log into Threat Management Console.
- Click the Policy tab.
-
From the Policy page, click Phishing Policy. The phishing policy configuration page displays.
Figure 1. Threat Management Console Phishing Policy page
-
In the Selected Group field, select the group to receive phishing protection.
-
Select from the following options:
-
Enable phishing protection and activate zIPS URL sharing – Enabled by default. Check this option to enable Threat Management Console phishing protection.
NOTE: Users who launch a device-level VPN app such as PulseSecure or GlobalProtect from their device will disconnect the MobileIron anti-phishing VPN, which disables the anti-phishing solution on the device. The device user must navigate back to Settings > VPN settings and re-select MobileIron anti-phishing VPN to re-enable anti-phishing protection. -
Local VPN for Phishing
-
Enable phishing protection and activate zIPS local VPN – Enabled by default. Check this option to enable a local phishing VPN.
-
Allow user control – Disabled by default. This option cannot be enabled.
-
Block detected phishing URLs – Enabled by default. Check this option to block phishing URLs when they are detected on a device.
NOTE: Do not disable Phishing Policy option "Block detected phishing URLs." If disabled, users will see a non-working notification.
-
-
Enable content inspection on remote server - Disabled by default. This option allows the Threat Management Console to access a much larger database of blacklisted sites than the sites available on the device, providing multilevel protection.
-
-
Click Deploy to distribute the phishing protection policy to the selected device group. For iOS clients, anti-phishing is enabled.
-
For Android clients, proceed to Android anti-phishing using MobileIron Tunnel app.