These are cumulative release notes. If a release does not appear in this section, then there are no associated limitations.
AC-22037: The Out of Compliance App threat is not consistently being detected, thus causing the local action not to trigger.
IOS-17838: On iOS 16.0.x versions, phishing URLs are not blocked after the Mobile@Work for iOS upgrade.
Workaround: Upon rebooting the device, phishing URLs are successfully blocked.
Android (Tunnel) limitations
TA-1488: Some URLs are not being blocked as expected, when added to the Access Control List (ACL).
TA-1476: After Tunnel with MTD is installed, the blocking of phishing websites can take between 5 and 20 minutes to become active.
Workaround: Toggle the Tunnel VPN off and back on to start anti-phishing working immediately.
TA-1462: When Tunnel is configured for MTD only (without Sentry or Access), blocked phishing URL notifications sometimes do not display as expected.
IOS-17229: When an iOS client user tries to access a risky URL on their MTD-enabled device, a notification appears, explaining the potential risk. The message asks the user to select either Go Back or Allow this Link. Due to a vendor limitation, the Allow this Link option continues to block access to the risky URL. Ivanti is tracking the issue.
AC-21018: When upgrading or registering Android devices to Mobile@Work client version 184.108.40.206, the user may see an unnecessary pop-up asking them to enable a VPN connection if, in the MTD console, either of these options are selected:
- Allow User Control
- Enable Phishing Protection and Activate zIPS for VPN
Workaround: To prevent the pop-up, make these configuration changes in the MTD console before doing upgrades and new registrations:
- Disable (uncheck) Enable phishing protection and activate zIPS local VPN.
- Enable (check) Allow User Control.
- Enable (check) Enable content inspection on remote server in the MTD console Phishing Policy (once user control is enabled). If the pop-up does display, the user should select OK to proceed.