2.4.1 Types of security rules
There are three types of security rules: Security policy, Android policy, and iOS profile.
- Security policy
-
This is a policy used to monitor the usage of smart devices. Phone numbers, Web sites, and applications can be set for a security policy. JP1/ITDM2 - SDM checks this policy and smart device usage history, and then issues an event if any use that does not comply with the policy is found. The administrator can detect unauthorized use of a smart device by checking the issued event.
- Android policy
-
This is an operation policy that is set for Android devices. An Android policy can specify password rules and restrict use of the camera function.
- iOS profile
-
This is an operation policy that is set for iOS devices. A configuration profile created by using the iPhone Configuration Utility (provided by Apple) can be registered as an iOS profile. An iOS policy can specify passcode rules and restrict use of the camera function.
The following lists the typical functions that can be disabled or monitored by using security rules:
Function |
Android device |
iOS device |
---|---|---|
Camera |
Can be disabled |
Can be disabled |
Application installation (using App Store) |
Cannot be disabled |
Can be disabled |
Call history |
Can be monitored |
Cannot be monitored |
Web browsing history |
Can be monitored |
Cannot be monitored |
Application use history |
Can be monitored |
Cannot be monitored |
Related Topics