Manage Android profiles in the Mobile Security Portal
New article with version: 1.28
This article refers to a Resellerpreview
-
Preamble
In a profile permissions, restrictions, password requirements, email settings and security settings are configured.
Several users or user groups (roles) can be assigned to a profile.
Several devices or device groups (devices designated by tags) can be assigned to a profile.
For a large number of devices and users it is recommended to map the assignment via groups.
- Device registration is directly tied to a profile
- A profile must be created first' (and configured) before a device can be registered
In Android Enterprise profiles, numerous security-relevant settings can be made, e.g.
- Disable Kamara
- Disable microphone
- Disable USB file transfer
- Disable outgoing calls
- Disable Bluetooth
- Disable contact sharing
- Disable tethering
- Disable sms
- Enable network only with VPN
- and much more.
Android Enterprise Profiles are used immediately and do not need to be published!
- Outdated Android profiles behave fundamentally different than Android Enterprise Profiles (EMM)
- It is no longer possible to assign a profile to a role, user or tag
Overview of profile management
| ||||
In the profile overview new profiles can be created, existing ones can be edited and deleted. The view of the profiles can be displayed in the list or tile view. You can also view details of existing profiles, update the list of profiles, and publish profiles. | ![]() |
![]() | ||
General Options | ||||
Sorts the tiles by profile name | ||||
Sorts the tiles according to the priority of the profile | ||||
Sorts the tiles in ascending or descending order according to the selected criterion | ||||
Filters on profile tiles that contain the search text | ||||
Add profile | Creates a new profile. The settings in the profile vary depending on the operating system. | |||
Import profile | Existing profiles that were previously exported from the Securepoint Mobile Security Portal can be imported here | |||
Hide generated profiles | Hides the generated profiles | |||
Show / hide details: For a large number of profiles, it can be useful to hide the most important details for clarity. | ||||
/ | Switch between lists and grid view | |||
Refreshes the display | ||||
Profile tile | ||||
Profile-Options | ||||
The button at the top right of each profile tile provides the following options: | ||||
Edit | Editing the settings (see below) | |||
Copy | Copying the profile to the clipboard | |||
Export | Exporting the settings | |||
Delete | Deletes one or more selected profiles | |||
Details displayed in the profile tile: | ||||
Updated | Changes have been made to the profile that have not yet been published! | |||
Partially installed | Not all sub profiles were able to be installed | |||
Profile information | ||||
Type | Profile type (see below) | |||
Roles | Roles | |||
Users | User | |||
Devices | Devices | |||
tags | Tags | |||
Parts | Listing of the sub-profiles that make up the complete Mobile Security Profile. | |||
Copy & paste of profiles | ||||
Click on the logo of the profile tile to mark one or more profiles In the general options, another field now appears under the filter mask: | ||||
Action for selected items | Execute the selected action with Ok | |||
Copies one or more selected profiles to the clipboard | ||||
Deletes one or more selected profiles | ||||
Paste | Inserts a copy of a profile from the clipboard
|
Android profile configuration
GeneralGeneral | ||||||
Caption | Value | Description | ![]() | |||
---|---|---|---|---|---|---|
Name | Name | Displays or enter the profile name | ||||
Devices | Add devices | For existing profiles: if available, display of the assigned devices | ||||
Personal usePersonal use | |||||||||
Caption | Value | Description | ![]() | ||||||
---|---|---|---|---|---|---|---|---|---|
Activate | Activation allows you to configure the personal use of the Android device. | ||||||||
Disable camera | The camera should be deactivated by default. | ||||||||
Disable screen capture | In order to provide data protection, it should not be possible to take screenshots. This also includes blocking screen sharing applications and similar applications (e.g. Google Assistant) that use the system's screenshot functions. | ||||||||
Account types with management disabled | Account types that cannot be managed by the user | ||||||||
Max. days without work | 0![]() |
Controls how long the work profile can remain off. | |||||||
Personal Play Store mode | Nicht spezifiziert | Used together with "Personal apps" to control how apps are allowed or blocked in the personal profile. | |||||||
| |||||||||
Personal applications | Add applications | Guidelines for apps in the personal profile of a company-owned device with a work profile. Each click on the button adds a section Application by customizing an app. | |||||||
Paketname | com.google.android.youtube Select application | The package name of the app. For example, com.google.android.youtube for the YouTube app. Clicking on the button Select application opens the Google Play Store to select the app. | |||||||
Installation type Only appears when an app is selected in Package name. |
Nicht spezifiziert | The way the installation is performed. | |||||||
| |||||||||
Cross-profile guidelines | |||||||||
Activate | Cross-profile policies applied to the device. | ||||||||
Show work contacts in personal profile | Erlaubt | Whether contacts stored in the work profile can be displayed in the contact search in the personal profile and on incoming calls. | |||||||
| |||||||||
Cross-profile copy & paste | Not allowed | Whether text copied from one profile (personal or business) can be pasted into the other profile. | |||||||
| |||||||||
Cross-profile data sharing | Refuse from business to personal profile | Whether data from one profile (personal or business) can be shared with apps in the other profile. Specifically controls simple data sharing via intents. Management of other cross-profile communication channels, such as contact search, copy/paste or connected work & personal apps, are configured separately. | |||||||
| |||||||||
PasscodePasscode | |||||||||||||||||
Caption | Value | Description | ![]() | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Password policies | Add policy | Password policies can be used for work profiles and fully managed devices. | |||||||||||||||
Scope | The scope that the password requirement applies to. | ||||||||||||||||
Device | The policy applies only to fully managed devices | ||||||||||||||||
Work Profile | The policy only applies to work profiles | ||||||||||||||||
Both | The policy applies to fully managed devices as well as devices with a work profile. | ||||||||||||||||
Passcode quality | Complex | The required password quality. | |||||||||||||||
| |||||||||||||||||
Minimum length | 0![]() |
The minimum allowed password length. A value of 0 means there is no restriction. Only enforced when Passcode quality is Numeric, Numeric (Complex), Alphabetic, Alphanumeric, or Complex. | |||||||||||||||
Minimum letters | 0![]() |
Minimum number of letters in the password Forced only if the Password quality is Complex. | |||||||||||||||
Minimum lowercase letters | 0![]() |
Minimum number of lowercase letters required in the password Forced only if the Password quality is Complex. | |||||||||||||||
Minimum uppercase letters | 0![]() |
Minimum number of capital letters in the password Forced only if the Password quality is Complex. | |||||||||||||||
Minimum non letter characters | 0![]() |
Minimum number of non-letters (numeric digits or symbols) required in the password. Forced only if the Password quality is Complex. | |||||||||||||||
Minimum numeric characters | 0![]() |
Minimum number of digits in the password Forced only if the Password quality is Complex. | |||||||||||||||
Minimum symbols | 0![]() |
Minimum number of symbols in the password Forced only if the Password quality is Complex. | |||||||||||||||
Password history length | 0![]() |
The length of the password history. After setting this field, the user won't be able to enter a new password that is the same as any password in the history. A value of 0 means there is no restriction. | |||||||||||||||
Maximum failed attempts | 10![]() |
Number of permitted input attempts before all data on the device is deleted. | |||||||||||||||
Validity | 0![]() |
A duration in days until the password must be changed. A value of 0 means that the password never needs to be changed. | |||||||||||||||
Password unlock required | The amount of time after a device or work profile is unlocked using a strong form of authentication (password, PIN, pattern) that can be unlocked using another authentication method (e.g., fingerprint, trusted agent, face). After the specified period, only strong authentication forms can be used to unlock the device or work profile. | ||||||||||||||||
Nicht spezifiziert | Not specified. By default, the device-timeout is used. | ||||||||||||||||
Device-timeout | The timeout is set to the default setting of the device. | ||||||||||||||||
Daily | The timeout is 24 hours. | ||||||||||||||||
ApplicationsApplications | |||||||||||||||||||||||||||||||||||||||||||||||||||
Caption | Value | Description | ![]() | ||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Applications | Add applications | Adds apps to this profile notempty Apps on EMM-managed devices are configured within the profiles!
| |||||||||||||||||||||||||||||||||||||||||||||||||
Package name | com.google.android.youtube Select application | Package name of the application | |||||||||||||||||||||||||||||||||||||||||||||||||
Install type | Pre install | The way the installation is performed. | |||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||
Default permission policy | Prompt | The default policy for all permissions requested by the app. If set, overrides the default policy-level permission policy that applies to all apps. It does not override the global permission grant, which applies to all apps. | |||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||
Permissions | Add permission | Grants explicit permission or denial for the app. These values override the default permission policy and global permission restrictions that apply to all apps. | |||||||||||||||||||||||||||||||||||||||||||||||||
Permission | The Android permission or group, for example android.permission.READ_CALENDAR or android.permission_group.CALENDAR. | ||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||
Policy | Not specified | The policy for granting authorization. | |||||||||||||||||||||||||||||||||||||||||||||||||
If necessary, further authorizations must be granted or denied here. Note: In the »Approval« field, only the authorizations that the respective app requires and is usually required for proper operation appear. It is recommended to grant necessary permissions in advance and to allow all other permissions only on request (prompt). The »deny« option should only be used for selected authorizations where it is clear that the desired function of the app is not affected by this. | |||||||||||||||||||||||||||||||||||||||||||||||||||
Managed configuration | Manage configuration | Managed configuration applied to the app. The format for the configuration depends on the ManagedProperty values supported by the app. Each field name in the managed configuration must match the key field of the managed property. The field value must be compatible with the ManagedProperty type. | |||||||||||||||||||||||||||||||||||||||||||||||||
Managed Configuration Template | Manage configuration template | This field is ignored if the managed configuration is set. Calls up a template from the app manufacturer in which various parameters can be transferred to the app, depending on what the manufacturer specifies. These can be fixed parameters and variables in email apps:
For a correct function, the button Substitute Wildcard variables (see below) must be activated ! The values are taken from the user settings of the user to whom the respective device is assigned
| |||||||||||||||||||||||||||||||||||||||||||||||||
Disabled | Whether the app is disabled. When deactivated, the app data is still retained. | ||||||||||||||||||||||||||||||||||||||||||||||||||
Minimum version code | 0![]() |
The minimum version of the app that will run on the device. If set, the device will attempt to update the app to at least this version code. If the app is not up to date, the device contains a non-compliance detail with the non-compliance reason APP_NOT_UPDATED. The app must already be published in Google Play with a version code equal or greater than this value. A maximum of 20 apps can set a minimum version code per policy. | |||||||||||||||||||||||||||||||||||||||||||||||||
Delegate areas | The permissions selected here are delegated to the app by the Device Policy Controller. | ||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||
Accessible Track IDs | List of track IDs of the app that an enterprise device can access. If the list contains multiple track IDs, devices get the latest version among all accessible tracks. If the list does not contain any track IDs, devices have access only to the production track of the app. | ||||||||||||||||||||||||||||||||||||||||||||||||||
Connected Work & Personal App | Not specified | Controls whether the app can communicate with itself through a device's work and personal profiles with the user's permission. | |||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||
Login Provider notempty New as of 2.1 |
Login Provider - Use Default Policy | This feature determines whether an app on Android 14 and above is allowed to function as a login provider for managing login credentials. It is relevant for apps that handle authentication or login data, such as password managers or multi-factor authentication apps. | |||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||
Substitute Wildcard variables | (Default) | If activated , the content of the variables $username$ and $emailaddress$ is read from the user settings of the user to whom the respective device is assigned. A click box will appear in which all Users to which this function is to be applied must be selected. If the button is deactivated again, the generated user profiles become editable profiles. | |||||||||||||||||||||||||||||||||||||||||||||||||
Automatic App Updates | Always | The policy enforced on a device to automatically update apps depending on the network connection: Apps should also be updated on devices that rarely or never return to a wireless network. The volume of data usually has little effect with standard volume tariffs. | |||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||
Global default authorization policy | Not specified (prompt) | The default authorization policy for runtime authorization requests. | |||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||
Disable installation of apps | notempty If activated , no installations or Updates are possible. Also not via the portal!
| ||||||||||||||||||||||||||||||||||||||||||||||||||
Disable uninstalling apps | The user should not be able to uninstall any apps. | ||||||||||||||||||||||||||||||||||||||||||||||||||
App Tracks | The app track that the device can access with the policy. The device receives the latest version of all available tracks. If no tracks are specified, the device uses only the production track. | ||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||
Play Store Mode | Allow list | Only apps that are configured here in the policy are available. Any app not included in this policy will be automatically uninstalled from the device. Blocklist means All apps in the Play Store are available, except for those configured here with Installation Type Block! | |||||||||||||||||||||||||||||||||||||||||||||||||
Global permission granting | Add permission | Explicit permission or group grant or deny for all apps. These values override the Default permission policy. | |||||||||||||||||||||||||||||||||||||||||||||||||
Permission | The Android permission or group, for example android.permission.READ_CALENDAR or android.permission_group.CALENDAR. | ||||||||||||||||||||||||||||||||||||||||||||||||||
Policy | Not specified | The policy for granting authorization. | |||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||
Login Provider Default Policy notempty New as of 2.1 |
Not specified (Only apps with a login provider policy) | This feature determines whether an app on Android 14 and above is allowed to function as a login provider for managing login credentials. If it is relevant for apps that handle authentication or login data, such as password managers or multi-factor authentication apps. | |||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||
Notes on using login providers | |||||||||||||||||||||||||||||||||||||||||||||||||||
notempty New as of 2.1 Depending on the selected settings in the options Applications → Login Provider and Login Provider Default Policy various behaviors may arise:
|
NetworksNetworks | ||||||
Caption | Value | Description | ![]() | |||
---|---|---|---|---|---|---|
Always on VPN | ||||||
Enable "Always-On-VPN" | Always sets up a VPN. Enables further settings | |||||
Package name | de.securepoint.ms.agent | The package name of the VPN app. | ||||
Lockdown enabled | If the VPN is not connected, any network connection is prevented. | |||||
Recommended global proxy | ||||||
Activate the global proxy | After activation, a global proxy can be set. | |||||
Host | Hostname | The host of the direct proxy. | ||||
Port | Port number![]() |
The port of the direct proxy. | ||||
Excluded host | Hostnames | For a direct proxy, the hosts for which the proxy is bypassed. The host names can contain wildcards such as * .example.com. | ||||
PAC URI | URI![]() |
The URI of the PAC script used to configure the proxy. | ||||
Network configuration | ||||||
Network configurations | Add configuration | Configuring Access Profiles for WiFi Networks | ||||
Name | ttt-point Headquarters | The name of the configuration | ||||
Type | WiFi | The configuration type is predefined | ||||
Wifi | ||||||
SSID | ttt-point-headquarter-WIFI | The SSID of the network | ||||
Security | WPA-PSK | High security level | ||||
Password | •••••••••• | 'Secure Password Even if it sounds trivial: WIFI.MyCompany.123 or Location.HouseNumber are no secure passwords! Also 1234 and abcd or qwerty are not really secure passwords! | ||||
Hidden SSID | Indicating if the SSID will be broadcast. | |||||
Autoconnect | The device should automatically connect to the network. | |||||
Status reportingStatus reporting | ||||||
Caption | Value | Description | ![]() | |||
---|---|---|---|---|---|---|
Activate the status message | After activation, the configuration of the status reports can be set. | |||||
Hardwarestatus |
Default |
Indicates whether the hardware status message is enabled. | ||||
Application Reports |
Default |
Indicates whether app reports are enabled. | ||||
Software information |
Default |
Indicates whether software info reporting is enabled. | ||||
Working memory information | Indicates whether memory reporting is enabled. | |||||
Display information | Indicates whether the display of reports is enabled. | |||||
Network information |
Default |
Indicates whether the network info message is enabled. | ||||
Device Settings |
Default |
Indicates whether reporting is enabled for device settings. | ||||
Power Management Events | Indicates whether power management event reporting is enabled. | |||||
ComplianceCompliance | |||||||
Rules can be defined for when the telephone or work profile is locked and when it is deleted (factory reset). The user is prompted to activate the selected policy on the device. Otherwise, the device / work profile will be blocked or set to factory defaults / deleted. | |||||||
Caption | Value | Description | ![]() | ||||
---|---|---|---|---|---|---|---|
Rules for enforcing the profile | Regel hinzufügen | A rule that defines the actions to be taken when a device or a work profile does not comply with the policy specified in "Setting name". | |||||
Preference name | Password policy | The password policies must be applied to the phone. | |||||
Block action | |||||||
Block after x days | 1![]() |
Number of days on which the policy is not compliant before the device or work profile is blocked. To block access immediately, the value is set to 0. | |||||
Block scope | Not specified | Specifies the scope of the blocking action. Applies only to devices owned by the company. | |||||
| |||||||
Delete | |||||||
Get factory reset protection | If enabled, the factory settings reset protection is preserved in the profile. In the event of theft or loss, you must first log into your Google Account before the device can be reset to factory defaults. This setting does not work with work profiles. | ||||||
Wipe after x days | 7![]() |
Number of days before the device or work profile is deleted if the policy (here: password policies) has not been implemented on the device. Delete must be greater than Block. | |||||
Sicherheit / VPNSicherheit / VPN | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
notempty The Security tab is only available if a Mobile Security license is present.
EMM licenses do not have VPN functionality that enables these security functions. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Caption | Value | Description | ![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Allow Suspend Always-On-VPN | Allow Suspend Always-On-VPN | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Allow other VPN profiles | Adding other VPN profiles in addition to the Securepoint Security profile shall not be allowed. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Authentifizierung nach App-Start erforderlich notempty New as of 2.1 |
Wenn aktiviert, ist eine Authentifizierung (PIN oder biometrisch) beim App-Start erforderlich. Diese muss der User festlegen. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Activate Securepoint Mobile Security | With Activation, the Securepoint Mobile Security app is added or removed in the Applications tab and can be configured here. This is required to configure the security settings. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Protocol | TCP | The protocol TCP or UDP used for the VPN tunnel | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Portfilter Type | Open | Filter network traffic based on network ports. Closed Open Selection | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Port filter rule selection Appears when Port filter type Selection is selected |
Communication VPN | Specify which port collections are open for network traffic
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
SSL-Interception | Default | SSL traffic from web pages listed in the content filter whitelist is not intercepted, other pages are checked using SSL interception. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Content-Filter Allowlist | Updates und wichtige Dienste | Click box: Web pages that are to be added to a whitelist. Possible entries: Contentfilter | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Content-Filter Blocklist | HackingProxyThreat Intelligence Feed | Click box: Websites that are to be added to a blacklist. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Exclude local WLAN from VPN | If enabled , a route is added that excludes the local WLAN IP range from the tunnel | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Disable VPN for SSIDs | SSIDs hinzufügen | Enter WiFi SSIDs for which the security features shall be disabled. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Exclude IP addresses from VPN | Add IPs | Enter IP addresses or networks for which the security functions are to be bypassed, i.e. the individual host 222.222.222/32 or the entire subnet 123.123.123.0/24. Use the cursor keys to navigate within the mask | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Exclude apps from VPN | Add package name | Enter the package names of the apps that are to bypass the VPN service | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
VPN-Konfigurationen | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
notempty New as of: 1.32 Zeigt eine Auflistung sämtlicher Roadwarrior-Verbindungen an, die mit diesem Profil verbunden sind. Über können neue Verbindungen erstellt werden. Weitere Informationen sind im folgendem Wiki-Artikel zu finden. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Roadwarrior: | Aliasname der Roadwarrior-Verbindung, das Transfernetz, die Core-UTM und die benutzten IPs. Per Klick auf den Aliasnamen erfolgt eine Weiterleitung auf die entsprechende VPN-Konfiguration. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Autostart: | Bei Aktivierung wird diese Verbindung sofort gestartet, wenn sie als aktive Verbindung ausgewählt wird. Bei einem Verbindungsabbruch wird sie automatisch neu gestartet. Diese Einstellung kann auf dem Gerät vom Benutzer selbst anschließend verändert werden. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
LocalizeLocalize | ||||||
Caption | Value | Description | ![]() | |||
---|---|---|---|---|---|---|
Enable localization function | Adds functionality to find the devices assigned to this policy. This functionality is limited to fully managed devices only. | |||||