beautypg.com

Security check items – H3C Technologies H3C Intelligent Management Center User Manual

Page 32

background image

16

3.

Configure check items to meet the network security requirements and configure an MDM

collaboration policy.

4.

Select a security level and configure the security mode and device action for each check item.
The following security modes are supported for smart devices:

{

Kick out

{

Isolate

{

Inform

{

Monitor

The following device actions are supported:

{

Lock

{

Wipe corporation data

{

Wipe data

5.

To isolate access users that fail the security check, configure an isolation mode and isolation rules.

6.

Configure a security policy to associate the selected security level with check items, isolation mode,
and MDM collaboration policy.

7.

To configure security policies for different access scenarios, repeat step 3 through step 6.

8.

Configure access services and associate them with security policies.

9.

Audit MDM security logs to identify any new trend of security threats in the network.

10.

Adjust the security policies, security levels, and isolation rules based on audit results.

Security check items

Security check items for smart devices vary with the MDM vendor.
Citrix provides the following check items:

Endpoint enrollment check

Endpoint compliance check

Jailbreak or root permission check

Storage encryption check

MobileIron provides the following check items:

Endpoint registration check

Endpoint compliance check

GPS service check

Auto-lock check

Bluetooth service check

Camera service check

Jailbreak or root permission check

Password lock check

Storage encryption check