Security check items – H3C Technologies H3C Intelligent Management Center User Manual
Page 32

16
3.
Configure check items to meet the network security requirements and configure an MDM
collaboration policy.
4.
Select a security level and configure the security mode and device action for each check item.
The following security modes are supported for smart devices:
{
Kick out
{
Isolate
{
Inform
{
Monitor
The following device actions are supported:
{
Lock
{
Wipe corporation data
{
Wipe data
5.
To isolate access users that fail the security check, configure an isolation mode and isolation rules.
6.
Configure a security policy to associate the selected security level with check items, isolation mode,
and MDM collaboration policy.
7.
To configure security policies for different access scenarios, repeat step 3 through step 6.
8.
Configure access services and associate them with security policies.
9.
Audit MDM security logs to identify any new trend of security threats in the network.
10.
Adjust the security policies, security levels, and isolation rules based on audit results.
Security check items
Security check items for smart devices vary with the MDM vendor.
Citrix provides the following check items:
•
Endpoint enrollment check
•
Endpoint compliance check
•
Jailbreak or root permission check
•
Storage encryption check
MobileIron provides the following check items:
•
Endpoint registration check
•
Endpoint compliance check
•
GPS service check
•
Auto-lock check
•
Bluetooth service check
•
Camera service check
•
Jailbreak or root permission check
•
Password lock check
•
Storage encryption check