Device Management Policies
To assign or reassign a mobile device, Seqrite Enterprise Mobility Management has the ability to make the following changes: Assign mobile device, Change the name of the mobile device, and Reassign the mobile device to another user.
These actions will depend on the internal policies or standards applied in the organization.
This chapter includes the information about how to add and edit a device and export and import devices.
Adding Devices
To add a new device, follow these steps:
- Log on to the Seqrite EMM console and in the left pane, click Devices > Add Device > Add. The Add Device page is displayed.
- Enter Device Name, Ownership, Owner, and Group. The default policy is assigned by default when a new device is added to the Seqrite Enterprise Mobility Management console.
- Select the group. The policy is applied by default.
- Click Save.
- The device is added successfully. Enroll the device using the details.
To know about how to enroll a device, see Enrollment
–>
Additional Actions
On the Device screen, you can carry out a number of actions. To carry an action on a device, follow these steps:
-
Log on to the Seqrite EMM console and in the left pane, click Devices.
-
On Devices page, select a device and click the Edit icon.
On the Device Details page, you can perform any of the following actions.
-
Overview: Helps you to view the device details, hardware storage, perform enrolment for Seqrite Enterprise Mobility Management and Workspace. To know about how to enroll a device, see Enrolling a new Android device.
-
Edit: Helps you to edit device details. You can change the device name, ownership of the device, mobile number, device type, owner name, group name, and configure the security settings for the device.
-
Location: Helps you to trace the device on geo map.
-
Apps: Helps you to view the app inventory of the device.
-
Data Usage: Helps you to view data usage for the device. It gives a detailed view of what data plan it has, how much data has been used, and how many apps are in use.
-
Call/SMS Logs: Helps you to view call and SMS logs. This is helpful to know how many calls have been done and with whom.
-
Remote Control: Helps you to access the device remotely and perform several actions. However, no action can be performed on the Mac devices, except mirroring of the device.
-
Reports: Helps you to view reports on different activities carried out on a device, device compliance report, and scan report.
-
Overview
Under Overview, you can take actions for Seqrite Enterprise Mobility Management and Workspace.
Select an action for EMM
You can perform various actions for Seqrite Enterprise Mobility Management on the devices. The actions are displayed as per the device status.
-
If the device is in uninstalled or pending state, the Take Action list displays the following options: Enrollment using Email/SMS, Enrollment using QR Code, Enrollment using ADO Enablement and Enrollment using Android Enterprise Enrollment Using AMA.
-
If the device status is in Approval Pending state, the Select an Action list shows three options: Approve, Disapprove, and Disconnect.
-
If the device status is in Enrolled state, the Select an Action list shows the following options:
Device actions | Description |
---|---|
Sync | Helps you to sync the device with the Seqrite Enterprise Mobility Management server. After sending this command, the device will send the latest app details, scan, and compliance report to the server. |
Remote Buzz | Use this command to play the ringtone on the selected Android device. |
Lock | Use this command to lock the device remotely. |
Locate | Use this command to fetch the current location of the Android device. This helps you know whether the device user is under the allowed geo location. |
Clear Passcode | Use this command to clear the passcode on the device. |
Block | Use this command to block the Android device completely and the user cannot access the device. This command should be used carefully. |
Unblock | Use this command to unblock the blocked Android device. |
Fetch Logs | Use this command to fetch the activity logs about the actions performed on the device. Click Download Device Logs on the upper-right side of the Device Details page to download the logs. You can download the logs in formats such as .txt, .log, and crash files. |
Wipe | Use this command to wipe out the data from the device. The Wipe option includes Full Wipe, SD Card, Factory Reset, and Custom Wipe.
Note: Full Wipe is not supported on devices that have Android 10 and above OS. |
Reset Password | Use this command to reset the password of the selected device through Seqrite Enterprise Mobility Management. |
Send Messages/Files | Use this command to broadcast a message or file URLs to the Android and iOS devices. To know more about Broadcast Message, see Broadcasting File and Message. |
Push Anti-Theft Settings | Use this command to reapply the anti-theft settings on the selected device. You can use this command when previously applied anti-theft settings fail to execute on the device. |
Push Web Security Configuration | Use this command to reapply the Web Security configuration on the selected device. You can use this command when previously applied Web Security configuration fails to execute on the device. |
Push Policy | Use this command to reapply the mapped policy on the selected device. You can use this command only when the previously applied policy fails to execute on the device. |
Push App Configuration | Use this command to reapply the mapped App Configuration on the selected device. You can use this command only when the previously applied app configuration fails to execute on the device. |
Push Schedule Scan Settings | Use this command to reapply the Schedule Scan Settings on the selected device. You can use this command only when the previously Schedule Scan Settings fail to execute on the device. |
Push Data Usage Configuration | Use this command to reapply the Network Usage configuration on the selected device. You can use this command only when the previously applied Network Usage configuration fails to execute on the device. |
Push Fence Configuration | Use this command to reapply a fence configuration on the selected device. |
Disconnect | This command will disconnect the device from the Seqrite Enterprise Mobility Management server. After the command is executed on the device, the device cannot be managed by the Seqrite Enterprise Mobility Management console. Use this command cautiously. |
Uninstall Device Management | Use this command to remotely uninstall the Seqrite EMM Agent from the selected ADO/Knox devices. |
Update Virus Signature | Use this command to updated Seqrite Enterprise Mobility Management Virus Signature on the selected device. |
Note: The iOS devices support only the following commands; Sync, lock, clear passcode, un-install, disconnect, broadcast files and messages, locate, ring, and fetch location.
Select an action for Workspace
You can perform various actions for Workspace on the devices.
Device actions | Description |
---|---|
Sync | Helps you to sync the selected device with the Seqrite Enterprise Workspace server. After sending this command the device will send the latest app details and compliance report to the server. |
Reset Workspace Password | Use this command to reset the password of Seqrite Enterprise Workspace. |
Wipe Workspace Data | Use this command to delete the Workspace data. |
Block Workspace | Use this command to block the Workspace application on a device. |
Unblock Workspace | Use this command to unblock the blocked Workspace application. |
Uninstall Workspace | Use this command to uninstall the Workspace application from the device. |
Push Workspace Policy | Use this command to push any Workspace policy on the device. |
Push Workspace Profile | Use this command to push any Workspace profile on the device. |
Edit
The Edit tab allows you to edit the device details and its configurations. You can change configurations such as Anti-Theft, Web Security, and App Configurations. The changed configurations on the console are automatically applied to the mobile device. The Edit tab includes the Edit details and Configurations sections.
Edit details
This section lets you edit the information of the added device.
Editing device details
To edit the information of the device, follow these steps:
-
Log on to the Seqrite EMM console and in the left pane, click Devices.
-
On Devices page, select a device and click the Edit icon.
-
On the Device Details screen, click the Edit tab and then click Edit details.
-
Edit the required information such as Device Name, Ownership, Device Type, Owner, and Group.
-
Click Save.
The device information is edited successfully.
Configuration
In this section you can view the configuration applied to the device. You can change the configurations for the selected device.
Note: |
---|
If the device is associated with any device group, to which the app configuration is applied, the app configuration cannot be edited. To enable and edit such app configuration, you need to move the device to a group that does not have App Configuration applied to it. |
Editing device configuration
To apply a configuration on the device, follow these steps:
-
Log on to the Seqrite EMM console and in the left pane, click Devices.
-
On Devices page, select a device and click the Edit icon.
-
On the Device Details screen, click the Edit tab and then click Configurations.
-
You can edit or update Anti-Theft, Web Security, and App Configurations as required.
-
Click Save & Apply.
The device information is edited successfully.
Location
Helps to locate the device on the geo map. This is helpful to see where the device users travel most of the time.
Note: If the device user denies the location permission, then the admin is unable to access the location of the device and locate/trace commands are bound to fail.
Turning on the device location
The device can be traced with the Trace On option. The Locations tab shows the details of the traced devices such as:
-
A list of traced locations.
-
You can select the traced locations and view the locations on the map.
-
You can select and delete the tracked locations from the list.
-
When the tracing location option is turned on, the activity log is in progress. When the task is completed, its status changes to complete.
To trace the device location, follow these steps:
-
Log on to the Seqrite EMM console and in the left pane, click Devices.
-
On the Devices page, select a device that is to be traced and click the Edit icon.
-
On the Device Details screen, click the Location tab.
-
Turn on the Trace option.
-
On the Location Tracking Frequency dialog box, select the Location tracking frequency in minutes and click Configure.
- The Trace On command is submitted successfully.
Note: |
---|
|
In the activity logs, the Trace On command will be in-progress until the admin sends the Trace Off command to the device.
Options | Description |
---|---|
Locate | This command is to fetch the current location of the selected device. Note: Location will be fetched only if the Location Services is enabled on the device. |
Trace On | This command is to carry out the continuous trace for the selected Android device. You can define the time to trace the device location whenever the user changes the location (moves more than 100 meters). To trace the devices, you can select the frequency such as 10 minutes, 20 minutes, 30 minutes, 45 minutes, and 60 minutes. |
Location view list | This list helps you to view the traced location. You can view the traced locations for Today, Since Yesterday, Last 7 days, Last 15 days, Last 30 days, Last 3 months, and From beginning (as per their time of location). |
Clear | With the Clear option, you can delete the tracked locations. – To delete all the traced locations, click Clear. – To delete the particular location, select the check box of the traced location and click Clear. |
Export | With Export, you can get the detailed information about the traced locations. You can export the details in CSV or PDF file format. – To get information about all the traced locations, just select the export option. – To get information about a specific traced location > select the location > click Export > select the export option. |
Obtaining the device location
The device location can be located with Locate option. You need to send an SMS and get the confirmation to locate the device.
To locate the device location, follow these steps:
-
Log on to the Seqrite EMM console and in the left pane, click Devices.
-
On the Devices page, select a device that is to be traced and click the Edit icon.
-
On the Device Details screen, click the Location tab.
-
Select one of the following periods for which you want to see the device location.
You can view location history for Today, Since Yesterday, Last 7 days, Last 15 days, Last 30 days, Last 45 days, Last 60 days, and Last 90 days.
Location history will start being stored only after you select the options. By default, location history is stored only for 7 days. -
Click the search icon.
Device locations appear. You can import the locations in CSV or PDF format.
-
To send the device location by SMS, click the Locate button on the map.
A confirmation screen appears.
-
Select the Locate device by sending SMS check box and then click Locate.
Note: The Locate device command via SMS works only when the Android device has the SIM and the mobile number is updated.
Locate Multiple Devices
Locate Multiple Devices helps you to locate the devices enrolled in your network. You can see all the devices on a single map wherever they are.
This gives you the flexibility to know where your resources are like if they are in the approved locations.
Locating devices
To locate the devices, follow these steps:
-
Log on to the Seqrite EMM console.
-
Select any device. You may select multiple number of devices.
A banner appears at the footer with an option Show on Map.
-
Click Show on Map available at the footer.
However, if you want to locate all the devices on a single map, click Show on Map available as a tab on the upper right side.
Apps
Apps is a list of apps installed on the mobile devices. If any command is pending with respect to app inventory; a small exclamatory icon is displayed on the App Inventory tab and also on the app in the app list. When hovered over the icon, the pending command is displayed. The Apps tab for the iOS devices will be in read-only format and only the downloaded apps will be listed. However, it will not show any Android system apps. With the App Inventory option, you can perform multiple actions.
App Status
The apps listed on App Inventory page shows different status as follows:
-
Installed: This status is showed when the app is already installed on the device.
-
Published: The app that is recommended by the Admin to install on the device will have the status as Published.
-
Recommended: If the user installs the app which has Published status, then the app will have the status as Recommended.
-
Whitelisted: If any installed app is whitelisted by the Admin then that app will have the status as Whitelisted.
-
Blocked: The app shows blocked status if the app is fully blocked or when the app is uninstalled using the Uninstall command in App Inventory. When the app is added to the uninstall list from App Configuration, then the app will have the status as Blocked.
Advanced Search for Apps
The Advanced Search option allows you to perform searches of your interest. You can see which apps have been downloaded, installed, blocked, or other status.
To search apps with Advanced Search option, follow these steps:
-
Log on to the Seqrite EMM console and in the left pane, click Devices.
-
On Devices page, select the device and click the Edit icon.
-
On the Device Details screen, click the Apps tab. Click Advanced Search.
-
Select the app type, app status, and app category.
You can select all the options or only one.
-
Click Search.
The Search result is displayed.
To edit the search criteria, click Reset.
Installing the App Launcher
You can install the app launcher on the selected devices. This is helpful if you want to restrict the users to have access only to a certain number of apps allowed by you.
You can create a list of app inventory and initiate installing the app launcher on a mobile device. As soon as the app launcher is installed on a device, all the apps previously installed on the mobile will not be accessible, except the ones allowed by you.
Note: |
---|
The administrator can install or uninstall the app Launcher only when the app configuration is added to the selected device and the launcher is mapped with the device. |
Activating the app launcher
The admin can activate the launcher using the following steps:
-
Log on to the Seqrite Enterprise Mobility Management console and in the left pane, click Devices.
-
Select a device and then click the Edit icon.
-
On the Device Details page, click the Install Launcher button.
-
To exit the launcher deactivation mode, click the Activate Launcher link.
The command to activate the launcher is sent to the device. After the Enable launcher command reaches on the device, the launcher gets activated.
Exiting the launcher
The user can exit the launcher using the following steps:
-
Log on to the Seqrite EMM console and in the left pane, click Devices.
-
Select a device and then click the Edit icon.
-
On the Device Details page, select Exit Launcher from Select an Action list and then click Submit.
On the device, a confirmation screen is displayed to exit the launcher.
-
Options to exit the launcher are displayed. Select the required option.
-
Exit launcher permanently: Select this option, to exit the launcher for infinite time duration.
-
Exit launcher temporarily: Select this option, to exit the launcher for a specific time duration. Enter the time in the Launcher Exit Duration text box and then select the time in minutes, hours, or in days as required.
-
-
Enter the Security Code as displayed and then click Exit Launcher.
The command is sent to the device and its activity log is generated.
Data Usage
The Data Usage option lets you monitor Internet data usage applied to the selected device if the network usage configuration is applied on the device. After the Data Usage configuration is applied to the device, the Seqrite Enterprise Mobility Management app starts monitoring the Internet data with respect to Wi-Fi, mobile data, and in roaming status. You can view the percentage of utilized mobile data for the mobile data plan that you have set on the device for the billing cycle. The enhanced graphical representation of data usage has been provided for easy monitoring of the network usage.
Searching network data usage
As a user, the network data usage statistics can be drawn for number of days or by selecting a date range. The available options to search network data usage are Last 7 days, Last 15 days, Last 30 days, Current Month, and Select a Range.
To search a network data usage for specific number of days or a date range, follow these steps:
-
Log on to the Seqrite EMM console and in the left pane, click Devices.
-
On the Devices page, select the device and click the Edit icon. Click the Data Usage tab.
-
Select the number of days or the date range from the list.
Tip: If you select Today from the Select a Range option, you can see the hourly usage of mobile data for the last 24 hours. -
Click Search.
To change the search criteria, click Reset.
Data Plan Details
This option helps you to view the detailed information of the mobile data and Wi-Fi usage in a selected range of period. This data usage information is provided in MBs.
- To change the current data plan, select the Billing Cycle Start Date, Number of Days, Mobile Data Plan Limit, and Wi-Fi Daily Usage Limit, and click Save. You can change this data plan whenever required with the help of the Settings button.
Note: If you select Today from the Select a Range option, you can see the hourly usage of mobile data for the last 24 hours.
Parameters | Description |
---|---|
Network Usage Configuration | Shows the name of the network configuration of the device. Clicking the network configuration name will navigate you to the Network Usage Configuration Details page. |
Billing Cycle Start Date | Shows the date on which the billing cycle begins. |
Number of Days | Shows the number of days in one billing cycle. |
Mobile Data Plan Limit | Shows the limit of the mobile data plan. |
Wi-Fi-Daily Usage Limit | Shows the daily limit of the Wi-Fi usage. |
Mobile Data Usage % | Shows the percentage of the mobile data usage in a specified mobile data billing cycle. |
Setting icon | The Setting icon, which is available next to Data Plan Details, help to change the Billing Cycle Start Date, Number of Days, Mobile Data Plan Limit, and Wi-Fi Daily Usage Limit of the device, if required.
Note: If the data plan is modified using this Setting icon, then the modified network usage configuration will have more preference and the changes will not be applied on the device. |
Network Usage
This section shows the graphical representation of network usage in a selected date range. The chart shows the usage of network data through Wi-Fi, Mobile Data, and Roaming. The data usage information is provided in MBs. Hover the mouse over the chart to see the details of network usage by Wi-Fi, Mobile Data, and in Roaming status.
Top 10 App Usage
This section displays the top 10 apps that consumed the maximum Internet data in the selected date range. The mouse hover over the pie chart shows the details of Internet data usage by the apps. This option also shows the apps, which consumed maximum Internet data in the selected date range. It gives the details of the Internet data usage by the user and help you to configure the app configuration.
Network Usage Graph
Displays the daily bar graph representation of data usage in the selected date range. The data usage shown in the bar graph is combined usage of Mobile Data, Wi-Fi, and in the Roaming status of the device. The values shown in the graph are based out of Data Usage in MB and days on that specified date range. The mouse hover over the graph shows the entire details of the usage. You can see the total network usage via Wi-Fi, mobile data, and in roaming. This graphical representation and network usage data ease the monitoring and tracking of data usage.
Usage Information
This option gives a detailed quantifiable information on the Internet data usage on a daily basis. The table below informs about the usage parameters and their description.
Parameters | Description |
---|---|
Mobile Data (in MB) | Shows the mobile data usage on a specified date. |
Wi-Fi Data (in MB) | Shows the Wi-Fi data usage on a specified date. |
Roaming Data (in MB) | Shows the usage of data on the device when the device is in Roaming status on a specified date. |
View Details | Displays the details of the Internet usage of the apps on the device for specified date. To navigate to the App Network Usage Details page, click View Details. |
Note: You can view the usage information by sorting the table based on date, mobile data, Wi-Fi data, and roaming data. The Usage Information option is visible only on the Android devices.
Viewing network usage details
The View Details option shows the usage of the Internet by apps on the device. You can also view the individual contribution of the app in utilizing the Internet data for a specified date or in the selected date range. It also shows the entire network usage of all the apps present on the device and the network usage of an app via Mobile Data Plan, Wi-Fi Data, and in Roaming status. To navigate to the App Network Usage Details page from Usage Information section, click the View Details option.
-
App Network Usage Details: Displays the Internet data usage by apps on user’s device for a selected date or date range. This app displays the data usage with respect to Wi-Fi, Mobile, and Roaming by all the apps on a device for the selected date range.
-
Select Date Range: Shows the selected date range.
Columns Description Icon Shows the icon of the app. App Name Shows the name of the app. Mobile Data (in MB) Shows the usage of Mobile Data by the app. Wi-Fi Data (in MB) Shows the usage of Wi-Fi Data by the app. Roaming Data (in MB) Shows the usage of data for apps in roaming sta
Call/SMS Logs
You can turn on monitoring for Calls and SMS and record logs. You can filter by log type, call type, and call log duration.
Call/SMS Logs Actions:
- Navigate to Devices > Select device > Click Edit icon.
You are redirected to Device Details page.
-
Click Call/SMS Logs tab. You can perform the following actions:
- Turn ON or OFF Call/ SMS Monitoring.
- Sync Logs from device to Seqrite Enterprise Mobility Management.
-
Perform detailed search by filtering logs and clicking Advanced Search as required:
- Log Type by Incoming, Outgoing, Missed, and Rejected.
- Call/SMS by Call, Video Call, SMS, and MMS.
- Duration (Call log history) by Today, Last 7 Days, Last 15 days, Last 30 days, Last 45 days, Last 60 days, and Last 90 days.
Call log history will start being stored only after you select the options. By default, call log history is stored only for 7 days.
- Export call logs to a file.
Remote Control
The Remote Control (RDC) feature helps the Seqrite Enterprise Mobility Management administrator to get the remote access of the user’s device. It is helpful in case of emergency when the user is travelling or out of office. In such scenario, the Seqrite Enterprise Mobility Management administrator can take remote access of the device and troubleshoot the issue. The Remote Control (RDC) feature is applicable only to the enrolled and approved devices. The administrator can take maximum of two RDC sessions in a single instance. Even in case of network fluctuation, Seqrite EMM Agent tries not to disconnect the RDC session and automatically reconnects with the Seqrite Enterprise Mobility Management console.
Note: |
---|
By default, every Seqrite Enterprise Mobility Management tenant is provided with certain data transaction usage limit. The process of remote device control and file handling is also part of this data transaction usage. If the limit exceeds, the user would not be allowed to take RDC of the device. Customer must buy/purchase additional transaction usage limit to take RDC of the device, and file upload and download in RDC session. If the transaction limit has exceeded, then the RDC tab will not be accessible. |
With the Remote Control feature, the Administrator can perform the following tasks:
-
Remotely view device screen (applicable to all the devices).
-
Remotely control the device (Android OS 7, 8, and later versions).
-
Upload or download a file from the server to the device or from device to the server.
Note: Only for the KNOX supported devices, the Administrator can have complete control of the device. The Remote Control feature is applicable only for the Android devices. -
Take screenshots of the remote device screen. The screenshot taken by the Administrator is saved on the local system.
The Remote Control tab shows the following options:
Options | Description |
---|---|
Start RDC | Helps you to start the RDC session and take control of the remote device. |
Stop RDC | Helps you to stop the RDC session. |
Resume | Helps you to resume the RDC session if it was stopped for any technical issue. |
Back | Helps you to visit the previous screen on the device. |
Home | Helps you to visit the Home screen of the device. |
Recent Apps | Helps you to visit the recent apps on the device. |
Screenshot | Helps you to take screenshot of the remote device. |
File Handling |
Helps you to view the files and folders structure on the device. Note: The admin can only access files if the device user authorizes it. If the user declines, the admin can try again by clicking retry (applicable only for android devices) to request access to the files. If device user doesn’t authorize, then admin won’t be able to view File Handling of the device. |
Retry | Helps you retry controlling the device remotely. |
Refresh | Helps you to refresh the files and folders structure on the device. |
Create Folder | Admin can create new folder on Android device remotely and can perform action on the folder. |
Download File | When in RDC session, it helps you to download a file from the device to the server. You can download maximum 30 MB file. |
Upload File | When in RDC session, it helps you to upload a file from server to the device. You can upload maximum 50 MB file. |
File Path | Helps you specify the file path. |
Note:
- The Remote Control (RDC) feature is applicable to Android OS 7, 8, and later versions.
- The Remote Control feature is supported on Seqrite Enterprise Mobility Management Agent 1.5 and later versions.
- The functionality to take screenshot in RDC session is applicable for all the devices.
- Functionalities like moving back, visiting Home screen or visiting recent apps is applicable only to the KNOX supported devices. For the Non-KNOX devices, the Admin can view only the mobile screen and cannot perform any action.
Remotely controlling the device
In the remote control session, the Admin can completely control the device. This functionality is applicable only to all the devices with OS 7 and later versions.
To remotely view or control the user device, follow these steps:
-
Log on to the Seqrite EMM console and in the left pane, click Devices.
-
In the Devices list, select the device to take its control and click the Edit icon.
-
On the Device Details page, click the Remote Control tab.
-
To view the device screen, click Start RDC. The RDC session starts in the new tab.
In Activity log, you can see the status of RDC session.
-
The device user has to accept and provide the consent.
-
For Seqrite Enterprise Mobility Management prompt on the device, the user must tap Start Now.
-
For system prompt, the user must tap Allow.
-
-
As the user accepts the consent, the Admin gets the visibility of the remote device screen on Seqrite Enterprise Mobility Management console and the remote session starts.
Note:
-
For normal device and ADO enabled devices, the Admin can only view the remote screen of the device with OS 6 and later versions.
- For KNOX supported devices, the Admin can take complete control of the remote device, perform actions remotely, and troubleshoot the issue.
- In case of Mac OS (iOS), the device can be viewed only but cannot be controlled.
-
To create new folder, click Create Folder.
-
To get a file from the device, click Download File.
-
To share a file from the server to the device, click Upload File.
-
To delete any file or folder, select the file or folder in File Handling section and then click Delete.
-
To stop the remote session, click Stop RDC.
Important points to remember for seamless RDC connection:
-
Make sure that data transaction usage limit is not exceeded.
-
Device must have good Internet connectivity without any network fluctuations.
Some delay may be observed (based on network speed) in screen appearance during RDC if network connection is slow.
-
When the Admin requests for remote access, device user has to accept the RDC request, then RDC connection will be established.
-
Device should have consistent 400 kbps network speed for smooth remote connection.
-
Device should have minimum 150 kbps network speed for establishing remote connection.
Reports
With Reports, you view the reports on all the actions that were performed on a device, compliance reports, and scan reports.
Activity
Following are the various statuses of the activities:
-
Pending: This status appears when the command/policy/configuration has not yet reached the device. The Cancel option is provided to end the request if you do not want the command to be executed.
Note: In case the command is in pending state and you want to send the command again, you have to cancel that command or send the command again from the Device Actions list.
-
Notified: This status appears when the command/policy/configuration has reached the device, but its status has not yet been received by the server.
-
In Progress: This status appears when the command/policy/configuration is reached to the device and it is in a continued state. This status is applicable to locate, trace on, scan, and wipe process.
-
Failed: This status appears when the command/policy/configuration was not able to reach the device due to unavailability of Internet connection or if the phone is switched off or any other reasons. You can view the reason for the failure so that you can act accordingly.
-
Cancelled: This status appears when the FCM server is unable to communicate with the device and the command gets cancelled. You can view the reason for the cancellation so that you can act accordingly.
-
Expired: This status appears when the command/policy/configuration has reached the set timeout and has not reached the device. After the request has expired, the Retry link appears. Clicking Retry will send the same request again to the device.
-
Success: This status appears when the command/policy/configuration has been successfully executed on the device. You can view the policy/configuration version so that you can know the version number that is applied to the device.
Searching activity logs
To search the activity logs, follow these steps:
-
Log on to the Seqrite EMM console and in the left pane, click Devices.
-
On the Devices page, select the device and click Edit icon.
-
On the Device Details page, click the Reports tab and click Activity.
-
From the period list, select the days or the date range to search the activity logs and click Search.
Activity logs are displayed.
Device Compliance Report
The Device Compliance Report section shows a report on all non-compliant devices. If the report is not displayed, you can send the sync command to fetch the latest reports.
When you are on the Device Compliance Report page, all the non-complaint devices are displayed.
- To view more details of the report, click View Report.
Scan Report
The Scan Report option shows the when a device was scanned. The scan reports are displayed with the View Report link in front of each report.
-
To view the report, click View Report.
The device scan report shows:
-
Scan summary: Shows the report type and the number of threats detected.
- Threat details: Shows the threat icon, name, type, location, threat installed date, action on the detected threat, and the date on which the action was taken on the threat.
Note: The scan report is generated only when the virus is detected.
To know about how to enroll a device, see Enrollment
–>
Importing Devices
Seqrite Enterprise Mobility Management provides an option to import multiple devices with ease. In one instance, maximum of 1000 devices can be imported.
To import the devices, follow these steps:
- Log on to the Seqrite EMM console and in the left pane, click Devices > Add Device > Import.
- Select the CSV file, which is to be imported and click Select File. To know about the CSV file format, click Download CSV sample format.
- Click Import. Devices are imported successfully.
Exporting Devices
When there is a requirement, you can export the devices and their information. The device details can be exported in the CSV or PDF format. The exported devices’ details show complete information about the devices present in Seqrite Enterprise Mobility Management.
To export devices and its details, follow these steps:
- Log on to the Seqrite EMM console and in the left pane, click Devices.
- Select the device from the list and click Edit icon.
The Device details page is displayed. Click Export.
- Select the file format in which the devices are to be imported; CSV or PDF. Devices are exported successfully.
Deleting Device
Devices can be deleted using any of the either options:
- On Devices list page, select a single device and click the Delete icon in Actions column.
- On Devices list page, select single or multiple devices. The Take Action option is displayed. Select Delete and then click Submit.