Analyze Device Behavior for Mobile Threat Defense

After you have configured the various parts of your Mobile Threat Defense instance, you have the ability to view reports about different policies. You can also filter these reports by different parameters, such as date or groups.

As needed, export these reports to a CSV file.

Your Mobile Threat Defense instance my contain reports on the following:

Report

Details

Private Access

These reports provide insights into the corporate device usage of your users.

For details on these reports and how to view them, see Private Access Reports in the Jamf Security documentation.

Data Usage

If you have set up a data policy, you can view reports on device data usage, including:

  • Acceptable user reports

  • Data management reports

  • Per device reports

For details on data usage reports, see Data Usage Reports Reports or Device Reports Reports in the Jamf Security documentation.

Threat Defense

Based on detected threats (per the configuration of your security policy), you can get a number of insights against your devices:

  • App insights

  • App Risk Score

  • App WatchList

For details on these reports, see App Insights, App Risk Score, or App WatchList in the Jamf Security documentation.

If the out-of-the-box reports do not suit your needs, you can also create custom reports. For details on how to use custom reports, see the following topics in the Jamf Security documentation:

Please see our Legal Disclaimer on links to third party web sites.