Analyze Device Behavior for Mobile Threat Defense
After you have configured the various parts of your Mobile Threat Defense instance, you have the ability to view reports about different policies. You can also filter these reports by different parameters, such as date or groups.
As needed, export these reports to a CSV file.
Your Mobile Threat Defense instance my contain reports on the following:
Report |
Details |
---|---|
Private Access |
These reports provide insights into the corporate device usage of your users. For details on these reports and how to view them, see Private Access Reports in the Jamf Security documentation. |
Data Usage |
If you have set up a data policy, you can view reports on device data usage, including:
For details on data usage reports, see Data Usage Reports Reports or Device Reports Reports in the Jamf Security documentation. |
Threat Defense |
Based on detected threats (per the configuration of your security policy), you can get a number of insights against your devices:
For details on these reports, see App Insights, App Risk Score, or App WatchList in the Jamf Security documentation. |
If the out-of-the-box reports do not suit your needs, you can also create custom reports. For details on how to use custom reports, see the following topics in the Jamf Security documentation:
Please see our Legal Disclaimer on links to third party web sites.