Activation Profiles for Device Deployment for Mobile Threat Defense

To enable you to deploy devices with the correct deployment mode for all devices, you use an activation profile.

This activation profile contains details on the deployment mode and protection settings for your devices.

After you create the activation profile, you deploy it to devices using:

  • Shareable links

  • UEM profile/configuration

For details on how to create activation profiles, see the following topics in the Jamf Security documentation:

Level

Details

Cloud Proxy

The proxy protection mode provides a secure proxy for your mobile devices to access the network. Mobile Threat Defense routes device traffic through the proxy to provide protection against network-based attacks.

Secure Access Layer (SAL) - Secure DNS

This protection mode extends the proxy protection and provides additional benefits:

  • The ability to create a secure network when needed, such as when a type of network-based threat is detected

  • Detection of threats to the device based on certain activities

Next-Gen VPN

This mode provides a VPN with a data encryption protocol for applications without user interactions.

Please see our Legal Disclaimer on links to third party web sites.