Create a Security Policy for Mobile Threat Defense
Your Mobile Threat Defense instance offers multi-level protection to keep devices safe from cyber threats, malicious downloads, and data leaks, with features such as vulnerability assessments, app scans, device behavior anomaly detection, and network-based security protection.
When you deploy devices with their activation profile, the threat policy is applied for the device as needed.
Your security policy enables you to specify how to react for the following types of threats:
Web content threats
App-based threats
Network threats
Device-based threats
For an up-to-date list of the various threats in each threat category, see Security Policy Threat Categories in the Jamf Security documentation.
In addition, you can use the same threat policy across all organizational units as needed or set different policies for different organizational units.
For details on how to use and configure your security policy, see the following topics in the Jamf Security documentation:
Configuring Signal UEM (for conditional access to devices when a threat is detected)
Please see our Legal Disclaimer on links to third party web sites.