Create a Security Policy for Mobile Threat Defense

Your Mobile Threat Defense instance offers multi-level protection to keep devices safe from cyber threats, malicious downloads, and data leaks, with features such as vulnerability assessments, app scans, device behavior anomaly detection, and network-based security protection.

When you deploy devices with their activation profile, the threat policy is applied for the device as needed.

Your security policy enables you to specify how to react for the following types of threats:

  • Web content threats

  • App-based threats

  • Network threats

  • Device-based threats

For an up-to-date list of the various threats in each threat category, see Security Policy Threat Categories in the Jamf Security documentation.

In addition, you can use the same threat policy across all organizational units as needed or set different policies for different organizational units.

For details on how to use and configure your security policy, see the following topics in the Jamf Security documentation:

Please see our Legal Disclaimer on links to third party web sites.