Deploy and Enroll Devices for Mobile Threat Defense
To use Mobile Threat Defense, you must install the Jamf Trust app on each connected device and activate the profile on the device.
This topic describes the different installation methods for the app, both for Managed and Unmanaged devices.
Deploy to managed devices
To deploy to managed devices, you create a UEM-assisted activation profile to help deploy to and enroll devices that are managed through your UEM/MDM platform. This method enables you to configure the device to send device traffic through your Mobile Threat Defense instance with no action required by the device user.
Deployment works slightly differently for device types:
Device type |
Deployment Details |
---|---|
iOS/iPadOS |
Configure the Jamf Trust app in UEM and then create the UEM configuration profile (which uses the activation profile) to deploy to devices |
Android |
You configure the deployment in a UEM with the option to configure Android Zero Touch for deployment without user intervention. |
macOS |
Only create and deploy a UEM configuration profile. |
For details on how to deploy to devices, see the following topics in the Jamf Security documentation:
Method |
Link |
---|---|
Apple Volume Purchasing |
|
Jamf Pro |
|
Jamf School |
|
Microsoft Endpoint Manager |
Microsof Endpoint Manager: Managed Deployment for Apple and Android |
Workspace ONE |
|
MobileIron Cloud |
|
MobileIron Core |
|
IBMMaas360 |
|
Citrix Endpoint Management |
Citrix Endpoint Management: Managed Deployment for Apple and Android |
Blackberry UEM |
|
Windows devices |
Deploy to unmanaged devices
You can also deploy to unmanaged devices, but this type of deployment may involve more user involvement.
For details on how to deploy to devices, see the following topics in the Jamf Security documentation:
Method |
Link |
---|---|
Apple/Android devices with a shareable link |
Deploying Jamf Trust to Unmanaged Apple and Android Devices Using a Shareable Link |
Unmanaged Windows devices |
Deploy to agentless devices
Your Mobile Threat Defense also provides data management and phishing protection on agentless devices.
For details on how to deploy to these devices, see these topics in the Jamf Security documentation:
For managed agentless devices: Deployment to Managed Agentless Devices
For unmanaged agentless devices from a Web browser: Deploying to Unmanaged Agentless Devices via a Web Browser
Please see our Legal Disclaimer on links to third party web sites.