Deploy and Enroll Devices for Mobile Threat Defense

To use Mobile Threat Defense, you must install the Jamf Trust app on each connected device and activate the profile on the device.

This topic describes the different installation methods for the app, both for Managed and Unmanaged devices.

Deploy to managed devices

To deploy to managed devices, you create a UEM-assisted activation profile to help deploy to and enroll devices that are managed through your UEM/MDM platform. This method enables you to configure the device to send device traffic through your Mobile Threat Defense instance with no action required by the device user.

Deployment works slightly differently for device types:

Device type

Deployment Details

iOS/iPadOS

Configure the Jamf Trust app in UEM and then create the UEM configuration profile (which uses the activation profile) to deploy to devices

Android

You configure the deployment in a UEM with the option to configure Android Zero Touch for deployment without user intervention.

macOS

Only create and deploy a UEM configuration profile.

For details on how to deploy to devices, see the following topics in the Jamf Security documentation:

Method

Link

Apple Volume Purchasing

App Deployment Using Apple's Volume Purchasing

Jamf Pro

Jamf Pro: Managed Deployment for Apple

Jamf School

Jamf School: Managed Deployment for Apple

Microsoft Endpoint Manager

Microsof Endpoint Manager: Managed Deployment for Apple and Android

Workspace ONE

Workspace ONE: Managed Deployment for Apple and Android

MobileIron Cloud

MobileIron Cloud: Managed Deployment for Apple and Android

MobileIron Core

MobileIron Core: Managed Deployment for Apple and Android

IBMMaas360

IBMMaas360: Managed Deployment for Apple and Android

Citrix Endpoint Management

Citrix Endpoint Management: Managed Deployment for Apple and Android

Blackberry UEM

Blackberry UEM: Managed Deployment for Apple and Android

Windows devices

Deployment to Managed Windows Devices

Deploy to unmanaged devices

You can also deploy to unmanaged devices, but this type of deployment may involve more user involvement.

For details on how to deploy to devices, see the following topics in the Jamf Security documentation:

Method

Link

Apple/Android devices with a shareable link

Deploying Jamf Trust to Unmanaged Apple and Android Devices Using a Shareable Link

Unmanaged Windows devices

Deploying Jamf Trust to Unmanaged Windows Devices

Deploy to agentless devices

Your Mobile Threat Defense also provides data management and phishing protection on agentless devices.

For details on how to deploy to these devices, see these topics in the Jamf Security documentation:

Please see our Legal Disclaimer on links to third party web sites.