Mobile Threat Defense
Note
This section is relevant for customers that are not integrating mobile device data with all other Cybereason data and that manage their devices separately from the Cybereason platform, using the RADAR console and their own MDM/UEM instance.
Mobile Threat Defense provides you with a way to manage protection of your mobile devices.
Using the RADAR console, you can add devices and manage a variety of settings for your mobile devices, including:
Add and monitor devices
Deploy devices
Update the security protection for your devices to ensure an appropriate level of protection and response
You can also set up a number of optional settings around data usage, network traffic, and other settings.
The topics in this section enable you to use your RADAR console.
Topics:
- Mobile Threat Defense Service Overview
- Mobile Threat Defense Deployment Modes and Protection
- Mobile Threat Defense Deployment Process
- Activation Profiles for Device Deployment for Mobile Threat Defense
- Set up Integration with Your MDM Platform for Deployment
- Create a Security Policy for Mobile Threat Defense
- Create Device Groups for Mobile Threat Defense
- Manage and Monitor Device Groups for Mobile Threat Defense
- Deploy and Enroll Devices for Mobile Threat Defense
- Remove Devices from Mobile Threat Defense
- Analyze Device Behavior for Mobile Threat Defense
- Mobile Threat Defense Portal Administration
- Set up Identity Providers for Mobile Threat Defense
- Configure Data Streams for Mobile Threat Defense
- Set Access Gateways for Mobile Traffic or Applications for Mobile Threat Defense
- Configure Custom DNS Zones for Mobile Threat Defense
- Add Custom Network Routing Exceptions for Mobile Threat Defense
- Create a Data Policy for Mobile Threat Defense
- Set up Private Access for Mobile Threat Defense
Please see our Legal Disclaimer on links to third party web sites.