Jailbroken or Rooted devices
These are devices where the user has gained direct access to the operating system, bypassing the control imposed on the device by the service provider. Devices in this state are generally considered compromised and there has been some recent legislative action to prohibit users defeating locks imposed on the device by the providers. The BYOD CVD offers a policy that does not allow jailbroken or rooted devices on the network. This is based on the MDM API. The MDM server will require a mobile client app installed on the device to determine the root status of the device. There are a few limitations to be aware of. Usually the process of rooting a device requires the user to reinstall the operating system. There is a good chance the user will uninstall the Fiberlink MaaS360 agent at the same time. Without the software, the server cannot with certainty say the device is rooted, only that it has been compromised and is no long under management. If the user also removes the MDM profile, then all of the child profiles are also removed with it, effectively resulting in a selective wipe. As a reminder, the MDM profile may not be locked. At this point, the user may attempt to
RegisterStatus
When a device is being
Manage Lost/Stolen Devices
Corporate and Personal devices require specific responses when reported lost or stolen. Personal devices reported as stolen should undergo an enterprise wipe to remove all corporate data. Lost devices may be handled in the same manner, although the user may attempt to locate the device from the myDevices page first (but only if that service is allowed with the user’s role privileges and location services are enabled on the mobile device). The user or Admin can also try to issue a “find device” if the either the mobile client app or secure content locker is installed on the device. The device will emit a sound at period intervals to help the user locate the lost device. If the device remains lost after an attempt to locate it, then an enterprise wipe is prudent. The device can be restored if later found by the user. The admin may also choose to blacklist the device on the network depending on the situation, forcing the user to call support to regain access.
Corporate devices have some more flexibility with respect to location information. If this information is available, then the administrator may have some options. They could choose to:
38Integrating Fiberlink MaaS360 with Cisco Identity Services Engine