Increasing Compliance Across Devices

The Security Risk dashboards in Workspace ONE Intelligence gather reports on numerous device states and quickly identify high-risk devices. In this activity, you explore the following Security Risk dashboards Workspace ONE Intelligence: Threats Summary, Compromised Devices, Policy Risks, and Vulnerabilities. 

1. Access the Security Risk Dashboards

In the Workspace ONE Intelligence console, under Dashboards, click Security Risk.

2. View Compromised Devices

The Compromised Device dashboard appears by default and displays the number of devices that reported as compromised in the past 30 days. A device becomes compromised when it is in violation with the compliance policies defined by the IT administrator. Common compliance policies include blacklisted apps, devices not seen in the past 24 hours, no passcode, and more.

NOTE: Your dashboard may not match the example above.

3. Identify Devices without Passcodes

  1. Select the Policy Risks tab to view the number of passcode-less devices detected in the past 30 days.
    Then, after you understand the scope of the issue, use automation to mitigate the risk. For example, you can create a rule to automatically move a passcode-less device to quarantine, or remove its access to corporate data.
  2. Scroll down.

NOTE: Your dashboard may not match the example above.

4. Identify Unencrypted Devices

This chart shows the total number of unencrypted devices identified on a daily basis by Workspace ONE Intelligence.

  1. Point to the data points for additional details about the number of devices per platform.
  2. Click View to obtain a detailed list of devices.
  3. Click Security Risk: Policy Risks to return.

NOTE: Your dashboard may not match the example above.

5. Identify Vulnerable Devices

Select the Vulnerabilities tab to view the number of vulnerable devices identified in the last 30 days.

Without encryption, confidential information is unprotected, and can easily land in the wrong hands. To mitigate this risk, create policies to enforce device encryption. For example, you can create a policy to block corporate access until the device is encrypted through Workspace ONE UEM.

NOTE: Your dashboard may not match the example above.

0 Comments

Add your comment

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.