Security Plan
Updated over a week ago

If you need more than just an inventory to control your devices, you can rely on powerful security features. The Security Plan includes all the functionalities listed below.

Inventory Management:

  • Device inventory report.

  • Device data such as internal storage, memory card, user data, manufacturer, model, version, IMEI, Serial Number, activation date, user email, ID.

Audit Logs:

  • View actions performed in the Pulsus database (WEB).

  • Identify affected items, actions taken, the administrator responsible, and the origin of the action.

Allowed Actions:

  • Reboot, synchronization, push message, sound alert, user recertification, lock and unlock, data wipe, management removal.

Parameter:

  • Information capture time: 60 minutes.

Alerts:

  • SIM card change alert.

  • Notification tab for WEB admin with information on SIM card removal or insertion.

Location:

  • View the last 15 captured locations of the device.

Disable Factory Reset Settings:

  • Protects the device against unauthorized factory reset actions through the settings menu.

Restrict Account Activation after Factory Reset:

  • FRP (Factory Reset Protection) prevents the device from restarting without adding the account registered in Pulsus after a factory reset.

Disable Screenshot Capture:

  • Prevents the user from taking screenshots of confidential corporate information.

Disable USB File Transfer:

  • Prevents file sharing via USB, avoiding the export of corporate data to unauthorized devices.

Disable Debugging Features:

  • Prevents debugging on the device, reducing the risk of data leaks and associated risks.

Installation of Apps from Unknown Sources:

  • Prevents unauthorized installation of apps from unauthorized sources, avoiding the installation of malicious apps or apps that may impact device performance or user productivity.

Disable Physical Media Card Reading:

  • Blocks the use of SD cards, preventing the insertion, copying, or importing of unauthorized and contaminated content and files.

Disable NFC Data Sharing:

  • Prevents extraction of files/information with potential sensitive corporate data.

Manage System Update Policy:

  • Define a permissible period for possible system updates, allowing the IT team to work on necessary adjustments before updates occur and avoiding OS (operating system) updates during business hours, impacting operations.

Set Date and Time Automatically:

  • Automatically set date and time to prevent potential fraud by users attempting to manipulate the system or applications that use date/time as a reference for user-performed actions.

Force High Precision Location:

  • Activates features in the Android operating system, such as GPS, WiFi, and mobile networks, to determine the device's location with greater accuracy and speed.

Prevent User from Adding or Removing Accounts:

  • Prevents the user from adding unauthorized accounts to the device, mitigating risks with improper actions, such as installing unauthorized apps and using unofficial email tools from the company, compromising security, performance, and productivity.

Prevent Google Play Protect from Being Turned Off on Devices:

  • Essential feature to ensure that Play Protect is running and checking for the presence of malicious applications in real-time, using a global database of information from Google and other partners.

SSO Login:

  • Allows the WEB Administrator's login to use Single Sign-On (SSO) through SAML (Security Assertion Markup Language), a feature that not only simplifies day-to-day tasks but also enhances digital security.

Allowed Sites:

  • Important for controlling access to inappropriate content, for example, preventing students from accessing pages verified in advance by educational institution authorities.

Device Password Pattern:

  • Security feature that forces the user to implement a screen lock password on the device, according to the complexity level defined by the company administrator.

Certificates - CA Distribution via Upload:

  • Allows the upload and installation of CA certificates on company devices. With CA certificate installation, it is possible to: enable secure access to corporate sites (SSL) and enable data traffic encryption.

Dashboard:

  • Alerts for potential issues on devices.

[Add-on Option] Remote Control:

  • Supports field teams in accessing and operating their devices remotely. This way, support personnel can remotely control the device and perform necessary actions on the geographically dispersed device.

Did this answer your question?