Contents
- Kaspersky Secure Mobility Management help
- What's new
- Working in Kaspersky Security Center Web Console
- About Kaspersky Secure Mobility Management
- Getting started
- Solution architecture
- Deployment scenarios
- Deploying a mobile device management solution in Kaspersky Security Center Web Console
- Deploying Kaspersky Security Center Linux and Kaspersky Security Center Web Console
- Deploying mobile management plug-ins
- Configuring Administration Server settings for connecting mobile devices
- Scenario: Configuring a connection gateway to connect mobile devices to Kaspersky Security Center Web Console
- Adding installation packages to Administration Server repository
- Adding a license key to the Administration Server repository
- Installing Network Agent Linux
- Configuring Kaspersky Security Center Linux Web Server settings
- Deploying an iOS device management system
- About iOS device operating modes
- About device management profiles
- Deploying Kaspersky Security for iOS
- Deploying a management system using the iOS MDM protocol
- Deploying iOS MDM Server
- Configuring an iOS MDM Server installation package
- Installing iOS MDM Server using a remote installation task
- Local installation of iOS MDM Server on a device via an installation package
- Updating iOS MDM Server using a remote installation task or locally
- Deleting iOS MDM Server using a remote uninstallation task
- Viewing the list of installed iOS MDM Servers and configuring their settings
- Configuring an iOS MDM Server certificate
- Configuring a reserve iOS MDM Server certificate
- Receiving or renewing an APNs certificate
- Installing an APNs certificate on iOS MDM Server
- Configuring access to Apple Push Notification service
- iOS MDM Server events
- Obtaining iOS MDM Server diagnostic data
- Deploying iOS MDM Server
- Deploying an Android device management system
- About Android device operating modes
- Using Firebase Cloud Messaging
- Deploying Kaspersky Endpoint Security for Android
- Permissions for Kaspersky Endpoint Security for Android
- Starting and stopping Kaspersky Endpoint Security for Android
- Activating Kaspersky Endpoint Security for Android
- Updating Kaspersky Endpoint Security for Android
- Removing Kaspersky Endpoint Security for Android
- Managing mobile devices in Kaspersky Security Center Web Console
- Creating administration groups
- Configuring policies
- Creating a policy
- Modifying a policy
- Copying a policy
- Moving a policy to another administration group
- Viewing the list of policies
- Viewing the policy distribution results
- Managing revisions to policies
- Restricting permissions to configure policies
- Configuring role-based access control
- Configuring policy profiles
- Deleting a policy
- Connecting mobile devices to Kaspersky Security Center Web Console
- Configuring synchronization settings
- Managing certificates of mobile devices
- Configuration and management
- Control
- Protection
- Configuring anti-malware protection on Android devices
- Protecting Android devices on the internet
- Protection of data on a stolen or lost device
- Configuring the device unlock password strength
- Configuring a virtual private network (VPN)
- Configuring Firewall on Android devices (only Samsung)
- Protecting Kaspersky Endpoint Security for Android against removal
- Detecting hacked devices
- Configuring a global HTTP proxy on iOS MDM devices
- Adding security certificates to iOS MDM devices
- Adding a SCEP profile to iOS MDM devices
- Restricting SD card usage (only Samsung)
- Management of mobile devices
- Managing Android devices
- Managing iOS MDM devices
- Adding a configuration profile
- Installing a configuration profile on a device
- Removing a configuration profile from a device
- Configuring managed apps
- Installing an app on a mobile device
- Removing an app from a device
- Configuring roaming on an iOS MDM mobile device
- Viewing information about an iOS MDM device
- Disconnecting an iOS MDM device from management
- Configuring kiosk mode for iOS MDM devices
- Management of mobile device settings
- Configuring connection to a Wi-Fi network
- Configuring email
- Configuring protection levels in Kaspersky Security Center
- Managing app configurations
- Managing app permissions
- Creating a report on installed mobile apps
- Installing root certificates on Android devices
- Configuring notifications for Kaspersky Endpoint Security for Android
- Connecting iOS MDM devices to AirPlay
- Connecting iOS MDM devices to AirPrint
- Configuring the Access Point Name (APN)
- Corporate container
- Adding an LDAP account
- Adding a contacts account
- Adding a calendar account
- Configuring a calendar subscription
- Configuring SSO
- Managing Web Clips
- Setting a wallpaper
- Adding fonts
- Working with commands for mobile devices
- Managing the app by using third-party EMM systems (Android only)
- Participating in Kaspersky Security Network
- Samsung Knox
- Using the Kaspersky Endpoint Security for Android app
- App features
- Main window at a glance
- Status bar icon
- Device scan
- Running a scheduled scan
- Changing the Protection mode
- Anti-malware database updates
- Scheduled database update
- Things to do if your device gets lost or stolen
- Web Protection
- Get Certificate
- Synchronizing with Kaspersky Security Center
- Activating the Kaspersky Endpoint Security for Android app without Kaspersky Security Center
- Installing the app on corporate devices
- Installing root certificates on the device
- Installing and using mail and VPN certificates on the device
- Enabling accessibility on Android 13 or later
- Updating the app
- Removing the app
- Applications with a briefcase icon
- Knox app
- Using the Kaspersky Security for iOS app
- Application licensing
- Comparison of solution features by management tool
- Contact Technical Support
- Sources of information about the application
- Glossary
- Activating the application
- Activation code
- Administration group
- Administration Server
- Administrator's workstation
- Anti-malware databases
- Apple Push Notification service (APNs) certificate
- Application management plug-in
- Basic control
- Basic protection
- Certificate Signing Request
- Compliance Control
- Corporate container
- Corporate device
- Device administrator
- Device management profile
- End User License Agreement
- Group task
- IMAP
- Installation package
- iOS MDM device
- iOS MDM profile
- iOS MDM Server
- Kaspersky categories
- Kaspersky Private Security Network (KPSN)
- Kaspersky Security Center Administrator
- Kaspersky Security Center Web Server
- Kaspersky Security Network (KSN)
- Kaspersky update servers
- Key file
- License
- License term
- Malware
- Manifest file
- Network Agent
- Personal device
- Phishing
- Policy
- POP3
- Proxy server
- Quarantine
- SSL
- Standalone installation package
- Subscription
- Supervised device
- Unlock code
- Virtual Administration Server
- Information about third-party code
- Trademark notices
Kaspersky Secure Mobility Management help
|
Find out what's new in the latest solution release. |
Set up device protection Manage mobile device protection remotely. Features include Anti-Malware, Web Protection, Anti-Theft, and more. |
|
Distribution kit Learn about various components, depending on the chosen solution version. |
Set up device settings Manage mobile devices remotely: configure Wi-Fi, VPN, email, root certificates on Android devices, Web Clips, and more. |
||
|
Deployment Learn how to deploy the solution in your organization and configure management systems for Android devices and iOS devices. |
Set up device control Monitor mobile devices remotely, including configuring restrictions, user access to websites, Compliance Control, App Control, and more. |
|
Remotely manage mobile devices with mobile commands. Lock device, Wipe corporate data, Locate device, Take photos, Sound alarm, and more. |
Set up corporate devices Manage Android operating system restrictions, Google Chrome settings, Kiosk mode, and more. |
||
Corporate container Discover the benefits of corporate container and learn how to configure it for your device. |
Other Manage the security of your Android devices using a third-party EMM solution, or install our solution via Knox for enhanced security on Samsung devices. |
||
Corporate App Catalog Create a customized corporate app catalog and use a browser to download apps from the catalog to users' devices. |
|
|
What's new
Version 5.0
In this version, we released the new Kaspersky Mobile Devices Protection and Management plug-in for Web Console of Kaspersky Security Center Linux. The new plug-in lets you manage both Android and iOS devices. We also released the new iOS MDM Server settings plug-in, which lets you configure iOS MDM Server Linux for managing iOS MDM devices.
The new plug-in supports the following features for managing Android devices:
- Create policies depending on the device operating mode:
- Personal device (basic protection and management of a personal Android device).
- Device with corporate container (isolated corporate environment on an Android device).
- Corporate device (an extended set of settings for managing a corporate Android device).
- Features for protecting Android devices:
- Real-time protection
- Scan
- Anti-Theft
- Database update
- Web Protection
- Features for security control:
- Compliance Control
- App Control
- Web Control
- Screen unlock settings
- Device features that you can configure:
- Root certificates
- Web Clips
- Wi-Fi
- SCEP and NDES
- Custom wallpapers
- Features for configuring apps:
- Exchange ActiveSync
- Google Chrome settings
- Configure other apps
- App permission management
- Restrictions:
- Device feature restrictions (for corporate devices only)
- Kiosk mode
- New screen unlock password
- Features that you can configure for Knox:
- Device feature restrictions
- VPN
- Exchange ActiveSync
- APN settings
- Firewall
- Configure corporate containers
- Send commands to Android devices:
- Wipe corporate data
- Lock device
- Unlock device
- Reset to factory settings
- Synchronize device
- Locate device
- Sound alarm
- Send message
- Wipe app data
- Wipe data of all apps
- Get location history
- Take photos
The new Kaspersky Mobile Devices Protection and Management and iOS MDM Server settings plug-ins support the following features for managing iOS and iOS MDM devices:
- Create policies depending on the device operating mode:
- Basic protection (protection against web threats and jailbreak detection on iOS devices).
- Basic control (basic management of a personal iOS device).
- Supervised (an extended set of settings for managing an iOS device).
- Features for security control:
- App Control
- Compliance Control
- Web Control
- Screen unlock settings
- Device features that you can configure:
- Web Clips
- Exchange ActiveSync
- Custom fonts
- Certificate management
- Global HTTP proxy
- VPN
- SCEP
- Calendar
- Contacts
- Wi-Fi
- LDAP
- AirPlay
- AirPrint
- SSO
- Calendar subscriptions
- APN settings
- Per App VPN for Safari
- Restrictions:
- Content restrictions
- App restrictions
- Device feature restrictions
- Kiosk mode
- Send commands to iOS MDM devices:
- Change roaming settings
- Set Bluetooth state (supervised only)
- Lock device
- Reset to factory settings
- Wipe corporate data
- Reset unlock password
- Synchronize device
- Enable Lost mode (supervised only)
- Locate device (Lost mode only)
- Sound alarm (Lost mode only)
- Disable Lost mode (supervised only)
- OS update (supervised only)
- Install app
- Update app
- Delete app
- Install configuration profile
- Delete configuration profile
Working in Kaspersky Security Center Web Console
This Help section describes protection and management of mobile devices by using Kaspersky Security Center Web Console (hereinafter also referred to as Web Console).
About Kaspersky Secure Mobility Management
Kaspersky Secure Mobility Management is an integrated solution for protecting and managing corporate mobile devices as well as personal mobile devices used by company employees for corporate purposes.
Distribution kit
The Kaspersky Secure Mobility Management distribution kit may include different components, depending on the chosen solution version.
Mobile device management in Kaspersky Security Center Web Console
This component is compatible with Kaspersky Security Center Linux 15.1. For information on the version compatible with Kaspersky Security Center Windows, see the Kaspersky Secure Mobility Management 4.1 Help.
on_prem_ksm_policies_<version>.zip
Archive that contains the files required for installation of the Kaspersky Mobile Devices Protection and Management plug-in:
plugin.zip
Archive that contains the Kaspersky Mobile Devices Protection and Management plug-in.
signature.txt
File that contains the signature for the Kaspersky Mobile Devices Protection and Management plug-in.
iOS MDM Server settings plug-in
This component is compatible with Kaspersky Security Center Linux 15.1. For information on the version compatible with Kaspersky Security Center Windows, see the Kaspersky Secure Mobility Management 4.1 Help.
on_prem_iosmdm_<version>.zip
Archive that contains the files required for installation of the iOS MDM Server settings plug-in:
plugin.zip
Archive that contains the iOS MDM Server settings plug-in.
signature.txt
File that contains the signature for the iOS MDM Server settings plug-in.
iOS MDM Server
This component is compatible with Kaspersky Security Center Linux 15.1. For information on the version compatible with Kaspersky Security Center Windows, see the Kaspersky Secure Mobility Management 4.1 Help.
kliosmdm-<architecture>-<version>-<package manager>_<language>.tar.gz
Archive that contains the files required for installation of iOS MDM Server, depending on the package manager and architecture:
kliosmdm.kpd
iOS MDM Server description file.
akinstall.sh
Script that lets you automate installation of iOS MDM Server.
kliosmdm-<version>.<architecture>.rpm
orkliosmdm_<version>_<architecture>.deb
iOS MDM Server installation package.
kpd.loc/
Folder with CFG files specifying paths to End User License Agreements.
license/
Folder with End User License Agreements and Privacy Policy in different languages in TXT format.
Kaspersky Endpoint Security for Android app
<version>_sc_package.zip
Archive that contains the files required for installing the Kaspersky Endpoint Security for Android app by creating installation packages:
installer.ini
Configuration file that contains Administration Server connection settings.
KES10_<version>.apk
Android package file of the Kaspersky Endpoint Security for Android app.
kesa.kpd
Application description file.
eula/
Folder with End User License Agreements in different languages in TXT format.
kpd.loc/
INI files specifying paths to End User License Agreements.
File with Corporate App Catalog
Install_<version>.exe
—Distribution package of Corporate App Catalog. The package includes the following components:
- Corporate App Catalog
- Corporate App Catalog Management Console
- Apache server
For more information about installing Corporate App Catalog, please refer to the Corporate App Catalog Help.
Documentation
- Help for Kaspersky Secure Mobility Management.
About the Kaspersky Endpoint Security for Android app
The Kaspersky Endpoint Security for Android app ensures the protection of mobile devices against web threats, viruses, and other programs that pose threats.
The Kaspersky Endpoint Security for Android includes the following features:
- Anti-Malware. This component detects and neutralizes threats on the device by using the anti-malware databases and the Kaspersky Security Network cloud service. Anti-Malware includes the following components:
- Protection. It detects threats in open files, scans new apps, and prevents device infection in real time.
- Scan. It is started on demand for the entire file system, only for installed apps, or only for a selected file or folder.
- Update. It lets you download new anti-malware databases for the app.
- Anti-Theft. This component protects the information on the device against unauthorized access in case the device is lost or stolen. This component lets you send the following commands to the device:
- Locate device. Get the coordinates of the device's location.
- Sound alarm. Make the device sound a loud alarm.
- Wipe corporate data. Erase corporate data to protect sensitive company information.
- Web Protection and Web Control. Web Protection blocks malicious websites designed to spread malicious code. Web Protection also blocks fake (phishing) websites designed to steal the user's confidential data (for example, passwords for online banking or e-money systems) and access the user's financial info. Web Protection uses the Kaspersky Security Network cloud service to scan websites before they open. After scanning, Web Protection allows trustworthy websites to load and blocks malicious websites. Web Control allows website filtering by categories defined in the Kaspersky Security Network cloud service. This lets the administrator restrict user access to certain categories of web pages (for example, Gambling, lotteries, sweepstakes or Internet communication).
- App Control. This component lets you install recommended and required apps to an Android device as well as remove blocked apps that violate corporate security requirements.
- Compliance Control. This component lets you check managed devices for compliance with corporate security requirements and impose restrictions on certain functions of non-compliant devices.
You can configure the components of the Kaspersky Endpoint Security for Android app in Kaspersky Security Center Web Console by defining the corresponding policy settings.
On personal devices and devices with a corporate container running Android 15, users can create their own private space. Kaspersky Endpoint Security for Android cannot scan apps, photos, and other files stored in a private space. Web Protection, Web Control, and App Control do not work for apps installed in a private space. Installation of Kaspersky Endpoint Security for Android in a private space is not supported.
Page top
About the Kaspersky Security for iOS app
The Kaspersky Security for iOS app ensures protection of mobile devices against phishing and web threats.
The Kaspersky Security for iOS app offers the following key features:
- Web Protection. This component blocks malicious websites designed to spread malicious code. Web Protection also blocks fake (phishing) websites designed to steal confidential data of the user (for example, passwords for online banking or e-money systems) and access the user's financial info. Web Protection scans websites before you open them, by using the Kaspersky Security Network cloud service. After scanning, Web Protection allows trustworthy websites to load and blocks malicious websites. You can configure this component in Kaspersky Security Center Web Console by defining the settings of group policies.
- Jailbreak detection. When Kaspersky Security for iOS detects a jailbreak, it displays a critical message and informs you about the issue.
About Kaspersky Mobile Devices Protection and Management
The Kaspersky Mobile Devices Protection and Management plug-in lets you manage mobile devices and mobile apps installed on them in Kaspersky Security Center Web Console. The Kaspersky Mobile Devices Protection and Management plug-in can be used to:
- Create group security policies for mobile devices.
- Remotely configure the settings of the Kaspersky Endpoint Security for Android app on users' mobile devices.
- Receive reports and statistics on the operation of the Kaspersky Endpoint Security for Android mobile app on users' devices.
- Remotely configure iOS devices connected using the iOS MDM protocol (hereinafter referred to as "iOS MDM devices") and iOS devices with the Kaspersky Security for iOS app.
- Remotely configure Aurora devices with the Kaspersky Endpoint Security for Aurora app.
The Kaspersky Mobile Devices Protection and Management plug-in can be installed when configuring Kaspersky Security Center Web Console. For more information about deployment scenarios, see Deploying mobile management plug-ins.
Page top
Hardware and software requirements
This section lists the hardware and software requirements for the administrator's computer that is used to deploy apps on mobile devices, as well as the mobile device operating systems supported by Kaspersky Secure Mobility Management.
Hardware and software requirements for the administrator's computer
If you use Kaspersky Security Center Linux, the server host must meet the following requirements:
- Software requirements:
- Administration Server of Kaspersky Security Center Linux 15.1 or later
- Web Console of Kaspersky Security Center Linux 15.1 or later
- Kaspersky Mobile Devices Protection and Management Plug-in 10.53 or later
- iOS MDM Server for Linux 15.1 or later
- iOS MDM Server settings Plug-in 15.1 or later
- Hardware requirements:
- To deploy Kaspersky Secure Mobility Management, the hardware requirements for Kaspersky Security Center must be met.
- For iOS MDM Server:
- CPU with an operating frequency of 1 GHz or higher. For a 64-bit operating system, the minimum CPU frequency is 1.4 GHz
- RAM: 4 GB
- Available disk space: 4 GB
Compatibility with third-party EMM systems
Kaspersky Endpoint Security for Android can function within third-party EMM systems:
- VMware AirWatch 9.3 or later
- MobileIron 10.0 or later
- IBM MaaS360 10.68 or later
- Microsoft Intune 1908 or later
- SOTI MobiControl 14.1.4 (1693) or later
Hardware and software requirements for Kaspersky Endpoint Security for Android
For Kaspersky Endpoint Security for Android, the mobile device must meet the following requirements:
- Smartphone or tablet with a screen resolution of 320x480 pixels or higher
- 65 MB of free disk space in the main memory of the device
- Android 5 or later (including Android 12L, excluding Go Edition)
- x86, x86-64, Arm5, Arm6, Arm7, or Arm8 processor architecture
- The app can be installed only in the main memory of the device
Hardware and software requirements for Kaspersky Security for iOS
For Kaspersky Security for iOS, the mobile device must meet the following requirements:
- iOS 15 or later / iPadOS 15 or later
- Internet connection
Hardware and software requirements for a device management profile (iOS MDM profile)
For a device management profile (iOS MDM profile), the mobile device must meet the following requirements:
- iOS 10 or later / iPadOS 13 or later
- Internet connection
Known issues and considerations
The following known issues are non-critical for the operation of the solution.
Known issues when connecting mobile devices to Kaspersky Security Center
- When connecting a new Android device to Kaspersky Security Center with Google Play as an app installation source, the mobile certificate will be issued for 365 days regardless of the validity period set in the Issuance rules. When the certificate is renewed, the validity period will be the one specified in the certificate settings.
- You cannot select and send the connection details to more than 75 users within a single session of Mobile device connection wizard.
Known issues when managing mobile devices
- If you edit the Name and Description fields on the General tab of the device properties, the changes will not be displayed in the list of mobile devices connected to Kaspersky Security Center due to technical limitations.
Known issues of Kaspersky Security for iOS
- The Kaspersky Security for iOS app does not operate properly when a VPN client with an active VPN connection is running on the same mobile device.
Known issues when installing apps
- Kaspersky Endpoint Security for Android is installed only in the main memory of the device.
- On devices running Android 7, an error may occur during attempts to disable administrator rights for Kaspersky Endpoint Security for Android in the device settings if Kaspersky Endpoint Security for Android is prohibited from overlaying other windows. This issue is caused by a well-known defect in Android 7.
- Kaspersky Endpoint Security for Android on devices running Android 7.0 or later does not support multi-window mode.
- Kaspersky Endpoint Security for Android does not work on Chromebook devices running the Chrome operating system.
- Kaspersky Endpoint Security for Android does not work on devices running Android (Go edition) operating systems.
- When using the Kaspersky Endpoint Security for Android app with third-party EMM systems (for example, VMWare AirWatch) without connecting to Kaspersky Security Center, only the Anti-Malware and Web Protection components are available. The administrator can configure the settings of Anti-Malware and Web Protection in the EMM system console. In this case, notifications about app operation are available only in the interface of the Kaspersky Endpoint Security for Android app (Reports).
- When installing Kaspersky Endpoint Security for Android on a corporate device using ADB, if you set a screen unlock password on the device after you reset it to factory settings, you must reset the device to factory settings again before installing the app.
Known issues when upgrading the app version
- You can upgrade Kaspersky Endpoint Security for Android only to a more recent version of the app. Kaspersky Endpoint Security for Android cannot be downgraded to an older version.
Known issues affecting Wi-Fi
- On iOS MDM devices, if you disable automatic connection to an existing Wi-Fi network in the policy settings, you will not be able to enable automatic connection to this network again. This is due to an issue known to Apple.
Known issues affecting Anti-Malware
- Due to technical limitations, Kaspersky Endpoint Security for Android cannot scan files with a size of 2 GB or more. During a scan, the app skips such files without notifying you that such files were skipped.
- To further analyze a device for new threats for which information has not yet been added to anti-malware databases, you must enable the use of Kaspersky Security Network. Kaspersky Security Network (KSN) is an infrastructure of cloud services providing access to the Kaspersky online knowledge base with information about the reputation of files, web resources, and software. To use KSN, the mobile device must be connected to the internet.
- In some cases, updating anti-malware databases from the Administration Server on a mobile device may fail. In this case, run the anti-malware database update task on the Administration Server.
- On some devices, Kaspersky Endpoint Security for Android does not detect devices connected over USB OTG. It is not possible to run a malware scan on such devices.
- On devices running Android 11 or later, the Kaspersky Endpoint Security for Android app can't scan the "Android/data" and "Android/obb" folders and detect malware in them due to technical limitations.
- On devices running Android 11 or later, the user must grant the "Allow access to manage all files" permission.
- On devices running Android 7 or later, the configuration window for the malware scan run schedule might display incorrectly (management elements are not shown). This issue is caused by a well-known defect in Android 7.
- On devices running Android 7, real-time protection in extended mode does not detect threats in files stored on an external SD card.
- On devices running Android 6, Kaspersky Endpoint Security for Android does not detect the downloading of a malicious file to the device memory. A malicious file may be detected by Anti-Malware when the file is run or during a malware scan of the device. This issue is caused by a well-known defect in Android 6. To ensure device security, it is recommended to configure scheduled malware scans.
Known issues affecting Web Protection and Web Control
- Web Control on Android devices is supported only by Google Chrome, HUAWEI Browser, Samsung Internet, and Yandex Browser.
- The Custom Tabs feature is supported by Google Chrome, HUAWEI Browser, and Samsung Internet.
- Web Control for HUAWEI Browser, Samsung Internet Browser, and Yandex Browser does not block sites on a mobile device if a corporate container is used and Web Protection is enabled only for the corporate container.
- For Web Protection and Web Control to work, you must enable the use of Kaspersky Security Network. Web Control blocks websites based on KSN data on the reputation and category of websites.
- Forbidden websites may remain unblocked by Web Control on devices running Android 6 with Google Chrome version 51 (or any earlier version) installed if the website is opened in the following ways (this issue is caused by a well-known defect in Google Chrome):
- From search results.
- From the bookmarks list.
- From the search history.
- Using the web address autocomplete function.
- Opening the website in a new tab in Google Chrome.
- Forbidden websites may remain unblocked in Google Chrome version 50 (or any earlier version) if the website is opened from Google search results while the Merge Tabs and Apps feature is enabled in the browser settings. This issue is caused by a well-known defect in Google Chrome.
- Websites from blocked categories may remain unblocked in Google Chrome if the user opens them from third-party apps, for example, from an IM client app. This issue is related to how the Accessibility service works with the Chrome Custom Tabs feature.
- Forbidden websites may remain unblocked in Samsung Internet if the user opens them in background mode from the context menu or from third-party apps, for example, from an IM client app.
- Kaspersky Endpoint Security for Android must be set as an Accessibility feature to ensure proper functioning of Web Protection and Web Control.
- On some Xiaomi devices, the "Display pop-up window" and "Display pop-up windows while running in the background" permissions should be granted for Web Protection and Web Control to work.
- Allowed websites may be blocked in Samsung Internet in the Allow only listed websites Web Control mode when the page is refreshed. Websites are blocked if a regular expression contains advanced settings (for example,
^https?://example.com/pictures/
). It is recommended to use regular expressions without additional settings (for example,^https?://example.com
). - If Web Control is set to Prohibit all websites, Kaspersky Endpoint Security for Android does not block search in the Google Search widget. Instead, it blocks user access to the search results.
- In a corporate container, if Web Control is set to Prohibit all websites, Kaspersky Endpoint Security for Android endlessly reloads the Google Chrome home page, blocks the browser, and interferes with the device.
- In Yandex Browser and Samsung Internet, malicious and phishing websites may remain unblocked. This is because only the website domain is scanned, and if it is trusted, Web Protection can skip a threat.
- The list of allowed websites created in the Web Control card does not display in Safari on iOS MDM devices. However, Web Control still works and users can access only allowed websites.
- If the Check full URL when using Custom Tabs option is enabled in the Web Control section of the policy settings, switching to the full version of supported browsers only works for phishing and malicious websites.
- On iOS devices operating in basic protection mode, when you change the language on the device or restart the device, Web Protection is disabled. To enable Web Protection, after you change the language or the device restarts, wait about a minute and then open Kaspersky Security for iOS.
Known issues affecting Anti-Theft
- For timely delivery of commands to Android devices, the app uses the Firebase Cloud Messaging (FCM) service. If FCM is not configured, commands will be delivered to the device only during synchronization with Kaspersky Security Center according to the schedule defined in the policy, for example, every 24 hours.
- To lock a device, Kaspersky Endpoint Security for Android must be set as a device administrator.
- To lock devices running Android 7 or later, Kaspersky Endpoint Security for Android must be set as an Accessibility feature.
- On some devices, Anti-Theft commands may fail to execute if Battery Saver mode is enabled on the device. This defect has been confirmed on Alcatel 5080X.
- To locate devices running Android 10 or later, the user must grant the "All the time" permission for device location.
Known issues affecting App Control
- Kaspersky Endpoint Security for Android must be set as an Accessibility feature to ensure proper functioning of App Control. This does not apply to corporate devices.
- For App Control (app categories) to work, you must enable the use of Kaspersky Security Network. App Control determines the category of an app based on data that is available in KSN. To use KSN, the mobile device must be connected to the internet. For App Control, you can add individual apps to the lists of blocked and allowed apps. In this case, KSN is not required.
- When configuring App Control, it is recommended to clear the Block system apps check box. Blocking system apps may lead to problems in the operation of the device.
- On iOS MDM devices, if you specify allowed apps in the list of apps allowed to be installed, all apps except system apps and those added to the list of allowed apps will be hidden on the device screen.
- On some HUAWEI and Honor personal devices, apps from allowed categories may be blocked and apps from forbidden categories may remain unblocked. This is because the category for some apps from the App Gallery cannot be correctly defined.
- On some Samsung and Oppo devices, app icons may remain hidden on the home screen after clearing the Block system apps check box. This is due to limitations of the Android operating system.
Known issues affecting Compliance Control
- The Send a message to the user response does not work in Compliance Control for iOS MDM devices.
- If a non-existent operating system version is specified in the Operating system version criterion, the device will upgrade to the latest downloaded operating system.
Known issues when managing certificates
- When the Integrate issuance of certificates with Microsoft Certification Authority (CA) via PKI option is enabled in the Issuance rules, the settings of mail and VPN certificates may remain inactive for a certain time while waiting for the PKI response.
- You cannot automatically renew a mail or VPN certificate uploaded from a file (with the Integrate issuance of certificates with Microsoft Certification Authority (CA) via PKI option disabled in the PKI settings section of the Issuance rules), since there is no access to the Certificate Authority (CA) of such a certificate. To renew the certificate, you need to upload a new certificate file manually.
- When issuing mail or VPN certificates for Android devices in the Certificate issuance wizard, if the Connect without mobile certificate authentication option is selected as the Connection method and the Domain or internal user credentials option is selected as the Authentication method, an error indicating that the login and password are incorrect occurs when the user attempts to receive the certificate. In this case, choose a different authentication method.
- When installing a custom Administration Server reserve certificate using a file in PEM (X.509) format, the "Failed to save the changes" error may occur. We recommend that you try to upload the certificate file again or use a certificate in PKCS #12 format.
Known issues when configuring the device unlock password strength
- On devices running Android 10 or later, Kaspersky Endpoint Security resolves the password strength requirements into one of the system values: medium or high.
If the password length required is 1 to 4 symbols, then the app prompts the user to set a medium-strength password. It must be either numeric (PIN), with no repeating or ordered sequences (e.g. 1234), or alphanumeric. The PIN or password must be at least 4 characters long.
If the password length required is 5 or more symbols, then the app prompts the user to set a high-strength password. It must be either numeric (PIN), with no repeating or ordered sequences, or alphanumeric (password). The PIN must be at least 8 digits long. The password must be at least 6 characters long.
- On devices running Android 7.1.1, if the unlock password does not meet the corporate security requirements (Compliance Control), the Settings system app may function improperly when an attempt is made to change the unlock password through Kaspersky Endpoint Security for Android. The issue is caused by a well-known defect in Android 7.1.1. In this case, only use the Settings system app to change the unlock password.
- On some devices running Android 6 or later, if device data is encrypted, an error may occur when the screen unlock password is entered. This issue is related to specific features of the Accessibility service with MIUI firmware.
- On some iOS MDM devices, if the Minimum number of special characters value is specified and the Allow simple password check box is selected, the device displays information about setting a password of 6 or more characters even though it is possible to set a password of 4 or more characters.
Known issues affecting App removal protection
- Kaspersky Endpoint Security for Android must be set as a device administrator.
- To protect the app from removal on devices running Android 7 or later, Kaspersky Endpoint Security for Android must be set as an Accessibility feature.
- On some Xiaomi and HUAWEI devices, Kaspersky Endpoint Security for Android removal protection does not work. This issue is caused by the specific features of MIUI 7 and 8 firmware on Xiaomi and EMUI firmware on HUAWEI.
Known issues when configuring device restrictions
- On personal devices and devices with a work profile running Android 10 or later, prohibiting the use of Wi-Fi networks is not supported.
- On devices running Android 11 or later, Kaspersky Endpoint Security for Android must be set as an Accessibility feature. Kaspersky Endpoint Security for Android prompts the user to set the app as an Accessibility feature through the Initial Configuration Wizard. The user can skip this step or later disable this service in the device settings. If this is the case, you will not be able to restrict use of the camera.
- On iOS MDM devices, users may be able to enable Spotlight internet search results in Siri Suggestions even if the Prohibit Spotlight suggestions check box is selected. This is due to an issue known to Apple.
- On Android devices, when use of the camera is prohibited, some apps may close automatically. This issue is due to how services and features such as Android System Intelligence and Screen Attention use the device camera to keep the screen on while the user is looking at it.
Known issues when sending commands to mobile devices
- On devices running Android 12 or later, if the user granted the "Use approximate location" permission, the Kaspersky Endpoint Security for Android app first tries to get the precise device location. If this is not successful, the approximate device location is returned only if it was received within the last 30 minutes. Otherwise, the Locate device command fails.
- The Locate device command does not work on Android devices if Google Location Accuracy is disabled in the settings. Please be aware that not all Android devices come with this location setting.
- If you send the Enable Lost Mode command to a supervised iOS MDM device without a SIM card and the device is restarted, the device won't be able to connect to Wi-Fi and receive the Disable Lost Mode command. This is a specific feature of iOS devices. To avoid this issue, you can either send the command only to devices with a SIM card, or insert a SIM card into the locked device to allow it to receive the Disable Lost Mode command over the mobile network.
- The Reset to factory settings command is unavailable for personal devices and devices with a corporate container running Android 14 or later.
Known issues affecting specific devices
- On certain devices (for example, HUAWEI, Meizu, and Xiaomi), you must grant Kaspersky Endpoint Security for Android the autostart permission or manually add it to the list of apps that are started when the operating system starts. If the app is not added to the list, Kaspersky Endpoint Security for Android stops performing all of its functions after the mobile device is restarted. In addition, if the device has been locked, you cannot use a command to unlock the device. You can unlock the device only by using a one-time unlock code.
- On certain devices (for example, Meizu and Asus) running Android 6 or later, after encrypting data and restarting the Android device, you must enter a numeric password to unlock the device. If the user uses a graphic password to unlock the device, you must convert the graphic password to a numeric password. For more details about converting a graphic password into a numeric password, please refer to the Technical Support website of the mobile device manufacturer. This issue is related to the operation of the Accessibility Features service.
- On some HUAWEI devices running Android 5.Х, after Kaspersky Endpoint Security for Android is set as an Accessibility feature, the device may incorrectly display a message about a lack of sufficient rights. To hide this message, enable the app as a protected app in the device settings.
- On some HUAWEI devices running Android 5.X or 6.X, when Battery Saver mode is enabled for Kaspersky Endpoint Security for Android, the user can manually terminate the app. The user device then becomes unprotected. This issue is due to some features of HUAWEI software. To restore device protection, run Kaspersky Endpoint Security for Android manually. It is recommended to disable Battery Saver mode for Kaspersky Endpoint Security for Android in the device settings.
- On HUAWEI devices with EMUI firmware running Android 7, the user can hide the notification regarding the protection status of Kaspersky Endpoint Security for Android. This issue is due to some features of HUAWEI software.
- On some Xiaomi devices, when setting the password length to more than 5 characters in a policy, the user will be prompted to change the screen unlock password instead of the PIN code. You cannot set a PIN code that has more than 5 characters. This issue is due to some features of Xiaomi software.
- On Xiaomi devices with MIUI firmware running Android 6, the Kaspersky Endpoint Security for Android icon may be hidden in the status bar. This issue is due to some features of Xiaomi software. It is recommended to allow the display of notification icons in the Notifications settings.
- On some Nexus devices running Android 6.0.1, the privileges required for proper operation cannot be granted through the Quick Start Wizard of Kaspersky Endpoint Security for Android. This issue is caused by a well-known defect in Security Patch for Android by Google. To ensure proper operation, the required privileges must be manually granted in the device settings.
- On certain Samsung devices running Android 7 or later, when the user attempts to configure unsupported methods for unlocking the device (for example, a graphical password), the device may be locked if the following conditions are met: Kaspersky Endpoint Security for Android removal protection is enabled and screen unlock password strength requirements are set. To unlock the device, you must send a special command to the device.
- On certain Samsung devices, it is impossible to block the use of fingerprints for unlocking the screen.
- Web Protection and Web Control cannot be enabled on some Samsung devices, if the device is connected to a 3G/4G network, has Battery Saver mode enabled and restricts background data. It is recommended to disable the function that restricts background processes in Battery Saver settings.
- On certain Samsung devices, if the unlock password does not comply with corporate security requirements, Kaspersky Endpoint Security for Android does not block the use of fingerprints for unlocking the screen.
- On some Honor and HUAWEI devices, you cannot restrict the use of Bluetooth. When Kaspersky Endpoint Security for Android attempts to restrict the use of Bluetooth, the operating system shows a notification with options to reject or allow this restriction. The user can reject this restriction and continue to use Bluetooth.
- On Blackview devices, the user can clear the memory for the Kaspersky Endpoint Security for Android app. As a result, device protection and management are disabled, all defined settings become ineffective, and the Kaspersky Endpoint Security for Android app is removed from the Accessibility features. This is because this vendor's devices provide elevated privileges to the customized Recent screens app. This app can override Kaspersky Endpoint Security for Android settings and cannot be replaced because it is part of the Android operating system.
- On some Google Pixel devices running Android 11 or earlier, the Kaspersky Endpoint Security for Android app crashes immediately after starting. This is caused by an issue in Android.
- On HUAWEI P60 Pro, a corporate container cannot be created.
Known issues affecting the app on Android 13
- On Android 13, the user can use the Foreground Services Task Manager to stop Kaspersky Endpoint Security from running in the background. This is caused by a well-known issue in Android 13.
- On Android 13, the permission to send notifications is requested when the initial app configuration begins. This is due to specifics of the Android 13 operating system.
Known issues affecting policy profiles
- If you switch to a license with basic functionality, settings that are available only with a license with extended functionality do not reset to defaults in policy profiles.
Known issues in role-based access control
- If the License key management right is not granted, when opening an existing policy, an error may occur. This does not affect the operation of the policy.
- If the License key management right is not granted, you can create a policy without choosing the license in the Mobile policy wizard. However, in this case, you cannot configure the policy settings.
Getting started
This section is intended for specialists who install the Kaspersky Secure Mobility Management solution, as well as for specialists who provide technical support to organizations that use Kaspersky Secure Mobility Management.
Solution architecture
Kaspersky Secure Mobility Management includes the following components:
- Kaspersky Endpoint Security for Android mobile app
The Kaspersky Endpoint Security for Android app protects mobile devices against web threats, viruses, and other apps that pose threats.
- Kaspersky Security for iOS mobile app
The Kaspersky Security for iOS app protects mobile devices against phishing and web threats and lets you detect jailbreaking on devices.
- Kaspersky Mobile Devices Protection and Management plug-in
The Kaspersky Mobile Devices Protection and Management plug-in lets you manage devices running Android and iOS in Kaspersky Security Center Web Console.
- iOS MDM Server
iOS MDM Server lets you connect iOS devices to the Administration Server and manage iOS devices.
- iOS MDM Server settings plug-in
The iOS MDM Server settings plug-in lets you configure iOS MDM Server settings.
Deployment scenarios
The deployment of Kaspersky Secure Mobility Management in Kaspersky Security Center Web Console consists of the following steps:
- Deploying Kaspersky Security Center Linux and Kaspersky Security Center Web Console
- Deploying mobile management plug-ins
- Configuring Administration Server settings for connecting mobile devices
- Deploying an iOS device management system
- Deploying an Android device management system
- Managing mobile devices in Kaspersky Security Center Web Console
Deploying a mobile device management solution in Kaspersky Security Center Web Console
To connect and manage mobile devices using Kaspersky Security Center Web Console, you must deploy a mobile device management solution. This section describes the recommended actions when getting started with Kaspersky Secure Mobility Management.
Page top
Deploying Kaspersky Security Center Linux and Kaspersky Security Center Web Console
Select a Linux device that you intend to use as the administrator's workstation, ensure that the device meets the software and hardware requirements, and then install Kaspersky Security Center and Kaspersky Security Center Web Console on the device.
For instructions on installing Kaspersky Security Center Linux, refer to the Kaspersky Security Center Help.
For instructions on installing Kaspersky Security Center Web Console, refer to the Kaspersky Security Center Help.
Page top
Deploying mobile management plug-ins
To use the Kaspersky Secure Mobility Management solution and connect mobile devices, you must add and install the following mobile management plug-ins:
- Kaspersky Mobile Devices Protection and Management
on_prem_ksm_policies_<version>.zip
Archive that contains the files required for the installation of the Kaspersky Mobile Devices Protection and Management plug-in:
plugin.zip
Archive that contains the Kaspersky Mobile Devices Protection and Management plug-in.
signature.txt
File that contains the signature for the Kaspersky Mobile Devices Protection and Management plug-in.
- iOS MDM Server settings
on_prem_iosmdm_<version>.zip
Archive that contains the files required for the installation of the iOS MDM Server settings plug-in:
plugin.zip
Archive that contains the iOS MDM Server settings plug-in.
signature.txt
File that contains the signature for the iOS MDM Server settings plug-in.
To install a management plug-in:
- In the main window of Kaspersky Security Center Web Console, select Settings > Web plug-ins.
- In the window that opens, click Add.
The list of available plug-ins is displayed.
- In the list of available plug-ins, select the plug-in you want to install by clicking on its name.
A plug-in description page is displayed.
- On the plug-in description page, click Install plug-in.
- When the installation is complete, click OK.
The management plug-in is downloaded with the default configuration and displayed in the list of management plug-ins.
You can add plug-ins and update downloaded plug-ins from a file. You can download management plug-ins and web management plug-ins from the Kaspersky Customer Service webpage.
To load or update a plug-in from a file:
- In the main window of Kaspersky Security Center Web Console, select Settings > Web plug-ins.
- In the window that opens:
- Click Add from file to load a plug-in from a file.
- Click Update from file to load an update of a plug-in from a file.
- Specify the file and signature of the file.
- Load the specified files.
The management plug-in is loaded from the file and displayed in the list of management plug-ins.
Updates functionality (including providing anti-malware signature updates and codebase updates), as well as KSN functionality may not be available in the software in the U.S.
Page top
Configuring Administration Server settings for connecting mobile devices
Before connecting mobile devices to Kaspersky Security Center Web Console, you must define the connection settings in the Administration Server properties.
To configure Administration Server settings for connecting mobile devices:
- In the main window of Kaspersky Security Center Web Console, click the settings icon (
) next to the name of the Administration Server.
- In the Administration Server properties window that opens, configure the Administration Server port that will be used by mobile devices:
- In the General tab, select the Additional ports section.
- Enable the Open port for mobile devices toggle button.
If this option is enabled, the port for mobile devices will be open on the Administration Server.
- In the Port for mobile device synchronization field, specify the port through which mobile devices will connect to the Administration Server.
Port 13292 is used by default.
If the Open port for mobile devices toggle button is off or an incorrect connection port is specified, mobile devices will not be able to connect to the Administration Server.
- If necessary, edit the certificate that will be used by mobile devices to connect to the Administration Server.
By default, Administration Server uses the certificate created after the port for mobile devices is opened. You can reissue or replace the certificate issued through the Administration Server with another certificate.
To edit the certificate:
- In the General tab, select the Certificates section.
- Define the required settings.
For more details on working with certificates in Kaspersky Security Center Linux, refer to the Kaspersky Security Center Help.
- Click Save to save the changes you have made and exit the Administration Server properties window.
The mobile device connection settings are configured.
Page top
Scenario: Configuring a connection gateway to connect mobile devices to Kaspersky Security Center Web Console
This scenario describes how to configure a connection gateway to connect mobile devices to Kaspersky Security Center Administration Server.
Requirements
For a connection gateway to work correctly with mobile devices, the following requirements must be met:
- Port 13292 must be open on the host with the connection gateway.
- Port 13000 must be open between the connection gateway and Kaspersky Security Center. It does not need to be open outside the DMZ.
- The host must have a static address accessible from the internet.
Stages
The configuration proceeds in the following steps:
- Installing Network Agent in the connection gateway role on a host
First, you need to install Network Agent on the selected host device acting in the gateway connection role.
For information about generating a Network Agent installation package, refer to the Kaspersky Security Center Help.
You can install Network Agent in interactive mode by specifying installation parameters step by step. Alternatively, you can use an answer file—a text file that contains a custom set of installation parameters: variables and their respective values. Using this answer file allows you to run an installation in silent mode, that is, without user participation. For information on installing Network Agent in silent mode, refer to the Kaspersky Security Center Help.
- Configuring the connection gateway on Kaspersky Security Center Administration Server
Once you have installed Network Agent in the connection gateway role, you must connect it to Administration Server. Administration Server does not yet list the device with the connection gateway among the managed devices because the connection gateway has not tried to connect to Administration Server.
You must create a new group under the Managed Devices group and add the device acting as a connection gateway to the group that you have created. For information on manually adding devices to groups in Kaspersky Security Center Web Console, refer to the Kaspersky Security Center Help.
After that, assign the device as a distribution point and configure the distribution point to act as a connection gateway in the Connection gateway section of the distribution point properties. Then enable the Open port for mobile devices (SSL authentication of the Administration Server only) and Open port for mobile devices (two-way SSL authentication) options and specify ports and DNS domain names of the distribution point to connect mobile devices.
Results
The connection gateway will be configured. You will be able to add new mobile devices by specifying the connection gateway address.
Page top
Adding installation packages to Administration Server repository
For further deployment of mobile management systems, you need to add the following installation packages to the Administration Server repository:
- Network Agent Linux installation package (for later installation of Network Agent on a workstation).
- iOS MDM Server installation package (for later installation of iOS MDM Server to connect and manage iOS devices).
- Kaspersky Endpoint Security for Android installation package (for later installation of Kaspersky Endpoint Security for Android on devices).
For instructions on adding installation packages to the Administration Server repository, refer to the Kaspersky Security Center Help.
Page top
Adding a license key to the Administration Server repository
To connect mobile devices to Kaspersky Security Center Web Console and manage them, you must add a license key that supports the Mobile Device Management solution to the Administration Server repository.
The license under which the solution is used determines a scope of basic or advanced settings you can configure. With a license that does not provide the extended Kaspersky Secure Mobility Management functionality, only basic device protection settings are available in the Kaspersky Mobile Devices Protection and Management plug-in. For detailed information on licenses, refer to the About the license section.
To add a license key to the Administration Server repository:
- In the main window of Kaspersky Security Center Web Console, click the settings icon (
) next to the name of the Administration Server.
In the Administration Server properties window that opens:
- In the General tab, select the License keys section.
- In the Current license block of settings, click Select and specify the KEY file you want to add.
The license you choose must support the Mobile Management solution.
- Click Save.
The license key is added to the Administration Server repository.
To view the list of the license keys added to the Administration Server repository:
In the main window of Kaspersky Security Center Web Console, select Operations > Kaspersky licenses.
The displayed list contains the key files and activation codes added to the Administration Server repository.
To view the detailed information about a license key:
- In the main window of Kaspersky Security Center Web Console, select Operations > Kaspersky licenses.
- Click the name of the required license key.
In the license key properties window that opens, on the General tab, you can view the detailed information about the selected license key.
Installing Network Agent Linux
Network Agent Linux is a Kaspersky Security Center component that enables interaction between the Administration Server and Kaspersky applications that are installed on a workstation or server.
To deploy an iOS device management system, you must install Network Agent on a workstation on which iOS MDM Server will later be deployed. After Network Agent is installed, you will be able to configure and install iOS MDM Server on it to subsequently connect and manage iOS devices.
For the instructions on installing Network Agent Linux, refer to the Kaspersky Security Center Help.
Page top
Configuring Kaspersky Security Center Linux Web Server settings
Kaspersky Security Center Linux Web Server (Web Server) is a component of Kaspersky Security Center Linux installed together with the Administration Server. Web Server is designed for network transmission of stand-alone installation packages, device management profiles, and files from a shared folder.
Installation packages that have been created are published on Web Server automatically and then removed after the first download. The administrator can send a new link to the user in any convenient way, such as by email.
For detailed information, refer to the Kaspersky Security Center Help.
To connect mobile devices, make sure the Web Server FQDN is specified correctly in the Administration Server properties:
- In the main window of Kaspersky Security Center Web Console, click the settings icon (
) next to the name of the Administration Server.
- In the Administration Server properties window that opens, on the General tab, select the Web Server section.
- In the Web Server FQDN field, check if the specified FQDN (a fully qualified domain name) is publicly resolvable by DNS servers.
Deploying an iOS device management system
Kaspersky Secure Mobility Management lets you manage mobile devices running iOS. This section describes the deployment of an iOS device management system.
Page top
About iOS device operating modes
The device operating mode depends on the owner of the mobile device (personal or corporate) and corporate security requirements. You can choose the operating mode that is most suitable for your company and use several modes at the same time.
The following device operating modes are available for iOS devices:
- Basic protection
- Basic control
- Supervised
Basic protection
Basic protection is the device operating mode for personal or corporate iOS devices. This operating mode lets you protect against web threats and detect jailbreaking on devices using the Kaspersky Security for iOS app.
Basic control
Basic control is the device operating mode for personal iOS devices. This operating mode lets you protect and perform basic management of devices.
The user is allowed to use a personal Apple ID, work with any apps, and store personal data on the device. You can configure policy settings to control user's access to corporate resources and manage other security requirements.
To manage iOS devices in the basic control operating mode, you must have an installed and configured iOS MDM Server.
Supervised
Supervised is the device operating mode for corporate iOS devices. This operating mode provides a wider range of settings to define through the policy than devices in other operating modes, for example:
- Send additional commands to manage Bluetooth settings, update operating system, locate device or sound alarm in Lost Mode.
- Manage advanced restrictions:
- Network restrictions (prohibit modifying Personal Hotspot settings, prohibit creating VPN configurations, force Wi-Fi on and allow connection to specified Wi-Fi networks on, prohibit modifying Bluetooth settings).
- App restrictions (for example, prohibit installation of apps from Apple Configurator and iTunes).
- Prohibit access to USB devices in Files and disable access to USB devices when the device is locked.
- Configure advanced App Control settings (for example, create custom lists of allowed and forbidden apps).
- Configure Web Control settings.
- Configure an HTTP proxy server to monitor internet traffic on a device within the corporate network.
To manage iOS devices in the supervised operating mode, you must have an installed and configured iOS MDM Server and devices switched to the supervised status in Apple Configurator. For detailed information on working with Apple Configurator, refer to the Apple Technical Support website.
Page top
About device management profiles
A device management profile is a profile that contains the settings for connecting mobile devices running iOS to Kaspersky Security Center. After installation of device management profile and device synchronization with iOS MDM Server, the device becomes a managed device (iOS MDM device). iOS MDM devices are managed through the Apple Push Notification service (APNs).
Using a device management profile, you can do the following:
- Remotely configure the settings of iOS devices using policies.
- Send commands to iOS MDM devices.
- Remotely install Kaspersky apps and third-party apps.
The deployment of a device management profile is carried out via Kaspersky Security Center Web Console using the Mobile device connection wizard. The user installs the device management profile after receiving an email with the details for connecting the mobile device to Kaspersky Security Center. No additional preparations for the profile are required.
Before installing a device management profile, you must deploy an iOS device management system.
Page top
Deploying Kaspersky Security for iOS
This section contains a general overview of the Kaspersky Security for iOS app and the activation process.
For detailed information on Kaspersky Security for iOS features and how to install, update, or remove the app, refer to the Using the Kaspersky Security for iOS app section.
Page top
About Kaspersky Security for iOS
The Kaspersky Security for iOS app ensures protection of mobile devices against phishing and web threats.
The Kaspersky Security for iOS app offers the following key features:
- Web Protection. This component blocks malicious websites designed to spread malicious code. Web Protection also blocks fake (phishing) websites designed to steal the user's confidential data (for example, passwords for online banking or e-money systems) and access the user's financial info. Web Protection uses the Kaspersky Security Network cloud service to scan websites before they are opened. After scanning, Web Protection allows trustworthy websites to load and blocks malicious websites. You can configure this component in Kaspersky Security Center Web Console by defining the corresponding policy settings.
- Jailbreak detection. When Kaspersky Security for iOS detects a jailbreak, it displays a critical message and informs you about the issue.
Activating Kaspersky Security for iOS
In Kaspersky Security Center, the license can cover various groups of features. To ensure that the Kaspersky Security for iOS app is fully functional, the Kaspersky Security Center license purchased by the organization must support the Mobile Device Management functionality.
For detailed information about licensing options, refer to the About the license section.
The Kaspersky Security for iOS app is activated on a mobile device by providing valid license information to the app. License information is delivered to the device together with the policy settings as soon as the device is synchronized with Kaspersky Security Center.
If activation of the mobile app is not completed within 30 days from the time of installation on the mobile device, the app is automatically switched to limited functionality mode. In this mode, most of the app components are not operational. When switched to limited functionality mode, the app stops performing automatic synchronization with Kaspersky Security Center. Accordingly, if activation of the app has not been completed within 30 days after the installation, the user must synchronize the device with Kaspersky Security Center manually.
If Kaspersky Security Center is not deployed in your organization or is not accessible to mobile devices, users can activate the mobile app on their devices manually.
To activate the mobile app:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Click the License button.
- In the window that opens, use the drop-down list to select the required license key from the key storage of the Administration Server.
The details of the license key are displayed in the fields below.
If a key file is selected from the Kaspersky Security Center key storage and sent to the device, Kaspersky Security for iOS will be not able to process it, because Kaspersky Security for iOS does not support this activation method. To activate Kaspersky Security for iOS, you must add an activation code to Kaspersky Security Center.
You can replace the existing activation key on the mobile device if it is different from the one selected in the drop-down list above. To do so, select the Replace with selected key if the key on devices is different check box.
- Click Save to save the changes you have made.
The app is activated after the next device synchronization with the Administration Server.
The user can also contact the administrator for an activation code and enter it manually.
Page top
Deploying a management system using the iOS MDM protocol
iOS devices with basic control and supervised operating modes are managed using the iOS MDM protocol. To deploy a mobile management system using the iOS MDM protocol and connect iOS devices to Kaspersky Security Center, follow these steps:
- Deploy iOS MDM Server
- Receive an APNs certificate
- Install the APNs certificate on iOS MDM Server
- Connect iOS devices to Kaspersky Security Center
Deploying iOS MDM Server
iOS MDM Server is a component of Kaspersky Secure Mobility Management which allows iOS MDM devices to connect to Kaspersky Security Center and facilitates management of these devices through Apple Push Notifications (APNs) by installing dedicated device management profiles on them.
iOS MDM Server receives inbound connections from mobile devices through its TLS port (by default, port 443), which is managed by Kaspersky Security Center using Network Agent. Network Agent is installed locally on a device with an iOS MDM Server deployed.
The number of copies of iOS MDM Server to be installed can be selected either based on available hardware or on the total number of mobile devices covered.
Please keep in mind that the recommended maximum number of mobile devices to be managed through iOS MDM Server is 50,000. In order to reduce the load, the entire pool of devices can be distributed among several servers that have iOS MDM Server installed.
Page top
Configuring an iOS MDM Server installation package
Before you install iOS MDM Server, you need to configure the iOS MDM Server installation package properties.
The iOS MDM Server installation package is an archive that contains the files required for the installation of the iOS MDM Server depending on the package manager and architecture: kliosmdm-<architecture>-<version>-<package manager>_<language>.tar.gz
To configure an iOS MDM Server installation package:
- In the main window of Kaspersky Security Center We Console, select Operations > Repositories > Installation packages.
- In the window that opens, click the iOS MDM Server installation package you want to configure.
The installation package properties window opens.
- In the Settings tab, specify the iOS MDM Server properties.
- In the Connection settings group of settings, configure the following properties:
It is recommended to use the default values.
- iOS MDM external connection port. In this field, specify an external port for connecting mobile devices to the iOS MDM service.
External port 5223 is used by mobile devices for communication with the APNs server. Make sure that port 5223 is open in the Firewall for connecting with the address range 17.0.0.0/8.
Port 443 is used for connecting to iOS MDM Server by default. If port 443 is already in use by another service or application, it can be replaced with, for example, port 9443.
Port 2197 is used by iOS MDM Server to send notifications to the APNs server. APNs servers run in load-balancing mode. Mobile devices do not always connect to the same IP addresses to receive notifications. The 17.0.0.0/8 address range is reserved for Apple, and it is therefore recommended to specify this entire range as an allowed range in Firewall settings.
- Network Agent connection port. In this field, specify a port for connecting the iOS MDM service to Network Agent. The default port number is 9799.
- iOS MDM local connection port. In this field, specify a local port for connecting Network Agent to the iOS MDM service. The default port number is 9899.
- iOS MDM external connection port. In this field, specify an external port for connecting mobile devices to the iOS MDM service.
- In the iOS MDM Server address group of settings, specify the address of the workstation on which iOS MDM Server is to be installed. This address will be used for connecting managed mobile devices to the iOS MDM service. The workstation must be available for connection of iOS MDM devices.
Choose one of the following options:
- Use FQDN device name. The fully qualified domain name (FQDN) of the device will be used.
- Use specified address. Specify the specific address of the device manually.
Do not add the URL scheme and the port number in the address string. These values will be added automatically.
- In the Connection settings group of settings, configure the following properties:
- Click Save.
The iOS MDM Server installation package properties are configured. Now you can install iOS MDM Server with the specified settings.
Page top
Installing iOS MDM Server using a remote installation task
Kaspersky Security Center Web Console lets you install iOS MDM Server remotely using a remote installation task. This task is created and assigned to up to 1000 devices through a corresponding wizard. The wizard will help install iOS MDM Server in an administration group, on devices with specific IP addresses, or on a selection of managed devices.
Please note that you will not be able to specify the iOS MDM Server settings during the installation. The settings are configured in the iOS MDM Server installation package properties.
Before installing iOS MDM Server on a device, make sure the Kaspersky Mobile Devices Protection and Management and iOS MDM Server settings plug-ins are installed.
To install iOS MDM Server using a remote installation task:
- Install Network Agent on a workstation on which iOS MDM Server will be deployed.
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → iOS MDM Servers.
- Click Install.
The New task wizard starts. Proceed through the wizard using the Next button.
- In the New task settings window that opens:
- In the Task name field, specify a custom name for the task, if necessary (The default name is "Install iOS MDM Server").
- In the Devices to which the task will be assigned group of settings, choose Specify device addresses manually or import addresses from a list. You can specify DNS names, IP addresses, and IP subnets of devices to which you want to assign the task.
- At the Task scope step:
- Click Add devices.
- In the window that opens, in the drop-down list, choose the Select networked devices detected by Administration Server option.
- Select devices or a device selection.
- Click Add.
After you add the devices, they are displayed in the table.
- At the Installation packages step, specify the following settings:
- In the Select installation package field, select the configured iOS MDM Server installation package.
- In the Select Network Agent field, select the installed Network Agent.
- In the Force installation package download group of settings, select the Using Network Agent check box to distribute the files that are required for iOS MDM Server installation via Network Agent.
- In the Maximum number of concurrent downloads field, specify the maximum allowed number of devices to which Administration Server can simultaneously transmit the files.
- In the Maximum number of installation attempts field, specify the maximum number of times the installer will be allowed to run.
- Specify the additional settings:
- Click the Do not re-install application if it is already installed check box. The application will not be re-installed if it has already been installed on the device.
- Click the Verify operating system type before downloading check box. Before transmitting the files to devices, Kaspersky Security Center checks if the installation utility settings are applicable to the operating system of the device. If the settings are not applicable, Kaspersky Security Center does not transmit the files and does not attempt to install the application. For example, to install some application to devices of an administration group that includes devices running various operating systems, you can assign the installation task to the administration group, and then enable this option to skip devices that run an operating system other than the required one.
- At the next step of the wizard, you will be prompted to select the action that will be performed if installation process prompts to restart the operating system. Select the Do not restart the device option or skip this step, as it does not apply to Linux operating system.
- At the Select accounts to access devices step, choose the No account required (Network Agent installed) option. If this option is selected, you do not have to specify the account under which the application installer will be run. The task will run under the account under which the Administration Server service is running. If Network Agent has not been installed on devices, this option is unavailable.
- At the Finish task creation step, click the Finish button to create the task and close the wizard.
iOS MDM Server is installed using a remote installation task.
Page top
Local installation of iOS MDM Server on a device via an installation package
Kaspersky Security Center Web Console lets you install iOS MDM Server on a local device using an installation package, that is, without interactively inputting the installation settings.
Before installing iOS MDM Server on a device, make sure the Kaspersky Mobile Devices Protection and Management and iOS MDM Server settings plug-ins are installed.
To install and configure iOS MDM Server on a local device manually:
- Install iOS MDM Server:
- Read the End User License Agreement. Use the command below only if you understand and accept the terms of the End User License Agreement.
- Depending on your operating system, run one of the following commands to launch the installation file:
- For Debian:
apt install /<path>/kliosmdm_<version_number>_amd64.deb
- For Red Hat Enterprise Linux:
yum install /<path>/kliosmdm_<version_number>.x86_64.rpm -y
iOS MDM Server is installed. The installer offers to start the setup procedure by executing the postinstall.pl script.
- For Debian:
- Configure iOS MDM Server using one of the methods:
- Configuration with the postinstall settings specified by the interactive step-by-step wizard:
- Run the following command:
/opt/kaspersky/iosmdm/lib/bin/setup/postinstall.pl
- Run the following command:
- Configuration with the key arguments specified as postinstall settings:
- Run the following command:
opt/kaspersky/bin/postinstall.pl -- <
params
>
where
<
params
>
is one of the settings specified in the iOS MDM Server installation settings table below.
- Run the following command:
- Configuration with the postinstall settings specified by the interactive step-by-step wizard:
The names and possible values for the settings that can be configured when installing iOS MDM Server are listed in the table. You can specify these settings in any convenient order.
iOS MDM Server installation settings
Setting name |
Setting description |
Values |
---|---|---|
EULA_ACCEPTED |
Acceptance of the terms of the End User License Agreement. This setting is mandatory. |
|
DONT_USE_ANSWER_FILE |
Whether or not to use a TXT answer file with iOS MDM Server installation settings. The file is included in the installation package or stored on the Administration Server. You do not have to specify an additional path to the file. This setting is mandatory. |
|
CONNECTORPORT |
Local port for connecting the iOS MDM service to Network Agent. The default port number is 9799. This setting is optional. |
Numerical value - 9799 |
LOCALSERVERPORT |
Local port for connecting Network Agent to the iOS MDM service. The default port number is 9899. This setting is optional. |
Numerical value - 9899 |
EXTERNALSERVERPORT |
Port for connecting a device to iOS MDM Server. The default port number is 443. This setting is optional. |
Numerical value - 443 |
EXTERNAL_SERVER_URL |
External address of the device on which iOS MDM Server is to be installed. This address will be used for connecting managed mobile devices to the iOS MDM service. The device must be available for connection through iOS MDM. The address must not include the URL scheme and number of the port because these values will be added automatically. This setting is optional. |
Device FQDN - example.fqdn.com |
Example:
|
To install and configure iOS MDM Server in silent mode automatically using an answer file:
An answer file is a text file that contains a custom set of installation settings (variables and their corresponding values).
- Create an answer file (in TXT format) in the directory where the installation will be performed:
/tmp/answers.txt
. - Specify the required values in the answer file:
- EULA_ACCEPTED=1
Acceptance of the terms of the End User License Agreement.
- KLIOSMDM_AUTOINSTALL=1
Using a TXT answer file with iOS MDM Server installation settings.
- EXTERNALSERVERPORT=443
Port for connecting a device to iOS MDM Server.
- CONNECTORPORT=9799
Local port for connecting the iOS MDM service to Network Agent.
- LOCALSERVERPORT=9899
Local port for connecting Network Agent to the iOS MDM service.
- EXTERNAL_SERVER_URL=example.fqdn.com
External address of the device on which iOS MDM Server is to be installed.
- EULA_ACCEPTED=1
- Set the value of the KLAUTOANSWERS environment variable by entering the full name of the answer file (including the path), for example:
export KLAUTOANSWERS=/tmp/answers.txt
. - Launch the iOS MDM Server installation.
iOS MDM Server is installed and configured in silent mode automatically using an answer file.
Page top
Updating iOS MDM Server using a remote installation task or locally
Kaspersky Security Center Web Console lets you update iOS MDM Server using a remote installation task or locally on a device.
Please note that you will not be able to specify the iOS MDM Server settings during the update. The settings are configured in the iOS MDM Server installation package properties.
To update iOS MDM Server using a remote installation task:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → iOS MDM Servers.
- Click Update.
The New task wizard starts. Proceed through the wizard using the Next button.
- In the New task settings window that opens:
- In the Task name field, specify a custom name for the task, if necessary (The default name is Update iOS MDM Server).
- In the Devices to which the task will be assigned group of settings, the device on which iOS MDM Server is installed will be displayed.
- At the Installation packages step, specify the following settings:
- In the Select installation package field, select the configured iOS MDM Server installation package.
- In the Force installation package download group of settings, select the Using Network Agent check box to distribute the files that are required to update iOS MDM Server via Network Agent.
- In the Maximum number of concurrent downloads field, specify the maximum allowed number of client devices to which Administration Server can simultaneously transmit the files.
- In the Maximum number of installation attempts field, specify the maximum number of times the installer will be allowed to run.
- Specify the additional settings:
- Click the Do not re-install application if it is already installed check box. The application will not be re-installed if it has already been installed on this device.
- Click the Verify operating system type before downloading check box. Before transmitting the files to devices, Kaspersky Security Center checks if the installation utility settings are applicable to the operating system of the device. If the settings are not applicable, Kaspersky Security Center does not transmit the files and does not attempt to install the application. For example, to install some application on devices of an administration group that includes devices running various operating systems, you can assign the installation task to the administration group, and then enable this option to skip devices that run an operating system other than the required one.
- At the next step of the wizard, you will be asked to select the action that will be performed if the application installation prompts you to restart the operating system. Select the Do not restart the device option or skip this step, as it does not apply to the Linux operating system.
- At the Select accounts to access devices step, choose the No account required (Network Agent installed) option. If this option is selected, you do not have to specify the account under which the application installer will be run. The task will run under the account under which the Administration Server service is running. If Network Agent has not been installed on devices, this option is unavailable.
- At the Finish task creation step, click the Finish button to create the task and close the wizard.
iOS MDM Server is updated using the remote installation task.
To update iOS MDM Server locally, follow the steps described for Local installation of iOS MDM Server on a device via installation package using the newer version of the installation package.
Page top
Deleting iOS MDM Server using a remote uninstallation task
Kaspersky Security Center Web Console lets you delete iOS MDM Server remotely using a remote uninstallation task.
Before deleting iOS MDM Server, make sure the iOS MDM Server installation package has been created and added to the Administration Server repository (Operations > Repositories > Installation packages).
To delete iOS MDM Server:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → iOS MDM Servers.
- Select the iOS MDM Server that you want to uninstall, and then click Delete.
The New task wizard starts. Follow the wizard steps as described in the Kaspersky Security Center Help.
Viewing the list of installed iOS MDM Servers and configuring their settings
Kaspersky Security Center Web Console lets you view the list of installed iOS MDM Servers and access their settings.
To view the installed iOS MDM Servers:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → iOS MDM Servers.
- In the list of installed iOS MDM Servers that opens:
- To install iOS MDM Server, click Install.
- To update iOS MDM Server, click Update.
- To delete iOS MDM Server, click Delete.
- To view or configure the iOS MDM Server settings, do one of the following:
- Select the check box next to the iOS MDM Server whose settings you want view or configure, and then click Modify settings.
The Application settings tab of the iOS MDM Server settings window opens.
- Click the name of the iOS MDM Server whose settings you want view or configure.
In the iOS MDM Server settings window that opens, navigate to the Application settings tab.
- Select the check box next to the iOS MDM Server whose settings you want view or configure, and then click Modify settings.
To view or configure the iOS MDM Server settings:
- Navigate to the Application settings tab of the iOS MDM Server settings window using the instructions above.
- In the General section, you can view the general iOS MDM Server properties.
- Name. The iOS MDM Server custom name.
- Version. The version of the installed iOS MDM Server.
- Modified. The date and time of the latest iOS MDM Server update or modification.
- Host name. The name of the device on which iOS MDM Server is installed.
- Host path. The path to iOS MDM Server on the device on which it is installed.
You cannot modify the settings in this section.
- In the APNs proxy server section, you can specify the following settings for Apple Push Notification Service (APNs):
- Address. APNs proxy server address.
- Port. APNs proxy server port.
- User name. APNs proxy user name.
- Password. APNs proxy password.
If you intend to access APNs from the iOS MDM service through a proxy server, the Use proxy server to connect to APNs option must be enabled.
For detailed information on APNs proxy server, refer to the Configuring access to Apple Push Notification service section.
- In the Certificates section, you can manage the certificates required for the operation of iOS MDM Server.
- Apple Push Notification service (APNs) certificate. The APNs certificate is signed by Apple and lets you use Apple Push Notification. Through Apple Push Notification, an iOS MDM Server can manage iOS devices. For detailed information on the APNs certificate, refer to the Receiving or renewing an APNs certificate section.
- iOS MDM Server certificate. The iOS MDM Server certificate is used to establish the connection and verify trust between iOS devices and iOS MDM Server.
- iOS MDM Server reserve certificate. The iOS MDM Server reserve certificate ensures seamless switching of iOS devices after the main iOS MDM Server certificate expires. For detailed information on the iOS MDM Server reserve certificate, refer to the Configuring a reserve iOS MDM Server certificate section.
- iOS MDM Server root certificate. The iOS MDM Server root certificate is used to issue client certificates to authenticate on iOS MDM Server.
- In the Connection settings section, you can view and configure the settings for mobile device connection to iOS MDM Server.
- In the Synchronization block of settings, you can enable or disable the synchronization of managed devices with iOS MDM Server and specify the Synchronization period (min).
- In the Local access point block of settings, you can specify the Network Agent connection port (a port for connecting iOS devices to Network Agent) and iOS MDM local connection port (a local port for connecting Network Agent to the iOS MDM service). For detailed information on these values, refer to the Configuring an iOS MDM Server installation package section.
- In the External access point block of settings, you can specify the iOS MDM external connection port (external port for connecting mobile devices to the iOS MDM service).
- In the iOS MDM installation profile block of settings, you can configure the installation profile properties. You can specify Profile name (a mandatory field), Company, and Profile description.
Please note that the settings in this section are applied to newly connected iOS MDM devices or to previously connected iOS MDM devices when their mobile certificates are renewed.
- In the Configuration profiles section, you can view and manage configuration profiles, which are used to centrally define the settings of managed iOS devices and restrict the features of these devices. For detailed information on managing configuration profiles, refer to the Adding a configuration profile, Installing a configuration profile on a device, and Removing a configuration profile from a device sections.
- In the General section, you can view the general iOS MDM Server properties.
Configuring an iOS MDM Server certificate
The iOS MDM server certificate is used to establish a connection and verify trust between the iOS MDM device and iOS MDM Server.
The iOS MDM Server certificate is issued by Kaspersky Security Center automatically upon the initial deployment of iOS MDM Server and installed on a device where iOS MDM Server is deployed. If you want to use a certificate issued by your certification authority, you need to specify a custom certificate file that will be used as an iOS MDM Server certificate.
If you specify a custom iOS MDM Server certificate, the Issue button for the iOS MDM Server reserve certificate will become unavailable. You need to specify the reserve certificate manually by clicking Install.
To specify a custom iOS MDM Server certificate:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → iOS MDM Servers. In the list of iOS MDM Servers that opens, click the iOS MDM Server whose settings you want to configure.
- In the iOS MDM Server settings window, select Application settings.
- Select the Certificates tab.
- In the iOS MDM Server certificate block of settings, click Install.
- In the File Explorer window that opens, specify a certificate file in PEM, PFX, or P12 format, and then click Open.
Make sure the certificate you install complies with the following security requirements:
- Common Name (CN) is specified;
- a correct Subject Alternative Name (SAN) of DNS is specified and matches the iOS MDM Server connection address;
- a correct certificate publisher is specified;
- a correct certificate expiration date is specified;
- the certificate chain is complete;
- Extended Key Usage (EKU) is XKU_SSL_SERVER (1.3.6.1.5.5.7.3.1 serverAuth);
- the root certificate is the same as the root certificate of the current certificate;
- the RSA key size in the certificate chain is at least 2048 bits;
- the RSA key size of the root certificate is at least 4096 bits;
- the hash algorithm in the certificate chain is from the SHA-2 family.
- In the Installing certificate window that opens, enter the certificate password, and then click Install.
- Click Save.
Your custom certificate is specified as the iOS MDM Server certificate. The certificate details are displayed in the iOS MDM Server certificate block of settings.
Page top
Configuring a reserve iOS MDM Server certificate
The iOS MDM Server functionality lets you issue a reserve certificate. This certificate is intended for use in device management profiles to ensure seamless switching of managed iOS devices after the iOS MDM Server certificate expires.
If your iOS MDM Server uses a default certificate issued by Kaspersky, you can issue a reserve certificate (or specify your own custom certificate as a reserve one) before the iOS MDM Server certificate expires. By default, the reserve certificate is automatically issued 60 days before the iOS MDM Server certificate expires. The reserve iOS MDM Server certificate becomes the main certificate immediately after the iOS MDM Server certificate expires. The public key is distributed to all managed devices through configuration profiles, so you do not have to transmit it manually.
Please note that the reserve iOS MDM Server certificate is not issued automatically if you use an iOS MDM Server custom certificate. If you use a custom certificate, we recommend that you specify a reserve certificate when installing iOS MDM Server or no later than 30 days before the expiration of the existing iOS MDM Server certificate.
If the certificate expires and no reserve has been specified, the connection between iOS MDM Server and iOS MDM devices will be lost. In this case, to reconnect devices, you must specify a new certificate and reinstall device management profiles on each of the managed devices.
To issue a reserve iOS MDM Server certificate or specify a custom reserve certificate:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → iOS MDM Servers. In the list of iOS MDM Servers that opens, click the iOS MDM Server whose settings you want to configure.
- In the iOS MDM Server settings window, select Application settings.
- Select the Certificates tab.
- In the iOS MDM Server reserve certificate block of settings, do one of the following:
- If you plan to continue using a self-signed certificate (the one issued by Kaspersky):
- Click Issue.
If you have a custom iOS MDM Server certificate specified, the Issue button for the iOS MDM Server reserve certificate will be unavailable. You need to specify the reserve certificate manually by clicking Install.
- In the Apply iOS MDM Server reserve certificate window that opens, select one of the two options for the date when the reserve certificate should be applied:
- If you want to apply the reserve certificate when the current certificate expires, select the After the current certificate expires option.
- If you want to apply the reserve certificate before the current certificate expires, select the After specified period (days) option. In the entry field next to this option, specify the duration of the period after which the reserve certificate must replace the current certificate.
The validity period of the reserve certificate that you specify cannot exceed the validity period of the current iOS MDM Server certificate.
- Click OK.
The self-signed reserve iOS MDM Server certificate is issued and specified as the reserve iOS MDM Server certificate.
Please note that when you specify the date when the reserve certificate should be applied, the certificate will be issued before you save the changes in the Certificates section. If you want to issue a new reserve certificate, open the iOS MDM Server settings again, remove the previously issued reserve certificate by clicking Delete, and issue a new reserve certificate by following the instructions above.
- Click Issue.
- If you plan to use a custom certificate issued by your certification authority:
- Click Install.
- In the File Explorer window that opens, specify a certificate file in PEM, PFX, or P12 format, and then click Open.
Make sure the certificate you install complies with the following security requirements:
- a correct Subject Alternative Name (SAN) of DNS is specified and matches the iOS MDM Server connection address;
- a correct certificate publisher is specified;
- a correct certificate expiration date is specified;
- the certificate chain is complete;
- Extended Key Usage (EKU) is XKU_SSL_SERVER (1.3.6.1.5.5.7.3.1 serverAuth);
- the root certificate is the same as the root certificate of the current certificate;
- the RSA key size in the certificate chain is at least 2048 bits;
- the RSA key size of the root certificate is at least 4096 bits;
- the hash algorithm in the certificate chain is from the SHA-2 family.
- In the Installing certificate window that opens, enter the certificate password, and then click Install.
- Click Save.
Your custom certificate is specified as the reserve iOS MDM Server certificate.
Please note that when you specify the date when the reserve certificate should be applied, the certificate will be issued before you save the changes in the Certificates section. If you want to issue a new reserve certificate, open the iOS MDM Server settings again, remove the previously issued reserve certificate by clicking Delete, and issue a new reserve certificate by following the instructions above.
- If you plan to continue using a self-signed certificate (the one issued by Kaspersky):
You have a specified reserve iOS MDM Server certificate. The reserve certificate details are displayed in the iOS MDM Server reserve certificate block of settings.
Page top
Receiving or renewing an APNs certificate
To ensure proper functioning of the iOS MDM service and timely responses of mobile devices to the administrator's commands, you need to specify an Apple Push Notification service certificate (APNs certificate) in the iOS MDM Server settings.
If you already have an APNs certificate, please consider renewing it instead of receiving a new one. When you replace the existing APNs certificate with a newly created one, Administration Server can no longer manage the previously connected iOS MDM devices.
To issue or renew an APNs certificate:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → iOS MDM Servers. In the list of iOS MDM Servers that opens, click the iOS MDM Server whose settings you want to configure.
- In the iOS MDM Server settings window, select Application settings.
- Select the Certificates tab.
- In the Apple Push Notification service (APNs) certificate block of settings, click Issue or renew.
The APNs certificate wizard opens. Click Start and then proceed through the wizard using the Back and Next buttons.
When the Certificate Signing Request (CSR) is created at the first step of the wizard, its private key is stored in the RAM of your device. Accordingly, all the steps of the wizard must be completed without interruption within a single session.
Step 1. Create a Certificate Signing Request (CSR)
To create a CSR:
- Specify the required information for generating a request file: Common Name (CN), Organization Name (O), Organization Unit Name (OU), City (L), Region (S), Country (C).
- Click Save.
After you save the changes, a CSR file will be generated, and the private key of the certificate will be saved in the device memory.
Step 2. Sign the CSR file
At this step, send the CSR file that you received in the previous step of the wizard to Kaspersky for signing:
- Click Go to Kaspersky CompanyAccount.
- Send the created CSR file to Kaspersky to be signed.
Please note that you will be able to sign the CSR file only after you upload a key that lets you use the Mobile Device Management solution.
- After your request is successfully processed, you will receive a CSR file signed by Kaspersky.
- Save the received file.
Step 3. Receive the APNs certificate public key
At this step, do one of the following if you want to issue a new certificate or renew an existing one:
To issue a new certificate:
- Click Go to Apple portal.
- Log in to the Apple portal with a corporate Apple ID.
We recommend that you avoid using a personal Apple ID. Create a dedicated Apple ID to make it your corporate ID. After you have created an Apple ID, link it with the organization's mailbox, not a mailbox of an employee.
- Upload a signed CSR file.
The file will be used to generate the public key of the APNs certificate.
- After your CSR is processed by Apple, you will receive the public key of the APNs certificate.
Save the received file.
To renew a certificate:
- Click Go to Apple portal.
- Log in to the Apple portal with a corporate Apple ID.
We recommend that you avoid using a personal Apple ID. Create a dedicated Apple ID to make it your corporate ID. After you have created an Apple ID, link it with the organization's mailbox, not a mailbox of an employee.
- Specify the certificate you want to renew.
- Upload a signed CSR file.
The file will be used to generate the public key of the APNs certificate.
- After your CSR is processed by Apple, you will receive the public key of the APNs certificate.
Save the received file.
Step 4. Specify the APNs certificate public key
At this step, upload the public key file received from Apple in the previous step of the wizard:
- Click Select.
- In the File Explorer window that opens, specify a certificate file in PEM, PFX, or P12 format, and then click Open.
Step 5. Specify the APNs certificate private key password
At this step, enter the certificate name and private key password:
- In the Certificate name field, specify a custom name for the certificate.
- In the Private key password field, specify the private key password for the certificate.
This password will be used to install the APNs certificate on iOS MDM Server.
- In the Confirm password, enter the password again.
Step 6. Complete the CSR
At this step, the APNs certificate is generated and ready to be installed on iOS MDM Server.
- To complete the CSR, click Download APNs certificate to save the created certificate.
- Click Done to exit the wizard.
The private and public keys of the certificate are combined, and the APNs certificate is saved in PEM format.
Now you can install the generated APNs certificate on iOS MDM Server.
Page top
Installing an APNs certificate on iOS MDM Server
After the APNs certificate is received, you can install it on iOS MDM Server.
To install the APNs certificate on iOS MDM Server:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → iOS MDM Servers. In the list of iOS MDM Servers that opens, click the iOS MDM Server whose settings you want to configure.
- In the iOS MDM Server settings window, select Application settings.
- Select the Certificates tab.
- In the Apple Push Notification service (APNs) certificate block of settings:
- Click Install.
- In the File Explorer window that opens, specify a certificate file in PEM format, and then click Open.
Make sure the certificate you install complies with the following security requirements:
- Common Name (CN) is specified;
- a correct APNs topic is specified;
- a correct certificate publisher is specified;
- a correct certificate expiration date is specified.
- In the Installing certificate window that opens, enter the private key password specified when receiving the APNs certificate, and then click Install.
The APNs certificate will be installed on iOS MDM Server. The certificate details will be displayed in the Apple Push Notification service (APNs) certificate block of settings.
Page top
Configuring access to Apple Push Notification service
To ensure proper functioning of the iOS MDM service and timely responses from mobile devices to the administrator's commands, you need to specify an Apple Push Notification Service certificate (APNs certificate) in the iOS MDM Server settings.
When interacting with Apple Push Notification service (APNs), the iOS MDM service connects to the external address api.push.apple.com through port 2197 (outbound). Therefore, the iOS MDM service requires access to port TCP 2197 for the range of addresses 17.0.0.0/8. From the iOS device, this interaction requires access to port TCP 5223 for the range of addresses 17.0.0.0/8.
If you intend to access APNs from the iOS MDM service through a proxy server, you must enable the use of a proxy server for connecting to APNs.
To enable the use of a proxy server to connect to APNs:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → iOS MDM Servers. In the list of iOS MDM Servers that opens, click the iOS MDM Server whose settings you want to configure.
- In the iOS MDM Server settings window, select Application settings.
- Select the APNs proxy server tab.
- In the window that opens, enable the Use proxy server to connect to APNs toggle switch.
- Configure the following settings:
- In the Address field, specify the APNs proxy server address.
- In the Port field, specify the APNs proxy server port.
- In the User name field, specify the APNs proxy user name.
- In the Password field, specify the APNs proxy password.
- Click Save.
Proxy server is now used to connect to APNs.
Page top
iOS MDM Server events
Kaspersky Security Center Web Console lets you view the events related to iOS MDM Server. The events have different severity levels: Information, Warning, Critical, Functional failure.
For each event that can be generated by iOS MDM Server, you can specify notification settings and storage settings on the Event configuration tab of the iOS MDM Server settings. If you want to configure notification settings for all events at once, configure general notification settings in the Administration Server properties. For detailed information on notifications, refer to the Kaspersky Security Center Help.
To view iOS MDM Server events:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → iOS MDM Servers. In the list of iOS MDM Servers that opens, click the iOS MDM Server whose events you want to view.
- In the iOS MDM Server settings window, select Application settings.
- Select the Events tab.
The iOS MDM Server events are displayed.
For detailed information on viewing events in Kaspersky Security Center Web Console, refer to the Kaspersky Security Center Help.
The table below shows the events of iOS MDM Server that have the Information severity level.
iOS MDM Server information events
Event type display name |
Event type |
Default storage term |
---|---|---|
General information about mobile device requested |
DEVICEINFORMATION_COMMAND_SUCCESSFUL |
30 days |
Security information requested |
SECURITYINFO_COMMAND_SUCCESSFUL |
30 days |
New mobile device connected |
NEW_DEVICE_CONNECTED |
30 days |
List of profiles requested |
PROFILELIST_COMMAND_SUCCESSFUL |
30 days |
Profile installed |
INSTALLPROFILE_COMMAND_SUCCESSFUL |
30 days |
Profile deleted |
REMOVEPROFILE_COMMAND_SUCCESSFUL |
30 days |
List of provisioning profiles requested |
PROVISIONINGPROFILELIST_COMMAND_SUCCESSFUL |
30 days |
Provisioning profile installed |
INSTALLPROVISIONINGPROFILE_COMMAND_SUCCESSFUL |
30 days |
Provisioning profile deleted |
REMOVEPROVISIONINGPROFILE_COMMAND_SUCCESSFUL |
30 days |
List of installed certificates requested |
CERTIFICATELIST_COMMAND_SUCCESSFUL |
30 days |
List of installed apps requested |
INSTALLEDAPPLICATIONLIST_COMMAND_SUCCESSFUL |
30 days |
List of managed apps requested |
MANAGEDAPPLICATIONLIST_COMMAND_SUCCESSFUL |
30 days |
App installation requested |
INSTALLAPPLICATION_COMMAND_SUCCESSFUL |
30 days |
App configuration applied |
APPCONFIG_APPLIED_SUCCESSFUL |
30 days |
Managed app deleted |
REMOVEAPPLICATION_COMMAND_SUCCESSFUL |
30 days |
App redemption code set |
APPLYREDEMPTIONCODE_COMMAND_SUCCESSFUL |
30 days |
Mobile device locked |
DEVICELOCK_COMMAND_SUCCESSFUL |
30 days |
Password reset |
CLEARPASSCODE_COMMAND_SUCCESSFULL |
30 days |
Data from mobile device wiped |
ERASEDEVICE_COMMAND_SUCCESSFUL |
30 days |
Operating system update scheduled |
SCHEDULEOSUPDATE_COMMAND_SUCCESSFULL |
30 days |
Roaming settings applied |
SETROAMINGSETTINGS_COMMAND_SUCCESSFUL |
30 days |
Bluetooth settings applied |
SETBLUETOOTHSETTINGS_COMMAND_SUCCESSFUL |
30 days |
Lost Mode enabled |
ENABLE_LOST_MODE_COMMAND_SUCCESSFUL |
30 days |
Sound played in Lost Mode |
PLAY_LOST_MODE_SOUND_COMMAND_SUCCESSFUL |
30 days |
Mobile device location received |
GET_DEVICE_LOCATION_COMMAND_SUCCESSFUL |
30 days |
Lost Mode disabled |
DISABLE_LOST_MODE_COMMAND_SUCCESFUL |
30 days |
Activation lock bypass code received |
GET_ACTIVATION_LOCK_BYPASS_CODE_COMMAND_SUCCESSFUL |
30 days |
Compliance Control check started |
COMPLIANCE_CONTROL_CHEKING_RULES_STARTED |
30 days |
Compliance Control check completed |
COMPLIANCE_CONTROL_CHEKING_RULES_COMPLETED |
30 days |
Compliance Control response started |
COMPLIANCE_CONTROL_ACTION_STARTED |
30 days |
Compliance Control response completed |
COMPLIANCE_CONTROL_ACTION_COMPLETED |
30 days |
The table below shows the events of iOS MDM Server that have the Warning severity level.
iOS MDM Server warning events
Event type display name |
Event type |
Default storage term |
---|---|---|
Attempt to connect locked mobile device detected |
INACTICE_DEVICE_TRY_CONNECTED |
30 days |
Device management profile deleted |
MDM_PROFILE_WAS_REMOVED |
30 days |
Attempt to reuse user certificate detected |
CLIENT_CERT_ALREADY_IN_USE |
30 days |
Non-compliance with Compliance Control criterion detected |
COMPLIANCE_CONTROL_CONDITIONS_MATCH_DETECTED |
30 days |
Failed to perform Compliance Control response |
COMPLIANCE_CONTROL_ACTION_FAILED |
30 days |
Inactive mobile device detected |
FOUND_INACTIVE_DEVICE |
30 days |
Redemption code is required |
NEED_REDEMPTION_CODE |
30 days |
Device management profile deleted from mobile device |
UMDM_PROFILE_WAS_REMOVED |
30 days |
The table below shows the events of iOS MDM Server that have the Functional failure severity level.
iOS MDM Server functional failure events
Event type display name |
Event type |
Default storage term |
---|---|---|
Failed to request general information about mobile device |
DEVICEINFORMATION_COMMAND_FAILED |
30 days |
Failed to request security information |
SECURITYINFO_COMMAND_FAILED |
30 days |
Failed to request list of profiles |
PROFILELIST_COMMAND_FAILED |
30 days |
Failed to install profile |
INSTALLPROFILE_COMMAND_FAILED |
30 days |
Failed to delete profile |
REMOVEPROFILE_COMMAND_FAILED |
30 days |
Failed to request list of provisioning profiles |
PROVISIONINGPROFILELIST_COMMAND_FAILED |
30 days |
Failed to install provisioning profile |
INSTALLPROVISIONINGPROFILE_COMMAND_FAILED |
30 days |
Failed to delete provisioning profile |
REMOVEPROVISIONINGPROFILE_COMMAND_FAILED |
30 days |
Failed to request list of installed certificates |
CERTIFICATELIST_COMMAND_FAILED |
30 days |
Failed to request list of installed apps |
INSTALLEDAPPLICATIONLIST_COMMAND_FAILED |
30 days |
Failed to request list of managed apps |
MANAGEDAPPLICATIONLIST_COMMAND_FAILED |
30 days |
Failed to request app installation |
INSTALLAPPLICATION_COMMAND_FAILED |
30 days |
Failed to apply app configuration |
APPCONFIG_APPLIED_FAILED |
30 days |
Failed to delete managed app |
REMOVEAPPLICATION_COMMAND_FAILED |
30 days |
Failed to set app redemption code |
APPLYREDEMPTIONCODE_COMMAND_FAILED |
30 days |
Failed to lock mobile device |
DEVICELOCK_COMMAND_FAILED |
30 days |
Failed to reset password |
CLEARPASSCODE_COMMAND_FAILED |
30 days |
Failed to wipe data from mobile device |
ERASEDEVICE_COMMAND_FAILED |
30 days |
Failed to schedule operating system update |
SCHEDULEOSUPDATE_COMMAND_FAILED |
30 days |
Failed to apply roaming settings |
SETROAMINGSETTINGS_COMMAND_FAILED |
30 days |
Failed to apply Bluetooth settings |
SETBLUETOOTHSETTINGS_COMMAND_FAILED |
30 days |
Failed to enable Lost Mode |
ENABLE_LOST_MODE_COMMAND_FAILED |
30 days |
Failed to play sound in Lost Mode |
PLAY_LOST_MODE_SOUND_COMMAND_FAILED |
30 days |
Failed to receive mobile device location |
GET_DEVICE_LOCATION_COMMAND_FAILED |
30 days |
Failed to disable Lost Mode |
DISABLE_LOST_MODE_COMMAND_FAILED |
30 days |
Failed to receive activation lock bypass code |
GET_ACTIVATION_LOCK_BYPASS_CODE_COMMAND_FAILED |
30 days |
Error in app operation |
PRODUCT_FAILURE |
30 days |
Command result contains incorrect data |
MALFORMED_COMMAND |
30 days |
Failed to send message |
SEND_PUSH_NOTIFICATION_FAILED |
30 days |
Failed to send command (Compliance Control) |
SEND_COMMAND_FAILED |
30 days |
Failed to find device |
DEVICE_NOT_FOUND |
30 days |
Obtaining iOS MDM Server diagnostic data
When creating a request to Kaspersky Technical Support, you may be asked to create and attach a trace file. Trace files are used by Technical Support for diagnostic purposes. They contain all steps of application command execution written in the file, which allows to detect the step on which an error occurs.
We recommend that you obtain the traces of iOS MDM Server together with the traces of Network Agent, as they contain the iOS MDM Server connector details.
There are several tracing levels for iOS MDM Server:
- 0 - CRITICAL
- 1 - ERROR
- 2 - MESSAGE
- 3 - DEBUG
Ask a support engineer which tracing level to set. If the Technical Support engineer has not specified the trace level, we recommend obtaining level 2 traces.
To enable the iOS MDM Server tracing and create trace files:
- Open the iOS MSM Server settings file
/var/opt/kaspersky/iosmdm/settings.ini
. - Specify the values required to enable tracing. We recommend that you specify the following default values:
- LogCommEnabled=1
Enabling or disabling the tracing of the iOS MDM Server and connector communication library.
- LogSettingsEnabled=1
Enabling or disabling the tracing of the iOS MDM Server and connector settings library.
- LogCommVerboseLevel=2
The tracing level of the iOS MDM Server and connector communication library.
- LogSettingsVerboseLevel=2
The tracing level of the iOS MDM Server and connector settings library.
- LogVerboseLevel=2
The tracing level of iOS MDM Server.
- LogFolder=/var/opt/kaspersky/iosmdm
The directory for writing trace files.
- LogCommEnabled=1
- Restart the iOS MDM Server and Network Agent services by running the following commands:
systemctl restart klnagent
systemctl restart kliosmdm
The iOS MDM Server tracing is enabled. Trace files are created in the directory that you specified as the LogFolder value: klcon_comm.log, klcon_settings.log, klsrv.log, klsrv_comm.log, klsrv_settings.log.
To disable the iOS MDM Server tracing:
- Open the iOS MSM Server settings file
/var/opt/kaspersky/iosmdm/settings.ini
. - Modify the file by deleting the strings that have been created to enable tracing:
- LogCommEnabled=1
- LogSettingsEnabled=1
- LogCommVerboseLevel=2
- LogSettingsVerboseLevel=2
- LogVerboseLevel=2
- LogFolder=/var/opt/kaspersky/iosmdm
- Restart the iOS MDM Server and Network Agent services by running the following commands:
systemctl restart klnagent
systemctl restart kliosmdm
The iOS MDM Server tracing is disabled.
Page top
Deploying an Android device management system
Kaspersky Secure Mobility Management lets you manage mobile devices running Android. This section describes the deployment of an Android device management system.
About Android device operating modes
The device operating mode depends on the owner of mobile device (personal or corporate) and corporate security requirements. You can choose the operating mode that is most suitable for your company and use several modes at the same time.
The following device operating modes are available for Android devices:
- Personal device
- Device with corporate container
- Corporate device
Personal device
Personal device is the device operating mode for personal Android devices. This operating mode lets you protect and perform basic management of devices.
Device with corporate container
Device with corporate container is the device operating mode for personal Android devices with an Android Work Profile, which provides an isolated corporate environment on a device.
This operating mode lets you manage apps and user accounts in a safe environment on a device without restricting the use of personal data by the user. When a Work Profile is created on the user's mobile device, the following corporate apps are automatically installed in the container (if applicable): Google Play Market, Google Chrome, Downloads, Kaspersky Endpoint Security for Android, and others. Corporate apps installed in the Work Profile and their notifications are marked with a blue briefcase icon. Apps installed in the work profile appear in the common list of apps.
Corporate device
Corporate device is the device operating mode for company-owned Android devices. This operating mode lets you have full control over the entire device and configure an extended set of security settings and features:
- Restrictions on Android features
- Management of Google Chrome settings
- Silent installation of required apps and removal of blocked apps in App Control
- Kiosk mode
- Management of Exchange ActiveSync
- NDES and SCEP integration
Using Firebase Cloud Messaging
To ensure timely delivery of commands to Android devices, Kaspersky Security Center uses the mechanism of push notifications. Push notifications are exchanged between Android devices and Administration Server through Firebase Cloud Messaging (hereinafter referred to as FCM). In Kaspersky Security Center Web Console, you can specify the Firebase Cloud Messaging settings to connect Android devices to the service.
To retrieve the settings of Firebase Cloud Messaging, you must have a Google account.
To enable the use of FCM:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Devices.
- Open the 3-dot menu (
) and select Forced Android device synchronization.
- In the Firebase project number field, specify the FCM Sender ID.
- In the Private key field, select the private key file.
At the next synchronization with Administration Server, Android devices will be connected to Firebase Cloud Messaging.
When you switch to a different Firebase project, you need to wait 10 minutes for FCM to resume.
FCM service runs in the following address ranges:
- From the Android device's side, access is required to ports 443 (HTTPS), 5228 (HTTPS), 5229 (HTTPS), and 5230 (HTTPS) of the following addresses:
- google.com
- fcm.googleapis.com
- android.apis.google.com
- All of the IP addresses listed in Google's ASN of 15169
- From the Administration Server side, access is required to port 443 (HTTPS) of the following addresses:
- fcm.googleapis.com
- All of the IP addresses listed in Google's ASN of 15169
If the proxy server settings have been specified in the Administration Server properties in Web Console, they will be used for interaction with FCM.
Configuring FCM: getting the Sender ID and private key file
To configure FCM:
- Register on the Google portal.
- Go to the Firebase console.
- Do one of the following:
- To create a new project, click Create a project and follow the instructions on the screen.
- Open an existing project.
- Click the gear icon and choose Project settings.
The Project settings window opens.
- Select the Cloud Messaging tab.
- Retrieve the relevant Sender ID from the Sender ID field in the Firebase Cloud Messaging API (V1) section.
- Select the Service accounts tab and click Generate new private key.
- In the window that opens, click Generate key to generate and download a private key file.
Firebase Cloud Messaging is now configured.
Page top
Deploying Kaspersky Endpoint Security for Android
This section contains a general overview of Kaspersky Endpoint Security for Android and the methods of installing, updating, and removing the app.
For detailed information on Kaspersky Endpoint Security for Android, refer to the Using the Kaspersky Endpoint Security for Android app section.
About the Kaspersky Endpoint Security for Android app
The Kaspersky Endpoint Security for Android app ensures the protection of mobile devices against web threats, viruses, and other programs that pose threats.
The Kaspersky Endpoint Security for Android includes the following features:
- Anti-Malware. This component detects and neutralizes threats on the device by using the anti-malware databases and the Kaspersky Security Network cloud service. Anti-Malware includes the following components:
- Protection. It detects threats in open files, scans new apps, and prevents device infection in real time.
- Scan. It is started on demand for the entire file system, only for installed apps, or only for a selected file or folder.
- Update. It lets you download new anti-malware databases for the app.
- Anti-Theft. This component protects the information on the device against unauthorized access in case the device is lost or stolen. This component lets you send the following commands to the device:
- Locate device. Get the coordinates of the device's location.
- Sound alarm. Make the device sound a loud alarm.
- Wipe corporate data. Erase corporate data to protect sensitive company information.
- Web Protection and Web Control. Web Protection blocks malicious websites designed to spread malicious code. Web Protection also blocks fake (phishing) websites designed to steal the user's confidential data (for example, passwords for online banking or e-money systems) and access the user's financial info. Web Protection uses the Kaspersky Security Network cloud service to scan websites before they open. After scanning, Web Protection allows trustworthy websites to load and blocks malicious websites. Web Control allows website filtering by categories defined in the Kaspersky Security Network cloud service. This lets the administrator restrict user access to certain categories of web pages (for example, Gambling, lotteries, sweepstakes or Internet communication).
- App Control. This component lets you install recommended and required apps to an Android device as well as remove blocked apps that violate corporate security requirements.
- Compliance Control. This component lets you check managed devices for compliance with corporate security requirements and impose restrictions on certain functions of non-compliant devices.
You can configure the components of the Kaspersky Endpoint Security for Android app in Kaspersky Security Center Web Console by defining the corresponding policy settings.
On personal devices and devices with a corporate container running Android 15, users can create their own private space. Kaspersky Endpoint Security for Android cannot scan apps, photos, and other files stored in a private space. Web Protection, Web Control, and App Control do not work for apps installed in a private space. Installation of Kaspersky Endpoint Security for Android in a private space is not supported.
Page top
Installing Kaspersky Endpoint Security for Android
There are several methods to deploy the Kaspersky Endpoint Security for Android app. You can use the most suitable installation scenario for your company or combine several installation scenarios.
The installation methods include the following:
- Installation via Kaspersky Security Center using one of the installation sources:
- Kaspersky website (for corporate device operating mode only)
- Installation package (for all operating modes)
- Manual installation
Creating the Kaspersky Endpoint Security for Android installation package
The Kaspersky Endpoint Security for Android app can be deployed using the installation package.
You can use this installation method if mobile devices in your company have no access to the internet.
For this installation method, you need to create a Kaspersky Endpoint Security for Android installation package before connecting Android devices to Kaspersky Security Center. The installation package will be downloaded from Kaspersky Security Center and updated via Kaspersky Security Center using policy settings.
The Kaspersky Endpoint Security for Android installation package is an archive that contains the files required for installing the Kaspersky Endpoint Security for Android app:
installer.ini
Configuration file that contains Administration Server connection settings.
KES10_<version>.apk
Android package file of the Kaspersky Endpoint Security for Android app.
kesa.kpd
Application description file.
eula/
Folder with End User License Agreements in different languages in TXT format.
kpd.loc/
INI files specifying paths to End User License Agreements.
To create the Kaspersky Endpoint Security for Android installation package:
- In the main window of Kaspersky Security Center Web Console, select Operations > Repositories > Installation packages.
- In the list of installation packages that opens, click Add. The New package wizard starts. Follow the instructions of the wizard as described in the Kaspersky Security Center Help to create an installation package from a file or create a stand-alone installation package.
To configure the Kaspersky Endpoint Security for Android installation package:
- In the main window of Kaspersky Security Center Web Console, select Operations > Repositories > Installation packages.
- In the list of installation packages that opens, click the Kaspersky Endpoint Security for Android installation package you want to configure.
- In the installation package properties window, select the Settings tab.
- In the Connection to the Administration Server group of settings, configure the following values:
- Server address. Specify the address of the server to which the Android devices will connect.
- SSL port for devices synchronization. Specify the number of the port opened on the Administration Server for connecting mobile devices. Port 13292 is used by default.
- For stand-alone installation packages, in the Subgroup name field of the Subgroup in Unassigned devices group of settings, specify the name of the group to which Android devices will be added after the first synchronization with the Administration Server. KES10 is used by default.
- In the Actions during installation on device group of settings, click the Prompt user for email address check box if you want Kaspersky Endpoint Security for Android to ask users to provide their corporate email address when the app is started for the first time.
User email address is used to form the name of the mobile device when it is added to the administration group.
- In the Connection to the Administration Server group of settings, configure the following values:
- Click Save.
The Kaspersky Endpoint Security for Android installation package is configured.
Page top
Manual installation of Kaspersky Endpoint Security for Android
You can manually install Kaspersky Endpoint Security for Android from the Kaspersky website, HUAWEI AppGallery, Samsung Galaxy Store, RuStore, or Xiaomi GetApps.
Installing the app
To install the app from an app store, follow the standard installation procedure for the Android platform.
To install Kaspersky Endpoint Security for Android from the Kaspersky website:
- Go to the Kaspersky website.
- Find Kaspersky Security for Mobile on the website.
- Tap Show Downloads.
- Select a version of the app and tap Download.
- Open the downloaded APK file and follow the instructions on the screen.
You may need to allow your browser to install apps from sources other than Google Play in the Apps → Special app access → Install unknown apps section in device settings. The location of these settings may differ on devices from different vendors.
The app will be installed on the device.
Configuring the app
After installing Kaspersky Endpoint Security for Android, you must manually configure the app. The configuration procedure depends on whether the administrator sent you a server address or a link for downloading the app.
To configure Kaspersky Endpoint Security for Android using a link for downloading the app:
- Open Kaspersky Endpoint Security for Android.
- Read the End User License Agreement. If you accept the End User License agreement, select the corresponding check box and tap Continue.
- Tap Continue and grant the app the required permissions.
- In the Server field, specify the link that you received from the administrator.
- Tap Continue.
Kaspersky Endpoint Security for Android is configured.
To configure Kaspersky Endpoint Security for Android using a server address:
- Open Kaspersky Endpoint Security for Android.
- Read the End User License Agreement. If you accept the End User License agreement, select the corresponding check box and tap Continue.
- Tap Continue and grant the app the required permissions.
- In the Server field, specify the Administration Server address provided by the administrator.
- Tap Continue.
- Tap Enable to enable the app as the device administrator.
- Tap Allow and grant the app the required permissions.
Kaspersky Endpoint Security for Android is configured.
Internet access must be enabled on the mobile device for synchronization with the Administration Server.
Page top
Installing Kaspersky Endpoint Security for Android on corporate devices in a closed network
When deploying Kaspersky Endpoint Security for Android in corporate device operating mode via QR code on devices with pre-installed Google Mobile Services (GMS), their Wi-Fi connectivity to certain Google endpoints is checked. If a Wi-Fi network has no access to the internet, the connectivity check fails and the deployment finishes with an error.
To avoid the connectivity check, you can deploy the Kaspersky Endpoint Security for Android app on corporate devices in a closed network by using a Proxy Auto-Configuration (PAC) file.
To use a PAC file to deploy the Kaspersky Endpoint Security for Android app:
- Create a PAC file (for example, proxy.pac) with the following contents:
function FindProxyForURL(url, host) {
return "DIRECT";
} - Publish the created PAC file on a resource that will be available in the closed network (for example, on an IIS Web server).
Save a link to the PAC file (for example, https://intranet.mycompany.com/files/proxy.pac).
- Make sure the APK file of the Kaspersky Endpoint Security for Android app being deployed is available within the closed network. To do this, use one of the methods below:
- Download the app installation package from the Kaspersky Security Center server. If the server is accessible, the installation packages will be available there.
- Download the APK installation file from the Kaspersky website and upload it to the closed network.
Choose the general version of the app as the source.
- Send the app installation link and QR code to the user by following the instructions of Mobile device connection wizard.
On the Operating systems step of the wizard, in the Installation settings section, you will be asked to specify the network for downloading the Kaspersky Endpoint Security for Android app. At this step, configure the use of the previously created PAC file for network connection by linking it to the Wi-Fi network settings on a device. To do this, use one of the methods below:
- In the Installation network settings section, choose Prompt the user to select a Wi-Fi network on device. While deploying the app, the user will need to specify the link to the PAC file (step 2) in the network settings when choosing a Wi-Fi network on the device. After the connection is established, the user will be able to continue the device setup and activate the app by following the instructions of the app's Initial Configuration Wizard.
- In the Installation network settings section, choose Only use the specified Wi-Fi network (Android 9 or later), click the Select network button, and then insert the link to the previously created PAC file (step 2) in the PAC file URL field.
If the APK installation file has been downloaded from the Kaspersky website (step 3), you need to replace the link in the QR code with the address of the closed network link.
When deploying the app via an installation package downloaded from Kaspersky Security Center, after the device is reset to factory settings and the QR code is scanned, a Blocked by Play Protect message may appear on the device. The issue is caused by the installation package's signing certificate being different from the one specified in Google Play. The user should continue the installation by choosing Install anyway. If OK is selected, the installation process will be interrupted and the device will be reset to factory settings.
The Kaspersky Endpoint Security for Android app is installed on a device in corporate device operating mode in a closed network.
Page top
Permissions for Kaspersky Endpoint Security for Android
For all features of apps, Kaspersky Endpoint Security for Android prompts the user for the required permissions. Kaspersky Endpoint Security for Android prompts for the mandatory permissions while the Setup Wizard is completed, as well as after installation and prior to using individual features of apps. It is impossible to install Kaspersky Endpoint Security for Android without providing the mandatory permissions.
On certain devices (for example, HUAWEI, Meizu, and Xiaomi), you must manually add Kaspersky Endpoint Security for Android to the list of apps that are started when the operating system starts in the device settings. If the app is not added to the list, Kaspersky Endpoint Security for Android stops performing all of its functions after the mobile device is restarted.
On devices running Android 11 or later or Android 6-10 with Google Play services, you must disable the Remove permissions if app isn't used system setting. Otherwise, after the app is not used for a few months, the system automatically resets the permissions that the user granted to the app.
Permissions requested by Kaspersky Endpoint Security for Android
Permission |
App function |
---|---|
Phone (read phone status and identity) |
Identify the device using its IMEI (for Android 5–9; for Android 10 or later in the corporate device operating mode; for Android 10–11 for the device with corporate container operating mode) |
Compliance Control – check whether the device SIM card has been replaced or removed |
|
Storage (mandatory) |
Anti-Malware |
Access to manage all files (for Android 11 or later) |
Anti-Malware |
Nearby devices (for Android 12 or later) |
Restrict use of Bluetooth On some Xiaomi and HUAWEI devices running Android 12, Kaspersky Endpoint Security for Android does not prompt the user for the Nearby Bluetooth devices permission. This issue is caused by the specific features of MIUI firmware on Xiaomi and EMUI firmware on HUAWEI. Despite the absence of the request for this permission, all features related to using Bluetooth work correctly on these devices. |
Ignore battery optimization (for Android 12 or later)
|
App Control |
Web Protection |
|
Anti-Theft |
|
Notifications (for Android 13) |
Notify the user about security issues and app events |
Allow running in the background (for Android 12 or later) |
Ensure continuous operation of the app. If permission is not granted, the app may be unloaded from memory and unable to restart. |
Device administrator (mandatory)
|
Anti-Theft – lock the device (only for Android 5–6) |
Anti-Theft – take a mugshot with frontal camera |
|
Anti-Theft – sound an alarm |
|
Anti-Theft – full reset |
|
Password protection |
|
App removal protection |
|
Install security certificate |
|
App Control |
|
Manage Knox (only for Samsung devices) |
|
Configure Wi-Fi |
|
Configure Exchange ActiveSync |
|
Restrict use of the camera, Bluetooth, and Wi-Fi |
|
|
|
Camera |
Anti-Theft – take a mugshot with frontal camera On devices running Android 11 or later, the user must grant the "While using the app" permission when prompted. |
Location
|
Anti-Theft – locate device On devices running Android 10 or later, the user must grant the "All the time" permission when prompted. |
Commands – Get location history |
|
|
|
Accessibility |
Anti-Theft – lock the device (only for Android 7 or later) |
Web Protection |
|
App Control |
|
App removal protection (only for Android 7 or later) |
|
Display of warnings of Kaspersky Endpoint Security for Android (only for Android 10 or later) |
|
Restrict use of the camera (only for Android 11 or later) |
|
|
|
Display pop-up window (for some Xiaomi devices) |
Web Protection |
Display pop-up windows while running in the background (for some Xiaomi devices) |
Web Protection |
Run in the background (for Xiaomi devices with MIUI firmware on Android 11 or earlier) |
App Control |
Web Protection |
|
Anti-Theft |
Starting and stopping Kaspersky Endpoint Security for Android
Kaspersky Endpoint Security for Android launches when the operating system starts up and protects the mobile device during the entire session. The user can stop the app by disabling all Kaspersky Endpoint Security for Android components. You can use policies to configure user permissions to manage app components.
On certain devices (for example, HUAWEI, Meizu, and Xiaomi), you must manually add Kaspersky Endpoint Security for Android to the list of apps that are started when the operating system starts (Security → Permissions → Autorun). If the app is not added to the list, Kaspersky Endpoint Security for Android stops performing all of its functions after the mobile device is restarted.
You must also disable Battery Saver mode for Kaspersky Endpoint Security for Android. This is necessary for the app to run in the background, for example, when running a scheduled malware scan or synchronizing the device with Kaspersky Security Center. This issue is due to the specific features of the embedded software of these devices.
Page top
Activating Kaspersky Endpoint Security for Android
In Kaspersky Security Center, the license can cover various groups of features. To ensure that the Kaspersky Endpoint Security for Android app is fully functional, the Kaspersky Security Center license purchased by the organization must support the Mobile Device Management functionality.
For detailed information about licensing options, refer to the About the license section.
Activating the Kaspersky Endpoint Security for Android app on a mobile device is performed by providing valid license information to the app. License information is delivered to the device together with the policy settings as soon as the device is synchronized with Kaspersky Security Center.
If activation of the mobile app is not completed within 30 days from the time of installation on the mobile device, the app is automatically switched to limited functionality mode. In this mode, most of the app components are not operational. When switched to limited functionality mode, the app stops performing automatic synchronization with Kaspersky Security Center. Accordingly, if the app is not activated within 30 days after the installation, the user must synchronize the device with Kaspersky Security Center manually.
If Kaspersky Security Center is not deployed in your organization or is not accessible to mobile devices, users can activate the mobile app on their devices manually.
To activate the mobile app:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Click the License button.
- In the window that opens, use the drop-down list to select the required license key from the key storage of the Administration Server.
The details of the license key are displayed in the fields below.
You can replace the existing activation key on the mobile device if it is different from the one selected in the drop-down list above. To do so, select the Replace with selected key if the key on devices is different check box.
- Click Save to save the changes you have made.
The app is activated after the next device synchronization with Kaspersky Security Center.
Page top
Updating Kaspersky Endpoint Security for Android
Kaspersky Endpoint Security for Android can be updated in the following ways:
- Using the Kaspersky website. The mobile device user downloads the new version of the app from the Kaspersky website and installs it on the device.
- Using HUAWEI AppGallery, Samsung Galaxy Store, RuStore, or Xiaomi GetApps. The mobile device user downloads the new version of the app from an app store and installs it on the device following the standard update procedure for the Android platform.
To update the app using the Samsung Galaxy Store, the device user must have a Samsung account.
- Using Kaspersky Security Center. You can remotely update the version of the app on the device using Kaspersky Security Center.
You can select the app update method that is most suitable for your organization. You can use only one update method.
Updating the app from the Kaspersky website
To update the app from the Kaspersky website:
- Go to the Kaspersky website.
- Find Kaspersky Security for Mobile on the website.
- Tap Show Downloads.
- Select a version of the app and tap Download.
- Open the downloaded APK file and follow the instructions on the screen.
Kaspersky Endpoint Security for Android is updated.
After downloading the app, Kaspersky Endpoint Security for Android checks the Terms and Conditions of the End User License Agreement (EULA). If the terms of the EULA have been updated, the app sends a request to the Kaspersky Security Center. If the administrator accepts the EULA in Web Console, Kaspersky Endpoint Security for Android skips the acceptance step during installation of the app.
Updating the app through Kaspersky Security Center
Kaspersky Endpoint Security for Android can be updated using Kaspersky Security Center after a group policy is applied. In the group policy settings, you can select the standalone installation package of the version of Kaspersky Endpoint Security for Android that meets the corporate security requirements.
You can update through Kaspersky Security Center if Kaspersky Endpoint Security for Android was installed using an installation package in Kaspersky Security Center or using a standalone installation package. If the app was installed from Google Play, you cannot update the app through Kaspersky Security Center.
To update Kaspersky Endpoint Security for Android using a standalone installation package, installation of apps from unknown sources must be allowed on the user's mobile device. For details about installing apps without Google Play, please refer to the Android Help.
To update the version of the app:
- Add a new Kaspersky Endpoint Security for Android installation package.
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the KES for Android settings section.
- On the App update card, click Settings.
The App update window opens.
- Enable the settings using the App update toggle switch.
- Click Select.
The Select installation package window opens.
- In the list of Kaspersky Endpoint Security for Android standalone installation packages, select the package whose version meets the corporate security requirements.
Kaspersky Endpoint Security for Android cannot be downgraded to an older version of the application.
- Click Select.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center. The mobile device user is prompted to install the new version of the app. After the user confirms installation, the new app version is installed on the mobile device.
Updates functionality (including providing anti-malware signature updates and codebase updates), as well as KSN functionality may not be available in the software in the U.S.
Page top
Removing Kaspersky Endpoint Security for Android
Kaspersky Endpoint Security for Android can be removed in the following ways:
- App removal by the user
The user removes Kaspersky Endpoint Security for Android manually using the app interface. In order for users to be able to remove the app, the app removal should be allowed in the Configure access to app settings card of the KES for Android settings section in the policy settings.
- App removal by the administrator (corporate devices only)
The administrator removes the app remotely using the Kaspersky Security Center Web Console. The app can be removed from an individual device or from several devices at once.
Permitting users to remove Kaspersky Endpoint Security for Android
To protect the app from removal on devices running Android 7 or later, Kaspersky Endpoint Security for Android must be set as an Accessibility feature. When the Initial Configuration Wizard is running, Kaspersky Endpoint Security for Android prompts the user to grant the application all required permissions. The user can skip these steps or disable these permissions in the device settings at a later time. If this is the case, the app is not protected from removal.
To allow removal of the app in a group policy:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the KES for Android settings section.
- On the Configure access to app settings card, click Settings.
The Configure access to app settings window opens.
- Select the Allow removing the app from device check box.
- Click OK.
- Click Save to save the changes you have made.
As a result, users will be allowed to remove the app from mobile devices after synchronization with the Administration Server. The app removal button becomes available in the Kaspersky Endpoint Security for Android settings.
To remove the app from a device:
- In the main window of Kaspersky Endpoint Security for Android, select Settings → App settings → Additional → Remove app.
On corporate devices, Kaspersky Endpoint Security for Android can be removed only by the administrator.
- Confirm removal of Kaspersky Endpoint Security for Android.
Kaspersky Endpoint Security for Android will be removed from the device.
Page top
Removal of Kaspersky Endpoint Security for Android by the user
On corporate devices, Kaspersky Endpoint Security for Android can be removed only by the administrator.
To independently remove Kaspersky Endpoint Security for Android from a mobile device, the user must do the following:
- In the main window of Kaspersky Endpoint Security for Android, select Settings → App settings → Additional → Remove app.
If the Remove app button is missing, this means that the administrator enabled protection against removal of Kaspersky Endpoint Security for Android or the device operates in corporate device mode.
- Confirm the removal of Kaspersky Endpoint Security for Android.
Kaspersky Endpoint Security for Android will be removed from the device.
Page top
Remote removal of Kaspersky Endpoint Security for Android on corporate devices
You can remove the Kaspersky Endpoint Security for Android app from corporate devices remotely by sending a Reset to factory settings command.
Executing the Reset to factory settings command wipes all data from the device and rolls back device settings to their factory values. This app removal method is recommended by Android Enterprise to guarantee that data is removed from a corporate device.
To remove the app:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Devices.
- In the list of devices that opens, select a device that you want to send a command to.
You can select multiple devices.
- Click Send command.
- In the Send command window that opens, in the Command field, select the Reset to factory settings command.
- Click Send.
You can view and cancel commands in the Command history.
The command is sent to the devices you selected. Kaspersky Endpoint Security for Android is removed from these devices.
- In the list of devices, select the device, and then click Delete.
The device is removed from the list of managed devices in Kaspersky Security Center Web Console.
If the device is not removed from Kaspersky Security Center Web Console, there can be problems with further installation of Kaspersky apps on this device.
Managing mobile devices in Kaspersky Security Center Web Console
To perform centralized configuration of mobile devices, you must configure policies. A policy is a set of security settings for managing mobile devices of specified operating systems and device operating modes within an administration group and for managing the mobile apps installed on devices.
This section describes how to create administration groups, configure policies for mobile devices, and connect mobile devices to Kaspersky Security Center in order to subsequently manage them.
Creating administration groups
To apply a policy to a group of devices, you are advised to create a separate group for these devices prior to installing mobile management apps.
An administration group is a logical set of managed devices combined on the basis of a specific trait for the purpose of managing the grouped devices as a single unit within Kaspersky Security Center.
All managed devices within an administration group are configured to do the following:
- Use the same settings, which you can specify in policies.
- Use a common operating mode for all applications through the creation of group tasks with specified settings. Examples of group tasks include creating and installing a common installation package, updating the application databases and modules, scanning the device on demand, and enabling real-time protection.
A managed device can belong to only one administration group.
You can create hierarchies that have any degree of nesting for Administration Servers and groups. A single hierarchy level can include secondary and virtual Administration Servers, groups, and managed devices. You can also move devices from one group to another.
Immediately after Kaspersky Security Center is installed, the hierarchy of administration groups contains only one administration group called Managed devices. When creating a hierarchy of administration groups, you can add devices to the Managed devices group, and add nested groups.
To create an administration group:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) > Hierarchy of groups.
- In the administration group structure, select the administration group that the new administration group will belong to.
- Click Add.
- In the Name of the new administration group window that opens, enter a name for the group, and then click Add.
A new administration group with the specified name appears in the hierarchy of administration groups.
To automatically create a structure of administration groups:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) > Hierarchy of groups.
- Click Import.
The New administration group structure wizard starts. Follow the instructions of the wizard.
After creating an administration group, we recommend configuring the option to automatically assign devices on which you want to install apps to this group. Then configure the settings that are common to all devices using a specific policy.
Page top
Configuring policies
This section describes how to manage policies in Kaspersky Security Center Web Console.
Creating a policy
Kaspersky Security Center Web Console lets you create policies to configure the security settings of a group of Android, iOS, and Aurora mobile devices. The values of security settings configured in policies are saved on the Administration Server, distributed to mobile devices during synchronization, and saved to devices as current settings.
You can create policies using the Mobile policy wizard.
To create a policy:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles.
- In the list of policies that opens, click Current path to select the administration group for which you want to create a policy.
By default, the new policy is applied to the Managed devices group.
- Click Add to start the Mobile policy wizard.
- In the Select application window, select the Kaspersky Mobile Devices Protection and Management option, and then click Next.
The Mobile policy wizard starts. Click Start, and then proceed through the wizard using the Back and Next buttons.
Step 1. License
At this step, choose a license.
The license you choose determines the security settings that you can configure in a policy. By default, the license that supports the Kaspersky Secure Mobility Management functionality is pre-selected. You can choose a different license manually.
Step 2. Operating systems and device operating modes
At this step, choose the operating systems the policy will apply to and specify the device operating modes.
- Android
- Personal device (basic protection and management of a personal Android device).
- Device with corporate container (isolated corporate environment on an Android device).
- Corporate device (an extended set of settings for managing a corporate Android device).
For detailed information, refer to the About Android device operating modes section.
- iOS
- Basic protection (protection against web threats and jailbreak detection on iOS devices).
- Basic control (basic management of a personal iOS device).
- Supervised (an extended set of settings for managing an iOS device).
For detailed information, refer to the About iOS device operating modes section.
To connect and manage iOS devices in basic control and supervised operating modes, you must have an iOS MDM Server installed in the selected administration group. For detailed information on installing iOS MDM Server, refer to the Deploying iOS MDM Server section.
- Aurora
- Protection (protection of Aurora devices against threats).
To connect Aurora devices, you need to have Kaspersky Endpoint Security for Aurora pre-installed on the devices that will connect.
- Protection (protection of Aurora devices against threats).
In the New policy window:
- In the Name field, type the name of the new policy. If you specify the name of an existing policy, it will have (1) added at the end automatically.
- In the Policy status block of settings, select the status of the policy:
- Active. The wizard saves the created policy on the Administration Server. At the next synchronization of mobile devices with the Administration Server, the policy will be used on devices as an active policy.
- Inactive. The wizard saves the created policy on the Administration Server as a backup policy. This policy can be activated in the future after a specific event. If necessary, an inactive policy can be switched to an active state.
Several policies can be created for one application in the group, but only one of them can be active. When a new active policy is created, the previous active policy automatically becomes inactive.
- On the General tab of the Settings inheritance block of settings, select the inheritance options:
- Inherit settings from parent policy
If you enable this option in a child policy and an administrator locks some settings in the parent policy, then you cannot change these settings in the child policy.
If you disable this option in a child policy, then you can change all the settings in the child policy, even if some settings are locked in the parent policy.
- Force inheritance of settings in child policies
If you enable this option in a parent policy, this enables the Inherit settings from parent policy option for each child policy. In this case, you cannot disable this option for any child policy. All the settings that are locked in the parent policy are forcibly inherited in the child groups and you cannot change these settings in the child groups.
By default, the Inherit settings from parent policy option is enabled and the Force inheritance of settings in child policies option is disabled.
Inheritance of policy settings works only if either identical device operating modes are selected for the parent and child policy or device operating modes selected for the child policy provide more security settings. For example, a child policy for Android devices with a corporate container can inherit settings from a parent policy for personal devices but cannot inherit settings from a parent policy for corporate devices.
If you create a child policy that is incompatible with the parent policy, you must delete it and create a new child policy to manage devices. - Inherit settings from parent policy
- Click Save.
The new policy for mobile devices is created.
Page top
Modifying a policy
Kaspersky Security Center Web Console lets you modify policies.
To modify a policy:
- Open the policy properties window by doing one of the following:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of policies that opens, click the name of the policy that you want to modify.
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Devices. Click the mobile device that falls under the policy that you want to modify, and then select the policy on the Active policies and policy profiles tab.
- In the policy properties window, navigate to the Application settings tab, and then define the policy settings.
You can also configure general settings, settings inheritance, event logging and notifications, and policy profiles, and also view the revision history. For more information, please refer to the Kaspersky Security Center Help.
- Click Save to save the changes you have made to the policy and exit the policy properties window.
The policy is modified. Mobile device settings are configured after the next device synchronization with Kaspersky Security Center.
Page top
Copying a policy
Kaspersky Security Center Web Console lets you create a copy of a policy.
To create a copy of a policy:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles.
- In the list of policies that opens, select the check box next to the name of the policy you want to copy, and then click Copy.
- In the tree of administration groups that opens, select the target group where you want the policy to be created.
You can create a new administration group by selecting an existing group, and then clicking Add child group.
- Click Copy.
- Click OK to confirm the operation.
A copy of the policy will be created in the target group under the same name. The status of each copied or moved policy in the target group will be Inactive. You can change the status to Active at any time.
If a policy with a name identical to that of the newly created or moved policy already exists in the target group, the (<next sequence number>) suffix is added to the name of the newly created or moved policy, for example: (1).
Page top
Moving a policy to another administration group
Kaspersky Security Center Web Console lets you move a policy to another administration group.
To move a policy to another administration group:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles.
- In the list of policies that opens, select the check box next to the name of the policy that you want to move to another administration group, and then click Move.
- In the tree of administration groups that opens, select the target group to which you want to move the policy.
You can create a new administration group by selecting an existing group, and then clicking Add child group.
- Click Move.
- Click OK to confirm the operation.
The result depends on the policy inheritance properties:
- If the policy is not inherited in the source group, it will be moved to the target group.
- If the policy is inherited in the source group, it will not be moved. Instead, a copy of the policy will be created in the target group.
The status of each copied or moved policy in the target group will be Inactive. You can change the status to Active at any time.
If a policy with a name identical to that of the newly created or moved policy already exists in the target group, the (<next sequence number>) suffix is added to the name of the newly created or moved policy, for example: (1).
Page top
Viewing the list of policies
Kaspersky Security Center Web Console lets you view the list of created policies, their statuses, and properties.
To view the list of policies:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles.
- The list of policies opens with brief information about the policies. On this page, you can create, modify, copy, move, and delete policies.
Viewing the policy distribution results
Kaspersky Security Center Web Console lets you view the distribution chart of a policy and the information about all devices that fall under that policy.
To view the results of distributing a policy:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles.
- In the list of policies that opens, select the check box next to the name of the policy whose distribution results you want to view, and then click Distribution.
The policy distribution results page opens. This page contains the policy summary, a policy distribution chart, and a table with information about all devices that fall under that policy. You can open the policy properties window by clicking the Configure policy button.
Page top
Managing revisions to policies
Kaspersky Security Center Web Console lets you view modifications made to a policy over a certain period, as well as save information about these modifications in a file.
To view a policy revision:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles.
- In the list of policies that opens, click the policy whose revision you want to view, and then go to the Revision history section.
- In the list of policy revisions, click the number of the revision that you want to view.
If the size of the revision is more than 10 MB, you will not be able to view it using Kaspersky Security Center Web Console. You will be prompted to save the selected revision to a JSON file.
If the size of the revision does not exceed 10 MB, a report in HTML format with the settings of the selected policy revision is displayed. The report is displayed in a pop-up window, so make sure pop-ups are allowed in your browser.To save a policy revision to a JSON file, in the list of policy revisions, select the revision that you want to save, and then click Save to file.
The revision is saved to a JSON file.
For detailed information on managing revisions to policies, refer to the Kaspersky Security Center Help.
Page top
Restricting permissions to configure policies
Kaspersky Security Center administrators can configure the access permissions of Web Console users for different functions of the Kaspersky Secure Mobility Management solution depending on the job duties of users.
In the Web Console interface, you can configure access rights on the Security and User roles tabs of the Administration Server properties window. The User roles tab lets you add standard user roles with a predefined set of rights. The Security section lets you configure rights for one user or a group of users or assign roles to one user or a group of users. User rights for each application are configured according to functional scopes.
For each functional area, the administrator can assign the following permissions:
- Allow editing. The Web Console user is allowed to change the policy settings in the properties window.
- Block editing. The Web Console user is prohibited from changing the policy settings in the properties window. Policy tabs belonging to the functional scope for which this right has been assigned are not displayed in the interface.
Configuring role-based access control
Kaspersky Security Center Web Console provides facilities for role-based access to the features of Kaspersky Secure Mobility Management.
You can configure access rights to application features for Kaspersky Secure Mobility Management in one of the following ways:
- By configuring the rights for each user or group of users individually.
- By creating standard user roles with a predefined set of rights and assigning those roles to users depending on their scope of duties.
Application of user roles is intended to simplify and shorten routine procedures of configuring users' access rights to application features. Access rights within a role are configured in accordance with the standard tasks and the users' scope of duties.
User roles can be assigned names that correspond to their respective purposes. You can create an unlimited number of roles in the application. You can use the predefined user roles with already configured set of rights, or create new roles and configure the required rights yourself.
For detailed information on configuring user access in Kaspersky Security Center, refer to the Kaspersky Security Center Help.
Some of the predefined user roles are not authorized to work with mobile devices. The predefined user roles which are available for the Kaspersky Secure Mobility Management features are listed in the table below.
Predefined user roles for Kaspersky Secure Mobility Management
Role |
Read |
Write |
License key management: create policies and modify license key settings |
Vulnerability and patch management: view unaccepted EULAs and accept EULAs |
---|---|---|---|---|
Kaspersky Endpoint Security Administrator |
+ |
+ |
- |
- |
Kaspersky Endpoint Security Operator |
+ |
- |
- |
- |
Main Administrator |
+ |
+ |
- |
- |
Main Operator |
+ |
- |
- |
- |
Mobile Device Management Administrator |
+ |
+ |
+ |
+ |
Mobile Device Management Operator |
+ |
- |
- |
- |
For detailed information on predefined user roles, refer to the Kaspersky Security Center Help.
Access rights to Kaspersky Secure Mobility Management features
Functional area |
Right |
---|---|
Kaspersky Mobile Devices Protection and Management > Kaspersky Security Center Web Console > App configuration |
Please note, to configure the Web Protection and Web Control settings, the administrator must have the Read and Write rights for both the Protection and Security controls functional areas. |
Kaspersky Mobile Devices Protection and Management > Kaspersky Security Center Web Console > Security controls |
|
Kaspersky Mobile Devices Protection and Management > Kaspersky Security Center Web Console > Corporate container |
|
Kaspersky Mobile Devices Protection and Management > Kaspersky Security Center Web Console > Device configuration |
|
Kaspersky Mobile Devices Protection and Management > Kaspersky Security Center Web Console > Configuration of Kaspersky device management apps |
|
Kaspersky Mobile Devices Protection and Management > Kaspersky Security Center Web Console > Protection |
|
Kaspersky Mobile Devices Protection and Management > Kaspersky Security Center Web Console > Restrictions |
|
Kaspersky Mobile Devices Protection and Management > Kaspersky Security Center Web Console > Samsung Knox settings |
Mobile Device Management access rights
Right |
User action: right required to perform the action |
---|---|
Mobile Device Management > General > Read |
|
Mobile Device Management > General > Write |
|
Mobile Device Management > General > Connect new devices |
|
Mobile Device Management > General > Manage certificates |
The Write right must also be granted. |
Mobile Device Management > General > Send only information commands to mobile devices |
|
Mobile Device Management > General > Send commands to mobile devices |
|
Configuring policy profiles
Sometimes it may be necessary to create and centrally modify several instances of a single policy for an administration group. These instances might differ by only one or two settings.
To help you avoid creating several instances of a single policy, Kaspersky Security Center Web Console lets you create policy profiles. Policy profiles are necessary if you want devices within a single administration group to run under different policy settings.
A policy profile is a named subset of policy settings. This subset is distributed on target devices together with the policy, supplementing it under a specific condition called the profile activation condition. Profiles only contain settings that differ from the "basic" policy, which is active on the managed device. Activation of a profile modifies the settings of the "basic" policy that were initially active on the device. The modified settings take values that have been specified in the profile.
You can modify the specific conditions that must affect activation of the policy profile that you are creating. For mobile devices, you can modify the following conditions:
- Rules for specific device owner
Profile activation on the device according to its owner.
- Device owner
- Device owner is included in an internal security group
- Rules for role assignment
Profile activation on the device depending on the owner's role.
- Activate policy profile by specific role of device owner
- Rules for tag usage
Profile activation on the device depending on the tags assigned to the device.
- Tag list
- Apply to devices without the specified tags
- Rules for Active Directory usage
Policy profile activation on the device based on the device allocation in an Active Directory organizational unit or the membership of that device (or the device owner) in an Active Directory security group. The configuration scope depends on the currently used policy.
- Device owner's membership in an Active Directory security group
- Device membership in Active Directory security group
- Device allocation in Active Directory organizational unit
For detailed information on configuring activation rules, creating, deleting, or copying policy profiles, refer to the Kaspersky Security Center Help.
If you copy a policy profile to an incompatible policy (a policy in which the operating systems and device operating modes of this profile are not configured), such profile will not work properly.
Page top
Deleting a policy
Kaspersky Security Center Web Console lets you delete policies.
You can delete only policies that are not inherited in the current administration group. If a policy is inherited, you can only delete it in the higher-level group for which it was created.
To delete a policy:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles.
- In the list of policies that opens, select the check box next to the name of the policy that you want to delete, and then click Delete.
- In the window that opens, click OK to confirm the operation.
The policy is deleted. Before the new policy is applied, mobile devices belonging to the administration group continue to work according to the settings specified in the policy that has been deleted.
Page top
Connecting mobile devices to Kaspersky Security Center Web Console
To manage mobile devices and the mobile management apps installed on them, you must connect these devices to Kaspersky Security Center.
Before connecting, make sure the license that supports the Mobile Management solution is configured in the License keys section of the Administration Server properties.
To connect a mobile device to Kaspersky Security Center:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Devices.
- In the list of mobile devices that opens, click Add.
The Mobile device connection wizard starts. Click Start, and then proceed through the wizard using the Back and Next buttons.
Welcome
On the welcome screen, you can read a summary of the Mobile device connection wizard steps.
Step 1. Policy
At this step, choose a policy for devices that will connect. Devices operate according to the security settings specified in the policy.
- Use an existing policy
For this option, specify the administration group of the policy you want to choose. The policy name, operating systems and operating modes of the devices managed by this policy will be displayed.
If necessary, click Go to policy to view the properties of the policy you have selected.
- Create a new policy
For this option, click the Create policy button that appears. You will be redirected to the Mobile policy wizard. After a policy with the required properties is created, you can return to the Mobile device connection wizard.
Step 2. Operating systems
At this step, choose the operating systems of the devices that will connect. The policy settings determine the available operating systems: Android, iOS, or Aurora.
- Android
After you select this operating system, the Kaspersky Endpoint Security for Android Installation settings will be displayed. To modify them, click Edit settings.
- Choose the Installation source for Kaspersky Endpoint Security for Android:
- Kaspersky website
This installation source works for all operating modes.
- Installation package
This installation source works for all operating modes.
- To choose an installation package, click Select installation package, and then select the installation package from the list that opens.
- If there are no available installation packages, you will be offered to create one. Click Create installation package, and then follow the steps of the New package wizard as described in the Kaspersky Security Center Help to create an installation package from a file or create a stand-alone installation package. After the installation package is created, you can return to the Mobile device connection wizard.
Automatic app updates through the store are not available with this installation method. You can update the app manually in the App update section of the policy settings.
The latest installation package uploaded to Kaspersky Security Center is used to install the app on devices.For corporate devices, make sure the Allow using HTTP to download the app on corporate devices check box is selected to ensure Kaspersky Endpoint Security for Android is downloaded. Otherwise, the app will be downloaded via HTTPS only if the Kaspersky Security Center Web Server certificate was issued by a trusted certificate authority.
For more information on the installation methods, refer to the Installing Kaspersky Endpoint Security for Android section.
- Kaspersky website
- Choose Installation network for Kaspersky Endpoint Security for Android (corporate devices only):
- Prompt the user to select a Wi-Fi network on device
If you choose this option, the user will be prompted to connect to any available Wi-Fi network for downloading the app.
- Only use the specified Wi-Fi network (Android 9 or later)
To choose an installation network, click Select network.
In the window that opens, specify the following settings:
- Service set identifier (SSID)
- Hidden network
- Network protection
- Password
- Use proxy server
- Proxy server address
- Proxy server port
- PAC file URL
- Do not use proxy server for the following addresses
Do not use a password for a confidential Wi-Fi network that must not be publicly accessible. The unencrypted password is sent to the user in a QR code along with other device configuration data.
- Try to use mobile network (Android 8 or later)
If you choose this option, the device will try to use mobile data to download the app. If the device does not have a SIM card or the mobile network is not available, the user will be prompted to select any available Wi-Fi network.
- Prompt the user to select a Wi-Fi network on device
- Click the Enable all system apps check box (corporate devices only) if you want system apps to remain active on the device. If necessary, they can be disabled later in the App Control section.
- Choose the Installation source for Kaspersky Endpoint Security for Android:
- iOS
To connect and manage iOS devices in basic control and supervised operating modes, you must have an iOS MDM Server installed in the selected administration group. For detailed information on installing iOS MDM Server, refer to the Deploying iOS MDM Server section.
The Kaspersky Security for iOS app will be installed on personal iOS devices in the basic protection operating mode.
A device management profile will be installed on the devices operating in basic control and supervised operating modes.
On devices running iOS 12.1 or later, you must manually confirm the installation of a device management profile on a mobile device. You must also grant the permission for remote management of the device.
- Aurora
To connect Aurora devices, you need to have Kaspersky Endpoint Security for Aurora pre-installed on the devices that will connect.
Step 3. Accept agreements
At this step, choose who must accept the End User License Agreement (EULA) and Privacy Policy.
- Administrator
The agreements are accepted by the administrator in the next step of the wizard. In this case, the app skips the acceptance step during the app installation.
- Users
The agreements are accepted on mobile devices by users.
This step only applies to Android and iOS operating systems. If you are connecting Aurora devices, the agreements are only accepted by users on their mobile devices.
Please note that the administrator will be offered to accept the EULA only after the same version of the EULA is accepted by users on devices for the first time. After the connection and first synchronization of devices with Kaspersky Security Center, the administrator will be able to accept this version of EULA upon subsequent connection of devices.
The list of accepted agreements is available in the End User License Agreements section of the Administration Server properties.
Step 4. End User License Agreement and Privacy Policy
At this step, if Administrator is selected as the recipient of the agreements in the previous step of the wizard, you will be offered to read the Privacy Policy, EULA, and all the documents associated with it. You must accept the terms and conditions of the EULA and Privacy Policy before installation of the mobile device management apps.
Step 5. Users
At this step, choose one or more users of the devices that will connect. These users will receive the details for installing the app to connect their devices to Kaspersky Security Center. If a user is not in the list, you can add a new user account without exiting the wizard.
Due to technical limitations, you cannot select and send the connection details to more than 75 users within a single session of Mobile device connection wizard. We recommend that you divide the devices that will connect into groups of less than 75 devices and connect these groups sequentially within separate wizard sessions.
- To choose an existing user, select check boxes next to the corresponding user names.
- To add a new user, click Add user.
- Specify user credentials in the Credentials block of settings.
- User name
- Password
The password must meet the following complexity requirements:
- It must contain between 8 and 16 characters.
- It must contain the characters from at least three of these groups: uppercase letters (A-Z), lowercase letters (a-z), digits (0-9), special characters (@ # $ % ^ & * - _ ! + = [ ] { } | : ' , . ? / \ ` ~ " ( ) ;).
- If necessary, specify the optional details in the Optional information group of settings.
- Full user name
- Description
- Email address
- Phone number
- Click OK to save the changes.
The new user will be added and displayed in the list of users.
- Specify user credentials in the Credentials block of settings.
- To modify user details, click Edit user.
The fields you can modify depend on the user subtype - internal or domain.
Step 6. Send connection details
At this step, choose how to send the QR codes and links for installing the mobile management apps or device management profiles. You can choose one of the following options:
- Send a message to users' email addresses
Choose this option to send the connection details by email to the selected users. To install the app or a device management profile, the user needs to scan the QR code using the camera of the mobile device or open the link to the installation package.
These email addresses must be specified in the user account settings in Kaspersky Security Center.
If you want to send the connection details to an email address that is not specified in the user account settings in Kaspersky Security Center, select the Send a copy of the message to an alternate email address check box, and then specify the required email address. - Show QR codes and links after completing the wizard
Choose this option to scan the QR code with the camera of the mobile device or follow the link in the wizard.
Step 7. Confirm
At this step, check the mobile device connection details specified in the earlier steps, and then click Finish to confirm the operation.
Finish
On the Finish screen:
- If you chose the Send a message to users' email addresses option, the specified users will receive the emails with QR codes and links for connecting mobile devices to the Administration Server.
- If you chose the Show QR codes and links after completing the wizard option, the connection details will be available on the Finish screen. You can view the displayed details or click Download list to receive a file with summarized information.
Click Close to exit the wizard.
As soon as users install the mobile management apps, their devices are connected to the Administration Server and displayed on the Devices tab of Kaspersky Security Center Web Console.
You can now configure the settings for devices and mobile management apps using policies. You will also be able to send commands to mobile devices for data protection in case devices are lost or stolen.
Page top
Direct connection of Android devices to Kaspersky Security Center
Android devices can connect directly to port 13292 of the Administration Server.
Depending on the method used for authentication, two connection options are possible.
Connecting devices with a user certificate
When connecting a device with a user certificate, the device is associated with the user account to which the corresponding certificate has been assigned through the Administration Server tools.
In this case, two-way SSL authentication (mutual authentication) will be used. Both the Administration Server and the device will be authenticated with certificates.
Connecting devices without a user certificate
When connecting a device without a user certificate, the device is associated with none of the user's accounts on Administration Server. However, when the device receives any certificate, the device will be associated with the user to which the corresponding certificate has been assigned through the Administration Server tools.
When connecting that device to the Administration Server, one-way SSL authentication will be applied, which means that only Administration Server is authenticated with the certificate. After the device retrieves the user certificate, the type of authentication will change to two-way SSL authentication (2-way SSL authentication, mutual authentication).
Page top
Moving unassigned mobile devices to administration groups
When the mobile devices are connected to Kaspersky Security Center, they are displayed on the Discovery & deployment > Unassigned devices page of Kaspersky Security Center Web Console. To manage newly connected devices, you can create a rule that automatically assigns them to administration groups or you can move them to an administration group manually.
To move an unassigned mobile device to an administration group:
- In the main window of Kaspersky Security Center web console, select Discovery & deployment > Unassigned devices.
- Select the device that you want to move to an administration group, and then click Move to group.
- In the tree of administration groups that opens, select the target group to which you want to move the device.
You can create a new administration group by selecting an existing group, and then clicking Add child group.
- Click Move.
The device is moved to the specified administration group and the corresponding policy is applied to it.
Page top
Actions on mobile devices to connect to Administration Server
Depending on the mode in which your device will operate, you may have to perform additional actions to protect your device and connect it to the Administration Server.
Install a mobile certificate
If you received a certificate password, you must use it to install the mobile certificate on your device.
To install the mobile certificate:
- Remember or write down the password you received from your administrator by email.
- Do one of the following:
- On an Android device, enter the certificate password when prompted by Kaspersky Endpoint Security for Android.
- On an iOS device, enter the certificate password during installation of the device management profile.
The mobile certificate will be installed on your device.
Pre-configure corporate Android devices
To connect a corporate Android device to the Administration Server, you must pre-configure the device depending on the operating system version and availability of a QR code scanner.
Configuring synchronization settings
To manage mobile devices and receive reports or statistics from mobile devices of users, you must configure the synchronization settings. Synchronization is performed using the HTTPS protocol. Mobile device synchronization with the Administration Server may be performed in the following ways:
- By schedule. You can configure the synchronization schedule in the policy settings. Modifications to policy settings, commands and tasks will be performed when the device synchronizes with Kaspersky Security Center according to the schedule, i.e. with a delay. By default, mobile devices are synchronized with Kaspersky Security Center automatically every 6 hours.
Due to Doze limitations, when you select a short synchronization period, devices may synchronize with the Administration Server less frequently than expected.
Using short synchronization periods decreases device battery life.
- Forced. Synchronization is performed using FCM (Firebase Cloud Messaging) push notifications. Forced synchronization is primarily intended for timely delivery of commands to a mobile device. This may be useful when a mobile device is in battery-saver mode, because in this case the app may perform tasks later than specified. If you want to use forced synchronization, make sure that the FCM settings are configured in Kaspersky Security Center.
To configure synchronization settings for Android devices:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the KES for Android settings section.
- On the Scheduled synchronization card, click Settings.
The Scheduled synchronization window opens.
- Enable synchronization using the Scheduled synchronization toggle switch.
- In the Synchronization period drop-down list, select the period of time between synchronizations of devices with Kaspersky Security Center.
- To disable synchronization of devices with Kaspersky Security Center while roaming, select the Do not synchronize while roaming check box.
The device user can manually perform synchronization in the app settings (Settings → App settings → Synchronization → Synchronize).
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center. You can manually synchronize the mobile device using a special command.
To configure synchronization settings for iOS devices operating in basic protection mode:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the KS for iOS settings section.
- On the Scheduled synchronization card, click Settings.
The Scheduled synchronization window opens.
- Enable synchronization using the Scheduled synchronization toggle switch.
- In the Synchronization period drop-down list, select the period of time between synchronizations of devices with Kaspersky Security Center. The default value is 6 hours.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center. You can manually synchronize the mobile device using a special command.
Page top
Managing certificates of mobile devices
Kaspersky Security Center Web Console lets you issue, renew, or delete mobile, mail, or VPN certificates of mobile devices.
This section contains information about how to manage mobile device certificates and configure their issuance rules.
Configuring certificate issuance rules
Kaspersky Security Center Web Console lets you configure how the certificates for mobile devices are issued, renewed, and protected.
To configure certificate issuance rules:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Certificates.
- In the list of certificates that opens, click Issuance rules.
- In the PKI settings section:
- In the Integration with PKI block of settings, enable the Integrate issuance of certificates with Microsoft Certification Authority (CA) via PKI toggle switch to issue certificates automatically following integration.
Click Select device, and then specify a device with Network Agent installed that will connect to Microsoft CA.
For detailed information on PKI, refer to the Integration with Public Key Infrastructure section.
- In the Domain account for transmitting requests to issue certificates block of settings, specify the PKI account name (the name of the user account to be used for PKI integration in the
userPrincipalName@DNSDomainName
format) and Password (the domain password for the account). - Click Save to apply the changes.
- In the Integration with PKI block of settings, enable the Integrate issuance of certificates with Microsoft Certification Authority (CA) via PKI toggle switch to issue certificates automatically following integration.
- In the Mobile certificates section, you can do the following:
- In the Validity block of settings, in the Certificate validity period (days) field, specify the certificate lifetime in days. The default lifetime of a certificate is 365 days. When this period expires, the mobile device will not be able to connect to the Administration Server.
- In the Renewal block of settings, in the Renew certificate before it expires in (days) field, specify the number of days remaining until the current certificate's expiration when Administration Server should issue a new certificate. For example, if the value of the field is 4, Administration Server issues a new certificate four days before the current certificate expires. The default value is 30.
Select the Renew certificate automatically check box to renew certificates automatically. If this option is disabled, certificates must be renewed manually as they expire. This check box is selected by default.
- In the Password protection block of settings, select the Prompt for password during certificate installation check box to prompt the user for a password when the certificate is installed on a mobile device. The password is used only once during the installation of the certificate on the mobile device. The password will be automatically generated by Administration Server and sent to the user by email. You can specify the password length in the Password length field.
Password protection is only available for mobile certificates.
- Click Save to apply the changes.
- In the Mail certificates and VPN certificates sections, if PKI integration is configured:
- In the Renewal block of settings, in the Renew certificate before it expires in (days) field, specify the number of days remaining until the current certificate's expiration when Administration Server should issue a new certificate. For example, if the value of the field is 4, Administration Server issues a new certificate four days before the current certificate expires.
Select the Renew certificate automatically check box to renew certificates automatically. If this option is disabled, certificates must be renewed manually as they expire. This check box is selected by default.
- In the PKI settings block of settings, specify the Certificate template name in PKI (the certificate template that will be used to issue certificates to domain users).
The Network Agent for Windows service installed on a device which connects to CA is run under the specified user account. This service is responsible for issuing users' domain certificates. The service is run when the list of certificate templates is loaded by clicking the Refresh list button or when a certificate is generated.
When connecting a non-domain user's mobile device (running either Android or iOS) to Kaspersky Security Center, the attempt to issue a certificate may fail.
- In the Automatic issuance of mail certificate on device connection and Automatic issuance of VPN certificate on device connection blocks of settings, select the Issue for devices managed by Kaspersky Endpoint Security for Android or Issue for iOS MDM devices check boxes to enable automatic issuance of a mail or VPN certificate when devices connect to Kaspersky Security Center.
If you selected the Issue for iOS MDM devices check box, choose the certificate alias from the drop-down list. The certificate alias is a name that identifies the certificate. You can configure the subsequent use of the selected alias for the certificate issuance in the following policy sections:
- For mail certificates: in the properties of the Email account for iOS MDM devices and in the properties of the Exchange ActiveSync account for iOS MDM devices.
- For VPN certificates: in the properties of the VPN network for iOS MDM devices and in the properties of the Wi-Fi network for iOS MDM devices.
You can also change the alias for individual or multiple mail and VPN certificates by clicking Modify alias in the list of certificates (Assets (Devices) → Mobile → Certificates).
- Click Save to apply the changes.
- In the Renewal block of settings, in the Renew certificate before it expires in (days) field, specify the number of days remaining until the current certificate's expiration when Administration Server should issue a new certificate. For example, if the value of the field is 4, Administration Server issues a new certificate four days before the current certificate expires.
- In the PKI settings section:
The specified settings will be used by Kaspersky Security Center to issue, renew, and protect the certificates of mobile devices.
Page top
Issuing mobile device certificates
You can issue mobile, mail, or VPN certificates for mobile devices.
To issue a certificate:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Certificates.
- In the list of certificates that opens, click Add.
The Certificate issuance wizard starts. Click Start, and then proceed through the wizard using the Back and Next buttons.
Welcome
On the welcome screen, you can read a summary of the Certificate issuance wizard steps.
Please note that the numbering and set of steps may vary depending on the certificate type, operating system, and the issuance settings defined in the Issuance rules section.
Step 1. Certificate type
At this step, choose the certificate to be issued.
- Mail certificate (to configure corporate email on devices).
- VPN certificate (to configure access to private networks and corporate web resources on devices).
- Mobile certificate (to identify mobile devices on the Administration Server).
Step 2. Operating system
At this step, choose the operating system of the devices for which the certificate will be issued.
- Android
- iOS
Step 3. Connection method
This step is displayed only if you selected Mail certificate or VPN certificate as the certificate type and Android as the operating system of the devices for which the certificate will be issued.
At this step, choose the method for connecting devices to Administration Server.
- Connect using mobile certificate authentication
Select this option if you want the mobile certificate to be used for user identification upon connecting to Administration Server.
- Connect without mobile certificate authentication
Select this option if you want to install a certificate on a device using no certificate authentication.
Step 4. Users
At this step, choose one or more users that will receive the details for installing certificates. If a user is not in the list, you can add a new user account without exiting the wizard.
- To choose an existing user, select check boxes next to the corresponding user names.
- To add a new user, click Add user.
- Specify user credentials in the Credentials block of settings.
- User name
- Password
The password must meet the following complexity requirements:
- It must contain between 8 and 16 characters.
- It must contain the characters from at least three of these groups: uppercase letters (A-Z), lowercase letters (a-z), digits (0-9), special characters (@ # $ % ^ & * - _ ! + = [ ] { } | : ' , . ? / \ ` ~ " ( ) ;).
- If necessary, specify the optional details in the Optional information group of settings.
- Full user name
- Description
- Email address
- Phone number
- Click OK to save the changes.
The new user will be added and displayed in the list of users.
- Specify user credentials in the Credentials block of settings.
- To modify user details, click Edit user.
The fields you can modify depend on the user subtype - internal or domain.
Step 5. Certificate alias and source
At this step, choose the certificate alias and source for importing the certificate.
- Certificate alias
A certificate alias is a name that identifies the certificate. You can use the selected alias later to configure policy settings: Email account for iOS MDM devices; Exchange ActiveSync account for iOS MDM devices; VPN network for iOS MDM devices; Wi-Fi network for iOS MDM devices.
This option is available only if you selected Mail certificate or VPN certificate as the certificate type.
- Integrate issuance with Microsoft CA via PKI
For this option, specify one of the available templates imported from Microsoft CA in the PKI template field.
This option is available only if the integration with PKI is enabled in the Issuance rules.
- Upload file
For this option, specify the Certificate format:
- For the PKCS #12 format, in the Certificate file field, click Select, and then specify a P12 or PFX file.
- For the X.509 format, in the Private key file field, click Select, and then specify a PRK or PEM file.
In the Certificate file field, click Select, and then specify a CER, CRT, or CERT file.
After you specify the files, you can also enter the Certificate password.
Step 6. Authentication method
This step is displayed only if you selected Mobile certificate as the certificate type, or if you selected Mail certificate or VPN certificate for Android devices and specified the Connect without mobile certificate authentication option as the connection method.
At this step, choose the user authentication method for receiving the certificate.
- Domain or internal user credentials. Users will access the certificate using the domain or internal user credentials. On mobile devices, users will have to specify the login in one of the following formats:
userPrincipalName@DNSDomainName
sAMAccountName
sAMADomain\sAMAccountName
- Password. Users will access the certificate using a password sent by email or displayed after completing the wizard.
In the Certificate use on device block of settings, click the Allow using one certificate multiple times on the same device (only for devices with Kaspersky Endpoint Security for Android installed) check box if you want to allow using one certificate multiple times on the same device.
This option is available only if Android is chosen as the operating system of the devices for which the certificate will be issued.
Step 7. Send certificate details
At this step, choose how to send the certificate installation details. You can choose one of the following options:
- Send a message to users' email addresses
Choose this option to send the certificate installation details by email to the selected users. These email addresses must be specified in the user account settings in Kaspersky Security Center.
If you want to send the certificate installation details to an email address that is not specified in the user account settings in Kaspersky Security Center, select the Send a copy of the message to an alternate email address check box, and then specify the required email address. - Show the details after completing the wizard
Choose this option to display the certificate installation details at the final step of the Certificate issuance wizard.
Step 8. Confirm
At this step, check the certificate issuance details specified in the earlier steps, and then click Confirm and issue certificate to confirm the operation.
Finish
On the Finish screen:
- If you chose the Send a message to users' email addresses option, the specified users will receive the emails with certificate installation details.
- If you chose the Show the details after completing the wizard option, certificate installation details are displayed on the Finish screen. You can view the displayed details or click Download list to receive a file with summarized information.
Click Close to exit the wizard.
After completing the Certificate issuance wizard, certificates are created and added to the list of user certificates. You can delete or renew certificates, as well as view their properties.
Page top
Renewing mobile device certificates
If one of the certificates is about to expire, you can renew it using Kaspersky Security Center Web Console.
By following the steps below, you can renew a mobile certificate or a mail or VPN certificate issued via PKI.
To renew a certificate:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Certificates.
- In the list of certificates that opens, select the certificate you want to renew, and then click Renew.
The status of the certificate changes to Certificate renewed.
Page top
Deleting mobile device certificates
You can delete the certificates of mobile devices using Kaspersky Security Center Web Console.
Please note that if you delete a mobile certificate, the device can no longer synchronize with Administration Server and cannot be managed by means of Kaspersky Security Center.
When you delete a certificate, it is only removed from Kaspersky Security Center Web Console and is no longer renewed, but remains on the device. To delete a certificate from iOS MDM devices, corporate devices, or devices with corporate container, you must execute the Wipe corporate data command. On personal Android devices, users should delete the certificate manually.
When you delete a mobile certificate of the iOS MDM device, the device is not removed from Kaspersky Security Center Web Console, but it loses the ability to synchronize with iOS MDM Server and the "Inactive" status is assigned to it. In this case, you have to delete this device from the list of managed devices in Kaspersky Security Center Web Console, and then reconnect it using Mobile device connection wizard.
To delete a certificate from Kaspersky Security Center Web Console:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Certificates.
- In the list of certificates that opens, select the certificate you want to delete, and then click Delete.
The certificate is deleted and removed from the list of certificates.
Page top
Integration with Public Key Infrastructure
You can integrate the issuance of certificates with Microsoft Certification Authority (CA) via Public Key Infrastructure (PKI). Integration with PKI is primarily intended for simplifying the issuance of domain user certificates by Administration Server. Following integration, certificates are issued automatically.
You can perform the PKI integration with specified settings and assign PKI to act as the source of certificates for specific types of certificates. The PKI integration settings specified in the Issuance rules let you set the individual default template for all types of certificates.
The specifics of using PKI integration to issue certificates:
- The PKI integration is disabled by default. You can enable it using the Integrate issuance of certificates with Microsoft Certification Authority (CA) via PKI toggle switch. For detailed information on enabling PKI and configuring its settings, refer to the Configuring certificate issuance rules section.
- The certificate issuance is carried out using Network Agent Windows, which enables the integration between Administration Server and Microsoft CA. Since there can be multiple devices with Network Agent installed, you can specify the device that will connect to Microsoft CA in the Issuance rules. This device must have an Enrollment Agent (EA) certificate installed in the certificates repository of the account under which the integration with PKI is performed. The certificate is issued by the administrator of the domain's CA.
- The account under which integration with PKI is performed must be a domain user and have the right to Log On As Service.
- Kaspersky Security Center can only work with one PKI (Microsoft CA) integration at a time.
For detailed information on configuring integration with PKI to issue certificates, refer to the Configuring certificate issuance rules section.
Page top
Viewing the list of mobile device certificates
Kaspersky Security Center Web Console lets you view the created mobile device certificates and their properties.
To view the list of all certificates and their properties:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Certificates.
- In the window that opens, you can view the list of all created certificates and their properties displayed in the table.
To view the properties of an individual certificate:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Certificates.
- In the list of certificates that opens, select the certificate whose properties you want to view.
- In the Certificate details window, view the certificate properties:
- User name
- Status
- Type
- Protocol
- Source
- Expiration date
- Issue date
- Latest status update
- Alias
- Automatic renewal disabled
- Thumbprint
To view the certificates installed on an iOS MDM device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Devices.
- In the list of mobile devices that opens, choose the device whose certificates you want to view.
- In the device properties window that opens, choose the Certificates section.
The list of certificates installed on the device and their properties are displayed.
- Certificate name
- User certificate
- Certificate thumbprint
Configuration and management
This section is intended for specialists who administer Kaspersky Secure Mobility Management, as well as for specialists who provide technical support to organizations that use Kaspersky Secure Mobility Management.
Control
This section contains information about how to remotely monitor mobile devices in the Kaspersky Security Center Web Console.
Configuring restrictions
This section provides instructions on how to configure user access to the features of mobile devices.
Configuring restrictions for personal Android devices
These settings apply to personal devices and devices with a corporate container.
To keep an Android device secure, Kaspersky Mobile Devices Protection and Management lets you configure user access to the following features of mobile devices:
- Wi-Fi
- Camera
- Bluetooth
By default, the user can use Wi-Fi, camera, and Bluetooth on the device without restrictions.
To configure the Wi-Fi, camera, and Bluetooth usage restrictions on the device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Restrictions section.
- On the Device feature restrictions card, click Settings.
The Device feature restrictions window opens.
- Enable the settings using the Device feature restrictions toggle switch.
- Configure usage of Wi-Fi, camera, and Bluetooth:
- To disable the Wi-Fi module on the user's mobile device, select the Prohibit use of Wi-Fi check box.
On personal devices and devices with a corporate container running Android 10 or later, prohibiting the use of Wi-Fi networks is not supported.
- To disable the camera on the user's mobile device, select the Prohibit use of camera check box.
When camera usage is prohibited, the app displays a notification upon opening and then closes shortly after. On Asus and OnePlus devices, the notification is shown in full screen. The device user can tap the Close button to exit the app.
On devices running Android 11 or later, Kaspersky Endpoint Security for Android must be set as an Accessibility feature. Kaspersky Endpoint Security for Android prompts the user to set the app as an Accessibility feature through the Initial Configuration Wizard. The user can skip this step or later disable this service in the device settings. If this is the case, you will not be able to restrict use of the camera.
- To disable Bluetooth on the user's mobile device, select the Prohibit use of Bluetooth check box.
On Android 12 or later, the use of Bluetooth can be disabled only if the device user granted the Nearby devices permission. The user can grant this permission during the Initial Configuration Wizard or later.
On personal devices running Android 13 or later, the use of Bluetooth cannot be disabled.
- To disable the Wi-Fi module on the user's mobile device, select the Prohibit use of Wi-Fi check box.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
You can also restrict additional operating system features on corporate devices.
Page top
Configuring iOS MDM device restrictions
To ensure compliance with corporate security requirements, configure restrictions on the operation of iOS MDM devices.
Configuring feature restrictions
To configure iOS MDM device feature restrictions:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Restrictions section.
- On the Device feature restrictions card, click Settings.
The Device feature restrictions window opens.
- Enable the settings using the Device feature restrictions toggle switch.
- Enable iOS MDM device feature restrictions using toggle switches on corresponding tabs and select the required restrictions.
- Click OK.
- Click Save to save the changes you have made.
As a result, feature restrictions will be configured on the user's mobile device after the policy is applied.
Configuring app restrictions
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Restrictions section.
- On the App restrictions card, click Settings.
The App restrictions window opens.
- Enable the settings using the App restrictions toggle switch.
- Configure iOS MDM device app restrictions.
- Click OK.
- Click Save to save the changes you have made.
As a result, app restrictions will be configured on the user's mobile device after the policy is applied.
Configuring content restrictions
Categories used for content restrictions are determined by Apple. In some cases, when content restrictions are configured, actual results may differ from expected results.
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Restrictions section.
- On the Content restrictions card, click Settings.
The Content restrictions window opens.
- Enable the settings using the Content restrictions toggle switch.
- Configure iOS MDM device content restrictions.
- Click OK.
- Click Save to save the changes you have made.
As a result, content restrictions will be configured on the user's mobile device after the policy is applied.
Page top
Configuring user access to websites
This section contains instructions on how to configure access to websites on Android and iOS devices.
Configuring access to websites on Android devices
You can use Web Control to configure Android device users' access to websites. Web Control supports website filtering by categories defined in the Kaspersky Security Network cloud service. Filtering allows you to restrict user access to certain websites or categories of websites (for example, "Gambling, lotteries, sweepstakes" or "Internet communication"). Web Control is enabled by default.
Web Control on Android devices is supported only in Google Chrome, HUAWEI Browser, Samsung Internet, and Yandex Browser.
On corporate devices, if Kaspersky Endpoint Security for Android is not enabled as an Accessibility feature, Web Control is supported only in Google Chrome and checks only the domain of a website. To allow other browsers (Samsung Internet, Yandex Browser, and HUAWEI Browser) to support Web Control, enable Kaspersky Endpoint Security as an Accessibility feature. This will also let you use the Custom Tabs feature.
If Kaspersky Endpoint Security for Android is not enabled as an Accessibility feature and a proxy is enabled in the Google Chrome settings card, Web Control will not work.
To configure the settings for device users' access to websites:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Security controls section.
- On the Web Control card, click Settings.
The Web Control window opens.
- Select one of the following options:
- If you want the app to restrict user access to websites depending on their content, do the following:
- In the Operating mode drop-down list, in the drop-down list select Prohibit websites in selected categories.
- In the Categories section, create a list of prohibited categories by selecting the check boxes next to the categories of websites to which the app will block access.
- If you want the app to allow or block user access only to specified websites, do the following:
- In the Operating mode drop-down list, select Allow only listed websites or Allow all websites except listed ones.
- Click Add.
- In the window that opens, create a list of websites to which the app will allow or block access, depending on the value selected in the drop-down list. You can add websites by link (full URL, including the protocol, for example,
https://example.com
).To make sure that the app allows or blocks access to the specified website in all supported versions of Google Chrome, HUAWEI Browser, Samsung Internet, and Yandex Browser include the same URL twice — once with the HTTP protocol (for example,
http://example.com
) and once with the HTTPS protocol (for example, https://example.com).For example:
https://example.com
— The main page of the website is either allowed or blocked. This URL can only be accessed through the HTTP protocol.http://example.com
— The main page of the website is either allowed or blocked, but only when accessed through the HTTP protocol. Other protocols like HTTPS are not affected.https://example.com/page/index.html
— Only the index.html page of the website will be allowed or blocked. The rest of the website is not affected by this entry.
The app also supports regular expressions. When entering the address of an allowed or forbidden website, use the following templates:
https://example\.com/.*
— This template blocks or allows all child pages of the website, accessed via the HTTPS protocol (for example,https://example.com/about
).https?://example\.com/.*
— This template blocks or allows all child pages of the website, accessed via both the HTTP and HTTPS protocols.https?://.*\.example\.com
— This template blocks or allows all subdomain pages of the website (for example,https://pictures.example.com
).https?://example\.com/[abc]/.*
— This template blocks or allows all child pages of the website where the URL path begins with 'a', 'b', or 'c' as the first directory (for example,https://example.com/b/about
).https?://\w{3,5}.example\.com/.*
— This template blocks or allows all child pages of the website where the subdomain consists of a word with 3 to 5 characters (for example,http://abde.example.com/about
).
Use the
https?
expression to select both the HTTP and HTTPS protocols. For more details on regular expressions, please refer to the Oracle Technical Support website. - Click Add.
- If you want the app to block user access to all websites, in the Operating mode section, in the drop-down list, select Prohibit all websites.
- If you want the app to restrict user access to websites depending on their content, do the following:
- If you want the app to check the full URL when opening a website in Custom Tabs, select the Check full URL when using Custom Tabs check box.
Custom Tabs is an in-app browser that allows the user to view web pages without having to leave the app and switch to a full web browser version. This option provides better URL recognition and checks URLs against the configured Web Control rules. If the check box is selected, Kaspersky Endpoint Security for Android opens the website in a full version of the browser and checks the whole web address of the website. If the check box is cleared, Kaspersky Endpoint Security for Android checks only the domain of the website in Custom Tabs.
The Custom Tabs feature is supported in Google Chrome, HUAWEI Browser, and Samsung Internet.
- If you want to lift content-based restrictions on user access to websites, disable the settings using the Web Control toggle switch and click Disable.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Managing the website list
You can manage the list of websites with the following buttons:
- Add — Click to add a website to the list by entering a URL or regular expression.
- Upload — Click to add multiple websites to the list by specifying a TXT file that contains the required URLs or regular expressions. The file must be encoded in UTF-8. URLs or regular expressions in the file must be separated by semicolons or line breaks.
- Edit — Click to change the address of a website.
- Delete — Click to remove one or more websites from the list.
Configuring access to websites on iOS MDM devices
These settings apply to supervised devices.
Configure Web Control settings to control access to websites for iOS MDM device users. Web Control manages users' access to websites based on lists of allowed and forbidden websites. Web Control also lets you add website bookmarks on the bookmark panel in Safari.
By default, access to websites is not restricted.
If a URL is redirected to a different website, Web Control checks only the redirect target.
To configure settings for device users' access to websites:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Security controls section.
- On the Web Control card, click Settings.
The Web Control window opens.
- Enable the settings using the Web Control toggle switch.
- In the Operating mode drop-down list do one of the following:
- If you want to create a list of allowed websites, select Allow only listed websites.
- If you want to create a list of forbidden websites, select Allow all websites except listed ones.
- Do one of the following:
- If you want to add websites manually:
- Click Add:
- Add websites to which the app will allow or block access, depending on the value selected in the drop-down list.
The website address should begin with
http://
orhttps://
. Kaspersky Mobile Devices Protection and Management allows or blocks access to all websites in the domain. For example, if you addhttp://www.example.com
to the list of allowed websites, access is allowedhttp://pictures.example.com
andhttp://example.com/movies
.If you want to add an allowed website to bookmarks in Safari on mobile devices, select the Add to bookmarks on device check box below the website address.
- Click Add.
- If you want to upload a TXT file with a list of websites, click Upload.
The TXT file must be saved with the UTF-8 encoding and LF or CR+RF line breaks.
- If you want to add websites manually:
- Click OK.
- Click Save to save the changes you have made.
As a result, once the policy is applied, Web Control will be configured on the mobile devices.
Page top
Compliance Control
This section contains instructions on how to monitor the compliance of devices with corporate requirements and configure compliance control rules.
Compliance Control of Android devices
You can control Android devices for compliance with corporate security requirements. Corporate security requirements regulate how the user can work with the device. For example, the real-time protection must be enabled on the device, the anti-malware databases must be up-to-date, and the device password must be sufficiently strong. Compliance Control is based on a list of rules. A compliance rule includes the following components:
- Device check criterion (for example, absence of blocked apps on the device).
- Time period allocated for the user to fix the non-compliance (for example, 24 hours).
- Responses performed on the device if the user does not correct the non-compliance issue within the set time period (for example, lock the device).
If the device is in battery saver mode, Kaspersky Endpoint Security for Android may perform this task later than specified.
To create a rule for checking devices for compliance with a policy:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Security controls section.
- On the Compliance Control card, click Settings.
The Compliance Control window opens.
- Enable the settings using the Compliance Control toggle switch.
- In the When non-compliance is detected section:
- Select the Notify user check box to inform the user that the device does not comply with the policy.
If the check box is cleared, the user is not notified of the non-compliance issue, and the response is performed on the device as soon as the time allocated for fixing the non-compliance expires.
- Select the Notify the administrator through the "Events" section check box to inform the administrator that the device does not comply with the policy.
- Select the Notify user check box to inform the user that the device does not comply with the policy.
- Click Add.
The Add rule wizard starts. This wizard will help you create a set of rules for checking the device compliance with the policy. Navigate through the wizard using the Next and Back buttons.
Step 1. Criterion for non-compliance
Click Add criterion to specify the non-compliance criterion to trigger the rule.
The following criteria are available:
- Real-time protection is disabled
Kaspersky Endpoint Security for Android is not installed or running on the device.
- Anti-malware databases on device are out of date
Anti-malware databases were last updated 3 or more days ago.
- Forbidden apps are installed
The list of apps on the device contains apps that are set as forbidden in the App Control settings of the policy.
- Apps from forbidden categories are installed
The list of apps on the device contains apps from the categories that are set as forbidden in the App Control settings of the policy.
- Not all required apps are installed
The list of apps on the device does not contain an app that is set as required in the App Control settings of the policy.
- Operating system version is outdated
The Android version on the device is outside the allowed range.
For this criterion, specify the minimum and maximum allowed versions of Android in the Minimum version and Maximum version fields. If the maximum allowed version is set to Any, future Android versions supported by Kaspersky Endpoint Security for Android will also be allowed.
- Device has not been synchronized for a long time
The last synchronization of the device with the Administration Server is checked.
For this criterion, specify the maximum period after the last synchronization in the Period without synchronization field.
- Device has been rooted
The device is hacked (root access is gained on the device).
- Unlock password is not compliant with security settings specified in policy
The unlock password on the device is not compliant with the settings defined in the Screen unlock settings card.
- Installed version of Kaspersky Endpoint Security for Android is outdated
Kaspersky Endpoint Security for Android installed on the device is obsolete.
This criterion applies only to an app installed using a Kaspersky Endpoint Security for Android installation package and if the minimum allowed version of Kaspersky Endpoint Security for Android is specified in the App update settings of the policy.
- SIM card usage is not compliant with security requirements
The device SIM card has been replaced or removed compared to the previous check state, or an additional SIM card has been inserted.
For this criterion, select the specific condition that must be monitored:
- The SIM card must not be replaced or removed
- The SIM card must not be replaced or removed; additional SIM cards must not be inserted
- Device location
The device is outside the specified geofence areas.
Specifying the geofence area will result in increased device power consumption.
For this criterion, select the specific condition that must be monitored:
- The device is within a specified geofence (the geofence areas are combined using the OR logical operator).
- The device is outside specified geofences (the geofence areas are combined using the AND logical operator).
To add a geofence area:
- Click Add geofences.
The Add geofences window opens.
- Specify the Geofence name.
- Specify the geofence perimeter by entering a latitude and a longitude for each point.
For each geofence area, you can manually enter from 3 to 100 coordinate pairs (latitude, longitude) as decimal numbers.
A geofence perimeter must not contain intersecting lines.If needed, you can specify more than 3 points by clicking the Add point button.
To delete a point, click the X button.
You can view the specified geofence area in the Yandex.Maps program by clicking View on map.
- Click OK to add the specified geofences.
- Kaspersky Endpoint Security for Android has no access to precise or background location
Kaspersky Endpoint Security for Android is not allowed to access the precise location of the device or use the device location in the background.
Step 2. Responses for non-compliance with security requirements
Add the responses to be performed on the device if the specified non-compliance criterion is detected.
Choose one of the following options:
- Add instant response. The response is applied instantly after the non-compliance criterion is detected.
- Add deferred response. The response is applied after a deferral period that you can specify in the Deferral period field.
The following responses are available:
- Block all apps except system apps
All apps on the device, except system apps, are blocked from starting.
As soon as the non-compliance criterion selected for the rule is no longer detected on the device, the apps are automatically unblocked.
- Lock device
The mobile device is locked. To obtain access to data, you must unlock the device by entering the one-time passcode or using the Unlock device command.
- Wipe corporate data
The corporate data is wiped from the device. The list of wiped data depends on the mode in which the device operates:
- On a personal device, Knox profile and mail certificate are wiped.
- On a corporate device, Knox profile and the certificates installed by Kaspersky Endpoint Security for Android (mail, VPN, and SCEP profile certificates, except the mobile certificates) are wiped.
- Additionally, on a device with corporate container, the container (its content, configurations, and restrictions) and the certificates installed in it (mail, VPN, and SCEP profile certificates, except the mobile certificates) are wiped.
- Reset to factory settings
All data is wiped from the device and settings are rolled back to their factory values. After this response is performed, the device will no longer be managed. To connect the device to Kaspersky Security Center, you must reinstall Kaspersky Endpoint Security for Android.
On devices running Android 14 or later, this response is only applicable if the device is operating in corporate device mode.
- Lock corporate container
Corporate container on the device is locked. To obtain access to corporate container, you must unlock it.
The response is only applicable to devices running Android 6 or later.
After the corporate container on a device is locked, the history of the container passwords is cleared. It means that the user can specify one of the recent passwords, regardless of the corporate container password settings.
- Wipe data of all apps
On a corporate device, data of all apps on the device is wiped.
On a device with corporate container, data of all apps in the container is wiped.
As a result, apps are rolled back to their default state.
The response is only applicable to devices running Android 9 or later in corporate device or device with corporate container operating modes.
- Wipe data of a specified app
For this response, you need to specify the package name for the app whose data is to be wiped. How to get the package name of an app
As a result, the app is rolled back to its default state.
The response is only applicable to devices running Android 9 or later in corporate device or device with corporate container operating modes.
- Prohibit safe boot
The user is not allowed to boot the device in safe mode.
The response is only applicable to corporate devices running Android 6 or later.
- Prohibit use of camera
The user is not allowed to use any cameras on the device.
- Prohibit use of Bluetooth
The user is not allowed to turn on and configure Bluetooth settings.
The response is only applicable to personal devices running Android 12 or earlier, corporate devices, or devices with corporate container.
- Prohibit use of Wi-Fi
The user is not allowed to use and configure Wi-Fi settings.
The response is only applicable to personal devices running Android 9 or earlier or corporate devices.
- Prohibit USB debugging features
The user is not allowed to use USB debugging features and developer mode on the device.
The response is only applicable to corporate devices or devices with corporate container.
- Prohibit airplane mode
The user is not allowed to enable airplane mode on the device.
The response is only applicable to corporate devices running Android 9 or later.
- Block all apps except system apps
Click Add rule to finish the Add rule wizard. The new rule and its details appear in the list of the Compliance Control rules. To temporarily disable a rule, use the toggle switch next to the selected rule.
To enable the automatic wiping of data from devices associated with disabled accounts of Active Directory users, select the Wipe data from devices with disabled Active Directory user accounts check box and select one of the following actions:
- Wipe corporate data
- Reset to factory settings
On devices running Android 14 or later, this action is only applicable if the device is operating in corporate device mode.
These settings require integration with Microsoft Active Directory.
If you use policy profiles, be sure to enable the wipe data option for the entire policy. When a user account is disabled in Active Directory, it is first removed from the Active Directory user group. As a result, the policy profile is no longer applied to this user account, so the data is not wiped from the device.
Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Page top
Compliance Control of iOS MDM devices
Compliance Control lets you monitor iOS MDM devices for compliance with corporate security requirements and take actions if non-compliance is found. Compliance Control is based on a list of rules. Each rule includes the following components:
- Status (whether the rule is enabled or disabled).
- Non-compliance criteria (for example, absence of the specified apps or the operating system version).
- Responses performed on the device if the user does not correct the non-compliance issue within the set time period (for example, wipe corporate data or send an email message to the user).
To create a rule for checking devices for compliance with a policy:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Security controls section.
- On the Compliance Control card, click Settings.
The Compliance Control window opens.
- Enable the settings using the Compliance Control toggle switch.
- Click Add.
The Add rule wizard starts. This wizard will help you create a set of rules for checking the device compliance with the policy. Navigate through the wizard using the Next and Back buttons.
Step 1. Criterion for non-compliance
Click Add criterion to specify the non-compliance criterion to trigger the rule.
The following criteria are available:
- List of installed apps
The list of apps on the device contains forbidden apps or does not contain required apps.
For this criterion, select a condition (Contains or Does not contain) and specify the Bundle ID of the app. How to get the bundle ID of an app
- Operating system version
The version of the operating system on the device is outside the allowed range.
For this criterion, select a condition (Equal to, Not equal to, Earlier than, Earlier than or equal to, Later than, or Later than or equal to) and specify the iOS version.
Note that the Equal to and Not equal to operators check for a full match of the operating system version with the specified value. For instance, if you specify iOS 15 in the rule, but the device is running iOS 15.2, the Equal to criterion is not met. If you need to specify a range of versions, you can create two criteria and use the Earlier than and Later than operators.
- Supervision status
The supervision status of the device is not the one required.
For this criterion, select the device operating mode (Supervised or Basic control).
- Device type
The device type is not the one required.
For this criterion, select a device type (iPhone or iPad).
- Device model
The device model is not the one required.
For this criterion, select a condition (Equal to or Not equal to) and specify models that will be checked or excluded from the check, respectively.
To specify a model, in the Model identifier field, select the required model from the list or enter a value manually. The list contains mobile device codes and their matching product names. For example, if you want to add all iPhone 14 models, type "iPhone 14". In this case, you can select any of the available models: "iPhone 14", "iPhone 14 Plus", "iPhone 14 Pro", "iPhone 14 Pro Max".
In some cases, the same product name may correspond to several mobile device codes (for example, the "iPhone 7" product name corresponds to two mobile device codes, "iPhone 9.1" and "iPhone 9.3"). Be sure that you select all of the mobile device codes that correspond to the required models.
If you enter a value that is not on the list, nothing will be found. However, you can click Add: "<value>" under the field to add the entered value to the criterion.
If you specify the criteria that contradict each other (for example, Device type is set to iPhone but the list of values of Device model, with the Equal to operator selected, contains an iPad model), an error message is displayed. You cannot save a rule with such criteria.
- Roaming
The device roaming status is not the one required.
For this criterion, select a condition (Device is roaming or Device is not roaming).
- Password on device
A password is not set or not compliant with the settings specified in the Screen unlock settings card.
For this criterion, select a condition (Not set, Set but not compliant, or Set and compliant).
- Free storage on device
The amount of free space on the device is less than the specified threshold.
For this criterion, specify the threshold amount of free space (Less than or equal to), and then select the measurement unit (MB or GB).
- Device is not encrypted
The device is not encrypted.
Data encryption is enabled by default on password-locked iOS devices (Settings > Touch ID / Face ID and Password > Enable Password). Also, the hardware encryption on a device must be set to At block and file level (you can check this setting in the device properties: go to Assets (Devices) → Mobile → Devices, and then select the required device).
- Actions with SIM card
The device SIM card has been replaced or removed compared to the previous check state, or an additional SIM card has been inserted.
For this criterion, select a condition (The SIM card must not be replaced or removed or The SIM card must not be replaced or removed; additional SIM cards must not be inserted).
On eSIM compatible devices, the non-compliance detection cannot be removed by inserting the previously removed eSIM. This is because the device operating system recognizes each added eSIM as a new one. In this case, delete the compliance control rule from the policy.
- Device has not been synchronized for a long time
The last synchronization of the device with iOS MDM Server is checked.
For this criterion, specify the maximum time after the last sync in the Period without synchronization field, and then select the measurement unit (Hours or Days).
We do not recommend that you specify a value less than the value of the Synchronization period (min) setting specified in the iOS MDM Server settings.
Step 2.Responses for non-compliance with security requirements
Add the responses to be performed on the device if the specified non-compliance criterion is detected.
Choose one of the following options:
- Add instant response. The response is applied instantly after the non-compliance criterion is detected.
- Add deferred response. The response is applied after a deferral period that you can specify in the Deferral period field.
Responses are performed during the compliance rule check, which happens every 40 minutes, and persist until the next synchronization with the iOS MDM Server. To prevent repeating responses from a single non-compliance instance, set the Synchronization period (min) value to 30 minutes in the iOS MDM Server settings.
If you specify responses that contradict each other, an error message is displayed. You cannot save such a rule.
When the non-compliance criteria selected for the rule are no longer detected on the device, you can revert the response by sending the respective command to the device.
The following responses are available:
- Send a message to the user
The user is informed about the non-compliance by email.
For this response, specify user email addresses in the Email and Alternate email address fields. If necessary, you can also edit the email subject and default text.
Make sure the Email notifications are configured in the Administration Server properties. For detailed information on configuring notifications delivery, refer to the Kaspersky Security Center Help.
- Wipe corporate data
All installed configuration profiles, provisioning profiles, the device management profile, and apps for which the Remove when device management profile is deleted check box has been selected are removed from the device. This response is performed by sending the Wipe corporate data command.
- Modify profile
For this response, specify one of the actions:
- Install profile. The configuration profile is installed on device. This action is performed by sending the Install configuration profile command. For this response, you also need to specify the ID of the profile to be installed.
Before the profile is installed, it must be added to the list of configuration profiles in the Configuration profiles section of the iOS MDM Server settings.
- Delete specified profile. The configuration profile is deleted from the device. This response is performed by sending the Delete configuration profile command. For this action, you also need to specify the ID of the profile to be deleted.
- Delete all profiles. All previously installed configuration profiles are deleted from the device.
When the non-compliance criteria selected for the rule are no longer detected on the device, you can install the deleted configuration profiles one by one, by sending the respective command to the device.
- Install profile. The configuration profile is installed on device. This action is performed by sending the Install configuration profile command. For this response, you also need to specify the ID of the profile to be installed.
- Update operating system
For this response, specify the OS version and one of the actions:
- Download and install. The device operating system is downloaded and installed.
If a non-existent operating system version is specified in the Operating system version criterion, the device will upgrade to the latest downloaded operating system.
- Download only. The device operating system is downloaded.
- Install only. The previously downloaded operating system is installed.
This response is only applicable to supervised devices.
- Download and install. The device operating system is downloaded and installed.
- Modify Bluetooth settings
For this response, specify whether you want to enable or disable Bluetooth on the device.
This response is only applicable to supervised devices.
- Reset to factory settings
All data is deleted from the device and the settings are rolled back to their default values. After this response is performed, the device will no longer be managed. To connect the device to Kaspersky Security Center, you must reinstall the device management profile on it.
- Modify apps
For this response, specify one of the actions:
- Delete specified app. The specified app is removed from the device.
You can delete only a managed app. An app is considered managed if it has been installed through Kaspersky Security Center by executing the Install app command.
When the non-compliance criteria selected for the rule are no longer detected on the device, you can revert the response by sending the respective command to the device.
For this action, specify the Bundle ID of the app to be deleted. How to get the bundle ID of an app
- Delete all apps. All managed apps are deleted from the device.
You can delete only managed apps. An app is considered managed if it has been installed through Kaspersky Security Center by executing the Install app command.
When the non-compliance criteria selected for the rule are no longer detected on the device, you can install the deleted apps one by one, by sending the respective command to the device.
For this action, specify the Bundle ID of the apps to be deleted. How to get the bundle ID of an app
- Delete specified app. The specified app is removed from the device.
- Delete profile of specified type
For this response, specify the Profile type to be deleted from the device (for example, Web Clips or Calendar subscriptions).
As soon as the non-compliance criteria selected for the rule are no longer detected on the device, the deleted profiles are automatically restored.
- Modify roaming settings
For this response, specify whether you want to enable or disable data roaming on the device.
- Send a message to the user
Click Add rule to finish the Add rule wizard. The new rule and its details appear in the list of Compliance Control rules. To temporarily disable a rule, use the toggle switch next to the selected rule.
To enable the automatic wiping of data from devices associated with disabled accounts of Active Directory users, select the Wipe data from devices with disabled Active Directory user accounts check box and choose one of the following actions:
- Wipe corporate data
- Reset to factory settings
These settings require integration with Microsoft Active Directory.
If you use policy profiles, be sure to enable the wipe data option for the entire policy. When a user account is disabled in Active Directory, it is first removed from the Active Directory user group. As a result, the policy profile is no longer applied to this user account, so the data is not wiped from the device.
Click Save to save the changes you have made.
Page top
App Control
This section contains instructions on how to configure user access to apps on a mobile device.
App Control on Android devices
The App Control component lets you manage apps on Android devices and configure use of these apps to keep the devices secure.
You can restrict user activity on a device on which forbidden apps are installed or required apps are not installed (for example, by locking the device). You can impose restrictions using the Compliance Control component. To do so, in the rule settings, you must select the Forbidden apps are installed, Apps from forbidden categories are installed, or Not all required apps are installed criterion.
Kaspersky Endpoint Security for Android must be set as an Accessibility feature to ensure proper functioning of App Control. Kaspersky Endpoint Security for Android prompts the user to set the app as an Accessibility feature through the Initial Configuration Wizard. The user can skip this step or later disable this service in the device settings. If the user does this, App Control will not run.
On corporate devices, you have extended control over the device. App Control operates without notifying the device user:
- Required apps are installed automatically in the background. To install apps silently, you need to specify a link to the APK file of the required app in the policy settings.
- Forbidden apps can be deleted from the device automatically. To delete apps silently, you need to select the Remove forbidden apps automatically check box in the policy settings.
To configure app startup settings on the mobile device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Security controls section.
- On the App Control card, click Settings.
The App Control window opens.
- Enable the settings using the App Control toggle switch.
- Configure the settings on the following tabs:
- If you want to configure general rules of app management, go to the App use tab.
- If you want to set actions to be performed for selected apps, go to the App management tab.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Page top
App Control on iOS MDM devices
These settings apply to supervised devices.
Kaspersky Security Center lets you manage apps on iOS MDM devices to keep these devices secure. You can create a list of apps allowed to be installed on devices and a list of apps prohibited from being displayed and launched on devices.
To configure the list of apps allowed or prohibited to be installed on devices:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Security controls section.
- On the App Control card, click Settings.
The App Control window opens.
- Enable the settings using the App Control toggle switch.
- In the Operating mode field, select one of the following options:
- Use all apps except forbidden ones
All apps will be displayed and available to run on the device except the ones from the list.
- Use only allowed apps
This option is selected by default. If you select this option, the user will be able to open only the following apps on the device:
- Apps in the list
- System apps
All other apps will be hidden.
- Use all apps except forbidden ones
- Click Add to add apps to the list.
- In the window that opens, specify the app's bundle ID in the corresponding field. Specify the
com.apple.webapp
value to allow or restrict all Web Clips. How to get the bundle ID of an appIf necessary, you can specify several bundle IDs by clicking the Add bundle ID button.
- Click Save.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with the iOS MDM Server.
As a result, once the policy is applied, the specified settings for apps are configured on devices.
Page top
Mobile device protection levels
Mobile device protection levels defined by Kaspersky Security Center
Web Console lets you quickly assess the current protection level of managed mobile devices in the Assets (Devices) → Mobile → Devices section.
A device can have one of the following protection levels: OK, Warning, or Critical.
The protection levels are assigned and sent to Kaspersky Security Center, in accordance with the following requirements:
- One reason for assigning a protection level is detected on the device — the device gets the status displayed in the list of managed devices.
- Multiple reasons for assigning protection levels are detected on the device — Kaspersky Mobile Devices Protection and Management assigns the most critical status.
- No reasons for assigning a protection level are detected on the device — Kaspersky Mobile Devices Protection and Management does not send a status to Kaspersky Security Center, and the status is set as OK.
Protection levels and their meanings
Protection level
Meaning
OK
An administrator's intervention is not required.
Warning
Events have been logged that are related to potential or actual threats to the security of managed devices.
Critical
Serious problems have been encountered. An administrator's intervention is required to solve them.
The administrator's goal is to ensure that the OK protection level exists on all devices.
Mobile device protection levels defined by Kaspersky Mobile Devices Protection and Management
Kaspersky Mobile Devices Protection and Management defines the protection level of mobile devices based on policy settings and then sends the protection levels to Kaspersky Security Center during synchronization. The administrator can change the protection level in the policy, depending on the severity level of the condition (see the Default values, reasons, and conditions for assigning a protection level on Android devices table). In this case, the value set by the administrator overrides the default value defined by Kaspersky Mobile Devices Protection and Management.
Default values, reasons, and conditions for assigning a protection level on Android devices
Condition |
Reason for protection level |
Default value |
---|---|---|
Real-time protection is not running
|
One of the following reasons:
|
Critical |
Web Protection and Web Control are not running |
One of the following reasons:
|
Warning |
App Control is not running |
The Accessibility permission has not been granted. |
Warning |
Device lock is not available |
One of the following reasons:
|
Warning |
Device location is not available |
One of the following reasons:
|
Warning |
Versions of the Kaspersky Security Network Statement do not match |
The version of the Kaspersky Security Network Statement that the user accepted in the policy and the version of the Kaspersky Security Network Statement on the device do not match. |
Warning |
Versions of the Marketing Statement do not match |
The version of the Statement regarding data processing for marketing purposes that the user accepted in the policy and the version of the Statement regarding data processing for marketing purposes on the device do not match. |
OK |
Software inventory on Android devices
You can take an inventory of apps on Android devices connected to the Administration Server. Kaspersky Endpoint Security for Android receives information about all apps installed on mobile devices. Information obtained while taking inventory is displayed in the device properties in the Events section. In this section, you can view detailed information on each installed app.
To enable software inventory:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Security controls section.
- On the App Control card, click Settings.
The App Control window opens.
- In the Report on installed apps section, select the Send data on installed apps check box.
- If you want to receive data about system apps, select the Send data on built-in apps check box.
- If you want to receive data about service apps, which do not have an interface and cannot be opened by the user, select the Send data on service apps check box.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center. Kaspersky Endpoint Security for Android sends data to the event log each time an app is installed or removed from the device.
Page top
Protection
This section contains information about how to remotely manage protection of mobile devices in the Kaspersky Security Center Web Console.
Configuring anti-malware protection on Android devices
For timely detection of threats, viruses, and other malicious applications, you can configure the settings for real-time protection and automatic malware scans.
Kaspersky Endpoint Security for Android detects the following types of objects:
- Viruses, worms, Trojans, and malicious tools
- Adware
- Legitimate apps that intruders can use to compromise users' devices or data
Anti-Malware has several limitations:
- Due to technical limitations, Kaspersky Endpoint Security for Android cannot scan files with a size of 2 GB or more. During a scan, the app skips such files without notifying you that such files were skipped.
- On devices running Android 11 or later, Kaspersky Endpoint Security for Android can't scan the "Android/data" and "Android/obb" folders and detect malware in them due to technical limitations.
Configuring real-time protection
To configure real-time protection settings for mobile devices:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Protection section.
- On the Real-time protection card, click Settings.
The Real-time protection window opens.
- Enable the settings using the Real-time protection toggle switch.
If the toggle switch is turned on, device protection is enabled, but can be manually disabled by the user.
If the toggle switch is turned off, device protection is disabled and the user can't enable it.
- In the App scan drop-down list, select the app scan mode:
- Do not scan apps
- Scan only new apps
- Scan all apps and monitor actions with files
- In the Action on threat detection drop-down list, select one of the following options:
- Delete
Detected objects will be automatically deleted. The user is not required to take any additional actions. Prior to deleting an object, Kaspersky Endpoint Security for Android will display a temporary notification about the detection of the object.
- Skip
If detected objects have been skipped, Kaspersky Endpoint Security for Android warns the user about problems in device protection. For each skipped threat, the app provides actions that the user can perform to eliminate the threat. The list of skipped objects may change, for example, if a malicious file is deleted or moved. To receive an up-to-date list of threats, run a full device scan. To ensure reliable protection of your data, eliminate all detected objects.
- Delete and save a backup copy of file in quarantine
- Delete
- To enable additional scanning of new apps before they are started for the first time on the user's device with the help of the Kaspersky Security Network cloud service, select the Additional protection by Kaspersky Security Network check box.
- To block adware and apps that can be exploited by criminals to harm the device or user data, select the Detect adware, autodialers, and legitimate apps that intruders can use to compromise the user's device and data check box.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Configuring automatic malware scans
To configure autorun of malware scans on the mobile device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Protection section.
- On the Scan card, click Settings.
The Scan window opens.
- Enable the settings using the Scan toggle switch.
- In the Action on threat detection list, select one of the following options:
- Delete
Detected objects will be automatically deleted. The user is not required to take any additional actions. Prior to deleting an object, Kaspersky Endpoint Security for Android will display a temporary notification about the detection of the object.
- Skip
If detected objects have been skipped, Kaspersky Endpoint Security for Android warns the user about problems in device protection. For each skipped threat, the app provides actions that the user can perform to eliminate the threat. The list of skipped objects may change, for example, if a malicious file is deleted or moved. To receive an up-to-date list of threats, run a full device scan. To ensure reliable protection of your data, eliminate all detected objects.
- Delete and save a backup copy of file in quarantine
- Ask user
Kaspersky Endpoint Security for Android displays a notification prompting the user to choose the action to take on the detected object: Skip or Delete.
Kaspersky Endpoint Security for Android must be set as an Accessibility feature to ensure the display of notifications on mobile devices running Android 10 or later. Kaspersky Endpoint Security for Android prompts the user to set the app as an Accessibility feature through the Initial Configuration Wizard. The user can skip this step or disable this service in the device settings at a later time. In this case, Kaspersky Endpoint Security for Android displays an Android system window prompting the user to choose the action to take on the detected object: Skip or Delete. To apply an action to multiple objects, you need to open Kaspersky Endpoint Security.
If during a scan Kaspersky Endpoint Security for Android detects malicious apps on users' devices, the actions differ depending on the device management mode.
- Delete
- In the Scheduled scan field, you can configure the settings for automatic launching a full scan of the device file system.
- If you selected a weekly or daily scan, specify the day of the week (for weekly scans) and start time in the Day and Time fields.
If the device is in battery saver mode, the app may perform this task later than specified.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center. Kaspersky Endpoint Security for Android scans all files, including the contents of archives.
To keep mobile device protection up to date, configure the anti-malware database update settings.
By default, anti-malware database updates are disabled when the device is roaming. Scheduled updates of anti-malware databases are not performed.
Configuring database updates
To configure settings for anti-malware database updates:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Protection section.
- On the Database update card, click Settings.
The Database update window opens.
- Enable the settings using the Database update toggle switch.
- In the Scheduled database update field, you can configure the settings for automatic anti-malware database updates on the user's device.
- If you selected a weekly or daily database update, specify the day of the week (for weekly database updates) and start time in the Day and Time fields.
If the device is in battery saver mode, the app may perform this task later than specified.
- In the Database update source section, specify the update source from which Kaspersky Endpoint Security for Android receives and installs anti-malware database updates:
- Kaspersky servers
Using a Kaspersky update server as an update source for downloading the databases of Kaspersky Endpoint Security for Android on users' mobile devices. To update databases using Kaspersky servers, Kaspersky Endpoint Security for Android transmits data to Kaspersky (for example, the update task run ID). The list of data that is transmitted during database updates is provided in the End User License Agreement.
- Administration Server
Using the repository of Kaspersky Security Center Administration Server as an update source for downloading the databases of Kaspersky Endpoint Security for Android on users' mobile devices.
- Other source
Using a third-party server as an update source for downloading the databases of Kaspersky Endpoint Security for Android on users' mobile devices. To start an update, you must enter the address of an HTTP server in the field below (for example,
http://domain.com/
).
- Kaspersky servers
- If you want Kaspersky Endpoint Security for Android to download database updates according to the update schedule when the device is roaming, select the Allow database update while roaming check box in the Database update while roaming section.
Even if the check box is cleared, the user can manually start an anti-malware database update when the device is roaming.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Page top
Protecting Android devices on the internet
You can use Web Protection to protect personal data of mobile device users on the internet. Web Protection blocks malicious websites that distribute malicious code, and phishing websites designed to steal your confidential data and gain access to your financial accounts. Web Protection scans websites before you open them using the Kaspersky Security Network cloud service. Web Protection is enabled by default.
In Yandex Browser and Samsung Internet, malicious and phishing websites may remain unblocked. This is because only the website domain is scanned, and if it is trusted, Web Protection can skip a threat.
Web Protection on Android devices is supported only in Google Chrome, HUAWEI Browser, Samsung Internet, and Yandex Browser.
On corporate devices, if Kaspersky Endpoint Security for Android is not enabled as an Accessibility feature, Web Protection is supported only in Google Chrome and checks only the domain of a website. To allow other browsers (Samsung Internet, Yandex Browser, and HUAWEI Browser) to support Web Protection, enable Kaspersky Endpoint Security as an Accessibility feature.
To enable Web Protection:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Protection section.
- On the Web Protection card, enable the settings using the Web Protection toggle switch.
- Click Enable.
If you disable Web Protection, Web Control will also be disabled.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Page top
Protection of data on a stolen or lost device
This section describes how you can configure the unauthorized access protection settings on the device in case it gets lost or stolen.
Sending commands to a lost or stolen mobile device
To protect data on a mobile device that is lost or stolen, you can send special commands.
You can send commands to the following types of managed mobile devices:
- Android devices managed via the Kaspersky Endpoint Security for Android app
- iOS MDM devices
Each device type supports a specific set of commands (see the tables below).
Commands for Android devices
Commands for protecting data on a lost or stolen Android device
Command |
Result |
|
---|---|---|
Lock device |
The mobile device is locked. To obtain access to data, you must unlock the device using the Unlock device command or a one-time passcode. |
|
Unlock device |
The mobile device is unlocked. After unlocking a device running Android 5 – 6, the screen unlock password is reset to "1234". After unlocking a device running Android 7 or later, the screen unlock password is not changed. |
|
Reset to factory settings |
All data is deleted from the mobile device and the settings are rolled back to their factory values. After this command is executed, the device will not be able to receive or execute subsequent commands. This command is unavailable for personal devices and devices with a corporate container running Android 14 or later. |
|
Wipe corporate data |
Corporate data is wiped from the device. The list of wiped data depends on the mode the device is operating in:
|
|
Locate device |
The mobile device's location coordinates are obtained. To view the device location on a map, go to the Assets (Devices) → Mobile → Devices section. Then choose a device and select Command history → Locate device → Device coordinates → Open Maps. On devices running Android 12 or later, if the user granted the "Use approximate location" permission, the Kaspersky Endpoint Security for Android app first tries to get the precise device location. If this is not successful, the approximate device location is returned only if it was received within the past 30 minutes. Otherwise, the command fails. This command does not work on Android devices if Google Location Accuracy is disabled in the settings. Please be aware that not all Android devices come with this location setting. |
|
Take photos |
The mobile device is locked. Photos are taken using the front camera of the device when somebody attempts to unlock the device. On devices with a pop-up front camera, the photo will be black if the camera is stowed. When attempting to unlock the device, the user automatically consents to having their photo taken on the device. If the permission to use the camera has been revoked, the mobile device displays a notification and prompts to provide the permission. On a mobile device running Android 12 or later, if the permission to use the camera has been revoked via Quick Settings, the notification is not displayed but the taken photo is black. |
|
Sound alarm |
The mobile device sounds an alarm. The alarm is sounded for 5 minutes (or for 1 minute if the device battery is low). |
|
Wipe app data |
The data of a specified app is wiped from the mobile device. For this action, you need to specify the package name for the app whose data is to be deleted. |
|
Wipe data of all apps |
The data of all apps is wiped from the mobile device. On a corporate device, the data of all apps on the device is wiped. |
|
Get location history |
The mobile device's location history for the last 14 days is displayed. To view the device location on a map, go to the Assets (Devices) → Mobile → Devices section. Then choose a device and select Command history → Get location history → View on map. Due to technical limitations on Android devices, the device location may be retrieved less often than specified in the Location tracking settings. |
Commands for iOS MDM devices
Commands for protecting data on a lost or stolen iOS MDM device
Command |
Result |
---|---|
Lock device |
The mobile device is locked. To access data, you must unlock the device. |
Reset unlock password |
The mobile device's screen unlock password is reset, and the user is prompted to set a new password in accordance with policy requirements. |
Reset to factory settings |
All data is deleted from the mobile device and the settings are rolled back to their factory values. After this command is executed, the device will not be able to receive or execute subsequent commands. |
Wipe corporate data |
All installed configuration profiles, provisioning profiles, the iOS MDM profile, and apps for which the Remove when device management profile is deleted check box has been selected are removed from the device. |
Enable Lost Mode (supervised only) |
Lost Mode is enabled on the supervised mobile device, and the device is locked. The device screen shows a message and phone number that you can edit. If you send the Enable Lost Mode command to a supervised iOS MDM device without a SIM card and this device is restarted, the device won't be able to connect to Wi-Fi and receive the Disable Lost Mode command. This is a specific feature of iOS devices. To avoid this issue, you can either send the command only to devices with a SIM card, or insert a SIM card into the locked device to allow it to receive the Disable Lost Mode command over the mobile network. |
Locate device (Lost Mode only) |
The location of the mobile device is obtained. To view the device location on a map, go to the Assets (Devices) → Mobile → Devices section. Then choose a device and select Command history → Locate device → Device coordinates → Open Maps. |
Sound alarm (Lost Mode only) |
A sound is played on the lost mobile device. |
Disable Lost Mode (supervised only) |
Lost Mode is disabled on the mobile device, and the device is unlocked. |
Permissions for executing commands
Special rights and permissions are required for executing Kaspersky Endpoint Security for Android commands. When the Initial Configuration Wizard is running, Kaspersky Endpoint Security for Android prompts the user to grant the application all required rights and permissions. The user can skip these steps or later disable these permissions in the device settings. If this is the case, it will be impossible to execute commands.
On devices running Android 10 or later, the user must grant the "All the time" permission to access the location. On devices running Android 11 or later, the user must also grant the "While using the app" permission to access the camera. Otherwise, Anti-Theft commands will not function. The user will be notified of this limitation and will again be prompted to grant the required level of permissions. If the user selects the "Only this time" option for the camera permission, access is considered granted by the app. We recommend contacting the user directly if the Camera permission is requested again.
For the complete list of available commands, please refer to the Commands for mobile devices section. To learn more about sending commands from Administration Console, please refer to the Sending commands section.
Page top
Unlocking a mobile device
You can unlock a mobile device using the following methods:
- Send the mobile device unlock command
- Enter the one-time passcode on the mobile device (only for Android devices)
On certain devices (for example, HUAWEI, Meizu, and Xiaomi), you must manually add Kaspersky Endpoint Security for Android to the list of apps that are started when the operating system starts. If the app is not added to the list, you can unlock the device only by using a one-time passcode. You cannot use commands to unlock the device.
To learn more about sending commands from the list of mobile devices in Web Console, please refer to the Sending commands section.
A one-time device passcode is a secret code for unlocking the mobile device. The passcode is generated by Kaspersky Security Center and is unique for each mobile device. You can change the length of the one-time passcode (4, 8, 12, or 16 digits) in the Anti-Theft settings of the policy.
To unlock a mobile device using a one-time passcode:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Devices.
- Click the mobile device for which you want to get a one-time passcode.
- Select Applications → Kaspersky Mobile Devices Protection and Management.
The Kaspersky Mobile Devices Protection and Management properties window opens.
- Select the Application settings tab.
The unique passcode for the selected device is shown in the One-time code field of the One-time device passcode section.
- Use any available method (such as email) to communicate the one-time passcode to the user of the locked device.
The user then must enter the received one-time passcode on the screen of the device that is locked by Kaspersky Endpoint Security for Android.
The user's mobile device is unlocked.
After unlocking a device running Android 5 – 6, the screen unlock password is reset to "1234". After unlocking a device running Android 7 or later, the screen unlock password is not changed.
To change the length of the one-time device passcode:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Protection section.
- On the Anti-Theft card, click Settings.
The Anti-Theft window opens.
- Select the length of the one-time device passcode in the corresponding drop-down list. By default, the passcode is 4 digits long.
- If you want to contact the person who finds the mobile device, in the Text displayed on locked device field, enter the text of the message that will be shown on the lock screen.
- Click OK.
- Click Save to save the changes you have made.
The length of the one-time passcode is set to the selected value.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Page top
Configuring the device unlock password strength
To protect access to a user's mobile device, you should set a device unlock password.
This section contains information about how to configure password protection on Android and iOS devices.
Configuring a strong unlock password for an Android device
To keep an Android device secure, you need to configure the use of a password that the user is prompted to enter when unlocking the device.
You can impose restrictions on the user's activity on the device if the unlock password is weak (for example, by locking the device). You can impose restrictions using the Compliance Control component. To do this, in the scan rule settings, you must select the Unlock password doesn't comply with security requirements criterion.
On certain Samsung devices running Android 7 or later, when the user attempts to configure unsupported methods for unlocking the device (for example, a graphical password), the device may be locked if the following conditions are met: removal protection is enabled for Kaspersky Endpoint Security for Android and strength requirements are set for the screen unlock password. To unlock the device, you must send a special command to the device.
Configuring unlock password settings
To configure the use of an unlock password:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Security controls section.
- On the Screen unlock settings card, click Settings.
The Screen unlock settings window opens.
- Enable the settings using the Screen unlock settings toggle switch, if you want the app to check whether an unlock password has been set.
The toggle switch in this card does not enable or disable the corresponding functionality on devices. Enabling the toggle switch lets you configure custom settings. Disabling the toggle switch lets you use default settings.
If the app detects that no system password has been set on the device, it prompts the user to set one. The password is set according to the parameters defined by the administrator.
- Specify the following options, if required:
- Minimum password length
- Minimum password complexity requirements
- Maximum password lifetime (days)
- Number of days to send a notification before a required password change
- Number of recent passwords that cannot be set as a new password
- Period of inactivity before the screen locks (sec)
- Period after biometric unlock before password must be entered (min)
- Allow biometric unlock methods
- Allow fingerprint unlock
- Allow face unlock
- Allow iris scanning
- Reset to factory settings after failed attempts to enter password
- Maximum number of failed password attempts
- Set new password
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Setting a new unlock password
To set a new password on a user's corporate device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Restrictions section.
- On the New screen unlock password card, click Settings.
The New screen unlock password window opens.
- Enable the settings using the New screen unlock password toggle switch.
- Enter a new password that will be used to unlock the user's mobile device. This password must comply with current screen unlock password settings.
- If you want to edit the current unlock password settings, click the Configure screen unlock settings button.
In the Screen unlock settings window that opens, configure screen unlock password settings, if required.
- Click OK.
If the device is not protected with a password or is running Android 10 or earlier, Kaspersky Endpoint Security for Android sets the password immediately. If the device is protected with the password or is running Android 11 or later, Kaspersky Endpoint Security for Android prompts the user to apply the new password.
- Click Save to save the changes you have made.
The new password is set on user's mobile device. Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Setting a PIN code on HUAWEI devices
Some HUAWEI devices display a message about screen unlocking method being too simple.
To set an acceptable PIN code on a HUAWEI device, the user must do the following:
- In the message about the issue, tap the Edit button.
- Enter the current PIN code.
- In the Set new password window, tap the Change unlock method button.
- Select the Custom PIN unlock method.
- Set the new PIN code.
The PIN code must be compliant with policy requirements.
An acceptable PIN code is set on the device.
Page top
Configuring a strong unlock password for an iOS MDM device
These settings apply to supervised devices and devices operating in basic control mode.
To protect iOS MDM device data, configure the unlock password strength settings.
By default, the user can use a simple password. A simple password is a password that contains sequential or repeated characters such as "abcd" or "2222". The user is not required to enter an alphanumeric password that includes special symbols. By default, the password validity period and the number of password entry attempts are not limited.
To configure the unlock password strength settings for an iOS MDM device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Security controls section.
- On the Screen unlock settings card, click Settings.
The Screen unlock settings window opens.
- Enable the settings using the Screen unlock settings toggle switch.
The toggle switch in this card does not enable or disable the corresponding functionality on devices. Enabling the toggle switch lets you configure custom settings. Disabling the toggle switch lets you use default settings.
- Configure the unlock password strength settings:
- To allow the user to use a simple password, select the Allow simple password check box. Even if this check box is cleared, the user can set a password with less than 6 characters.
If only the Allow simple password check box is selected, no password will be requested. To prompt the user to set a password, select both the Allow simple password check box and the Force use of password check box.
- To require use of both letters and numbers in the password, select the Prompt for alphanumeric value check box.
- To require use of a password, select the Force use of password check box. If the check box is cleared, the mobile device can be used without a password.
If the Prompt for alphanumeric value, Minimum password length, or Minimum number of special characters options are enabled, a password is requested even if the Force use of password check box is cleared.
- In the Minimum password length list, select the minimum password length in characters.
- In the Minimum number of special characters list, select the minimum number of special characters in the password (such as "$", "&", "!").
On some iOS MDM devices, if the Minimum number of special characters value is specified and the Allow simple password check box is selected, the device displays information about setting a password of 6 or more characters even though it is possible to set a password of 4 or more characters.
- In the Maximum password lifetime (days) field, specify the period of time in days during which the password will stay current. When this period expires, the iOS MDM Server prompts the user to change the password.
- In the Auto-Lock list, select the amount of time after which Auto-Lock should be enabled on the iOS MDM device. If the mobile device remains idle for this time period, it switches to sleep mode.
On different iOS MDM devices, the actual time of the device's automatic locking may differ from the value that you have specified:
On iPhone devices: if you set Auto-Lock in 10 or 15 minutes, the device will be locked in 5 minutes.
On iPad devices: if you set Auto-Lock in 1 – 4 minutes, the device will be locked in 2 minutes.
For other values the actual time of the device's automatic locking matches the specified time.
- In the Reuse of previous passwords field, specify the number of used passwords (including the current password) that the iOS MDM Server will compare with the new password when the user changes the current password. If the passwords match, the new password is rejected.
- In the Maximum time for unlock without password list, select the amount of time during which the user can unlock the iOS MDM device without entering the password.
- In the Maximum number of failed password attempts, select the number of attempts that the user can make to enter the unlock password on the iOS MDM device.
- To allow the user to use a simple password, select the Allow simple password check box. Even if this check box is cleared, the user can set a password with less than 6 characters.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with the iOS MDM Server.
As a result, once the policy is applied, the iOS MDM Server checks the strength of the password set on the user's mobile device. If the strength of the device unlock password does not comply with the policy, the user is prompted to change the password.
Page top
Configuring a virtual private network (VPN)
This section contains information on configuring virtual private network (VPN) settings for secure connection to Wi-Fi networks.
Configuring VPN on Android devices (only Samsung)
To securely connect an Android device to the internet and protect data transfer, you can configure VPN (Virtual Private Network) settings.
Configuration of VPN is possible only for Samsung devices running Android 11 or earlier.
The following requirements must be considered when using a virtual private network:
- The app that uses the VPN connection must be allowed in the Firewall settings.
- VPN settings configured in the policy cannot be applied to system apps. The VPN connection for system apps has to be configured manually.
- Some apps that use a VPN connection need to have additional settings configured at first startup. To configure settings, a VPN connection has to be allowed in app settings.
To configure VPN on a user's mobile device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Samsung Knox settings section.
- On the VPN card, click Settings.
The VPN window opens.
- Enable the settings using the VPN toggle switch.
- Specify the following VPN settings:
- Settings in the Network section:
- In the Network name field, enter the name of the VPN tunnel.
- In the Protocol drop-down list, select the VPN connection type:
- IPSec Xauth PSK. A tunneling protocol of the "gateway-to-gateway" type that lets the mobile device user establish a secure connection with the VPN server using the Xauth authentication utility.
- L2TP IPSec PSK. A tunneling protocol of the "gateway-to-gateway" type that lets the mobile device user establish a secure connection with the VPN server via the IKE protocol using a preset key. This protocol is selected by default.
- PPTP. A "point-to-point" tunneling protocol that lets the mobile device user establish a secure connection to the VPN server by creating a special tunnel on a standard unsecured network.
- In the Server address field, enter the network name or IP address of the VPN server.
- Settings in the Protocol settings section:
- In the DNS search domain(s) list, enter the DNS search domain to be automatically added to the DNS server name.
You can specify several DNS search domains, separating them with blank spaces.
- In the DNS server(s) field, enter the full domain name or IP address of the DNS server.
You can specify several DNS servers, separating them with blank spaces.
- In the Routing field, enter the range of network IP addresses with which data is exchanged via the VPN connection.
If a range of IP addresses is not specified in the Routing field, all internet traffic will pass through the VPN connection.
- In the DNS search domain(s) list, enter the DNS search domain to be automatically added to the DNS server name.
- Settings in the Network section:
- Additionally, configure the following settings:
- For the IPSec Xauth PSK and L2TP IPSec PSK protocols:
- In the IPSec shared key field, enter the password for the preset IPSec security key.
- In the IPSec ID field, enter the name of the mobile device user.
- For the L2TP IPSec PSK protocol, specify the password for the L2TP key in the L2TP key field.
- For the PPTP network, select the Use SSL connection check box so that the app will use the MPPE (Microsoft Point-to-Point Encryption) method of data encryption to secure data transmission when the mobile device connects to the VPN server.
- For the IPSec Xauth PSK and L2TP IPSec PSK protocols:
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Page top
Configuring VPN on iOS MDM devices
These settings apply to supervised devices and devices operating in basic control mode.
To connect an iOS MDM device to a virtual private network (VPN) and protect data while connected to the VPN, configure the VPN connection settings. The IKEv2 and IPSec VPN protocols also let you set up a Per App VPN connection.
To configure a VPN connection on a user's iOS MDM device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Device configuration section.
- On the VPN card, click Settings.
The VPN window opens.
- Enable the settings using the VPN toggle switch.
- Click Add.
The Add VPN configuration window opens.
- On the General settings tab, in the Network section, configure the following settings:
- In the Network name field, enter the name of the VPN tunnel.
- In the Protocol drop-down list, select the type of the VPN connection.
- In the Server address field, enter the network name or IP address of the VPN server.
- Configure the settings for the VPN connection according to the selected type of virtual private network.
- If necessary, on the Advanced settings tab, in the Proxy server section, configure the settings of the VPN connection via a proxy server:
- Select the Use a proxy server check box.
- Configure a connection to a proxy server:
- If you want to configure the connection automatically:
- Select Automatic.
- In the PAC file URL field, specify the URL of the proxy PAC file.
- To allow the user to connect the mobile device to a wireless network without using a proxy server when the PAC file cannot be accessed, select the Allow direct connection if PAC file cannot be accessed check box.
- If you want to configure the connection manually:
- Select Manual.
- In the Proxy server address and Proxy server port fields, enter the IP address or DNS name of the proxy server and port number.
- In the User name field, select a macro that will be used as a user name for the connection to the proxy server.
- In the Password field, specify the password for the connection to the proxy server.
- If you want to configure the connection automatically:
- For IKEv2 and IPSec connections, if necessary, set up Per App VPN functionality for supported system apps (Mail, Calendar, Contacts, and Safari).
- Click Add.
The new VPN is displayed in the list.
You can modify or delete VPN in the list using the Edit and Delete buttons at the top of the list.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with the iOS MDM Server.
As a result, once the policy is applied, the VPN connection will be configured on the user's iOS MDM device.
Page top
Configuring Per App VPN on iOS MDM devices
These settings apply to supervised devices and devices operating in basic control mode.
The Per App VPN functionality allows a device to establish a VPN connection when supported system apps are launched. This functionality is available for IKEv2 and IPSec connections.
The following system apps support Per App VPN connections:
- Calendar
- Contacts
- Safari
- Messages
To enable the Per App VPN functionality:
- Perform the initial setup of the VPN connection.
- On the Advanced settings tab, in the Per App VPN section, select the Enable Per App VPN check box.
- Set up Per App VPN for supported system apps in the corresponding settings of the policy.
To specify the Per App VPN configuration for the Mail app:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Device configuration section.
- On the Email card, click Settings.
The Email window opens.
- Enable the settings using the Email toggle switch.
- Click Add.
The Add email account window opens.
- Configure a mailbox.
- On the Advanced settings tab, in the Per App VPN section, select the Enable Per App VPN check box.
- Select a configuration from the Per App VPN configuration drop-down list.
- Click Save.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with the iOS MDM Server.
As a result, once the policy is applied, Per App VPN is configured for the Mail app.
Calendar
To specify the Per App VPN configuration for the Calendar app:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Device configuration section.
- On the Calendar card, click Settings.
The Calendar window opens.
- Enable the settings using the Calendar toggle switch.
- Click Add.
The Add CalDAV account window opens.
- Add a calendar account.
- In the Per App VPN section, select the Enable Per App VPN check box.
- Select a configuration from the Per App VPN configuration drop-down list.
- Click Add.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with the iOS MDM Server.
As a result, once the policy is applied, Per App VPN is configured for the Calendar app.
Calendar subscriptions
A list of subscriptions to calendars of other CalDAV users, iCal calendars, and other published calendars.
To specify the Per App VPN configuration for calendar subscriptions:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Device configuration section.
- On the Calendar subscriptions card, click Settings.
The Calendar subscriptions window opens.
- Enable the settings using the Calendar subscriptions toggle switch.
- Click Add.
The Add calendar subscription window opens.
- Add a calendar subscription.
- In the Per App VPN section, select the Enable Per App VPN check box.
- Select a configuration from the Per App VPN configuration drop-down list.
- Click Add.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with the iOS MDM Server.
As a result, once the policy is applied, Per App VPN is configured for calendar subscriptions.
Contacts
To specify the Per App VPN configuration for the Contacts app:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Device configuration section.
- On the Contacts card, click Settings.
The Contacts window opens.
- Enable the settings using the Contacts toggle switch.
- Click Add.
The Add CardDAV account window opens.
- Add a contacts account.
- In the Per App VPN section, select the Enable Per App VPN check box.
- Select a configuration from the Per App VPN configuration drop-down list.
- Click Add.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with the iOS MDM Server.
As a result, once the policy is applied, Per App VPN is configured for the Contacts app.
Safari
To specify the Per App VPN configuration for Safari:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Device configuration section.
- On the Per App VPN for Safari card, click Settings.
The Per App VPN for Safari window opens.
- Enable the settings using the Per App VPN for Safari toggle switch.
- Click Add.
The Add a website domain window opens.
- Select a configuration from the Per App VPN configuration drop-down list.
- In the Domain name field, specify the website domain that will trigger the VPN connection in Safari. The domain must be in the
www.example.com
format. - Click Add.
The new domain appears in the Safari website domains list.
You can modify or delete Safari website domains in the list using the Edit and Delete buttons at the top of the list.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with the iOS MDM Server.
As a result, once the policy is applied, Per App VPN is configured for Safari website domains.
LDAP
An LDAP account provides access to corporate data and contacts in the standard iOS apps: Contacts, Messages, and Mail.
To specify the Per App VPN configuration for an LDAP account:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Device configuration section.
- On the LDAP card, click Settings.
The LDAP window opens.
- Enable the settings using the LDAP toggle switch.
- Click Add.
The Add LDAP account window opens.
- Add an LDAP account.
- In the Per App VPN section, select the Enable Per App VPN check box.
- Select a configuration from the Per App VPN configuration drop-down list.
- Click Add.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with the iOS MDM Server.
As a result, once the policy is applied, Per App VPN is configured for the LDAP account.
Page top
Configuring Firewall on Android devices (only Samsung)
Configure Firewall settings to monitor network connections on the user's mobile device.
Firewall can be configured only for Samsung devices.
To configure Firewall on a user's mobile device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Samsung Knox settings section.
- On the Firewall card, click Settings.
The Firewall window opens.
- Enable the settings using the Firewall toggle switch.
- In the Internet access drop-down list, select the Firewall mode. Depending on its operating mode, Firewall monitors connections established by the user's mobile device:
- If you want to allow inbound and outbound connections of all installed apps, select Allow for all apps. This mode is selected by default.
- If you want to block all network activity except for several specified apps, select Allow for listed apps.
- If you selected Allow for listed apps as the Firewall mode, create a list of apps for which all network activity is allowed:
- In the Apps with internet access section, click Add.
The Add app window opens.
- In the App name field, enter the name of the mobile app.
- In the Package name field, enter the system name of the mobile app package (for example,
com.mobileapp.example
). - Click Add.
The new app for which Firewall is disabled appears in the list.
You can modify or delete mobile apps in the list using the Edit and Delete buttons at the top of the list.
- In the Apps with internet access section, click Add.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Page top
Protecting Kaspersky Endpoint Security for Android against removal
To protect mobile devices and comply with corporate security requirements, you can enable protection against removal of Kaspersky Endpoint Security for Android. In this case, the user cannot remove the app using the Kaspersky Endpoint Security for Android interface. When removing the app using Android operating system tools, you are prompted to disable administrator rights for Kaspersky Endpoint Security for Android. After disabling the rights, the mobile device will be locked.
On certain Samsung devices running Android 7 or later, when the user attempts to configure unsupported methods for unlocking the device (for example, a graphical password), the device may be locked if the following conditions are met: removal protection is enabled for Kaspersky Endpoint Security for Android and strength requirements are set for the screen unlock password. To unlock the device, you must send a special command to the device.
To protect the app from removal on devices running Android 7 or later, Kaspersky Endpoint Security for Android must be set as an Accessibility feature. When the Initial Configuration Wizard is running, Kaspersky Endpoint Security for Android prompts the user to grant the application all required permissions. The user can skip these steps or later disable these permissions in the device settings. If this is the case, the app is not protected from removal.
To enable protection against removal of Kaspersky Endpoint Security for Android:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the KES for Android settings section.
- On the Configure access to app settings card, click Settings.
The Configure access to app settings window opens.
- Enable the settings using the Configure access to app settings toggle switch.
The toggle switch in this card does not enable or disable the corresponding functionality on devices. Enabling the toggle switch lets you configure custom settings. Disabling the toggle switch lets you use default settings.
- Clear the Allow removing the app from device check box.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center. If an attempt is made to remove the app, the mobile device will be locked.
Page top
Detecting hacked devices
Kaspersky Security Center Web Console lets you detect hacked (rooted) Android devices and jailbreaking on iOS devices. System files are unprotected on a hacked device and can therefore be modified. If a hack attempt is detected, we recommend that you immediately restore normal operation of the device.
If a device is hacked, you receive a notification. You can view hacking notifications in Kaspersky Security Center Web Console in the Monitoring & reporting → Dashboard section. You can also disable notifications about hacks in the event notification settings.
On Android devices, you can impose restrictions on the user's activity if the device is hacked (for example, lock the device). You can impose restrictions using the Compliance Control component. To do this, create a compliance rule with the Device has been rooted criterion.
Page top
Configuring a global HTTP proxy on iOS MDM devices
These settings apply to supervised devices.
To route the user's internet traffic, configure the iOS MDM device connect to the internet through a proxy server.
Be careful when configuring these settings. If the settings are incorrect, devices may lose their internet connection and will not synchronize with the iOS MDM Server. If this happens, you will have to add the devices again.
To configure global HTTP proxy settings on the user's iOS MDM device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Device configuration section.
- On the Global HTTP proxy card, click Settings.
The Global HTTP proxy window opens.
- Enable the settings using the Global HTTP proxy toggle switch.
- Select the type of global HTTP proxy configuration:
- To specify the proxy server connection settings manually:
- In the Setting type section, select Manual.
- In the Proxy server address and Proxy server port fields, enter the name of a host or the IP address of a proxy server and the number of the proxy server port.
- In the User name field, set the user account name for authorization on the proxy server.
- In the Password field, set the user account password for authorization on the proxy server.
- To allow the user to access captive networks, select the Allow access to captive networks without connecting to proxy check box.
- To configure the proxy server connection settings using a predefined PAC (Proxy Auto Configuration) file:
- In the Setting type section, select Automatic.
- In the PAC file URL field, enter the web address of the PAC file (for example:
http://www.example.com/filename.pac
). - To allow the user to connect the mobile device to a wireless network without using a proxy server when the PAC file cannot be accessed, select the Allow direct connection if PAC file cannot be accessed check box.
- To allow the user to access captive networks, select the Allow access to captive networks without connecting to proxy check box.
- To specify the proxy server connection settings manually:
- Click OK.
- Click Save to save the changes you have made.
As a result, the mobile device user will connect to the internet via a proxy server after the policy is applied.
Page top
Adding security certificates to iOS MDM devices
These settings apply to supervised devices and devices operating in basic control mode.
You can add certificates to iOS MDM devices to simplify user authentication and ensure data security. The data signed with a certificate is protected against modification while it is transferred over the network. Data encryption using a certificate provides an added level of security for the data. The certificate can also be used to verify user identity.
Kaspersky Mobile Devices Protection and Management supports the following certificate standards:
- PKCS#1. Encryption with a public key based on RSA algorithms.
- PKCS#12. Storage and transmission of a certificate and a private key.
To add a security certificate to iOS MDM devices:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Device configuration section.
- On the Certificate management card, click Settings.
The Certificate management window opens.
- Enable the settings using the Certificate management toggle switch.
- Click Upload and specify the path to the certificate.
Files of PKCS#1 certificates have the CER, DER, or PEM extension. Files of PKCS#12 certificates have the P12 or PFX extension. The password for a PKCS#12 certificate must not me empty.
- Click Open.
If the certificate is password-protected, enter the password. The new certificate appears in the list.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with the iOS MDM Server.
As a result, once the policy is applied, certificates are automatically installed on devices.
Page top
Adding a SCEP profile to iOS MDM devices
These settings apply to supervised devices and devices operating in basic control mode.
You have to add a SCEP profile to enable the iOS MDM device user to automatically receive certificates from the Certification Center via the internet. The SCEP profile enables support of the Simple Certificate Enrollment Protocol.
A SCEP profile with the following settings is added by default:
- The alternative subject name is not used for registering certificates.
- Three attempts are made at 10-second intervals to poll the SCEP server. If all attempts to sign the certificate fail, you have to generate a new certificate signing request.
- The received certificate cannot be used for data signing or encryption.
You can edit the specified settings when adding the SCEP profile.
To add a SCEP profile:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Device configuration section.
- On the SCEP card, click Settings.
The SCEP window opens.
- Enable the settings using the SCEP toggle switch.
- Click Add.
The Add SCEP profile window opens.
- In the SCEP Server section, specify the following SCEP server settings:
- In the Configuration name field, specify the name of the Certification Center deployed on the SCEP server. The Certification Center supplies the user of an iOS MDM device with certificates using the Simple Certificate Enrollment Protocol (SCEP).
- In the Server URL field, enter the web address of the SCEP server on which the Certification Center is deployed.
The URL can contain the IP address or the full domain name (FQDN). For example,
http://10.10.10.10/certserver/companyscep
. - In the Maximum number of polling attempts field, specify the maximum number of attempts to poll the SCEP server to get the certificate signed. By default, the value is 3 attempts.
If all attempts to sign the certificate fail, you have to generate a new certificate signing request.
- In the Polling interval (sec) field, specify the number of seconds between attempts to poll the SCEP server to get the certificate signed. By default, the value is 10 seconds.
- In the Static challenge phrase field, enter a pre-published registration key.
Before signing a certificate, the SCEP server prompts the mobile device user to enter the key. If this field is left blank, the SCEP does not request the key.
- In the Method for uploading certificate thumbprint drop-down list, select how to add a certificate thumbprint. You can use certificate thumbprints based on the SHA-1 or MD5 hashing algorithm.
- If you selected the Manually option, in the Certificate thumbprint field that appears, enter a unique certificate thumbprint for verifying the authenticity of the response from the Certification Center.
- If you selected the From file option, upload a CER, KEY, or PEM file. The thumbprint will be generated and added automatically.
The certificate thumbprint has to be specified if data exchange between the mobile device and the Certification Center takes place via the HTTP protocol.
- In the Subject section, specify the following settings:
- In the Subject Name field, enter a string with the attributes of the iOS MDM device user that are contained in the X.500 certificate.
Attributes can contain details of the country (C), locality (L), state (ST), organization (O), organization unit (OU), and common user name (CN). For example,
/C=RU/O=MyCompany/CN=User/
.You can also use other attributes specified in RFC 5280.
Attributes are used by DNS services to validate the certificate issued by the Authentication Authority at the user's request.
- Click the Add Subject Alternative Name button to add a field for specifying the subject alternative name:
- In the Type of Subject Alternative Name drop-down list that appears, select the type of subject alternative name for the SCEP server. You can add only one alternative name of each type.
You can use a subject alternative name to identify the user of the iOS MDM device. By default, identification based on the alternative name is not used.
- DNS name. Identification using the domain name.
- NT Principal Name. DNS name of the iOS MDM device user on the Windows NT network. The NT subject name is contained in the certificate request sent to the SCEP server. You can also use the name of the NT subject to identify the user of the iOS MDM device.
- Email address. Identification using the email address. The email address must be specified according to RFC 822.
- Uniform Resource Identifier (URI). Identification using the IP address or address in FQDN format.
- In the Subject Alternative Name field, enter the alternative name of the subject of the X.500 certificate. The value of the subject alternative name depends on the selected subject type: the user's email address, domain, or web address.
- In the Type of Subject Alternative Name drop-down list that appears, select the type of subject alternative name for the SCEP server. You can add only one alternative name of each type.
- In the Subject Name field, enter a string with the attributes of the iOS MDM device user that are contained in the X.500 certificate.
- In the Key section, configure the encryption key settings:
- In the Key size (bit) drop-down list, select the size of the registration key in bits: 1024, 2048, or 4096. The default value is 1024 bits.
- If you want to allow the user to use a certificate received from the SCEP server as a signing certificate, select the Use as digital signature check box.
Data signing protects data against modification. For example, Safari can validate the authenticity of the certificate and establish a safe data exchange session.
- If you want to allow the user to use a certificate received from the SCEP server for data encryption, select the Use for encryption check box.
Data encryption also protects confidential data during data exchange over a network. For example, Safari can establish a secure data exchange session using encryption. This guarantees website authenticity and confirms that the connection to the website is encrypted to prevent interception of personal and confidential data.
You cannot simultaneously use the SCEP server certificate as a data signing certificate and a data encryption certificate.
- If you want to allow all installed apps to access the private key from the SCEP server certificate, select the Allow all apps to access private key check box.
- If you do not want the private key to be exported from the keychain, select the Prohibit exporting private key from the keychain check box.
- Click Add.
The new SCEP profile appears in the list.
You can modify or delete SCEP profiles in the list using the Edit and Delete buttons at the top of the list.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with the iOS MDM Server.
As a result, once the policy is applied, the user's mobile device is configured to automatically receive a certificate from the Certification Center via the internet.
Page top
Restricting SD card usage (only Samsung)
Configure SD card restrictions to control usage of SD cards on the user's Samsung device that supports Knox.
To restrict SD card usage on a mobile device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Samsung Knox settings section.
- On the Device feature restrictions card, click Settings.
The Device feature restrictions window opens.
- Enable the settings using the Device feature restrictions toggle switch.
- In the SD card settings section, specify the required restrictions:
- In the Additional settings section, you can specify any additional restrictions:
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center. SD card settings are now configured.
Page top
Management of mobile devices
This section contains information about how to remotely manage mobile devices in Kaspersky Security Center Web Console.
Managing Android devices
Kaspersky Security Center Web Console lets you manage Android devices in the following ways:
- Centrally manage devices by using commands.
- View information about the settings for management of Android devices.
- Install apps by using mobile app packages.
- Disconnect Android devices from management.
Corporate devices
This section contains information about managing the settings of corporate Android devices. For information about installing Kaspersky Endpoint Security for Android on corporate devices, see here.
Restricting Android features on devices
These settings apply to corporate devices.
You can restrict Android operating system features on corporate devices. For example, you can restrict factory reset, changing credentials, use of Google Play and Google Chrome, file transfer over USB, changing location settings, and management of system updates. You can also restrict operating system features on personal devices and devices with a corporate container.
To restrict Android features:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Restrictions section.
- On the Device feature restrictions card, click Settings.
The Device feature restrictions window opens.
- Enable the settings using the Device feature restrictions toggle switch.
- Enable device feature restrictions using toggle switches on the corresponding tabs and select the required restrictions.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Restrict device features
On the General tab, you can enable or disable the following features.
- Features in the Data loss protection section:
- Features in the Calls and SMS section:
- Features in the Location services section:
- Features in the Keyguard section:
- Features in the Users and accounts section:
Restrict app features
On the Apps tab, you can enable or disable the following features.
- Features in the General section:
- Features in the Google apps section:
- Features in the Camera section:
- Granting runtime permissions for apps
Restrict storage features
On the Storage tab, in the General section, you can enable or disable the following features.
- Prohibit debugging features
- Prohibit mounting physical external media
- Prohibit file transfer over USB
- Prohibit backup service
Restrict network features
On the Network tab, you can enable or disable the following features.
- Features in the General section:
- Features in the Wi-Fi section:
- Features in the Bluetooth section:
- Features in the Mobile networks section:
Additional restrictions
On the Additional settings tab, you can enable or disable the following features.
- Features in the Language, date, and time section:
- Features in the Display section:
- Features in the Screen on section:
- Features in the Microphone section:
- Features in the Volume section:
Restrict system updates
Management of update settings on mobile devices is vendor-specific. On some Android devices, the restriction on manual installation of operating system updates may not work correct.
On the OS update tab, you can configure the following settings.
- In the Update mode section:
- In the Freeze periods section:
Configuring kiosk mode for Android devices
These settings apply to corporate devices.
Kiosk mode is a Kaspersky Endpoint Security for Android feature that lets you limit the apps available to a device user to a single app or a set of multiple apps. You can also efficiently manage some device settings.
Kiosk mode does not affect the work of the Kaspersky Endpoint Security for Android app. It runs in the background, shows notifications, and can be updated.
Types of kiosk modes
The following types of kiosk mode are available in Kaspersky Endpoint Security:
- Single-app mode
Kiosk mode with only a single app. In this mode, a device user can open only the one app that is allowed on the device and specified in the kiosk mode settings. If the app that you want to add to kiosk mode is not installed on the device, kiosk mode activates after the app is installed.
On Android 9 or later, the app launches directly in kiosk mode.
On Android 8 or earlier, the specified app must support kiosk mode functionality and call the
startLockTask()
method itself to launch the app. - Multi-app mode
Kiosk mode with multiple apps. In this mode, a device user can open only the set of apps that are allowed on the device and specified in the kiosk mode settings.
Before you configure kiosk mode
Before you configure kiosk mode, do the following:
- Before specifying the apps that are allowed to be run on the device in kiosk mode, you first need to select the Install action for these apps on the App management tab of the App Control card. Then, they will appear in the App package list of the kiosk mode.
- Before activating kiosk mode, we recommend that you prohibit starting Google Assistant by enabling the corresponding restriction in Assets (Devices) → Policies & profiles → Application settings → Android → Restrictions → Device feature restrictions → Apps → Prohibit Google Assistant. Otherwise, Google Assistant starts in kiosk mode and allows non-trusted apps to be opened.
Open the kiosk mode settings
To open the kiosk mode settings:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Restrictions section.
- On the Kiosk mode card, click Settings.
The Kiosk mode window opens.
Configure single-app mode
To configure single-app mode:
- Enable the settings using the Kiosk mode toggle switch.
- In the Operating mode drop-down list, select Single-app mode.
- In the App package drop-down list, select an app package with the app that is allowed to be run on the device.
- Specify any required restrictions. For available restrictions, see the "Kiosk mode restrictions" section below.
- Select the Allow navigation to trusted apps check box if you want to add other apps that a device user can navigate to. For more details, see the "Add additional apps" section below.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Configure multi-app mode
To configure multi-app mode:
- Enable the settings using the Kiosk mode toggle switch.
- In the Operating mode drop-down list, select Multi-app mode.
- Click Add package and select the apps that are allowed to be run on the device.
- Specify any required restrictions. For available restrictions, see the "Kiosk mode restrictions" section below.
- Select the Allow navigation to trusted apps check box if you want to add other apps that a device user can navigate to. For more details, see the "Add additional apps" section below.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Kiosk mode restrictions
You can set the following restrictions in kiosk mode:
Add additional apps
Besides locking the device to a single app or set of apps, you can also specify additional apps, that the main app can use. These additional apps allow the apps added to kiosk mode to provide their full functionality. For example, the user can view a document or access a website opened from the main app. By default, these additional apps are hidden on a device and a user cannot launch them manually.
To add additional apps:
- In the Additional apps section, select the Allow navigation to trusted apps check box.
- Click Add package and specify the desired app package name.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Connecting to a NDES/SCEP server
These settings apply to corporate devices.
You can connect to an NDES/SCEP server to obtain a certificate from a certificate authority (CA) using the Simple Certificate Enrollment Protocol (SCEP). To do this, you need to add a connection to the certificate authority and a certificate profile.
To add a connection to the certificate authority and a certificate profile:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Device configuration section.
- On the SCEP and NDES card, click Settings.
The SCEP and NDES window opens.
- Enable the settings using the SCEP and NDES toggle switch.
The Add connection to certificate authority window opens.
- Add a connection to the certificate authority:
- In the Connection name field, enter the name of the connection to the certificate authority.
- In the Protocol type drop-down list, select the protocol version.
- In the Server URL field, enter the URL of a NDES or SCEP server.
The format of the NDES server URL is
http://<ServerName>/certsrv/mscep/mscep.dll
. - In the Challenge phrase type drop-down list, select one of the following options to configure the authentication challenge:
- If you selected the Static option, in the Static challenge phrase field, enter the authentication phrase.
- Click Add.
The connection to the certificate authority is added. You can add multiple connections to certificate authorities.
- Select the Certificate profile tab and click Add.
The Add profile window opens.
- Add a certificate profile:
- In the General settings section, in the Profile name field, enter the unique certificate profile name.
- In the Certificate authority (CA) drop-down list select the certificate authority that you added on the Certificate authority tab.
- In the Subject Name field specify the subject of the certificate. Subject name is a unique identifier that includes information about what is being certified, such as common name, organization, organizational unit, and country code. You can either enter a value or select a macro by clicking the
button.
- If you want to add an alternative name that represents the certificate subject name, click Add Subject Alternative Name and configure the following settings:
- In the Type of Subject Alternative Name drop-down list select the subject alternative name type.
- In the Subject Alternative Name field enter the alternative name. You can either enter a value or select a macro by clicking the
button.
You can add multiple subject alternative names.
- In the Key section, in the Key size (bit) drop-down list, select the certificate's private key length.
- In the Private key type drop-down list select the certificate's private key type:
- If you want the certificate to be automatically reissued to the device before it expires, in the Certificate section, select the Renew certificate automatically check box. This check box is cleared by default.
- If you selected the Renew certificate automatically check box, enter the number of days before the expiration date when the certificate is reissued in the Renew certificate before it expires in (days) field.
- Click Add.
The certificate profile is added. You can add multiple certificate profiles.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
You can edit or remove the added connections to certificate authorities and certificate profiles by clicking Edit and Delete at the top of the list.
If you delete a connection to a certificate authority, all certificate profiles that use it are also removed.
Page top
Enabling certificate-based authentication of devices
To enable certificate-based authentication of a device:
- Open the command line on a device where the Administration Server is installed.
- Go to the directory containing the klscflag utility.
By default, the utility is located in
/opt/kaspersky/ksc64/sbin
. - Run the following command under an account with root privileges to configure certificate-based authentication of devices on the Administration Server:
./klscflag -fset -pv ".core/.independent" -s KLLIM -n LP_MobileMustUseTwoWayAuthOnPort13292 -t d -v 1
- Restart the Administration Server service.
After you start the Administration Server service, certificate-based authentication of the device using a shared certificate will be required.
The first connection of the device to the Administration Server does not require a certificate.
By default, certificate-based authentication of devices is disabled.
Page top
Creating a mobile application package for Android devices
To create a mobile app package:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Apps.
- Click Android apps, and then click Add.
The Add app window opens.
- Specify the app name in the App name field. This name will be used to identify the app in policy settings.
- Click Select and select an APK file on your computer.
- Click Save to save the changes you have made.
The newly created app package is displayed in the list of apps on the Android apps tab.
If you select a large APK file, the app may take some time to upload. Do not close the Apps section until the app is uploaded.
In the Apps section, you can also add iOS apps.
Viewing information about an Android device
To view information about an Android device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Devices.
The list of managed mobile devices opens.
- To filter Android devices, click the OS column heading and select Android.
The list of Android devices is displayed.
Depending on the database you use, searches may be case-sensitive.
- Select the mobile device you want to view information about.
A window with the properties of the Android device opens.
The mobile device properties window displays information about the connected Android device.
If an old version of Kaspersky Endpoint Security for Android (10.52.1.3 or earlier) is installed on the devices the Operating mode value is set to Unknown.
Disconnecting an Android device from management
To disconnect an Android device from management, the user has to remove Kaspersky Endpoint Security for Android from the mobile device. After the user has removed Kaspersky Endpoint Security for Android, the administrator can remove the mobile device from the list of managed devices in Web Console.
If Kaspersky Endpoint Security for Android has not been removed from the mobile device, that mobile device reappears in the list of managed devices after synchronization with the Administration Server.
To remove an Android device from the list of managed devices:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Devices.
The list of managed mobile devices opens.
- To filter Android devices, click the OS column heading and select Android.
The list of Android devices is displayed.
- Select the mobile device you want to disconnect.
- Click Delete.
The mobile device is removed from the list of managed devices.
Page top
Managing iOS MDM devices
This section describes advanced features for management of iOS MDM devices in Kaspersky Security Center Web Console.
Adding a configuration profile
To create a configuration profile, you can use Apple Configurator 2, which is available on the Apple website. Apple Configurator 2 works only on devices running macOS. If you do not have such devices at your disposal, you can use iPhone Configuration Utility. However, Apple no longer supports iPhone Configuration Utility.
To add a configuration profile to an iOS MDM Server:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → iOS MDM Servers. In the list of iOS MDM Servers that opens, click the iOS MDM Server whose settings you want to configure.
- In the iOS MDM Server settings window, select Application settings.
- Select the Configuration profiles tab.
- To add a new configuration profile, click Add.
- In the window that opens, select the configuration profile that you want to add.
The configuration profile name should not be longer than 100 characters. If you enter a longer name, only part of it will be displayed.
The new configuration profile will be displayed in the list of configuration profiles.
You can install the profile that you have created on iOS MDM devices.
Page top
Installing a configuration profile on a device
To install a configuration profile on an iOS MDM device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Devices.
- In the list of devices that opens, select the devices that you want to install configuration profiles on.
- Click Send command.
- In the Send command window that opens, in the Command field, select the Install configuration profile command.
- In the Configuration profiles section, select the configuration profiles that you want to install on the devices.
- Click Send.
The command is sent to the devices you selected.
To view the list of configuration profiles installed on a device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Devices.
- In the list of devices that opens, click the device whose properties you want to view.
The device properties window opens.
- Select the Configuration profiles tab.
The list of configuration profiles installed on the device is displayed.
Page top
Removing a configuration profile from a device
To remove a configuration profile from an iOS MDM device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Devices.
- In the list of devices that opens, select the devices that you want to remove configuration profiles from.
- Click Send command.
- In the Send command window that opens, in the Command field, select the Delete configuration profile command.
- In the Configuration profiles section, select the configuration profiles that you want to remove from the devices.
- Click Send.
The command is sent to the devices you selected.
The profile may be displayed in the list of configuration profiles installed on the device for several minutes after it has been deleted.
To view the list of configuration profiles installed on a device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Devices.
- In the list of devices that opens, click the device whose properties you want to view.
The device properties window opens.
- Select the Configuration profiles tab.
The list of configuration profiles installed on the device is displayed.
Page top
Configuring managed apps
Before installing an app on an iOS MDM device, you must add that app to the Administration Server. An app is considered managed if it has been installed on a device through Kaspersky Mobile Devices Protection and Management. A managed app can be managed remotely by means of Kaspersky Mobile Devices Protection and Management.
To add a managed app to an iOS MDM Server:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Apps.
- Click iOS apps, and then click Add.
The Add app window opens.
- Specify the app name in the App name field. This name will be used to identify the app in policy settings.
- In the Installation method field, select one of the following methods to add the app:
- Installation package
- Link to manifest file
A manifest file is a PLIST file, which is required to install an app on an iOS device. These files are dictionaries containing app installation settings (for example, the location of the installation package). When you use a manifest file to add an app, you have to fill in these settings manually. When you add an app from the App Store or an IPA file, the manifest file is generated automatically.
To get a manifest file for an app, we recommend first adding the app to the iOS MDM Server using an IPA file. In this case, the iOS MDM Server automatically generates a manifest file, which you can download and modify later.
- App Store
- Do one of the following:
- If you selected Installation package, click Select, and upload an IPA file from your computer.
- If you selected Link to manifest file, specify a link to a manifest file that can be used to download the app.
- If you selected App Store, specify a link or ID of the app to be added from the App Store.
- If necessary, configure the following settings:
- Select the Remove when device management profile is deleted check box if you want the app to be removed from the user's mobile device along with the device management profile. By default, this check box is selected.
- Select the Block backup of app data to iCloud check box if you want to block backup of the app data to iCloud.
- If you want to add a custom configuration for the app, in the App configuration section, click Select and select a configuration file in PLIST format on your computer.
To generate a configuration file, you can use a configuration generator (for example, https://appconfig.jamfresearch.com/generator) or refer to the official documentation on the app to be configured.
Example of a basic configuration for the Microsoft Outlook app
Example of a configuration file for the Microsoft Outlook app
You can use macros in the corresponding fields of the configuration file to replace values. Available macros
- Click Save to save the changes you have made.
The newly created app is displayed in the table of apps on the iOS apps tab.
If you select a large IPA file, the app may take some time to upload. Do not close the Apps section until the app is uploaded.
You can view and edit app properties by clicking the app in the list or remove the app using the Delete button.
Installing an app on a mobile device
To install an app on a mobile device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Devices.
- In the list of devices that opens, select the devices that you want to install apps on.
- Click Send command.
- In the Send command window that opens, in the Command field, select the Install app command.
- In the Apps field, select the apps that you want to install on the devices.
- Click Send.
The command is sent to the devices you selected.
Page top
Removing an app from a device
To remove an app from a mobile device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Devices.
- In the list of devices that opens, select the devices that you want to remove apps from.
- Click Send command.
- In the Send command window that opens, in the Command field, select the Delete app command.
- In the Apps section, select the apps that you want to remove from the devices.
- Click Send.
The command is sent to the devices you selected.
Configuring roaming on an iOS MDM mobile device
To configure roaming:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Devices.
- In the list of devices that opens, select the devices that you want to configure roaming settings for.
- Click Send command.
- In the Send command window that opens, in the Command field, select the Change roaming settings command.
- In the Action section, do one of the following:
- If you want to enable data roaming, select Enable data roaming.
- If you want to disable data roaming, select Disable data roaming.
- Click Send.
The command is sent to the devices you selected.
Page top
Viewing information about an iOS MDM device
To view information about an iOS MDM device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Devices.
The list of managed mobile devices opens.
- To filter iOS MDM devices, click the Operating mode column heading and select the operating mode of the iOS MDM device you want to view information about.
The list of iOS MDM devices is displayed.
Depending on the database you use, searches may be case-sensitive.
- Select the mobile device you want to view information about.
A window with the properties of the iOS MDM device opens.
The General tab of the properties window displays information about the connected iOS MDM device.
The Certificates tab of the properties window displays information about the certificates installed on the selected iOS MDM device.
The Apps tab of the properties window displays information about the apps installed on the selected iOS MDM device.
The Configuration profiles tab of the properties window displays information about the configuration profiles installed on the selected iOS MDM device.
Disconnecting an iOS MDM device from management
If you want to stop managing an iOS MDM device, you can disconnect it from management in Kaspersky Security Center.
As an alternative, you or the device owner can remove the device management profile from the device. However, after that you must still disconnect the device from management, as described in this section. Otherwise, you will not be able to start managing this device again.
To disconnect an iOS MDM device from the iOS MDM Server:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Devices.
The list of managed mobile devices opens.
- To filter iOS MDM devices, click the Operating mode column heading and select the operating mode of the iOS MDM device you want to disconnect.
The list of iOS MDM devices operating in the selected mode is displayed.
- Select the mobile device you want to disconnect.
- Click Delete.
In the list, the iOS MDM device is marked for removal. Within one minute, the device is removed from the database of the iOS MDM Server, after which it is automatically removed from the list of managed devices.
After the iOS MDM device is disconnected from management, all installed configuration profiles, the device management profile, and apps for which the Remove when device management profile is deleted option has been enabled in the iOS MDM Server settings, will be removed from the device. The iOS MDM policy will also be deleted.
Page top
Configuring kiosk mode for iOS MDM devices
These settings apply to supervised devices.
Kiosk mode is an iOS feature that lets you limit the apps available to a device user to a single app. In this mode, a device user can open only the one app that is allowed on the device and specified in the kiosk mode settings.
Open the kiosk mode settings
To open the kiosk mode settings:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Restrictions section.
- On the Kiosk mode card, click Settings.
The Kiosk mode window opens.
Configure kiosk mode
To enable kiosk mode:
- Enable the settings using the Kiosk mode toggle switch to activate kiosk mode on a supervised device.
- In the Bundle ID field, enter the unique identifier of an app selected for kiosk mode (for example, com.apple.calculator).
How to get the bundle ID of an app
To select a different app, you need to disable kiosk mode, save the changes to the policy, and enable kiosk mode for a new app.
The app that is selected for kiosk mode must be installed on the device. Otherwise, the device will be locked until kiosk mode is disabled.
The use of the selected app must also be allowed in the policy settings. If the use of the app is prohibited, kiosk mode will not be enabled until the selected app is removed from the list of forbidden apps.
In some cases, kiosk mode can still be enabled even when the use of the selected app is prohibited in the policy settings.
- Specify the settings that will be enabled on the device in kiosk mode in the corresponding section. For available settings, see the "Kiosk mode settings" section below.
- Specify the settings that the user can edit on the device in kiosk mode in the corresponding section.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with the iOS MDM Server.
As a result, once the policy is applied, kiosk mode is enabled. The selected app is forced to open on a supervised device, and the use of other apps is prohibited. The selected app reopens immediately after the device is restarted.
To edit the kiosk mode settings, you need to disable kiosk mode, save changes to the policy, and then enable kiosk mode again with the new settings.
To disable kiosk mode:
- Disable the settings using the Kiosk mode toggle switch to deactivate kiosk mode on a supervised device.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with the iOS MDM Server.
As a result, once the policy is applied, kiosk mode is disabled and the use of all apps is allowed on the supervised device.
Now, you can enable kiosk mode again with the new settings.
Kiosk mode settings
- Auto-Lock
- Touch (not recommended to disable)
- AssistiveTouch
- Voice Control
- VoiceOver
- Speak Selection
- Volume Buttons
- Mono Audio
- Zoom
- Auto-Rotate Screen
- Invert Colors
- Ring/Silent Switch
- Sleep/Wake Button
Management of mobile device settings
This section contains information about how to remotely manage the settings of mobile devices in Kaspersky Security Center Web Console.
Configuring connection to a Wi-Fi network
This section provides instructions on how to configure automatic connection to a corporate Wi-Fi network on Android and iOS MDM devices.
Connecting Android devices to a Wi-Fi network
For an Android device to automatically connect to an available Wi-Fi network and protect data during the connection, you must configure the connection settings.
To connect a mobile device to a Wi-Fi network:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Device configuration section.
- On the Wi-Fi card, click Settings.
The Wi-Fi window opens.
- Enable the settings using the Wi-Fi toggle switch.
- Click Add.
The Add Wi-Fi network window opens.
- In the Service set identifier (SSID) field, enter the name of the Wi-Fi network that includes the access point (SSID).
- Select the Connect automatically check box if you want Android devices to automatically connect to the Wi-Fi network.
- Select the Hidden network check box if you want the Wi-Fi network to be hidden in the list of available networks on the device.
In this case, to connect to the network the user needs to manually enter the service set identifier (SSID) specified in the settings of the Wi-Fi router on the mobile device.
- In the Protection section, select the type of Wi-Fi network security (open network or secure network protected with the WEP, WPA2 PSK, or 802.1.x EAP protocol).
The 802.1.x EAP security protocol is supported only in Kaspersky Endpoint Security for Android 10.48.1.1 or later. The WEP protocol is supported only on Android 9 or earlier.
- If you selected the 802.1.x EAP security protocol, specify the following network protection settings:
- In the Password field, set a network access password if you selected a secure network at step 9.
- On the Additional settings tab, select the Use a proxy server check box if you want to use a proxy server to connect to the Wi-Fi network.
- If you selected Use a proxy server, in the Proxy server address and Proxy server port fields, enter the IP address or DNS name of the proxy server and port number, if necessary.
On devices running Android 8 or later, proxy server settings for Wi-Fi cannot be redefined with a policy. However, you can manually configure the proxy server settings for a Wi-Fi network on the mobile device.
If you are not using a proxy server to connect to a Wi-Fi network, there are no limitations on using policies to manage a Wi-Fi network connection.
- In the Do not use proxy server for the specified addresses field, add web addresses that can be accessed without the use of the proxy server.
For example, you can enter the address
example.com
. In this case, the proxy server will not be used for the addressespictures.example.com
,example.com/movies
, etc. The protocol (for example,http://
) can be omitted.On devices running Android 8 or later, excluding web addresses from the proxy server does not work.
- Click Add.
The added Wi-Fi network is displayed in the list of Wi-Fi networks.
This list contains the names of suggested wireless networks.
On personal devices running Android 10 or later, the operating system prompts the user to connect to such networks. Suggested networks don't appear in the saved networks list on these devices.
On corporate devices and personal devices running Android 9 or earlier, after synchronizing the device with the Administration Server, the device user can select a suggested wireless network in the saved networks list and connect to it without having to specify any network settings.
You can modify or delete Wi-Fi networks in the list of networks using the Edit and Delete buttons at the top of the list.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
On devices running Android 10 or later, if a user refuses to connect to the suggested Wi-Fi network, the app's permission to change Wi-Fi state is revoked. The user must grant this permission manually.
Page top
Connecting iOS MDM devices to a Wi-Fi network
For an iOS MDM device to automatically connect to an available Wi-Fi network and protect data during the connection, you must configure the connection settings.
To configure the connection of an iOS MDM device to a Wi-Fi network:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Device configuration section.
- On the Wi-Fi card, click Settings.
The Wi-Fi window opens.
- Enable the settings using the Wi-Fi toggle switch.
- Click Add.
The Add Wi-Fi network window opens.
- In the Service set identifier (SSID) field, enter the name of the Wi-Fi network that includes the access point (SSID).
- If you want iOS MDM devices to automatically connect to the Wi-Fi network, select the Connect automatically check box.
If you disable automatic connection to an existing Wi-Fi network in the policy settings, you will not be able to enable automatic connection to this network again. This is due to an issue known to Apple.
- If you don't want iOS MDM devices to connect to Wi-Fi networks requiring preliminary authentication (captive networks), select the Bypass captive portal check box.
To use a captive network, you must subscribe, accept an agreement, or make a payment. Captive networks may be deployed in cafes and hotels, for example.
- If you want the Wi-Fi network to be hidden in the list of available networks on the iOS MDM device, select the Hidden network check box.
In this case, to connect to the network the user needs to manually enter the service set identifier (SSID) specified in the settings of the Wi-Fi router on the mobile device.
- If you want iOS MDM devices to use static MAC addresses when they connect to the Wi-Fi network, select the Disable MAC address randomization check box.
- In the Protection section, select the type of Wi-Fi network security (open network or secure network protected with the WEP, WPA, WPA2, or WPA3 protocol).
On devices running iOS 15 or earlier, selecting WPA, WPA2, or WPA3 is identical and lets you connect to any network protected using WPA.
- Open network. User authentication is not required.
- WEP. The network is protected using Wireless Encryption Protocol (WEP).
WEP protection is available on devices running iOS 5 or later.
- WPA. The network is protected using the WPA (Wi-Fi Protected Access) or WPA2 protocol.
- WPA2. The network is protected using the WPA2 or WPA3 protocol.
- WPA3. The network is protected using the WPA3 protocol.
- Personal network (any). The network is protected using the WEP, WPA, WPA2, or WPA3 encryption protocol depending on the type of Wi-Fi router. An encryption key unique to each user is used for authentication.
- WEP (corporate network). The network is protected using the WEP protocol with the use of a dynamic key.
- WPA (corporate network). The network is protected using the WPA or WPA2 encryption protocol with the use of the 802.1X protocol.
- WPA2 (corporate network). The network is protected using the WPA2 or WPA3 encryption protocol with the use of one key shared by all users (802.1X).
- WPA3 (corporate network). The network is protected using the WPA3 encryption protocol with the use of one key shared by all users (802.1X).
- Corporate network (any). The network is protected using the WEP, WPA, WPA2, or WPA3 protocol depending on the type of Wi-Fi router. Authentication is performed using a single encryption key shared by all users.
If you have selected any of the corporate network options, in the EAP protocol section you can select the types of EAP protocols (Extensible Authentication Protocol) for user identification on the Wi-Fi network.
In the Trusted certificates section, you can also create a list of trusted certificates for authentication of the iOS MDM device user on trusted servers.
- In the Authentication section, configure the settings of the account for user authentication upon connection of the iOS MDM device to the Wi-Fi network:
- In the User name field, enter the account name for user authentication upon connection to the Wi-Fi network.
- In the User ID field, enter the user ID displayed during data transmission upon authentication instead of the user's real name.
The user ID is designed to make the authentication process more secure, since the user name is not displayed openly, but rather transmitted via an encrypted TLS tunnel.
- In the Password field, enter the password of the account for authentication on the Wi-Fi network.
- If you want the user to enter the password manually upon every connection to the Wi-Fi network, select the Prompt for password at each connection check box.
- In the Authentication certificate drop-down list, select a certificate for user authentication on the Wi-Fi network.
- In the Minimum TLS version drop-down list, select the minimum allowed TLS version.
- In the Maximum TLS version drop-down list, select the maximum allowed TLS version.
- If necessary, on the Additional settings tab, configure the settings for connecting to the Wi-Fi network via a proxy server:
- Select the Use a proxy server check box.
- Configure a connection to a proxy server:
- If you want to configure the connection automatically:
- Select Automatic.
- In the PAC file URL field, specify the URL of the proxy PAC file.
- To allow the user to connect the mobile device to a wireless network without using a proxy server when the PAC file cannot be accessed, select the Allow direct connection if PAC file cannot be accessed check box.
- If you want to configure the connection manually:
- Select Manual.
- In the Proxy server address and Proxy server port fields, enter the IP address or DNS name of the proxy server and port number.
- In the User name field, select a macro that will be used as a user name for the connection to the proxy server.
- In the Password field, specify the password for the connection to the proxy server.
- If you want to configure the connection automatically:
- Click Add.
The new Wi-Fi network is displayed in the list.
- Click OK.
- Click Save to save the changes you have made.
As a result, a Wi-Fi network connection will be configured on the user's iOS MDM device once the policy is applied. The user's mobile device will automatically connect to available Wi-Fi networks. Data security during a Wi-Fi network connection is ensured by the selected authentication method.
Page top
Configuring email
This section contains information on configuring mailboxes on mobile devices.
Configuring a mailbox on iOS MDM devices
These settings apply to supervised devices and devices operating in basic control mode.
To enable an iOS MDM device user to work with email, add the user's email account to the list of accounts on the iOS MDM device.
By default, the email account is added with the following settings:
- Email protocol – IMAP.
- The user can move email messages between the user's accounts and synchronize account addresses.
- The user can use any email client (other than Mail) to use email.
- The SSL connection is not used during transmission of messages.
You can edit the specified settings when adding an account.
To add an email account of the iOS MDM device user:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Device configuration section.
- On the Email card, click Settings.
The Email window opens.
- Enable the settings using the Email toggle switch.
- Click Add.
The Add email account window opens.
- Specify the email account settings:
- On the General settings tab, configure the following settings:
- In the User name field, specify the name of the iOS MDM device user. You can either enter a value or select a macro by clicking the
button.
- In the Email address field, specify the email address of the iOS MDM device user. You can either enter a value or select a macro by clicking the
button.
- In the Account description field, enter a description of the user's email account.
- In the Email protocol field, select one of the following protocols:
- POP
- IMAP
- If you selected IMAP, specify the IMAP path prefix in the IMAP path prefix field.
The IMAP path prefix must be entered using uppercase letters (for example: GMAIL for Google Mail).
- In the Incoming mail server settings and Outgoing mail server settings sections, configure the server connection settings:
- In the Server address field, specify names of hosts or IP addresses of incoming and outgoing mail servers.
- In the Server port fields, specify the port numbers of incoming and outgoing mail servers.
To configure optional settings for the incoming and outgoing mail servers, click More settings and do the following:
- In the User name field, specify the name of the user's account for authorization on the incoming and outgoing mail servers. You can either enter a value or select a macro by clicking the
button.
- In the Authentication type field, select the type of authentication of the user's email account on the incoming and outgoing mail servers.
- In the Password field, specify the account password for authenticating on incoming and outgoing mail servers protected using the selected authentication method.
- If you want to use the SSL (Secure Sockets Layer) data transport protocol, select the Use SSL connection check box.
- If you want to use the same password for user authentication on the incoming and outgoing mail servers, select the Use the same password for incoming and outgoing mail servers check box.
- In the User name field, specify the name of the iOS MDM device user. You can either enter a value or select a macro by clicking the
- On the Advanced settings tab, configure the additional settings of the email account:
- In the Restrictions section, select or clear the following check boxes, if necessary:
- In the Signature and Encryption sections, configure the settings for signing and encrypting outgoing mail using the S/MIME protocol in the Mail app.
S/MIME is a protocol for transmitting digitally signed encrypted messages. S/MIME provides cryptographic security capabilities such as authentication, message integrity control, and non-repudiation of origin (using digital signatures). The protocol also helps improve the confidentiality and security of data in email messages by using encryption.
- If necessary, in the Per App VPN section, configure Per App VPN.
- On the General settings tab, configure the following settings:
- Click Save.
The new email account appears in the list.
You can modify or delete email accounts in the list using the Edit and Delete buttons at the top of the list.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with the iOS MDM Server.
As a result, once the policy is applied, email accounts from the list are added on the user's mobile device.
We recommend closing and opening the Settings app on the iOS MDM device after you configure a mailbox.
Page top
Configuring an Exchange mailbox on iOS MDM devices
These settings apply to supervised devices and devices operating in basic control mode.
To allow an iOS MDM device user to use corporate email, calendar, contacts, notes, and tasks, add the user's Exchange ActiveSync account on the Microsoft Exchange server.
By default, an account with the following settings is added on the Microsoft Exchange server:
- Email is synchronized once per week.
- The user can move messages between the user's accounts and synchronize account addresses.
- The user can use any email clients (other than Mail) to use email.
- The SSL connection is not used during transmission of messages.
You can edit the specified settings when adding the Exchange ActiveSync account.
To add an Exchange ActiveSync account of an iOS MDM device user:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Device configuration section.
- On the Exchange ActiveSync card, click Settings.
The Exchange ActiveSync window opens.
- Enable the settings using the Exchange ActiveSync toggle switch.
- Click Add.
The Add Exchange ActiveSync account window opens.
- Specify the Exchange ActiveSync settings:
- On the General settings tab, specify the user's data:
- In the Account name field, enter the account name for authorization on the Microsoft Exchange server. You can either enter a value or select a macro by clicking the
button.
- In the Exchange ActiveSync server address field, enter the DNS name or IP address of the Microsoft Exchange server.
- Settings in the User credentials section:
- In the User domain field, enter the name of the iOS MDM device user's domain. You can either enter a value or select a macro by clicking the
button.
- In the User name field, enter the name of the iOS MDM device user. You can either enter a value or select a macro by clicking the
button.
If you leave this field blank, Kaspersky Mobile Devices Protection and Management prompts the user to enter the user name when applying the policy on the iOS MDM device.
- In the Email address field, specify the email address of the iOS MDM device user. You can either enter a value or select a macro by clicking the
button.
- In the User domain field, enter the name of the iOS MDM device user's domain. You can either enter a value or select a macro by clicking the
- Settings in the Authentication section:
- In the Password field, enter the password of the Exchange ActiveSync account for authorization on the Microsoft Exchange server.
- In the Authentication certificate drop-down list, select the certificate used for authenticating the iOS MDM device user on the Microsoft Exchange server. You can add certificates in the Certificate management settings of the policy or in the Certificates section of Web Console.
- In the Account name field, enter the account name for authorization on the Microsoft Exchange server. You can either enter a value or select a macro by clicking the
- On the Additional settings tab, configure the additional settings of the Exchange ActiveSync account:
- In the Email synchronization section, in the Synchronization period drop-down list, select the time interval for which email is automatically synchronized and stored on the iOS MDM device. The longer the email synchronization period, the more free space required in the memory of the mobile device. Messages that have not been synchronized are not available without an internet connection. The default value is 1 week.
- In the Restrictions section, select or clear the following check boxes, if necessary:
- In the Signature and encryption section, configure the settings for signing and encrypting outgoing mail using the S/MIME protocol in the Mail app. S/MIME is a protocol for transmitting digitally signed encrypted messages. S/MIME provides cryptographic security capabilities such as authentication, message integrity control, and non-repudiation of origin (using digital signatures). The protocol also uses encryption to help improve the level of confidentiality and security of data in email messages.
- On the General settings tab, specify the user's data:
- Click Add.
The new Exchange ActiveSync account appears in the list.
You can modify or delete Exchange ActiveSync accounts in the list using the Edit and Delete buttons at the top of the list.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with the iOS MDM Server.
As a result, once the policy is applied, Exchange ActiveSync accounts from the compiled list are added on the user's mobile device.
Page top
Configuring an Exchange mailbox on Android devices
To work with corporate mail, contacts, and the calendar on the mobile device, you can configure the Exchange mailbox settings for the standard Samsung Email app.
An Exchange mailbox can be configured only for Samsung devices running Android 9 or earlier.
To configure an Exchange mailbox on a user's mobile device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Samsung Knox settings section.
- On the Exchange ActiveSync card, click Settings.
The Exchange ActiveSync window opens.
- Enable the settings using the Exchange ActiveSync toggle switch.
- In the Server address field, enter the IP address or DNS name of the server hosting the mail server.
- In the Domain name field, enter the name of the mobile device user's domain on the corporate network.
- In the Synchronization interval drop-down list, select the interval for mobile device synchronization with the Microsoft Exchange server.
- To use the SSL (Secure Sockets Layer) data transport protocol, select the Use SSL connection check box. The SSL protocol uses encryption and certificate-based authentication for secure data transfer. This check box is selected by default.
- To use digital certificates to protect data transfer between the user's mobile device and the Microsoft Exchange server, select the Verify server certificate check box. The server certificate is verified to have been issued from the trusted root certificate. This check box is selected by default.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Page top
Configuring protection levels in Kaspersky Security Center
These settings apply to Android devices.
To configure rules for assigning protection levels in Kaspersky Security Center:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the KES for Android settings section.
- On the Severity settings for device protection level card, click Settings.
The Severity settings for device protection level window opens.
- Enable the settings using the Severity settings for device protection level toggle switch.
- Select the OK, Warning, or Critical protection level for each of the following conditions:
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
For more information about default values, reasons, and conditions for assigning protection levels, please refer to the Mobile device protection levels section.
Page top
Managing app configurations
This section provides instructions on how to manage settings and edit configurations of the apps installed on your users' devices.
Managing Google Chrome settings
These settings apply to corporate devices and devices with a corporate container.
To configure Google Chrome settings:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the App configuration section.
- On the Google Chrome settings card, click Settings.
The Google Chrome settings window opens.
- Enable the settings using the Google Chrome settings toggle switch.
The toggle switch in this card does not enable or disable the corresponding functionality on devices. Enabling the toggle switch lets you configure custom settings. Disabling the toggle switch lets you use default settings.
- Configure the required settings.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Manage content settings
On the Content tab, you can manage the following settings:
- In the Cookies section:
- In the JavaScript section:
- In the Pop-ups section:
- In the Location tracking section:
Manage proxy settings
On the Proxy tab, you can manage the following settings:
Manage search settings
On the Search tab, you can manage the following settings:
- In the Touch to Search section:
- In the Search provider section:
Manage security settings
On the Security tab, you can manage the following settings:
- In the Google Safe Browsing and SafeSearch section:
- In the Blocked websites section:
- In the Passwords and autofill section:
- In the Network section:
Manage additional settings
On the Additional settings tab, you can manage the following settings:
- In the Bookmarks section:
- In the History and Incognito mode section:
- In the Other section:
Managing Exchange ActiveSync for Gmail
These settings apply to corporate devices and devices with a corporate container.
The Exchange ActiveSync settings let you manage Exchange ActiveSync for the Gmail app.
To configure Exchange ActiveSync settings:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the App configuration section.
- On the Exchange ActiveSync card, click Settings.
The Exchange ActiveSync window opens.
- Enable the settings using the Exchange ActiveSync toggle switch.
- Specify the Exchange ActiveSync settings:
- On the General settings tab, specify the following settings:
- Exchange ActiveSync server address
- Settings in the User credentials section:
- Settings in the Authentication section:
- On the Additional settings tab, specify the following settings:
- Settings in the Email synchronization section:
- Settings in the Restrictions section:
- Settings in the Signature section:
- On the General settings tab, specify the following settings:
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Page top
Configuring other apps
These settings apply to corporate devices and devices with a corporate container.
The Configure other apps settings let you configure installed apps that support configurations.
To add app configurations:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the App configuration section.
- On the Configure other apps card, click Settings.
The Configure other apps window opens.
- Enable the settings using the Configure other apps toggle switch.
- Click Add.
The Add app configuration window opens.
- In the Method for adding configuration drop-down list, select how to add configuration:
- In the Configuration data section, specify the following settings:
An example of configured basic parameters for the Microsoft Outlook app.
- Click the Add setting button to add a block of the app configuration settings. You can add several blocks of settings.
Specify the following parameters for each block of settings of the configuration:
For some types of settings, additional parameters can be configured. For example:
- You can add macros for a String.
- You can add a field to a Bundle.
- You can add a Bundle to a BundleArray.
It is also possible to edit a setting to be added to a BundleArray by clicking the Configure Bundle button and configuring the setting's parameters.
For information about configuring rules, please refer to the official documentation for the app to be configured.
- Click Add.
The configuration appears in the list of app configurations.
You can modify or delete app configurations in the list using the Edit and Delete buttons at the top of the list.
- Click OK.
- Click Save to save the changes you have made.
The app configuration is applied.
Some apps may not notify Kaspersky Endpoint Security for Android that the app configuration has been applied.
When configuring some apps, certificates installed on devices via Kaspersky Security Center can be used. In this case, you must specify a certificate alias in the app configuration:
VpnCert
for VPN certificates.MailCert
for mail certificates.SCEP_profile_name
for certificates received using SCEP.
Managing app permissions
These settings apply to corporate devices and devices with a corporate container.
App permission management settings let you configure rules for granting runtime permissions to installed apps.
To add app permissions:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the App configuration section.
- On the App permission management card, click Settings.
The App permission management window opens.
- Enable the settings using the App permission management toggle switch.
- Click Add.
The Add app with permission granting rules window opens.
- In the Method for adding configuration section, select how to add a configuration with permission granting rules:
- In the App data section, specify the following settings:
- Click the Add rule button to add and configure a new rule. You can add several permissions.
Select one of the following permissions.
To configure granting rules for app runtime permissions, you need to select one of the following actions for each permission:
You can save only one granting rule for each app permission.
- Click Add.
The configuration appears in the Apps with configured permission granting rules list.
You can modify or delete configurations in the list using the Edit and Delete buttons at the top of the list.
- Click OK.
- Click Save to save the changes you have made.
The configuration with permission granting rules is applied. Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Permission granting rules configured for specific apps have precedence over the general policy for granting permissions. For example, if you first select the Deny permissions automatically option in the Corporate container on devices section, and then select the Grant permissions automatically option for a specific app in the App permission management section, the permission for this app will be granted automatically.
Page top
Creating a report on installed mobile apps
The Report on installed mobile apps lets you get detailed information about the apps installed on users' Android devices.
To allow the report to display information, the Send data on installed apps check box must be selected in App Control settings and the An app was installed or removed (list of installed apps) informational event type must be stored in the Administration Server database.
To enable sending data:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Security controls section.
- On the App Control card, click Settings.
The App Control window opens.
- In the Report on installed apps section, select the Send data on installed apps check box.
- If you want to receive data about system apps, select the Send data on built-in apps check box.
- If you want to receive data about service apps, which do not have an interface and cannot be opened by the user, select the Send data on service apps check box.
- Click OK.
- Click Save to save the changes you have made.
- Click the name of the policy and select Event configuration.
- Go to the Info section.
- Click the An app was installed or removed (list of installed apps) event to open its properties.
- In the event properties window, turn on the Store in the Administration Server database for (days) toggle switch and set the storage period. By default, the storage period is 30 days.
After the storage period expires, the Administration Server deletes outdated information from the database. For more information about events, please refer to the Kaspersky Security Center Help.
- Click OK.
- Click Save to save the changes you have made.
Sending data is enabled.
To configure a report on installed mobile apps:
- In the main window of Kaspersky Security Center Web Console, select Monitoring & reporting → Reports.
- Click the Report on installed mobile apps report template to open its properties.
- In the window that opens, click Edit.
- Edit the report template properties:
- On the General tab, specify the following parameters:
- On the Fields tab, select the fields that will be displayed in the report and the order of these fields, and configure whether the report must be sorted and filtered by each of the fields.
- Click Save to save the changes you have made.
The updated report template appears in the list of report templates.
To create and view a report on installed mobile apps:
- In the main window of Kaspersky Security Center Web Console, select Monitoring & reporting → Reports.
- Click a report with the Report on installed mobile apps type.
A report using the selected template is generated and displayed.
For more information about using reports, managing custom report templates, using report templates to generate new reports, and creating report delivery tasks, please refer to the Kaspersky Security Center Help.
Page top
Installing root certificates on Android devices
A root certificate is a public key certificate issued by a trusted certificate authority (CA). Root certificates are used to verify custom certificates and guarantee their identity.
Kaspersky Security Center Web Console lets you add root certificates to be installed to a trusted certificate store on Android devices.
These certificates are installed on user devices as follows:
- On corporate devices, the certificates are installed automatically.
If you delete a root certificate in the policy settings, it will also be automatically deleted on the device during the next synchronization with the Administration Server.
- On personal devices:
- If a corporate container was not created, the device user is prompted to install each certificate manually in a personal space by following the instructions in the notification.
- If a corporate container was created, the certificates are installed automatically to the container. If the Duplicate installation of root certificates in user's personal space check box is selected in the corporate container settings, the certificates can also be installed in a personal space. The device user is prompted to do this manually by following the instructions in the notification.
If you delete a root certificate in the policy settings, it will also be automatically deleted on the device during the next synchronization with the Administration Server.
For instructions on how to install certificates in a personal space, please refer to Installing root certificates on the device.
To add a root certificate:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Device configuration section.
- On the Root certificates card, click Settings.
The Root certificates window opens.
- Enable the settings using the Root certificates toggle switch.
- Click Add.
The file explorer opens.
- Select a certificate file (a CER, PEM, KEY, or CRT file) and click Open.
The certificate file must be no larger than 10 MB.
The certificate will appear in the list of root certificates.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are configured after the next device synchronization with Kaspersky Security Center.
Page top
Configuring notifications for Kaspersky Endpoint Security for Android
If you don't want the mobile device user to be distracted by Kaspersky Endpoint Security for Android notifications, you can disable certain notifications.
Kaspersky Endpoint Security for Android uses the following tools to display the status of device protection:
- Protection status notification. This notification is pinned to the notification bar. A protection status notification cannot be removed. The notification displays the device protection status (for example,
) and the number of issues, if any. You can tap the device protection status and see security issues in the app.
- App notifications. These notifications inform the device user about the application (for example, the detection of a threat).
- Pop-up messages. Pop-up messages require action from the device user (for example, action to take when a threat is detected).
All Kaspersky Endpoint Security for Android notifications are enabled by default.
On Android 13, the device user must grant the permission to send notifications during or after the Initial Configuration Wizard.
The user can disable all notifications from Kaspersky Endpoint Security for Android in the settings on the notification bar. If notifications are disabled, the user is not monitoring operation of the app and may ignore important information (for example, information about failures during device synchronization with Kaspersky Security Center). In this case, to find out the app operating status, the user must open Kaspersky Endpoint Security for Android.
To configure displaying notifications about the operation of Kaspersky Endpoint Security for Android:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the KES for Android settings section.
- On the Notifications card, click Settings.
The Notifications window opens.
- Enable the settings using the Notifications toggle switch.
- If you want to hide all notifications and pop-up messages, in the Background notifications section, select the Disable notifications when Kaspersky Endpoint Security is in the background check box.
Kaspersky Endpoint Security for Android will display only the protection status notification. The notification displays the device protection status (for example,
) and the number of issues.
In-app notifications (for example, when the user updates anti-malware databases manually) will still be displayed.
We recommend that you enable notifications and pop-up messages. If you disable notifications and pop-up messages when the app is in the background, the app will not warn users about threats in real time. In this case, mobile device users will not see the device protection status unless they open the app.
- In the Notifications about device security issues section, select the Kaspersky Endpoint Security for Android issues that you want to display on the user's mobile device.
Displaying certain Kaspersky Endpoint Security for Android issues is mandatory. These issues are always displayed on the device (for example, issues about license expiration).
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center. The notifications that you disable will not be displayed on the user's mobile device.
Page top
Connecting iOS MDM devices to AirPlay
Configure the connection to AirPlay devices to stream music, photos, and videos from an iOS MDM device to AirPlay devices. To be able to use AirPlay, the mobile device and AirPlay devices must be connected to the same wireless network. AirPlay devices include Apple TV devices (second generation or later), AirPort Express devices, speakers, TVs, and radios with AirPlay support.
Automatic connection to AirPlay devices is available for devices operating in basic control mode and for supervised devices.
To configure the connection of an iOS MDM device to AirPlay devices:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Device configuration section.
- On the AirPlay card, click Settings.
The AirPlay window opens.
- Enable the settings using the AirPlay toggle switch.
- In the Passwords section, click Add password.
- In the Device field, enter the name of the AirPlay device on the wireless network.
- In the Password field, enter the password to the AirPlay device.
- If you want iOS MDM devices to connect only to specific AirPlay devices, create a list of allowed devices in the Allowed devices section. To do this, click Add device and specify the MAC addresses of AirPlay devices.
Both the Wi-Fi and Ethernet address for each device must be added.
Access to AirPlay devices that are not in the list of allowed devices is blocked. If the list of allowed devices is empty, Kaspersky Mobile Devices Protection and Management allows access to all AirPlay devices.
- Click OK.
- Click Save to save the changes you have made.
As a result, once the policy is applied, the user's mobile device will automatically connect to AirPlay devices to stream media.
Page top
Connecting iOS MDM devices to AirPrint
To enable printing documents from an iOS MDM device wirelessly using AirPrint, configure automatic connection to AirPrint printers. The mobile device and printer must be connected to the same wireless network. Shared access for all users must be configured on the AirPrint printer.
To configure the connection of an iOS MDM device to an AirPrint printer:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Device configuration section.
- On the AirPrint card, click Settings.
The AirPrint window opens.
- Enable the settings using the AirPrint toggle switch.
- Click Add.
The Add printer window opens.
- In the IP address or FQDN field, enter the IP address or a fully qualified domain name (FQDN) of the AirPrint printer.
- In the Port field, enter the listening port of the AirPrint destination.
- In the Resource path field, enter the path to the AirPrint printer.
The path to the printer corresponds to the rp (resource path) key of the Bonjour protocol. For example:
- printers/Canon_MG5300_series
- ipp/print
- Epson_IPP_Printer
- If you want to protect the connection to the AirPrint printer using the TLS protocol, select the Use TLS check box.
- Click Add.
The newly added AirPrint printer appears in the list.
- Click OK.
- Click Save to save the changes you have made.
As a result, once the policy is applied, the mobile device user can wirelessly print documents on the AirPrint printer.
Page top
Configuring the Access Point Name (APN)
This section provides instructions on how to connect a mobile device to cellular data services on a mobile network.
Configuring APN on Android devices (only Samsung)
APN can be configured only for Samsung devices.
A SIM card must be inserted to be able to use an access point on the user's mobile device. Access point settings are provided by the mobile operator. Incorrect access point settings may result in additional mobile charges.
To configure the Access Point Name (APN) settings on a user's mobile device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Samsung Knox settings section.
- On the APN settings card, click Settings.
The APN settings window opens.
- Enable the settings using the APN settings toggle switch.
The toggle switch in this card does not enable or disable the corresponding functionality on devices. Enabling the toggle switch lets you configure custom settings. Disabling the toggle switch lets you use default settings.
- Specify the following access point settings for connecting the user to the data service:
- In the APN type drop-down list, select the type of access point (APN) for data transmission on a GPRS/3G/4G mobile network:
- Internet. Connection of the user's mobile device to the internet.
- MMS. Exchange of MMS multimedia messages.
- Internet and MMS. Connection to the internet and exchange of multimedia messages. This is the default value.
- In the APN name field, specify the name of the access point.
- In the MCC field, enter the mobile country code (MCC).
- In the MNC field, enter the mobile network code (MNC).
- In the APN type drop-down list, select the type of access point (APN) for data transmission on a GPRS/3G/4G mobile network:
- If you have selected MMS or Internet and MMS as the type of access point, specify the following additional MMS server settings in the MMS server section:
- In the MMS server name field, specify the full domain name of the mobile carrier's server used for MMS exchange (for example,
mms.mobile.com
). - In the MMS proxy server address field, specify the network name or IP address of the proxy server.
- In the MMS proxy server port field, specify the port number of the mobile carrier's server used for MMS exchange.
- In the MMS server name field, specify the full domain name of the mobile carrier's server used for MMS exchange (for example,
- In the Authentication section, specify the authentication settings:
- In the Authentication type drop-down list, select the type of authentication of the mobile device user that will be used on the mobile carrier's server for network access. By default, user authentication is not required. The following types are available:
- None. User authentication is not required to access the mobile network.
- PAP (Password Authentication Protocol). An authentication protocol that uses passwords as plain non-encrypted text.
- CHAP (Challenge Handshake Authentication Protocol). A request-response authentication protocol that uses standard MD5 hashing to encrypt the response.
- Concurrently. Combined use of CHAP and PAP protocols.
- In the User name field, enter the user name for authorization on the mobile network.
- In the Password field, enter the password for user authorization on the mobile network.
- In the Authentication type drop-down list, select the type of authentication of the mobile device user that will be used on the mobile carrier's server for network access. By default, user authentication is not required. The following types are available:
- In the Network section, specify the following network settings:
- In the Network name field, enter the name of the network.
- In the Server address field, specify the network name of the mobile carrier's server through which data transmission services are accessed.
- In the Proxy server section, specify the following proxy server settings:
- Select the Use a proxy server check box to enable the use of a proxy server. This check box is cleared by default.
- In the Proxy server address field, specify the network name or IP address of the mobile carrier's proxy server for network access. This field is available only if the Use a proxy server check box is selected.
- In the Proxy server port field, specify the port number of the mobile carrier's proxy server for network access. This field is available only if the Use a proxy server check box is selected.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Page top
Configuring APN on iOS MDM devices
The Access Point Name (APN) has to be configured in order to enable the mobile network data transmission service on the user's iOS MDM device.
To configure an access point on a user's iOS MDM device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Device configuration section.
- On the APN settings card, click Settings.
The APN settings window opens.
- Enable the settings using the APN settings toggle switch.
The toggle switch in this card does not enable or disable the corresponding functionality on devices. Enabling the toggle switch lets you configure custom settings. Disabling the toggle switch lets you use default settings.
- In the APN type drop-down list, select the type of access point for data transfer on a GPRS/3G/4G mobile network:
- Built-in APN. Configure cellular communication settings for data transfer via a mobile network operator that supports operation with a built-in Apple SIM. For more details about devices with a built-in Apple SIM, visit the Apple Support website.
- APN. Configure cellular communication settings for data transfer via the mobile network operator of the inserted SIM card.
- Built-in APN and APN. Configure cellular communication settings for data transfer via the mobile network operators of the inserted SIM card and the built-in Apple SIM. For more details about devices with a built-in Apple SIM and a SIM card slot, visit the Apple Support website.
- If you selected APN, in the APN section click Add.
The Add APN window opens.
- Configure the following settings:
- In the APN name field, specify the name of the access point.
- In the Authentication type drop-down list, select the type of user authentication on the mobile operator's server for network access (internet and MMS).
- In the User name field, enter the user name for authorization on the mobile network.
- In the Password field, enter the password for user authorization on the mobile network.
- In the Proxy server address field, enter the name of the host or the IP address of the proxy server.
- In the Proxy server port field, enter the number of the proxy server port.
- In the Allowed protocol drop-down list, select the internet protocol.
- In the Allowed protocol for roaming drop-down list, select the internet protocol that will be used during international roaming.
- In the Allowed protocol for domestic roaming drop-down list, select the internet protocol that will be used during domestic roaming.
- If you want devices on IPv6-only networks to be able to access IPv4-only internet services, select the Use the 464XLAT technology check box.
- Click OK.
- If you selected Built-in APN, configure the following settings:
- In the Built-in APN name field, specify the name of the access point.
- In the Authentication type drop-down list, select the type of user authentication on the mobile operator's server for network access (internet and MMS).
- In the User name field, enter the user name for authorization on the mobile network.
- In the Password field, enter the password for user authorization on the mobile network.
- In the Allowed protocol drop-down list, select the internet protocol.
- Click OK.
- Click Save to save the changes you have made.
As a result, the access point name (APN) is configured on the user's mobile device after the policy is applied.
Page top
Corporate container
This section contains information about working with a corporate container.
About corporate containers
Android Enterprise is a platform for managing the corporate mobile infrastructure and provides company employees with a safe work environment in which they can use mobile devices. For details on using Android Enterprise, see the Google support website.
You can create a corporate container that uses an Android Work Profile on a user's personal mobile device. A corporate container is a safe environment in which the administrator can manage apps and user accounts without restricting the user's use of their own data. When a corporate container is created on the user's mobile device, the following corporate apps are automatically installed in it: Google Play, Google Chrome, Downloads, Kaspersky Endpoint Security for Android, and others. Apps installed in the corporate container as well as notifications from these apps are marked with a briefcase icon. You have to create a separate Google corporate account for the Google Play app. Apps installed in a corporate container appear in the common list of apps.
Page top
Configuring a corporate container
To configure the settings of a corporate container:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Corporate container section.
- On the Corporate container on devices card, click Settings.
The Corporate container on devices window opens.
- Enable the settings using the Corporate container on devices toggle switch.
- Specify the corporate container settings:
- On the General tab, you can specify the settings for data sharing, contacts, and more.
- Settings in the Data access and sharing section:
- Prohibit personal apps from sharing data with corporate container apps
- Prohibit corporate container apps from sharing data with personal apps
- Prohibit corporate container apps from accessing personal files
- Prohibit personal apps from accessing files in corporate container
- Prohibit use of clipboard between personal apps and corporate container
- Prohibit activation of USB debugging
- Prohibit users from adding and removing accounts in corporate container
- Prohibit screen sharing, recording, and screenshots in corporate container apps
- Settings in the Contacts section:
- Settings in the Data access and sharing section:
- On the Apps tab, specify the following settings:
- Settings in the General section:
- Enable App Control in corporate container only
- Enable Web Protection and Web Control in corporate container only
- Prohibit installation of apps from unknown sources in corporate container
- Prohibit removing apps from corporate container
- Prohibit displaying notifications from corporate container apps when screen is locked
- Prohibit use of camera for corporate container apps
- In the Granting runtime permissions for corporate container apps section you can select an action to be performed when corporate container apps are running and request additional permissions. This does not apply to permissions granted in the device settings (for example, Access All Files).
- In the Adding widgets of corporate container apps to device home screen section you can choose whether the device user is allowed to add widgets of corporate container apps to the device home screen.
- Settings in the General section:
- On the Certificates tab, you can configure the following settings:
- On the Password tab, specify the corporate container password settings:
- Require setting a password for corporate container
- Minimum password length
- Minimum password complexity requirements
- Maximum number of failed password attempts before corporate container is deleted
- Maximum password lifetime (days)
- Number of days to send a notification before a required password change
- Number of recent passwords that cannot be set as a new password
- Period of inactivity before corporate container is locked (sec)
- Period after biometric unlock before password must be entered (min)
- Allow biometric unlock methods
- Allow fingerprint unlock
- Allow face unlock
- Allow iris scanning
- On the Passcode tab, specify the one-time passcode settings. The user will be prompted to enter the one-time passcode to unlock their corporate container if it is locked.
- On the General tab, you can specify the settings for data sharing, contacts, and more.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center. The user's mobile device is divided into a corporate container and a personal space.
Page top
Unlocking the corporate container
The corporate container can be locked if the device does not meet the Compliance Control security requirements.
To unlock the corporate container, the user of the mobile device must enter a one-time corporate container passcode on the locked screen. The passcode is generated by Kaspersky Security Center and is unique for each mobile device. When the corporate container is unlocked, the corporate container password is set to the default value (1234).
As an administrator, you can view the passcode in the policy settings that are applied to the mobile device. The length of the passcode can be changed (4, 8, 12, or 16 digits) in the Corporate container on devices settings of the policy.
To unlock a corporate container using a one-time passcode:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Devices.
- Click the mobile device for which you want to get a one-time passcode.
- Select Applications → Kaspersky Mobile Devices Protection and Management.
The Kaspersky Mobile Devices Protection and Management properties window opens.
- Select the Application settings tab.
The unique passcode for the selected device is shown in the One-time code field of the One-time corporate container passcode section.
- Use any available method (such as email) to communicate the one-time passcode to the user.
The user then must enter the received one-time passcode on their device.
The corporate container of the user's mobile device is unlocked.
After the corporate container on a device is locked, the history of corporate container passwords is cleared. This means that the user can specify a recent password, regardless of the corporate container password settings.
Page top
Adding an LDAP account
These settings apply to supervised devices and devices operating in basic control mode.
To enable an iOS MDM device user to access corporate contacts on the LDAP server, add an LDAP account.
To add an LDAP account of an iOS MDM device user:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Device configuration section.
- On the LDAP card, click Settings.
The LDAP window opens.
- Enable the settings using the LDAP toggle switch.
- Click Add.
The Add LDAP account window opens.
- On the General settings tab. specify the following LDAP settings:
- In the Server section, specify the server settings:
- In the Description field, enter a description of the user's LDAP account. You can either enter a value or select a macro by clicking the
button.
- In the Server address field, enter the name of the LDAP server domain.
- In the Description field, enter a description of the user's LDAP account. You can either enter a value or select a macro by clicking the
- In the Authentication section, specify the user's credentials:
- In the Account name field, enter the account name for authorization on the LDAP server. You can either enter a value or select a macro by clicking the
button.
- In the Password field, enter the password of the LDAP account for authorization on the LDAP server.
- To use the SSL (Secure Sockets Layer) data transport protocol to secure the transmission of messages, select the Use SSL connection check box.
- In the Account name field, enter the account name for authorization on the LDAP server. You can either enter a value or select a macro by clicking the
- If necessary, in the Per App VPN section, configure Per App VPN.
- In the Server section, specify the server settings:
- On the Search settings tab, compile a list of search queries for the iOS MDM device user to access corporate data on the LDAP server:
- Click the Add setting button to add a block of the search query settings.
- In the Name field, enter the name of a search query.
- In the Search scope drop-down list, select the nesting level of the folder for searching corporate data on the LDAP server:
- Root folder of the LDAP server. Search in the base folder of the LDAP server.
- First level subfolders. Search in folders in the first nesting level, counting from the base folder.
- All subfolders. Search in folders in all nesting levels, counting from the base folder.
- In the Search base field, enter the path to the folder on the LDAP server where the search begins (for example: "ou=people", "o=example corp").
- Repeat steps a-d for all search queries that you want to add to the iOS MDM device.
- Click Add.
The new LDAP account appears in the list.
You can modify or delete LDAP accounts in the list using the Edit and Delete buttons at the top of the list.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with the iOS MDM Server.
As a result, once the policy is applied, LDAP accounts from the compiled list is added on the user's mobile device. The user can access corporate contacts in the standard iOS apps: Contacts, Messages, and Mail.
Page top
Adding a contacts account
These settings apply to supervised devices and devices operating in basic control mode.
To let the iOS MDM device user synchronize data with the CardDAV server, add a CardDAV account. Synchronization with the CardDAV server lets the user access the contact details from any device.
To add a CardDAV account of an iOS MDM device user:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Device configuration section.
- On the Contacts card, click Settings.
The Contacts window opens.
- Enable the settings using the Contacts toggle switch.
- Click Add.
The Add CardDAV account window opens.
- In the Server section, in the Description field, enter a description of the user's CardDAV account.
- In the Server address and Server port fields, enter the host name or the IP address of the CardDAV server and the number of the CardDAV server port.
- In the Contact URL field, specify the URL of the CardDAV account of the iOS MDM device user on the CardDAV server (for example:
http://example.com/carddav/users/mycompany/user
).The URL must begin with
http://
orhttps://
. - In the Authentication section, in the Account name field, enter the account name for authorization on the CardDAV server.
- In the Password field, enter the CardDAV account password for authorization on the CardDAV server.
- If you want to use the SSL (Secure Sockets Layer) data transport protocol to secure the transmission of data between the CardDAV server and the mobile device, select the Use SSL connection check box.
- If necessary, in the Per App VPN section, configure Per App VPN.
- Click Add.
The new CardDAV account appears in the list.
You can modify or delete CardDAV accounts in the list using the Edit and Delete buttons at the top of the list.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with the iOS MDM Server.
As a result, once the policy is applied, CardDAV accounts from the compiled list will be added on the user's mobile device.
If you experience problems when adding or updating accounts, check whether the settings you configured are correct.
Page top
Adding a calendar account
To let an iOS MDM device user access their calendar events on a CalDAV server, add a CalDAV account. Synchronization with the CalDAV server lets the user create and receive invitations, receive event updates, and synchronize tasks with the Reminders app.
To add an iOS MDM device user's CalDAV account:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Device configuration section.
- On the Calendar card, click Settings.
The Calendar window opens.
- Enable the settings using the Calendar toggle switch.
- Click Add.
The Add CalDAV account window opens.
- In the Server section, in the Description field, enter a description of the user's CalDAV account.
- In the Server address and Server port fields, enter the host name or the IP address of a CalDAV server and the number of the CalDAV server port.
- In the Calendar URL field, specify the URL of the CalDAV account of the iOS MDM device user on the CalDAV server (for example, http://example.com/caldav/users/mycompany/user).
The URL must begin with
http://
orhttps://
. - In the Authentication section, in the Account name field, enter the account name for authorization on the CalDAV server.
- In the Password field, set the CalDAV account password for authorization on the CalDAV server.
- If you want to use the SSL (Secure Sockets Layer) data transport protocol to secure transmission of event data between the CalDAV server and the mobile device, select the Use SSL connection check box.
- If necessary, in the Per App VPN section, configure Per App VPN.
- Click Add.
The new CalDAV account appears in the list.
You can modify or delete CalDAV accounts in the list using the Edit and Delete buttons at the top of the list.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with the iOS MDM Server.
As a result, once the policy is applied, CalDAV accounts from the compiled list is added on the user's mobile device.
If you experience problems when adding or updating accounts, check whether the settings you configured are correct.
Page top
Configuring a calendar subscription
These settings apply to supervised devices and devices operating in basic control mode.
To let the iOS MDM device user add events of shared calendars (such as a corporate calendar) to the user's calendar, add a subscription to these calendars. Shared calendars are calendars of other users who have a CalDAV account, iCal calendars, and other published calendars.
To add a calendar subscription:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Device configuration section.
- On the Calendar subscriptions card, click Settings.
The Calendar subscriptions window opens.
- Enable the settings using the Calendar subscriptions toggle switch.
- Click Add.
The Add calendar subscription window opens.
- In the Description field, enter a description of the calendar subscription.
- In the Server address field, specify the URL of a third-party calendar.
In this field, you can enter the mail URL of the CalDAV account of a user whose calendar you are subscribing to. You can also specify the URL of an iCal calendar or a different published calendar.
- In the User name field, enter the user account name for authentication on the server of the third-party calendar.
- In the Password field, enter the calendar subscription password for authentication on the server of the third-party calendar.
- If you want to use the SSL (Secure Sockets Layer) data transport protocol to secure the transmission of event data between the CalDAV server and the mobile device, select the Use SSL connection check box.
- If necessary, in the Per App VPN section, configure Per App VPN.
- Click Add.
The new calendar subscription appears in the list.
You can modify or delete calendar subscriptions in the list using the Edit and Delete buttons at the top of the list.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with the iOS MDM Server.
As a result, once the policy is applied, events from the shared calendar in the list will be added to the calendar on the user's mobile device.
Page top
Configuring SSO
These settings apply to supervised devices and devices operating in basic control mode.
The SSO settings let you configure account settings for using Single Sign-On technology. Single Sign-On (SSO) is an authentication method that allows a user to sign in to multiple services with a single ID. The Kerberos protocol is used for user authentication.
To configure the use of SSO on iOS MDM devices:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Device configuration section.
- On the SSO card, click Settings.
The SSO window opens.
- Enable the settings using the SSO toggle switch.
- Specify the following settings:
- In the Account name field, specify the name of the user's Single Sign-On account for Kerberos server authorization. You can either enter a value or select a macro by clicking the
button.
- In the Authentication section, specify the authentication settings:
- In the URL prefixes section, specify the addresses of websites on which Kaspersky Mobile Devices Protection and Management allows using SSO:
- In the Bundle IDs section, specify the IDs of apps in which Kaspersky Mobile Devices Protection and Management allows using SSO:
- In the Account name field, specify the name of the user's Single Sign-On account for Kerberos server authorization. You can either enter a value or select a macro by clicking the
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with the iOS MDM Server.
As a result, once the policy is applied, SSO is configured on the iOS MDM device.
Page top
Managing Web Clips
A Web Clip is an app that opens a website from the home screen of a mobile device. By clicking Web Clip icons on the home screen of the device, the user can quickly open websites (such as the corporate website).
You can add or delete Web Clips on user devices and specify icons displayed on the screen. Web Clips can be added on both Android and iOS MDM devices.
Managing Web Clips on Android devices
To manage Web Clips on a user's Android device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Device configuration section.
- On the Web Clips card, click Settings.
The Web Clips window opens.
- Enable the settings using the Web Clips toggle switch.
- Click Add.
The Add Web Clip window opens.
- In the Web Clip name field, enter the name of the Web Clip to be displayed on the home screen of the Android device.
- In the Website URL field, enter the web address of the website that will open when the user taps the Web Clip icon. The address should begin with
http://
orhttps://
.If the entered website is forbidden or is not on the list of allowed websites in the Web Control settings of the policy, users will not be able to access this website via the Web Clip.
- Click Select to specify the image for the Web Clip icon. The PNG, JPEG, and ICO file formats are supported. If you do not select an image for the Web Clip, a blank square is displayed as the icon.
- Click Add.
The new Web Clip appears in the list.
The maximum number of Web Clips that can be added to an Android device depends on the device type. When this number is reached, Web Clips are no longer added to the Android device.
You can modify or delete Web Clips in the list using the Edit and Delete buttons at the top of the list.
- Click OK.
- Click Save to save the changes you have made.
Once the policy is applied to a device, the Kaspersky Endpoint Security for Android app shows notifications to prompt the user to install the Web Clips you created. After the user installs these Web Clips, the corresponding icons are added on the home screen of the device.
If there is no in-app notifications prompting the user to install Web Clips, make sure the Device has not been synchronized with the Administration Server for a long time check box is selected in the Notifications settings of the KES for Android settings section.
The deleted Web Clips are disabled on the home screen of the Android device. If the user taps the corresponding icon, a notification appears that the Web Clip is no longer available. The user should delete the Web Clip from the home screen by following a vendor-specific procedure.
Managing Web Clips on iOS MDM devices
By default, the following restrictions apply to Web Clips:
- The user cannot manually remove Web Clips from the mobile device.
- The corner rounding, shadow, and gloss visual effects are applied to the Web Clip icon on the screen.
- Websites that open when the user taps a Web Clip icon do not open in full-screen mode.
To manage Web Clips on a user's iOS MDM device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Device configuration section.
- On the Web Clips card, click Settings.
The Web Clips window opens.
- Enable the settings using the Web Clips toggle switch.
- Click Add.
The Add Web Clip window opens.
- In the Web Clip name field, enter the name of the Web Clip to be displayed on the home screen of the iOS MDM device.
- In the Website URL field, enter the web address of the website that will open when the user taps the Web Clip icon. The address should begin with
http://
orhttps://
.If the entered website is forbidden or is not on the list of allowed websites in the Web Control settings of the policy, users will not be able to access this website via the Web Clip.
- Click Select to specify the image for the Web Clip icon.
The image must meet the following requirements:
- Image size no greater than 400 х 400 pixels.
- File format: PNG, JPEG, or ICO.
- File size no larger than 1 MB.
If you do not select an image for the Web Clip, a blank square is displayed as the icon.
If the selected image has a transparent background, the background will be black on the device.
- In the Options section, specify the following additional settings:
- If you want to allow the user to remove the Web Clip from the iOS MDM device, select the Allow removal of Web Clip check box.
- If you want the Web Clip icon to be displayed without special visual effects (rounding of icon corners and gloss effect), select the Precomposed icon check box.
- If you want the website to open in full-screen mode on the iOS MDM device when the user taps the icon, select the Full screen Web Clip check box.
In full-screen mode, the Safari toolbar is hidden and only the website is shown on the device screen.
- Click Add.
The new Web Clip appears in the list.
You can modify or delete Web Clips in the list using the Edit and Delete buttons at the top of the list.
- Click OK.
- Click Save to save the changes you have made.
Once the policy is applied, the Web Clip icons in the list you have created are added on the home screen of the user's mobile device.
The deleted Web Clips are removed from the home screen of the iOS MDM device.
Page top
Setting a wallpaper
You can set an image as the home screen wallpaper and lock screen wallpaper on users' devices that fall under the same policy.
To set a wallpaper on users' Android devices:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Device configuration section.
- On the Custom wallpapers card, click Settings.
The Custom wallpapers window opens.
- Enable the settings using the Custom wallpapers toggle switch.
- In the Home screen wallpaper section, in the How to set wallpaper drop-down list, select the method for specifying the wallpaper:
- Add an image to be used as a wallpaper:
- If you selected the Upload file option, click Select to upload an image. When the upload is finished, an image preview will be displayed.
- If you selected the Download image from the internet option, specify the link to the image in the Link to image field. You can click Open preview to view the image in a new browser tab.
- If you want to use the same image as the lock screen wallpaper, in the Lock screen wallpaper section, select the Use home screen wallpaper for lock screen check box.
- Click OK.
- Click Save to save the changes you have made.
The imported image is set as a wallpaper on users' devices.
Page top
Adding fonts
These settings apply to supervised devices and devices operating in basic control mode.
To add a font on a user's iOS MDM device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the Device configuration section.
- On the Custom fonts card, click Settings.
The Custom fonts window opens.
- Enable the settings using the Custom fonts toggle switch.
- Click Add.
- Select the font file saved on your computer. The file must have the .TTF or .OTF extension.
Fonts with the .TTC or .OTC extension are not supported.
Fonts are identified using the PostScript name. Do not install fonts with the same PostScript name even if their content is different. Installing fonts with the same PostScript name will result in an error.
- Click Open.
The new font appears in the list.
You can delete fonts in the list using the Delete button at the top of the list.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with the iOS MDM Server.
As a result, once the policy is applied, the user will be prompted to install fonts from the list that has been created.
Page top
Working with commands for mobile devices
This section contains information about commands for managing mobile devices supported by Kaspersky Security Center. It provides instructions on how to send commands to mobile devices, as well as how to view the execution statuses of commands in the command history.
Commands for mobile devices
Kaspersky Security Center supports commands for remote mobile device management. For instance, if a mobile device is lost or stolen, you can send commands to locate the device or wipe all corporate data from the device.
You can send commands to the following types of managed mobile devices:
- Android devices managed via the Kaspersky Endpoint Security for Android app
- iOS MDM devices
Each device type supports a dedicated set of commands.
You can cancel commands in the Command history.
Commands may be delivered almost immediately to devices connected to the internet. As a result, they may fail to cancel despite being displayed as canceled.
Commands for Android devices
Command |
Result |
|
---|---|---|
Lock device |
The mobile device is locked. To obtain access to data, you must unlock the device using the Unlock device command or a one-time passcode. |
|
Unlock device |
The mobile device is unlocked. After unlocking a device running Android 5 – 6, the screen unlock password is reset to "1234". After unlocking a device running Android 7 or later, the screen unlock password is not changed. |
|
Reset to factory settings |
All data is deleted from the mobile device and the settings are rolled back to their factory values. After this command is executed, the device will not be able to receive or execute subsequent commands. This command is unavailable for personal devices and devices with a corporate container running Android 14 or later. |
|
Wipe corporate data |
Corporate data is wiped from the device. The list of wiped data depends on the mode the device is operating in:
|
|
Synchronize device |
The mobile device data is synchronized with the Administration Server. The Executed status may be displayed when the command has been successfully sent but not yet received by the device. |
|
Locate device |
The mobile device's location coordinates are obtained. To view the device location on a map, go to the Assets (Devices) → Mobile → Devices section. Then choose a device and select Command history → Locate device → Device coordinates → Open Maps. On devices running Android 12 or later, if the user granted the "Use approximate location" permission, the Kaspersky Endpoint Security for Android app first tries to get the precise device location. If this is not successful, the approximate device location is returned only if it was received within the past 30 minutes. Otherwise, the command fails. This command does not work on Android devices if Google Location Accuracy is disabled in the settings. Please be aware that not all Android devices come with this location setting. |
|
Take photos |
The mobile device is locked. Photos are taken using the front camera of the device when somebody attempts to unlock the device. On devices with a pop-up front camera, the photo will be black if the camera is stowed. When attempting to unlock the device, the user automatically consents to having their photo taken on the device. If the permission to use the camera has been revoked, the mobile device displays a notification and prompts to provide the permission. On a mobile device running Android 12 or later, if the permission to use the camera has been revoked via Quick Settings, the notification is not displayed but the taken photo is black. |
|
Sound alarm |
The mobile device sounds an alarm. The alarm is sounded for 5 minutes (or for 1 minute if the device battery is low). |
|
Wipe app data |
The data of a specified app is wiped from the mobile device. For this action, you need to specify the package name for the app whose data is to be deleted. |
|
Wipe data of all apps |
The data of all apps is wiped from the mobile device. On a corporate device, the data of all apps on the device is wiped. |
|
Send message |
A message with the specified title and text is sent to the user's mobile device. You can send only a push notification or both a push notification and an alert. |
|
Get location history |
The mobile device's location history for the last 14 days is displayed. To view the device location on a map, go to the Assets (Devices) → Mobile → Devices section. Then choose a device and select Command history → Get location history → View on map. Due to technical limitations on Android devices, the device location may be retrieved less often than specified in the Location tracking settings. |
Commands for iOS MDM devices
Command |
Result |
---|---|
Lock device |
The mobile device is locked. To access data, you must unlock the device. |
Reset unlock password |
The mobile device's screen unlock password is reset, and the user is prompted to set a new password in accordance with policy requirements. |
Reset to factory settings |
All data is deleted from the mobile device and the settings are rolled back to their factory values. After this command is executed, the device will not be able to receive or execute subsequent commands. |
Wipe corporate data |
All installed configuration profiles, the device management profile, and apps for which the Remove when device management profile is deleted check box has been selected are removed from the device. |
Synchronize device |
The mobile device data is synchronized with the Administration Server. |
Install configuration profile |
A configuration profile is installed on the mobile device. You cannot install a configuration profile with settings for a supervised device on a device in basic control mode. |
Delete configuration profile |
The configuration profile is deleted from the mobile device. The profile may be displayed in the list of configuration profiles installed on the device for several minutes after it has been deleted. |
Install app |
The specified app is installed on the mobile device. |
Update app |
The specified app is updated on the mobile device. |
Delete app |
The specified app is removed from the mobile device. |
OS update (supervised only) |
Operating system updates are scheduled on the mobile device according to the specified update settings. This command may fail to be executed when a device does not have enough storage space or the specified OS version is not available for the selected device. We recommend specifying the latest available OS version. |
Change roaming settings |
Data roaming and voice roaming are enabled or disabled. |
Set Bluetooth state (supervised only) |
Bluetooth is enabled or disabled on the mobile device. This command is supported only for supervised devices running iOS 11.3 or later. |
Enable Lost Mode (supervised only) |
Lost Mode is enabled on the supervised mobile device, and the device is locked. The device screen shows a message and phone number that you can edit. If you send the Enable Lost Mode command to a supervised iOS MDM device without a SIM card and this device is restarted, the device won't be able to connect to Wi-Fi and receive the Disable Lost Mode command. This is a specific feature of iOS devices. To avoid this issue, you can either send the command only to devices with a SIM card, or insert a SIM card into the locked device to allow it to receive the Disable Lost Mode command over the mobile network. |
Locate device (Lost Mode only) |
The location of the mobile device is obtained. |
Sound alarm (Lost Mode only) |
A sound is played on the lost mobile device. |
Disable Lost Mode (supervised only) |
Lost Mode is disabled on the mobile device, and the device is unlocked. |
Permissions for executing commands
Special rights and permissions are required for executing Kaspersky Endpoint Security for Android commands. When the Initial Configuration Wizard is running, Kaspersky Endpoint Security for Android prompts the user to grant the application all required rights and permissions. The user can skip these steps or later disable these permissions in the device settings. If this is the case, it will be impossible to execute commands.
On devices running Android 10 or later, the user must grant the "All the time" permission to access the location. On devices running Android 11 or later, the user must also grant the "While using the app" permission to access the camera. Otherwise, Anti-Theft commands will not function. The user will be notified of this limitation and will again be prompted to grant the required level of permissions. If the user selects the "Only this time" option for the camera permission, access is considered granted by the app. We recommend contacting the user directly if the Camera permission is requested again.
Page top
Sending commands
To send a command to the user's mobile device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Devices.
- In the list of devices that opens, select a device that you want to send a command to.
You can select multiple devices.
- Click Send command.
- In the Send command window that opens, in the Command field, select a command.
- Configure the command that you want to send.
- Click Send.
You can view and cancel commands in the Command history.
The command is sent to the devices you selected.
Page top
Viewing the statuses of commands in the command history
The application saves information about all commands that have been sent to mobile devices to the command history. The command history contains information about the time and date that each command was sent to the mobile device, their statuses, and descriptions of the results. For example, when a command fails, the history displays the cause of the error.
Commands sent to mobile devices can have the following statuses:
- Sent
The command has been sent to the mobile device.
- Executed
Execution of the command has succeeded.
- Error
Execution of the command failed.
- Canceling
The command is being removed from the queue of commands sent to the mobile device.
- Canceled
The command has been successfully removed from the queue of commands sent to the mobile device.
The application maintains a command history for each mobile device.
To view the command history:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Mobile → Devices.
- In the list of mobile devices, select the one for which you want to view the command history.
- Click Command history.
The Command history window opens. The sections of the Command history window correspond to the commands that can be sent to the mobile device.
- Select sections containing the necessary commands and view information about how the commands are sent and executed.
Managing the app by using third-party EMM systems (Android only)
You can use the Kaspersky Endpoint Security for Android app without Kaspersky Administration Systems. Use solutions of other EMM (Enterprise Mobility Management) service providers to deploy and manage the Kaspersky Endpoint Security for Android app. Kaspersky participates in the AppConfig Community to ensure that the app operates with third-party EMM solutions.
You can manage the Kaspersky Endpoint Security for Android app through third-party EMM solutions only on devices running Android.
If you want to use a third-party EMM solution only to deploy the Kaspersky Endpoint Security for Android app, then you can manage devices in the Web Console after deployment.
You cannot use the Web Console and a third-party EMM solution simultaneously to manage devices.
If you deployed the Kaspersky Endpoint Security for Android app using the third-party EMM system, it is impossible to manage the app in Kaspersky Endpoint Security Cloud. You can manage the Kaspersky Endpoint Security for Android app in the EMM Console.
The following EMM solutions support the use of the Kaspersky Endpoint Security for Android app:
- VMware AirWatch
- MobileIron
- IBM Maas360
- Microsoft Intune
- SOTI MobiControl
You can perform the following actions in the EMM Console:
- Deploy the app to an Android work profile on users' devices.
- Activate the app.
- Configure app settings:
- Enable protection against malicious and phishing websites on the internet.
- Configure settings for connecting the device to Kaspersky Security Center.
- Configure Anti-Malware settings.
- Configure the schedule for running a malware scan on the device.
- Enable detection of adware and apps that could be exploited by criminals to harm the user's device or personal data.
- Configure the schedule for app database updates.
Getting Started
Kaspersky Endpoint Security for Android is currently not available in Google Play.
To deploy the app on users' mobile devices, you must add Kaspersky Endpoint Security for Android to the EMM app store. For more details about working with apps in the EMM Console, visit the technical support website of the EMM service provider.
The Kaspersky Endpoint Security for Android app is deployed in an Android work profile. The app is isolated from the user's personal data and protects only corporate data in the work profile. It is recommended to ensure that Kaspersky Endpoint Security for Android is protected from removal by EMM Console tools.
Page top
How to install the app
If you want to manage devices in a third-party EMM console, you can distribute the app using the APK file from the Kaspersky website.
The following permissions are required for the app to work:
- Storage permission for accessing files when Anti-Malware is running (only for Android 6 or later).
- Phone permission for identifying the device, for example, when activating the app.
- Request to add Kaspersky Endpoint Security for Android to the list of apps that are started at operating system startup (on certain devices, such as HUAWEI, Meizu, and Xiaomi). If the add request is not displayed, manually add Kaspersky Endpoint Security for Android to the list of startup apps. The request may not be displayed if the Security app is not installed in the work profile.
You can grant the required permissions in the EMM Console before deploying the Kaspersky Endpoint Security for Android app. For more details about granting the permissions in the EMM Console, visit the technical support website of the EMM service provider. You can also grant the permissions while completing the Initial Configuration Wizard of Kaspersky Endpoint Security for Android on device.
The Kaspersky Endpoint Security for Android app will be installed in the Android work profile.
For operation of Web Protection, you must also configure a proxy server in Google Chrome settings using the AppConfig file of a third-party EMM system:
- Proxy server configuration mode: manual.
- Proxy server address and port: 127.0.0.1:3128.
- SPDY protocol support: disabled.
- Data compression through proxy server: disabled.
Protecting devices on the internet
To protect the personal data of a mobile device user on the internet, enable Web Protection. Web Protection blocks malicious websites that distribute malicious code, and phishing websites designed to steal your confidential data and gain access to your financial accounts. Web Protection scans websites before you open them using the Kaspersky Security Network cloud service.
For the Web Protection component to work, the following conditions must be met:
- The proxy server is configured in the browser settings:
ProxyMode = "fixed_servers"
ProxyServer = "127.0.0.1:3128"
DisableSpdy = true
DataCompressionProxyEnabled = false
Proxy server configuration may vary depending on the Google Chrome version. For more details about configuring Google Chrome, visit the Chromium project website.
After the Kaspersky Endpoint Security for Android app is removed from the mobile device, reset the proxy server settings.
- Device users accept the Privacy Policy and the Web Protection Statement in the Initial Configuration Wizard or app settings.
Administrator can accept the Web Protection Statement in the Kaspersky Security Center Web Console.
- Web Protection is enabled in the app settings:
EnableWebFilter = True
,EnableWebFilterLock = True
. - Use of KSN is enabled in the app settings:
UseKsnMode = Recommended
orUseKsnMode = Extended
.
To configure Google Chrome proxy server via the VMware Workspace ONE Console:
- In the console, select Apps & Books → Application → Native.
App catalog opens.
- Select the Public section.
- Select the Google Chrome app.
App properties window opens.
- Select the Assignment section.
- In the window that opens, click the Assign button.
The list of devices that the app is assigned opens.
- Click the Edit button.
- In the window that opens, click Configure.
The app configuration opens. You can read about each of the app parameters using tool tip.
- Specify the necessary settings:
- Proxy Mode – Use fixed proxy server.
- Proxy Server URL – 127.0.0.1:3128.
- SPDY protocol support – disabled.
- Data compression through proxy server – disabled.
- Save changes.
To enable Web Protection in Google Chrome via the VMware Workspace ONE Console:
- In the console, select Apps & Books → Application → Native.
App catalog opens.
- Select the Public section.
- Select the Kaspersky Endpoint Security app.
App properties window opens.
- Select the Assignment section.
- In the window that opens, click the Assign button.
The list of devices that the app is assigned opens.
- Click the Edit button.
- In the window that opens, click Configure.
The app configuration opens. You can read about each of the app parameters using tool tip.
- Specify the necessary settings:
- Web Protection – Enable.
- Forbid configuration of Web Protection settings – Enable. The user cannot access Web Protection settings within the app settings.
- Kaspersky Security Network mode – Recommended or Extended.
Recommended – The app exchanges data with Kaspersky Security Network (KSN). Kaspersky Endpoint Security for Android uses KSN for real-time protection of the device against threats (Cloud Protection) and the operation of Web Protection on the internet.
Extended – The app exchanges data with Kaspersky Security Network and also sends the Virus Laboratory certain performance statistics from Kaspersky Endpoint Security for Android. This information makes it possible to keep track of threats in real time. No personal data is collected, processed, or stored by KSN services.
- Save changes.
If users' devices are connected to the Kaspersky Security Center, enable Web Protection in the group policy. Also, you can accept the Web Protection Statement in the Kaspersky Security Center Web Console.
After enabling Web Protection in the Kaspersky Endpoint Security for Android app and configuring Google Chrome, check protection against web threats. To check protection, you can use EICAR test.
Page top
How to activate the app
Information about the license is transmitted to the mobile device together with the other settings in the configuration file.
If the app is not activated within 30 days after its installation on the mobile device, the trial license expires. When the trial license expires, all features of the Kaspersky Endpoint Security for Android mobile app are disabled.
When the commercial license expires, the mobile app continues running with limited functionality (for example, Kaspersky Endpoint Security for Android database updates are not available). To continue using the app in fully functional mode, you must renew your commercial license.
To activate Kaspersky Endpoint Security for Android:
- In the EMM Console, open the settings of the Kaspersky Endpoint Security for Android app.
- In the
LicenseActivationCode
field, enter the app activation code.To activate the app on a device, you must have access to Kaspersky activation servers.
How to connect a device to Kaspersky Security Center
After Kaspersky Endpoint Security for Android is installed on a mobile device, you can connect the device to Kaspersky Security Center. The data necessary for connecting the device to Kaspersky Security Center is transmitted to the mobile device together with the other settings listed in the configuration file. After connecting the device to Kaspersky Security Center, you can use group policies to centrally configure the app settings. You can also receive reports and statistics on the performance of Kaspersky Endpoint Security for Android.
Prior to connecting devices to Kaspersky Security Center, make sure that the following conditions are fulfilled:
- The Kaspersky Endpoint Security for Android Administration Plug-in is installed on the administrator's workstation.
- The port for connecting mobile devices is opened in the Administration Server properties.
- The display of the Mobile Device Management folder is enabled in the Administration Console.
- A mobile certificate for identifying the mobile device user has been created in the Kaspersky Security Center certificate storage.
Prior to connecting devices to Kaspersky Security Center, it is recommended to do the following:
- If you want to create tasks and policies for mobile devices, create a separate administration group for mobile devices.
- If you want to automatically move mobile devices to a separate administration group, create a rule for automatically moving devices from the Unassigned devices folder.
- If you want to centrally configure Kaspersky Endpoint Security for Android, create a group policy.
To connect a device to Kaspersky Security Center:
- In the EMM Console, open the settings of the Kaspersky Endpoint Security for Android app.
- In the
KscServer
field, enter the DNS name or IP address of the Kaspersky Security Center Administration Server. The default port is 13292. - If you do not want the user to be distracted by Kaspersky Endpoint Security for Android notifications, disable app notifications. To do so, set the
DisableNotification = True
setting.After connecting, the app shows all notifications. You can disable certain app notifications in the policy settings.
Do not disable app notifications if you do not use Kaspersky Security Center. This could cause a user to not receive notifications about the license expiring. As a result, the app will stop performing its functions.
After the connection settings are configured, Kaspersky Endpoint Security for Android displays a notification prompting you to grant the following additional rights and permissions:
- Permission to use the Camera for Anti-Theft operation (Mugshot command).
- Permission to use Location for Anti-Theft operation (Locate device command).
- Device administrator rights (Android work profile owner) for operation of the following app functions:
- Install security certificate.
- Configure Wi-Fi.
- Configure Exchange ActiveSync.
- Restrict use of the camera, Bluetooth, and Wi-Fi.
Due to the specific characteristics of an Android work profile (absence of the Accessibility service), the App Control and Anti-Theft features are unavailable in the app.
When the user grants the necessary rights and permissions, the device will be connected to Kaspersky Security Center. If a rule for automatically moving devices to an administration group has not been created, the device will be automatically added to the Unassigned devices folder. If a rule for automatically moving devices to an administration group has been created, the device will be automatically added to the defined group.
Kaspersky Endpoint Security provides the following devices name format:
- Device model [email, device ID]
- Device model [email (if any) or device ID]
A device ID is a unique ID that Kaspersky Endpoint Security for Android generates from the data received from a device as follows:
- On personal devices running Android 9 and earlier, the app uses the IMEI. For later versions of Android, the app uses SSAID (Android ID) or checksum of other data received from the device.
- In device owner mode, the app uses IMEI on all Android versions.
- When a work profile is created on devices running Android 11 or earlier, the app uses IMEI. On other Android versions, the app uses the SSAID (Android ID) or checksum of other data received from the device.
You can configure device name format in the group policy.
In SOTI MobiControl, you can use the %DEVICENAME% macro in the KscDeviceName
field. This macro allows you automatically get the device name from the SOTI MobiControl console to Kaspersky Security Center.
You can also add a tag to the device name. This makes it easier to find and sort devices in Kaspersky Security Center. The tag is available only for VMware AirWatch.
To add the tag to the device name:
- In the EMM Console, open the settings of the Kaspersky Endpoint Security for Android app.
- In the
KscDeviceNameTag
field, select the values:{DeviceSerialNumber}
– Serial number of the device.{DeviceUid}
– Unique device identifier (UDID).{DeviceAssetNumber}
– Device asset number. This number is created internally from within your organization.
We recommend using only these values. VMware AirWatch supports other values, but Kaspersky Endpoint Security cannot guarantee work these values.
You can add some values (for example, {DeviceSerialNumber} {DeviceUid}
). The tag will be added to the device name in Kaspersky Security Center. A space separates the tag and the device name. For example, if the device name is Google Pixel 2 a10c6b75f7b31de9 22:7D:78:9E:C5:1E
, then 22:7D:78:9E:C5:1E
is UDID tag. If you use Kaspersky Security Center and VMwareAirWatch, the tag allows you to identify devices in both consoles. To match the device, select the same values for the device name (for example, the serial number of the device).
After the device is connected to Kaspersky Security Center, the app settings will be changed according to the group policy. Kaspersky Endpoint Security for Android ignores the app settings from the configuration file that was configured in the EMM Console. You can configure all sections of the policy except the following sections:
- Anti-Theft (Device lock)
- Device management (Screen lock)
- App Control (Block forbidden apps)
- Android work profile
- Manage Samsung Knox
Due to the method used to deploy a work profile, you cannot apply group policy settings from the Android work profile section. These settings can be applied only if the work profile was created using Kaspersky Security Center.
Page top
Silent mode of the app
An Android device user can disable all notifications from Kaspersky Endpoint Security for Android in the settings on the notification bar. If notifications are disabled, the user does not monitor the operation of the app and can ignore important information (for example, information about threats in real time). In this case, to find out the app operating status, the user must open Kaspersky Endpoint Security for Android.
If you do not want the mobile device user to be distracted by Kaspersky Endpoint Security for Android notifications, you can disable certain notifications.
The Kaspersky Endpoint Security uses the following tools to display the device protection status:
- Protection status notification. This notification is pinned to the notification bar. Protection status notification cannot be removed. The notification displays the device protection status (for example,
) and number of issues, if any. You can tap the device protection status and see the list issues in the app.
- App notifications. These notifications inform the device user about the application (for example, threat detection).
- Pop-up messages. Pop-up messages require action from the device user (for example, action to take when a threat is detected).
The silent mode settings are transmitted to the mobile device together with the other settings in the configuration file. Set True
value for the DisableNotification
parameter.
To enable silent mode of the app via the VMware Workspace ONE Console:
- In the console, select Apps & Books → Application → Native.
App catalog opens.
- Select the Public section.
- Select the Kaspersky Endpoint Security app.
App properties window opens.
- Select the Assignment section.
- In the window that opens, click the Assign button.
The list of devices that the app is assigned opens.
- Click the Edit button.
- In the window that opens, click Configure.
The app configuration opens. You can read about each of the app parameters using tool tip.
- In the Disable app notifications before connecting to Kaspersky Security Center.
If you use Kaspersky Security Center, enable silent mode in the group policy too.
- Save changes.
As a result, the app will only show the Protection status notification. Other notifications and pop-ups will be disabled.
Page top
AppConfig File
A configuration file is generated to configure the app in an EMM Console. The app settings in the configuration file are presented in the table below.
Configuration file settings
Configuration key |
Description |
Type |
Value |
Default value |
---|---|---|---|---|
|
App activation code |
String |
App activation code consisting of 20 Latin letters and numerals. To activate the app by using the activation code, you need internet access to connect to Kaspersky activation servers. If you leave the field blank, the app will be activated with a trial license. The trial license is valid for 30 days. When the trial license expires, all features of the Kaspersky Endpoint Security for Android mobile app are disabled. To continue using the app, you must purchase a commercial license. |
|
|
<License Agreement link> |
Choice |
This setting is available only for VMware AirWatch.
To accept the terms and conditions of the EULA for all mobile devices, you need internet access to connect to Kaspersky servers. If you chose |
|
|
License Agreement code |
String |
These settings are available only for VMware AirWatch. Use License Agreement code is contained in the End User License Agreement. To learn License Agreement code:
To accept the terms and conditions of the EULAs for all mobile devices, you need internet access to connect to Kaspersky servers. If you leave the fields blank, the app will ask the user to accept the terms and conditions of the EULAs. Mobile device user can accept the conditions in the Initial Configuration Wizard. If you specify the values of both fields, the terms and conditions of all EULAs specified in them will be accepted. |
|
|
License Agreement codes |
String |
|
|
|
Kaspersky Security Center Administration Server address and port |
String |
DNS name or IP address of the Kaspersky Security Center Administration Server and port number. Enter the address as follows: |
|
|
Disable app notifications before connecting to Kaspersky Security Center |
Boolean |
Do not disable app notifications if you do not use Kaspersky Security Center. This could cause a user to miss receiving notifications about a license expiration. In this case, the app would stop performing its functions.
|
|
|
Scan run mode |
Choice |
Irrespective of which value is set, the device user can manually start a malware scan. |
|
|
Day of scan |
Choice |
You can select only one value for this setting. |
|
|
Time of scan |
String |
The time can be indicated in 24-hour format (for example, 13:00) or 12-hour format (for example, 10:30 PM). |
|
|
Block configuration of the scan run mode |
Boolean |
|
|
|
Types of files to scan (malware scan) |
Choice |
In Kaspersky Endpoint Security for Android Service Pack 4 Maintenance Release 1, you cannot enable scanning of executable files only. |
|
|
Scan archives with unpacking |
Boolean |
The app scans only archives with the .zip (.apk) extension. |
|
|
Action on threat detection (malware scan) |
Choice |
Information about detected threats and the actions taken on them is logged in app reports. |
|
|
Block configuration of scan settings |
Boolean |
|
|
|
Block adware, autodialers, and apps that can be used by criminals to cause harm to the user's device and data |
Boolean |
|
|
|
Real-time protection mode |
Choice |
|
|
|
Kaspersky Security Network mode |
Choice |
|
|
|
Types of files to scan (Real-time Protection) |
Boolean |
In Kaspersky Endpoint Security for Android Service Pack 4 Maintenance Release 1, you cannot enable scanning of executable files only. |
|
|
Action on threat detection (Real-time Protection) |
Choice |
Information about detected threats and the actions taken on them is logged in app reports. |
|
|
Block configuration of real-time protection settings |
Boolean |
|
|
|
Databases update run mode |
Choice |
Irrespective of which value is set, the device user can manually start an update of anti-malware databases. |
|
|
Day to start a database update |
Choice |
You can select only one value for this setting. |
|
|
Database update start time |
String |
The time can be indicated in 24-hour format (for example, 13:00) or 12-hour format (for example, 10:30 PM). |
|
|
Block configuration of the database update run mode |
Boolean |
|
|
|
Update databases in roaming |
Boolean |
|
|
|
Web Protection |
Boolean |
Malicious and phishing websites using the HTTPS protocol are allowed to remain unblocked if the domain is trusted. If the domain is untrusted, Web Protection blocks malicious and phishing websites.
For the Web Protection component to work, the following conditions must be met:
|
|
|
Block configuration of Web Protection |
Boolean |
|
|
|
Database update source server address |
String |
Address of the server hosting the database updates, for example, If you leave the field blank, Kaspersky Endpoint Security for Android uses the Kaspersky database update servers. |
|
|
Submit data to the Google Analytics for Firebase, Firebase Performance Monitoring, and Crashlytics services |
Boolean |
|
|
|
Device Name Tag for Kaspersky Security Center |
String |
This setting is available only for VMware AirWatch. The tag will be added to the device name in Kaspersky Security Center. A space separates the tag and the device name. This makes it easier to find and sort devices in Kaspersky Security Center.
You can add some values (for example, We recommend using only these values. VMware AirWatch supports other values, but Kaspersky Endpoint Security cannot guarantee that these values work. |
|
|
Device group name |
String |
You can specify device groups in an EMM console. When a device is connected to Kaspersky Security Center, it will be automatically added to a subfolder of the of Unassigned devices folder. The name of the subfolder will match the group name specified in this parameter. You can then create rules for automatically moving devices from subfolders of the Unassigned devices folder to administration groups in the Managed devices folder. If you leave the field blank, the device will be automatically added to the root of the Unassigned devices folder. |
|
|
User's corporate email |
String |
You can specify users' corporate email addresses in an EMM console. These emails will be displayed in Kaspersky Security Center. The string must be a valid email address. Other values are ignored. |
|
|
Device name in Kaspersky Security Center |
String |
This setting is available only for SOTI MobiControl. You can specify the device name displayed in Kaspersky Security Center. You can type any name or use the %DEVICENAME% macro to automatically get the device name from the SOTI MobiControl console. If you leave the field blank, the device name will be generated according to the format specified in the Kaspersky Security Center group policy. |
|
Participating in Kaspersky Security Network
To protect mobile devices more effectively, Kaspersky Endpoint Security for Android and Kaspersky Security for iOS use data acquired from users around the globe. Kaspersky Security Network is designed to process this data.
Kaspersky Security Network (KSN) is an infrastructure of cloud services providing access to the Kaspersky knowledge base with information about the reputation of files, web resources, and software. The use of data from Kaspersky Security Network ensures faster responses by Kaspersky applications to threats, improves the performance of some protection components, and reduces the likelihood of false alarms.
Your participation in Kaspersky Security Network helps Kaspersky to acquire real-time information about the types and sources of new threats, develop methods for neutralizing them, and reduce the number of false alarms raised by Kaspersky Endpoint Security for Android and Kaspersky Security for iOS. Participation in Kaspersky Security Network also lets you access reputation statistics for applications and websites.
When you participate in Kaspersky Security Network, some statistics are acquired while Kaspersky Endpoint Security for Android and Kaspersky Security for iOS are running and are automatically sent to Kaspersky. This information makes it possible to keep track of threats in real time. Files or parts of files that may be exploited by intruders to harm the computer or user's content can be also sent to Kaspersky for additional examination.
Use of Kaspersky Security Network is required for the operation of Kaspersky Endpoint Security for Android and Kaspersky Security for iOS.
The following app components use the Kaspersky Security Network cloud service:
- The Anti-Malware, Web Protection, Web Control, and App Control components in the Kaspersky Endpoint Security for Android app.
- The Web Protection component in the Kaspersky Security for iOS app.
Refusal to participate in KSN reduces the level of device protection, which may lead to infection of the device and loss of data. To start using Kaspersky Security Network, you must accept the terms of the End User License Agreement when installing the app. The End User License Agreement outlines which data is transmitted to Kaspersky Security Network by Kaspersky Endpoint Security for Android and Kaspersky Security for iOS.
To improve the performance of the app, you can additionally provide statistical data to Kaspersky Security Network. Providing the above information to the KSN is voluntary. To start using Kaspersky Security Network, you have to accept the terms of a special agreement – the Kaspersky Security Network Statement. You can opt out of participating in Kaspersky Security Network at any time. The Kaspersky Security Network Statement describes the types of data that Kaspersky Endpoint Security for Android and Kaspersky Security for iOS transmit to Kaspersky Security Network. You can use Kaspersky Security Network services if the license term for the integrated solution has not expired and the key has not been denylisted.
Updates functionality (including providing anti-malware signature updates and codebase updates), as well as KSN functionality may not be available in the software in the U.S.
Information exchange with Kaspersky Security Network
Information exchange in Kaspersky Endpoint Security for Android
To improve real-time protection, Kaspersky Endpoint Security for Android uses the Kaspersky Security Network cloud service for the following components:
- Anti-malware. The app obtains access to the Kaspersky knowledge base regarding the reputation of files and apps. The app scans for threats whose information has not yet been added to anti-malware databases but is already available in KSN. Kaspersky Security Network cloud service facilitates the full Anti-Malware functionality and reduces the likelihood of false alarms.
- Web Protection and Web Control. The app uses data received from KSN to scan websites before they are opened. The app also determines the website category to control internet users' access based on lists of allowed and blocked categories (for example, the "Internet communication" category).
- App Control. The app determines the app category to restrict the startup of apps that do not meet corporate security requirements based on lists of allowed and blocked categories (for example, the "Games" category).
Information on the types of data submitted to Kaspersky when using KSN during operation of Anti-Malware and App Control is available in the End User License Agreement. By accepting the terms and conditions of the License Agreement, you agree to transfer this information.
Information on the types of data submitted to Kaspersky when using KSN during operation of Web Protection and Web Control is available in the Statement regarding data processing for Web Protection. By accepting the terms and conditions of the Statement, you agree to transfer this information.
For more information about the provision of data to KSN, refer to the Data provision in Kaspersky Endpoint Security for Android section.
Providing data to KSN is voluntary. If you want, you can disable data exchange with KSN.
Information exchange in Kaspersky Security for iOS
To improve real-time protection, Kaspersky Security for iOS uses the Kaspersky Security Network cloud service for the following components:
- Web Protection. The app uses data received from KSN to scan websites before they are opened.
Information on the types of data submitted to Kaspersky when using KSN during operation of Web Protection is available in the End User License Agreement. By accepting the terms and conditions of the License Agreement, you agree to transfer this information.
For more information about the provision of data to KSN, refer to the Data provision in Kaspersky Security for iOS section.
Providing data to KSN is voluntary. If you want, you can disable data exchange with KSN.
Sending statistics to KSN from Android and iOS apps
For the purposes of identifying emerging information security threats, intrusion threats, and threats that are hard to detect (along with their respective sources), and to improve the protection of information stored and processed on a device, you can extend your participation in Kaspersky Security Network.
To exchange data with KSN for the purposes of improving the performance of the app, the following conditions must be fulfilled:
- You or the device user must read and accept the terms of the Kaspersky Security Network Statement. If you choose for the Statement to be accepted by users, they will be prompted by a notification on the main app screen to accept the terms of the Statement. Users can also accept the Statements in the About the app section in the Kaspersky Endpoint Security for Android or Kaspersky Security for iOS settings.
- You must configure the group policy settings to allow statistics to be sent to KSN.
You can opt out of sending statistical data to Kaspersky Security Network at any time. Information on the types of statistical data submitted to Kaspersky when using KSN during the operation of mobile apps is available in the Kaspersky Security Network Statement.
Providing data to KSN is voluntary. If you want, you can disable data exchange with KSN.
Page top
Enabling and disabling the use of Kaspersky Security Network
For the operation of Kaspersky Endpoint Security for Android and Kaspersky Security for iOS components that use Kaspersky Security Network, the app sends requests to cloud services. Requests contain the data described in the Data provision in Kaspersky Endpoint Security for Android and Data provision in Kaspersky Security for iOS sections respectively.
If the use of Kaspersky Security Network is disabled on the device, the Anti-Malware, Web Protection, Web Control, and App Control features are disabled automatically.
To enable or disable the use of Kaspersky Security Network for Android devices:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the KES for Android settings section.
- Enable the toggle switch on the Kaspersky Security Network card for the following components: Anti-Malware, Web Protection, Web Control, and App Control.
- On the Sending additional data card, click Settings.
- In the Sending data to Kaspersky Security Network section, select the Allow sending statistics to Kaspersky Security Network check box to submit data to Kaspersky.
This data will help the Kaspersky Endpoint Security for Android app more quickly respond to threats, improve the performance of protection components, and decrease the likelihood of false alarms.
- In the Sending data for marketing purposes section, select the Allow data processing to help improve the quality, appearance, and performance of the app check box to improve the quality, appearance, and performance of the Rightholder's Software, products, services, and infrastructure by analyzing users' experience, features they use, and device status and settings.
- Select who must accept the Statements:
- If you select Statements are accepted by administrator, you will be prompted to accept the Statements in the window that opens.
- If you select Statements are accepted by users, the device user will be prompted to accept the Statements.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
To enable or disable the use of Kaspersky Security Network for iOS devices:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select iOS and go to the KS for iOS settings section.
- Enable the toggle switch on the Kaspersky Security Network card for the Web Protection component.
- On the Sending additional data card, click Settings.
- In the Sending data to Kaspersky Security Network section, select the Allow sending statistics to Kaspersky Security Network check box to submit data to Kaspersky.
This data will help the Kaspersky Security for iOS app more quickly respond to threats, improve the performance of protection components, and decrease the likelihood of false alarms.
- Select who must accept the Statements:
- If you select Statements are accepted by administrator, you will be prompted to accept the Statements in the window that opens.
- If you select Statements are accepted by users, the device user will be prompted to accept the Statements.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Page top
Using Kaspersky Private Security Network
Kaspersky Private Security Network (hereinafter also referred to as KPSN) is a solution that grants access to the reputation databases of Kaspersky Security Network (KSN), without sending data from users' devices to Kaspersky Security Network.
A database of the reputations of objects (files or URLs) is stored on the Kaspersky Private Security Network server, but not on Kaspersky Security Network servers. KPSN reputation databases are stored within the corporate network and are managed by the company administrator.
When KPSN is enabled, Kaspersky Endpoint Security for Android does not send any statistical data from users' devices to KSN.
KPSN is applicable only for Android devices managed by Kaspersky Endpoint Security for Android. Kaspersky Security for iOS continues to send statistical data from users' devices to KSN.
To enable use of KPSN via Kaspersky Security Center:
- In the main window of Kaspersky Security Center Web Console, click the settings icon (
) next to the name of the Administration Server.
The Administration Server properties window opens.
- On the General tab, select the KSN Proxy settings section.
- Switch the toggle button to the Use Kaspersky Private Security Network Enabled position.
- Click the Select file with KSN Proxy settings button, and then browse for the configuration file that with PKCS7 or PEM extension (provided by Kaspersky).
- Click Open.
- If you have the proxy server settings configured in the Administration Server properties, but your network architecture requires that you use KPSN directly, enable the Ignore proxy server settings when connecting to KPSN option. Otherwise, requests from the managed applications cannot reach KPSN.
- Click Save to save the changes you have made.
After the settings are downloaded, the interface displays the provider's name and contacts, as well as the creation date of the file with the settings of KPSN. KPSN settings are applied to mobile devices.
When you switch to KPSN, App Control does not support the app categories available when using KSN. App categorization will be available if you choose to switch back to KSN.
Page top
Samsung Knox
Samsung Knox is a mobile solution for configuring and deploying Samsung mobile devices running the Android operating system. For more details about Samsung Knox, please visit the Samsung technical support website.
Installation of Kaspersky Endpoint Security for Android via Knox Mobile Enrollment
Knox Mobile Enrollment (KME) is part of the Samsung Knox mobile solution. It is used for batch installation and initial configuration of apps on new Samsung devices.
Installation of Kaspersky Endpoint Security for Android via Knox Mobile Enrollment consists of the following steps:
- Creating a Knox profile with the Kaspersky Endpoint Security for Android app
- Adding devices in Knox Mobile Enrollment
- Installing the Kaspersky Endpoint Security for Android app on the user's mobile devices
For more details about working with Knox Mobile Enrollment, please refer to the Knox Mobile Enrollment User Guide.
Deployment via Knox Mobile Enrollment is possible only for supported Samsung devices.
Creating a Knox profile
A Knox profile is a profile that contains links to apps for their quick deployment and initial configuration on mobile devices.
To create a Knox profile:
- Sign in to the Samsung Knox console → Knox Mobile Enrollment.
- Select the Profiles section.
- Click Actions > Create profile.
The Create New Profile wizard starts.
- Select Android Enterprise as the profile type.
- In the Android enterprise profile details window that opens, specify the following settings:
- In the Basic information section, enter general information about the Knox profile: Profile name and Description.
- In the EMM information section, in the Pick your EMM field, select Other.
- In the EMM agent APK field, enter the path to the APK installation file.
The installation file for Kaspersky Endpoint Security for Android is included in the Kaspersky Secure Mobility Management distribution kit. First, download the APK installation file. Then place the APK installation file on the Kaspersky Security Center Web Server or on another server that is accessible for downloading from the device.
- Click Continue.
- In the Android enterprise profile settings window that opens, specify the following settings:
- In the EMM configuration section, enter the settings for connecting the device to Kaspersky Security Center in the Custom JSON data (as defined by EMM) field in the following format:
{"serverAddress":"myServer.domain.com","serverPort":"12345","vsrv":"virtualServerID","groupName":"MOBILE GROUP","eulas":"cmFuZG9tYmFzZTY0c3RyaW5n"}
.The following fields of the JSON file are now supported:
serverAddress
- the address of the Kaspersky Security Center.serverPort
- the number of the port for mobile device synchronization to the Administration Server via the specified address.vsrv
(optional) - the Virtual Administration Server.groupName
(optional) - the name of the subgroup in the Unassigned group.eulas
(optional) - the list of the accepted EULAs (an array of binary identifiers, 16 bytes long).
The
connectionString
parameter is no longer supported for KME (Knox Mobile Enrollment).- To install Kaspersky Endpoint Security for Android via Knox Mobile Enrollment, the mobile device user must accept the terms of the Samsung License Agreement. You can view the terms of the Samsung License Agreement in the Privacy Policy, EULAs and Terms of Service section. You can also add other legal documents of your company that are necessary for deploying a Knox profile by clicking the Add legal agreement button.
- Click the Save button.
As a result, the new Knox profile with the Kaspersky Endpoint Security for Android app will be added to the list in the KME console.
Page top
Adding devices in Knox Mobile Enrollment
Devices can be added in the Knox Mobile Enrollment (KME) console in the following ways:
- The vendor automatically adds devices in the KME console after the devices are purchased.
- The administrator installs the Knox Deployment app from Google Play on their mobile device and migrates the Knox profile to users' devices using Bluetooth, Wi-Fi Direct, or a QR code.
After the device is reset to the factory settings, the Knox profile will be installed. After deployment of the Knox profile, the device will be automatically added in the KME console.
Adding a device through the Knox Deployment app
If you did not purchase your Samsung device from an official vendor, you can add the device to Knox Mobile Enrollment using Bluetooth, Wi-Fi Direct, or a QR code. This will require the administrator's mobile device that will be used to deliver Knox profiles to users' mobile devices.
To add devices using the Knox Deployment app, the following conditions must be met:
- Depending on the selected delivery mode, Bluetooth or Wi-Fi must be enabled on the mobile devices.
- The mobile devices must be connected to the internet.
To deliver a Knox profile using the Knox Deployment app:
- Install the Knox Deployment app from Google Play on the administrator's primary mobile device.
- Start the Knox Deployment app.
- Enter your Samsung account credentials to sign in.
- In the Knox Deployment window, configure the settings for deploying a Knox profile:
- In the Knox services section, select Knox Mobile Enrollment.
- Select the desired Knox profile from the list.
- Select the Deployment mode:
- Bluetooth. Set the duration of Bluetooth connection and specify whether the Bluetooth connection is automatic or manual.
When using Bluetooth, you can add a Knox profile to several devices at the same time.
- Wi-Fi Direct. Specify whether the Wi-Fi Direct connection is automatic or manual. Then follow the instructions on the screen.
- Bluetooth. Set the duration of Bluetooth connection and specify whether the Bluetooth connection is automatic or manual.
- Tap Start deployment.
- On the receiver device, draw a plus-sign (+) gesture on the Welcome window to initiate deployment.
- In the Knox Deployment menu that opens, select whether you want to use Bluetooth or Wi-Fi Direct to enroll a device:
- If you selected Bluetooth, approve the pairing request that appears on the primary device. Then the receiver device downloads the profile. Follow the instructions on the screen.
After the Knox profile is installed, the new device will be added with the Bluetooth tag to the KME console.
- If you selected Wi-Fi Direct, follow the instructions on the screen.
After the Knox profile is installed, the new device will be added with the Wi-Fi tag to the KME console.
- If you selected Bluetooth, approve the pairing request that appears on the primary device. Then the receiver device downloads the profile. Follow the instructions on the screen.
- When the receiver device is configured, tap Finish deployment on the primary device in order to complete the enrollment.
After the device is reset to the factory settings, the Knox profile will be installed.
To deliver a Knox profile using a QR code:
- On the receiver device, draw a plus-sign (+) gesture on the Welcome window to initiate deployment.
- In the Knox Deployment menu that opens, select QR-code.
- In the KME Console, select the desired profile in the Profiles section.
- If there is no QR code next to the profile name, open the profile settings and click the Add a QR-code button on the second page.
- Follow the instructions on the screen and save the profile.
The generated QR code appears near the profile name.
- Scan a QR code from the KME Console with the camera on the user's mobile device running Android 10 or later.
After the Knox profile is installed, the new device with the QR-code tag will be added to the KME console.
After the device is reset to the factory settings, the Knox profile will be installed.
Adding a device through the vendor
Official vendors of Samsung devices can be registered in Samsung Knox. For the list of official vendors, visit the Samsung technical support website. The vendor automatically adds devices in the KME console for your Samsung account immediately after the devices are purchased. To have the devices added by the vendor, you must register the vendor in the KME console for your Samsung account. You will need a reseller ID to add the Samsung device vendor in the KME console. To receive the reseller ID, you must send a request to the vendor. In the request, specify your Knox client ID.
To view your Knox client ID:
- Sign in to the Samsung Knox console → Knox Mobile Enrollment.
- Select the Resellers section.
- Your ID is displayed in the Knox Customer ID field.
After you receive a response from the vendor with the reseller ID, register the vendor in the KME console. Prior to registering the vendor, you can create a Knox profile so that the profile can be automatically deployed when adding new devices.
To register an official vendor in the KME console:
- Sign in to the Samsung Knox console → Knox Mobile Enrollment.
- Select the Resellers section.
- Click the Register reseller button.
The window for registering the device vendor opens.
- In the Reseller ID field, enter the ID received from the official Samsung device vendor.
- If you created a Knox profile, select the Knox profile in the vendor registration window.
When you add new devices, the Knox profile is automatically installed.
For more information about configuring other settings, please refer to the Samsung technical support website.
- Click OK.
The Samsung device vendor will be added to the list of vendors in the KME console.
After new devices are purchased from the official vendor, Kaspersky Endpoint Security for Android will be automatically installed on the devices after the devices are connected to the internet. For more details about working with Knox Mobile Enrollment, please refer to the Knox Mobile Enrollment User Guide. If you already have a list of devices in the KME console, add the Knox profile with the Knox app to the device.
Page top
Installing the app
Prior to installing Kaspersky Endpoint Security for Android, issue a mobile certificate for mobile device users in the Kaspersky Security Center Web Console. A mobile certificate is required for identifying the mobile device user in the Kaspersky Security Center Web Console.
To deliver the Knox profile to devices:
- Sign in to the Samsung Knox console → Knox Mobile Enrollment.
- Select Devices → All devices.
- Select the devices on which you want to install the Knox profile.
The Device info window opens.
- In the Profiles list, select the Knox profile with Kaspersky Endpoint Security for Android.
- In the Tags field, enter tags for grouping and labeling devices, and for search optimization in the KME console.
- Enter the user account credentials of the device into the User ID and Password fields.
Account credentials are required for receiving a mobile certificate. The user ID and password must match the user account credentials in Kaspersky Security Center (Name and Password in the user account properties).
To receive a mobile certificate only with a password and without a login, enter the "
DO_NOT_USE_LOGIN
" value in the User ID field. Kaspersky Endpoint Security for Android will not use the login to request a certificate. - Select the Knox profile for the remaining devices.
- Click the Save button.
After the device is reset to the factory settings, the Knox profile will be installed.
After deployment of the Knox profile is started, the APK installation file will be automatically downloaded on the mobile device. Installation of Kaspersky Endpoint Security for Android starts automatically. No additional configuration of the app is required. After the initial setup of the device is performed and the app is installed, synchronization with Kaspersky Security Center will be performed automatically. The mobile device will be added to the Kaspersky Security Center Web Console.
Page top
Configuring Knox
This section contains information about working with Knox on Samsung devices.
Knox is available only on Samsung devices running Android 6 or later.
Restricting SD card usage in Knox
Configure SD card restrictions to control usage of SD cards on the user's Samsung device that supports Knox.
To restrict SD card usage on a mobile device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Samsung Knox settings section.
- On the Device feature restrictions card, click Settings.
The Device feature restrictions window opens.
- Enable the settings using the Device feature restrictions toggle switch.
- In the SD card settings section, specify the required restrictions:
- In the Additional settings section, you can specify any additional restrictions:
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center. SD card settings are now configured.
Page top
Configuring VPN in Knox
To securely connect an Android device to the internet and protect data transfer, you can configure VPN (Virtual Private Network) settings.
Configuration of VPN is possible only for Samsung devices running Android 11 or earlier.
The following requirements must be considered when using a virtual private network:
- The app that uses the VPN connection must be allowed in the Firewall settings.
- VPN settings configured in the policy cannot be applied to system apps. The VPN connection for system apps has to be configured manually.
- Some apps that use a VPN connection need to have additional settings configured at first startup. To configure settings, a VPN connection has to be allowed in app settings.
To configure VPN on a user's mobile device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Samsung Knox settings section.
- On the VPN card, click Settings.
The VPN window opens.
- Enable the settings using the VPN toggle switch.
- Specify the following VPN settings:
- Settings in the Network section:
- In the Network name field, enter the name of the VPN tunnel.
- In the Protocol drop-down list, select the VPN connection type:
- IPSec Xauth PSK. A tunneling protocol of the "gateway-to-gateway" type that lets the mobile device user establish a secure connection with the VPN server using the Xauth authentication utility.
- L2TP IPSec PSK. A tunneling protocol of the "gateway-to-gateway" type that lets the mobile device user establish a secure connection with the VPN server via the IKE protocol using a preset key. This protocol is selected by default.
- PPTP. A "point-to-point" tunneling protocol that lets the mobile device user establish a secure connection to the VPN server by creating a special tunnel on a standard unsecured network.
- In the Server address field, enter the network name or IP address of the VPN server.
- Settings in the Protocol settings section:
- In the DNS search domain(s) list, enter the DNS search domain to be automatically added to the DNS server name.
You can specify several DNS search domains, separating them with blank spaces.
- In the DNS server(s) field, enter the full domain name or IP address of the DNS server.
You can specify several DNS servers, separating them with blank spaces.
- In the Routing field, enter the range of network IP addresses with which data is exchanged via the VPN connection.
If a range of IP addresses is not specified in the Routing field, all internet traffic will pass through the VPN connection.
- In the DNS search domain(s) list, enter the DNS search domain to be automatically added to the DNS server name.
- Settings in the Network section:
- Additionally, configure the following settings:
- For the IPSec Xauth PSK and L2TP IPSec PSK protocols:
- In the IPSec shared key field, enter the password for the preset IPSec security key.
- In the IPSec ID field, enter the name of the mobile device user.
- For the L2TP IPSec PSK protocol, specify the password for the L2TP key in the L2TP key field.
- For the PPTP network, select the Use SSL connection check box so that the app will use the MPPE (Microsoft Point-to-Point Encryption) method of data encryption to secure data transmission when the mobile device connects to the VPN server.
- For the IPSec Xauth PSK and L2TP IPSec PSK protocols:
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Page top
Configuring an Exchange mailbox in Knox
To work with corporate mail, contacts, and the calendar on the mobile device, you can configure the Exchange mailbox settings for the standard Samsung Email app.
An Exchange mailbox can be configured only for Samsung devices running Android 9 or earlier.
To configure an Exchange mailbox on a user's mobile device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Samsung Knox settings section.
- On the Exchange ActiveSync card, click Settings.
The Exchange ActiveSync window opens.
- Enable the settings using the Exchange ActiveSync toggle switch.
- In the Server address field, enter the IP address or DNS name of the server hosting the mail server.
- In the Domain name field, enter the name of the mobile device user's domain on the corporate network.
- In the Synchronization interval drop-down list, select the interval for mobile device synchronization with the Microsoft Exchange server.
- To use the SSL (Secure Sockets Layer) data transport protocol, select the Use SSL connection check box. The SSL protocol uses encryption and certificate-based authentication for secure data transfer. This check box is selected by default.
- To use digital certificates to protect data transfer between the user's mobile device and the Microsoft Exchange server, select the Verify server certificate check box. The server certificate is verified to have been issued from the trusted root certificate. This check box is selected by default.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Page top
Configuring APN in Knox
APN can be configured only for Samsung devices.
A SIM card must be inserted to be able to use an access point on the user's mobile device. Access point settings are provided by the mobile operator. Incorrect access point settings may result in additional mobile charges.
To configure the Access Point Name (APN) settings on a user's mobile device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Samsung Knox settings section.
- On the APN settings card, click Settings.
The APN settings window opens.
- Enable the settings using the APN settings toggle switch.
The toggle switch in this card does not enable or disable the corresponding functionality on devices. Enabling the toggle switch lets you configure custom settings. Disabling the toggle switch lets you use default settings.
- Specify the following access point settings for connecting the user to the data service:
- In the APN type drop-down list, select the type of access point (APN) for data transmission on a GPRS/3G/4G mobile network:
- Internet. Connection of the user's mobile device to the internet.
- MMS. Exchange of MMS multimedia messages.
- Internet and MMS. Connection to the internet and exchange of multimedia messages. This is the default value.
- In the APN name field, specify the name of the access point.
- In the MCC field, enter the mobile country code (MCC).
- In the MNC field, enter the mobile network code (MNC).
- In the APN type drop-down list, select the type of access point (APN) for data transmission on a GPRS/3G/4G mobile network:
- If you have selected MMS or Internet and MMS as the type of access point, specify the following additional MMS server settings in the MMS server section:
- In the MMS server name field, specify the full domain name of the mobile carrier's server used for MMS exchange (for example,
mms.mobile.com
). - In the MMS proxy server address field, specify the network name or IP address of the proxy server.
- In the MMS proxy server port field, specify the port number of the mobile carrier's server used for MMS exchange.
- In the MMS server name field, specify the full domain name of the mobile carrier's server used for MMS exchange (for example,
- In the Authentication section, specify the authentication settings:
- In the Authentication type drop-down list, select the type of authentication of the mobile device user that will be used on the mobile carrier's server for network access. By default, user authentication is not required. The following types are available:
- None. User authentication is not required to access the mobile network.
- PAP (Password Authentication Protocol). An authentication protocol that uses passwords as plain non-encrypted text.
- CHAP (Challenge Handshake Authentication Protocol). A request-response authentication protocol that uses standard MD5 hashing to encrypt the response.
- Concurrently. Combined use of CHAP and PAP protocols.
- In the User name field, enter the user name for authorization on the mobile network.
- In the Password field, enter the password for user authorization on the mobile network.
- In the Authentication type drop-down list, select the type of authentication of the mobile device user that will be used on the mobile carrier's server for network access. By default, user authentication is not required. The following types are available:
- In the Network section, specify the following network settings:
- In the Network name field, enter the name of the network.
- In the Server address field, specify the network name of the mobile carrier's server through which data transmission services are accessed.
- In the Proxy server section, specify the following proxy server settings:
- Select the Use a proxy server check box to enable the use of a proxy server. This check box is cleared by default.
- In the Proxy server address field, specify the network name or IP address of the mobile carrier's proxy server for network access. This field is available only if the Use a proxy server check box is selected.
- In the Proxy server port field, specify the port number of the mobile carrier's proxy server for network access. This field is available only if the Use a proxy server check box is selected.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Page top
Configuring Firewall in Knox
Configure Firewall settings to monitor network connections on the user's mobile device.
Firewall can be configured only for Samsung devices.
To configure Firewall on a user's mobile device:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Select Android and go to the Samsung Knox settings section.
- On the Firewall card, click Settings.
The Firewall window opens.
- Enable the settings using the Firewall toggle switch.
- In the Internet access drop-down list, select the Firewall mode. Depending on its operating mode, Firewall monitors connections established by the user's mobile device:
- If you want to allow inbound and outbound connections of all installed apps, select Allow for all apps. This mode is selected by default.
- If you want to block all network activity except for several specified apps, select Allow for listed apps.
- If you selected Allow for listed apps as the Firewall mode, create a list of apps for which all network activity is allowed:
- In the Apps with internet access section, click Add.
The Add app window opens.
- In the App name field, enter the name of the mobile app.
- In the Package name field, enter the system name of the mobile app package (for example,
com.mobileapp.example
). - Click Add.
The new app for which Firewall is disabled appears in the list.
You can modify or delete mobile apps in the list using the Edit and Delete buttons at the top of the list.
- In the Apps with internet access section, click Add.
- Click OK.
- Click Save to save the changes you have made.
Mobile device settings are changed after the next device synchronization with Kaspersky Security Center.
Page top
Using the Kaspersky Endpoint Security for Android app
This Help section describes features and operations that are available to users of the Kaspersky Endpoint Security for Android app.
Articles in this section comprise all the options that can be available or visible on a mobile device. The actual layout and behavior of the app depends on the remote administration system that is implemented and how the administrator configures your device in accordance with corporate security requirements. Some functions and options described in this section may not apply to your actual experience with the app. If you have any questions about the app on your specific device, contact your administrator.
App features
Kaspersky Endpoint Security offers the following key features.
Protection against viruses and other malware
The app uses the Anti-Malware component to protect the device against viruses and other malware.
Anti-Malware performs the following functions:
- Scans the entire device, installed apps, or selected folders for threats
- Protects the device in real time
- Scans newly installed apps before they are launched for the first time
- Updates anti-malware databases
If an application that collects information and sends it to be processed is installed on a mobile device, Kaspersky Endpoint Security for Android may classify this application as malware.
Protection of stolen or lost device data
The Anti-Theft component protects your data against unauthorized access and helps you to locate the device if it gets lost or stolen.
Anti-Theft lets you perform the following operations remotely:
- Lock the device.
To prevent a hacker from having the capability to unlock the device, Kaspersky Endpoint Security must be enabled as an Accessibility Features service on mobile devices running Android 7 or later.
- Turn on a loud alarm on the device even if the device sound is disabled.
- Get the device location coordinates.
- Wipe data stored on the device.
- Reset to factory settings.
- Secretly take a photo of the person using your device.
To enable Anti-Theft operations, Kaspersky Endpoint Security must be enabled as a device administrator. If you did not grant device administrator rights during the initial configuration of apps, you can grant administrator rights to Kaspersky Endpoint Security using the appropriate notification or in the device settings (Android Settings → Security → Device administrators).
Protection against online threats
The Web Protection component provides protection against online threats.
Web Protection blocks malicious websites that distribute malicious code, and phishing websites designed to steal your confidential data and gain access to your financial accounts. Web Protection scans websites before you open them by using the Kaspersky Security Network cloud service. Learn more.
App Control
According to corporate security requirements, the administrator of the remote administration system (hereinafter also "administrator") creates lists of recommended, forbidden, and required apps. The App Control component is used to install recommended and required apps, update them, and remove forbidden apps.
App Control lets you install recommended and required apps to your device via a direct link to the distribution package or a link to Google Play. App Control lets you remove forbidden apps that violate corporate security requirements.
Kaspersky Endpoint Security must be enabled as an Accessibility Features service to ensure proper functioning of App Control. If you did not enable this service during the Initial Configuration Wizard for the app, you can enable Kaspersky Endpoint Security as an Accessibility Features service using the appropriate notification or in the device settings (Android Settings → Accessibility → Services).
Compliance Control
The Compliance Control component automatically checks whether the device conforms to corporate security requirements. If your device does not meet corporate security requirements, the app shows a notification with the following information:
- Reason for the non-compliance (for example, forbidden apps were detected on the device or anti-malware databases are out of date).
- Time period within which you must eliminate the non-compliance (for example, 24 hours).
- Action that will be taken on the device if you do not eliminate the non-compliance within the specified time period (for example, device will be locked).
- Action performed to fix the device's non-compliance with corporate security requirements.
Main window at a glance
The appearance of the main window slightly differs for different screen resolutions.
The main window displays the overall protection status of your device. This status determines the color of the window:
- Green indicates that device protection is at an optimal level.
- Red indicates critical problems with device security.
In the main app window, you can also do the following:
- View notifications by clicking the button at the top right corner. They inform you about security issues, problems in app operation, compliance with corporate security requirements, and your license.
- Navigate between the main window and app settings using the buttons at the bottom.
Status bar icon
After the first launch wizard finishes, the icon of Kaspersky Endpoint Security appears in the status bar.
The icon reflects the operation of the app and provides access to the main window of Kaspersky Endpoint Security.
The icon signals the operation of Kaspersky Endpoint Security and reflects the protection status of your device:
– Device is protected.
– There are problems with protection (for example, the anti-malware databases are out of date or a newly installed app has not been scanned).
Device scan
Anti-Malware has a number of limitations:
- When Anti-Malware is running, a threat detected in the external memory of the device (such as an SD card) cannot be neutralized automatically in the corporate container. Kaspersky Endpoint Security for Android does not have access to external memory in the corporate container. Information about detected objects is displayed in app notifications. To neutralize objects detected in the external memory, the object files have to be deleted manually and the device scan restarted.
- Due to technical limitations, Kaspersky Endpoint Security for Android cannot scan files with a size of 2 GB or more. During a scan, the app skips such files without notifying you that such files were skipped.
- On devices running Android 11 or later, the Kaspersky Endpoint Security for Android app can't scan the "Android/data" and "Android/obb" folders and detect malware in them due to technical limitations.
To start a device scan:
- In the main window of Kaspersky Endpoint Security, tap Settings → App settings → Anti-Malware → Start scan.
- Select the device scan scope:
- Scan entire device. The app scans the entire file system of the device.
- Scan installed apps. The app scans only installed apps.
- Custom Scan. The app scans the selected folder or individual file. You can select an individual object (folder or file) or one of the following partitions of device memory:
- Device memory. Read-accessible memory of the entire device. This also includes the system memory partition that stores operating system files.
- Internal memory. Device memory partition intended for installation of apps and storage of media content, documents, and other files.
- External memory. External SD card memory. If no external SD card is installed, this option is hidden.
Access to malware scan settings may be restricted by your administrator.
To configure the malware scan:
- In the main window of Kaspersky Endpoint Security, tap Settings → App settings → Anti-Malware → Scan settings.
- If you want the app to detect adware and apps that could be used by hackers to cause harm to your device or data when the app performs a scan, switch on the Adware, dialers, and other toggle button.
- Tap Action on threat detection, and then select the action taken by the app by default:
- Quarantine
Quarantine stores files as archives, so they cannot harm the device. The Quarantine lets you delete or restore the files that were moved to isolated storage.
- Ask user
The app prompts you to select an action for each detected object: skip, quarantine, or delete. When multiple objects are detected, you can apply a selected action to all objects.
- Delete
Detected objects will be automatically deleted. No additional actions are required. Prior to deleting an object, Kaspersky Endpoint Security will display a temporary notification about the detection of the object.
- Skip
If the detected objects have been skipped, Kaspersky Endpoint Security warns you about problems in device protection. For each skipped threat, the app provides actions that you can perform to eliminate the threat. The list of skipped objects may change, for example, if a malicious file was deleted or moved. To receive an up-to-date list of threats, run a full device scan. To ensure reliable protection of your data, eliminate all detected objects.
- Quarantine
Information about detected threats and the actions taken on them is logged in app reports (Settings → Reports). You can choose to display reports on Anti-Malware operations.
Page top
Running a scheduled scan
Anti-Malware has a number of limitations:
- When Anti-Malware is running, a threat detected in the external memory of the device (such as an SD card) cannot be neutralized automatically in the corporate container. Kaspersky Endpoint Security for Android does not have access to external memory in the corporate container. Information about detected objects is displayed in app notifications. To neutralize objects detected in the external memory, the object files have to be deleted manually and the device scan restarted.
- Due to technical limitations, Kaspersky Endpoint Security for Android cannot scan files with a size of 2 GB or more. During a scan, the app skips such files without notifying you that such files were skipped.
- On devices running Android 11 or later, the Kaspersky Endpoint Security for Android app can't scan the "Android/data" and "Android/obb" folders and detect malware in them due to technical limitations.
To configure the full scan schedule for a device:
- In the main window of Kaspersky Endpoint Security, tap Settings → App settings → Anti-Malware → Scan settings.
- Tap Schedule, and then select the full scan frequency:
- Weekly
- Daily
- Disabled
- After database update
- Tap Start day, and then select the day of the week when you want to start the full scan.
- Tap Start time, and then select the time for starting the full scan.
A full scan of the device is started according to schedule.
If the device is in battery saver mode, the app may perform this task later than specified. To ensure timely responses of Android devices to the administrator's commands, enable the use of Firebase Cloud Messaging.
Page top
Changing the Protection mode
Real-Time Protection lets you detect threats in files being opened, and scan apps while they are being installed on the device in real time. The anti-malware databases and the Kaspersky Security Network cloud service (Cloud Protection) are used to ensure security automatically.
To change the device protection mode:
- In the main window of Kaspersky Endpoint Security, tap Settings → App settings → Anti-Malware → Real-time protection mode.
- Select the device Protection mode:
- Disabled. Protection is disabled.
- Recommended. Anti-Malware scans only installed apps and files from the Downloads folder. Anti-Malware scans new apps as soon as they are installed.
- Extended. Anti-Malware scans all device files for malicious objects when any operation is performed with them (for example, when they are saved, moved, or modified). Anti-Malware also scans new apps as soon as they are installed.
Information about the current Protection mode is displayed under the description of the component.
Access to Real-Time Protection settings may be restricted by your administrator.
To enable Cloud Protection (KSN):
- Tap Settings → App settings → Anti-Malware in the main window of Kaspersky Endpoint Security.
- Switch on the Cloud Protection (KSN) toggle button.
The Cloud Protection (KSN) toggle button manages the use of Kaspersky Security Network only for real-time protection of a device. If the check box is cleared, Kaspersky Endpoint Security continues to use KSN for the operation of other components of the app.
As a result, the app obtains access to the Kaspersky online knowledge base regarding the reputation of files and apps. The scan is performed for threats whose information has not yet been added to anti-malware databases but is already available in KSN. Kaspersky Security Network cloud service provides full operation of Anti-Malware and reduces the likelihood of false alarms. Only your administrator can fully disable the use of Kaspersky Security Network.
To configure Real-Time Protection:
- In the main window of Kaspersky Endpoint Security, tap Settings → App settings → Anti-Malware → Scan settings.
- If you want the app to detect adware and apps that could be used by hackers to cause harm to your device or data when the app performs a scan, switch on the Adware, dialers, and other toggle button.
- Tap Action on threat detection, and then select the action taken by the app by default:
- Quarantine
Quarantine stores files as archives, so they cannot harm the device. Quarantine lets you delete or restore the files that were moved to isolated storage.
- Ask user
The app prompts you to select an action for each detected object: skip, quarantine, or delete. When multiple objects are detected, you can apply a selected action to all objects.
- Delete
Detected objects will be automatically deleted. No additional actions are required. Prior to deleting an object, Kaspersky Endpoint Security will display a temporary notification about the detection of the object.
- Skip
If the detected objects have been skipped, Kaspersky Endpoint Security warns you about problems in device protection. For each skipped threat, the app provides actions that you can perform to eliminate the threat. The list of skipped objects may change, for example, if a malicious file was deleted or moved. To receive an up-to-date list of threats, run a full device scan. To ensure reliable protection of your data, eliminate all detected objects.
- Quarantine
Information about detected threats and the actions taken on them is logged in the app reports (Settings → Reports). You can choose to display reports on Anti-Malware operations.
Page top
Anti-malware database updates
To update anti-malware databases of the app:
In the main window of Kaspersky Endpoint Security, tap Settings → App settings → Anti-Malware → Start database update.
When you use Kaspersky Endpoint Security for Android, you may encounter a Kaspersky service domain name blocked issue, which means network issues are preventing the app from reaching Kaspersky services. This may affect the Anti-Malware protection features and put your data at risk. Changing your connection settings might fix the issue.
This section only gives general instructions. Please refer to the user guide provided by your device manufacturer for specific instructions.
To change your connection settings:
- Go to Settings on the device.
- Open the connection settings.
- Go to the Private DNS section.
- Select Private DNS provider hostname, and then type a DNS name. For example, you could type "dns.google" to use Google's public DNS server.
- Save the changes.
The connection settings are changed.
Page top
Scheduled database update
The app can automatically update the anti-malware databases according to the schedule you specify.
To configure the update schedule:
- In the main window of Kaspersky Endpoint Security, tap Settings → App settings → Anti-Malware → Database update settings.
- Tap Schedule, and then select the update frequency:
- Weekly
- Daily
- Disabled
- Tap Start day, and then select the day of the week when you want to run the update.
- Tap Start time, and then select the time for starting the update.
Anti-malware database updates are started according to schedule.
If the device is in battery saver mode, the app may perform this task later than specified. To ensure timely responses of Android devices to the administrator's commands, enable the use of Firebase Cloud Messaging.
Updates functionality (including providing anti-malware signature updates and codebase updates), as well as KSN functionality may not be available in the software in the U.S.
Page top
Things to do if your device gets lost or stolen
If your device gets lost or stolen, contact your system administrator. The administrator can execute Anti-Theft commands on your device remotely according to corporate security requirements.
If a Reset to factory settings command is sent to the device, control over the device will be lost, and the remaining Anti-Theft commands will not work.
Page top
Web Protection
The following conditions must be met to enable Web Protection:
- The Statement regarding data processing for the purpose of using Web Protection (Web Protection Statement) must be accepted. Kaspersky Endpoint Security uses Kaspersky Security Network (KSN) to scan websites. The Web Protection Statement contains the terms of data exchange with KSN.
Your administrator can accept the Web Protection Statement for you in Kaspersky Security Center. In this case, you are not required to take any action.
If your administrator has not accepted the Web Protection Statement and has sent you the request to do this, you must read and accept the Web Protection Statement in the app settings.
If your administrator has not accepted the Web Protection Statement, Web Protection is not available.
Web Protection on Android devices is supported only by Google Chrome, HUAWEI Browser, Samsung Internet, and Yandex Browser.
If the Kaspersky Endpoint Security for Android app on a corporate device is not enabled as an Accessibility Features service, Web Protection is supported only by the Google Chrome browser and checks only the domain of a website. To allow other browsers (Samsung Internet, Yandex Browser, and HUAWEI Browser) support Web Protection, enable Kaspersky Endpoint Security as an Accessibility Features service. This will also enable the Custom Tabs feature operation.
The Custom Tabs feature is supported by Google Chrome, HUAWEI Browser, and Samsung Internet.
To use Web Protection in Telegram, disable opening links in the In-App Telegram browser in Telegram settings.
Web Protection for HUAWEI Browser, Samsung Internet, and Yandex Browser does not block sites on a mobile device if a corporate container is used and Web Protection is enabled only for the corporate container.
To use Web Protection at all times when you browse the web, set Google Chrome, HUAWEI Browser, Samsung Internet, or Yandex Browser as the default browser.
To set a supported browser as the default browser and use Web Protection for website scanning at all times:
- In the main window of Kaspersky Endpoint Security, tap Settings → App settings → Web Protection.
- Switch the Web Protection toggle button to On.
- Tap Set default browser.
This button is displayed when Web Protection is enabled and a supported browser has not been set as the default browser.
The default browser selection wizard starts.
- Follow the wizard instructions.
The wizard sets Google Chrome, HUAWEI Browser, or Samsung Internet as the default browser. Web Protection continuously scans websites while you browse the web.
Page top
Get Certificate
To obtain a certificate for accessing corporate network resources:
- In the main window of Kaspersky Endpoint Security, tap Settings → App settings → Additional → Get certificate.
- Specify your corporate network account credentials. The login must be specified in one of the following formats:
userPrincipalName@DNSDomainName
sAMAccountName
sAMADomain\sAMAccountName
For more information on these attributes, visit the Microsoft Technical documentation website. For details, you may contact your administrator.
- If you have received a one-time password from the administrator, select the One-time password check box, and then enter the password you received.
The Certificate Installation Wizard starts.
- Follow the wizard's instructions.
Synchronizing with Kaspersky Security Center
Synchronization of the mobile device with the Kaspersky Security Center remote administration system is required for protecting and configuring your device in accordance with corporate security requirements. The device is automatically synchronized with Kaspersky Security Center, and you can also start synchronization manually. After the first synchronization, your device is added to the list of mobile devices managed via Kaspersky Security Center. The administrator can then configure your device in accordance with corporate security requirements.
You can configure synchronization settings while running the Initial Configuration Wizard or in the settings of Kaspersky Endpoint Security. Request the values of synchronization settings from your system administrator.
Modify the settings of device synchronization with the Kaspersky Security Center remote administration system only when instructed to do so by the administrator.
To synchronize your device with Kaspersky Security Center:
- In the main window of Kaspersky Endpoint Security, tap Settings → App settings → Synchronization.
- In the Synchronization settings section, specify the values of the following settings:
- Server
- Port
- Group
- Corporate email address
Synchronization settings can be hidden by the administrator.
- Tap Synchronize.
Activating the Kaspersky Endpoint Security for Android app without Kaspersky Security Center
In most cases, the Kaspersky Endpoint Security for Android app that is installed on your device is activated by the administrator centrally in the Kaspersky Security Center remote administration system. If your device is not connected to Kaspersky Security Center, you can enter the activation code manually. To get the activation code, contact the administrator.
Activate the app manually only when instructed to do so by the administrator.
To enter the activation code:
- In the error message that says that your license will soon expire or has expired and that your device is not connected to the Administration Server, tap Activate.
- In the activation window, enter the activation code that the administrator gave you, and then tap Activate.
- If the activation code is correct, a notification is displayed saying that the app has activated, along with the license expiration date.
The Kaspersky Endpoint Security for Android app on your device is activated.
Page top
Installing the app on corporate devices
Corporate device is the device operation mode for company-owned Android devices. This mode allows the administrator to have full control over the entire device and configure a wide range of device functions.
The Kaspersky Endpoint Security for Android app can be installed in one of the following ways:
- Using the QR code generated in Kaspersky Security Center for devices running Android 7 and later.
- Using the app installation package from Kaspersky Security Center and running the command in ADB. This method is suitable for devices running Android 5-6 and devices with later Android versions on which the QR code scanner is not available.
Configuring the app on corporate devices running Android 7 and later
To deploy the app on corporate devices, you need to reset the devices to factory settings and install the app using the QR code generated in Kaspersky Security Center. The QR code contains all the necessary data for app configuration.
To install the Kaspersky Endpoint Security for Android app on the corporate device:
- Reset the device to factory settings.
The device reboots, and the welcome screen appears.
- Tap six times on an empty space of the device's welcome screen.
The QR code reader appears.
- Scan the QR code generated in Kaspersky Security Center for app installation.
- Perform the initial setup of the device. The operating system installs the Kaspersky Endpoint Security for Android app in the background.
Once the device setup completes, Kaspersky Endpoint Security for Android starts on the device.
On Xiaomi devices running Android 12, Kaspersky Endpoint Security for Android does not start automatically. In this case, please, start the app manually.
- Activate the app by following the instructions in the app's Initial Configuration Wizard.
When deploying the app via the installation package downloaded from Kaspersky Security Center, after the device is reset to factory settings and the QR code is scanned, the Blocked by Play Protect message may appear on the device. The issue is caused by the installation package signing certificate being different from the one specified in Google Play. The user should continue the installation by choosing Install anyway. If OK is selected, the installation process will be interrupted and the device will be reset to factory settings.
The Kaspersky Endpoint Security for Android app is installed and activated on the corporate device.
Page top
Configuring the app on corporate devices running Android 5-6
For corporate devices running Android 5-6, the process of configuring the app differs from the standard one. You need to pre-configure the device, install the app, and use Android Debug Bridge (ADB) for additional settings.
This scenario can also be used for other Android versions and for devices on which the QR code scanner is not available.
To deploy the Kaspersky Endpoint Security for Android app on the corporate device with Android 5-6:
- Reset the device to factory settings. You can skip this step and go to step 2 if the device has not been used before.
If you set a screen unlock password on the device after you reset it to factory settings, you must reset the device to factory settings again before installing the app using ADB.
- Enable the developer mode:
- Navigate to the Settings → About phone section.
- Tap the Build Number option seven times until you see the "You are now a developer!" message.
On some devices, these sections might be located or named differently. For more details, please refer to the Android documentation.
- Enable the USB debugging option in the Settings → Developer options section.
- Allow app installation from the sources other than Google Play:
- Navigate to the Settings → Security section.
- Enable the Unknown sources option.
- Install the Kaspersky Endpoint Security for Android app on the device via the app installation package from Kaspersky Security Center or using other suitable methods of installation (for example, an APK file).
- In the window that opens on the device after installation, tap Done to exit the Installation Wizard.
For this scenario to work correctly, do not launch the app before running the ADB command described in step 9.
- Install ADB on your computer.
- Connect the device to the computer using a USB cable.
The system will show a dialog asking whether to allow the device debugging on the computer. Click OK.
- Start ADB and run the following command:
adb shell dpm set-device-owner com.kaspersky.kes/com.kms.selfprotection.DeviceAdmin
. - Start the Kaspersky Endpoint Security for Android app and activate it by following the instructions in the app's Initial Configuration Wizard.
Some Xiaomi devices cannot be enrolled using ADB if MIUI optimization is turned on. To enroll these devices, turn off MIUI optimization by navigating to Settings → Build number. Tap on the build number six to eight times to enable Developer options and disable MIUI optimization. Perform the above mentioned steps again to successfully enroll these devices.
Page top
Installing root certificates on the device
A root certificate is a public key certificate issued by a trusted certificate authority (CA). Root certificates are used to verify custom certificates and guarantee their identity.
Your administrator can specify root certificates to be installed on the device. On corporate devices and devices with a corporate container, these certificates are installed automatically. On personal devices, you will get notifications and have to install each certificate manually by following the instructions below.
To manually install a root certificate on the device:
- Open the device Settings.
- Navigate to the security settings. The path depends on the device model and operating system version. For instance, you may need to tap Advanced settings → Security or Security & lock screen → Credential storage.
- Tap Install from Phone Storage / Install from SD Card or a similar option.
- Tap CA Certificate.
- On the confirmation window, tap Install Anyway.
- In the appeared file manager, select the required root certificate.
On some devices, the downloaded certificates may not be displayed in Recent files. Please wait for 3-5 minutes and open the file manager again. The waiting time depends on the device model. If after 3-5 minutes no files have appeared, go to the Internal storage\Download\kesm_certs or SD card\Download\kesm_certs folder and select the required root certificate.
The root certificate will be installed on the device.
Page top
Installing and using mail and VPN certificates on the device
Your administrator can specify mail and VPN certificates to be installed on the device. On corporate devices or devices with a corporate container, such certificates are installed automatically.
A mail certificate is installed on the device only if your administrator first configures Exchange ActiveSync settings.
A VPN certificate can also be installed in a trusted certificate store in a personal space in addition to the corporate container and be used by any app. You will get a notification and have to install a VPN certificate manually by following the instructions below.
To manually install a VPN certificate on the device:
- Open Kaspersky Endpoint Security for Android.
- Tap Notifications.
- In the notification about the certificate, tap Install.
A window with the certificate password opens.
- Remember or write down the password and tap OK.
- When prompted, enter the certificate password and tap OK.
- Tap OK to confirm installation of the certificate.
The VPN certificate will be installed on the device.
Page top
Enabling accessibility on Android 13 or later
On Android 13 or later, accessibility services are restricted for apps not downloaded from Google Play or HUAWEI AppGallery. You must manually allow accessibility services if you downloaded Kaspersky Endpoint Security for Android from the Kaspersky Security Center server or the Kaspersky website.
If you update the Kaspersky Endpoint Security for Android app using a Kaspersky Security Center installation package or APK file from the Kaspersky website, accessibility services will be disabled. You must manually enable accessibility services again.
Accessibility is used for the following purposes:
- Check websites and apps in Kaspersky Security Network
- Lock the device in case of theft
- Display warnings
- Block the camera when restricted by the administrator
To enable accessibility for Kaspersky Endpoint Security:
- Open the Accessibility page in the device settings and find Kaspersky Endpoint Security.
- Turn on the Kaspersky Endpoint Security switch. In the dialog that says that accessibility services are restricted, tap OK.
Now you can give Kaspersky Endpoint Security access to the restricted settings.
- Open the Kaspersky Endpoint Security info page in the device settings. For example, go to Settings > Apps and then find the app in the list of apps.
- On the Kaspersky Endpoint Security info page, tap
in the top right corner and select Allow restricted settings.
Kaspersky Endpoint Security now has access to the restricted settings.
- Go back to the Accessibility page in the device settings and find Kaspersky Endpoint Security.
- Turn on the Kaspersky Endpoint Security switch. In the dialog that opens, allow the app to have full control of your device.
Accessibility services are now enabled for Kaspersky Endpoint Security.
Page top
Enabling accessibility for the app on Android 13 or later
To enable accessibility for Kaspersky Endpoint Security:
- In the dialog that asks you to turn on accessibility services, tap Turn On.
The Accessibility page in the device settings opens.
- Turn on the Kaspersky Endpoint Security switch. In the dialog that says that accessibility services are restricted, tap OK.
Now you can give Kaspersky Endpoint Security access to the restricted settings.
- Open the Kaspersky Endpoint Security info page in the device settings. For example, go to Settings > Apps and then find the app in the list of apps.
- On the Kaspersky Endpoint Security info page, tap
in the top right corner and select Allow restricted settings.
Kaspersky Endpoint Security now has access to the restricted settings.
- Go back to the app and in the dialog that asks you to turn on accessibility services, tap Turn On.
The Accessibility page in the device settings opens.
- Turn on the Kaspersky Endpoint Security switch. In the dialog that opens, allow the app to have full control of your device.
Accessibility services are now enabled for Kaspersky Endpoint Security.
Page top
Updating the app
Kaspersky Endpoint Security can be updated in the following ways:
- Manually using the Kaspersky website. You download the new version of the app from the Kaspersky website and install it on the device.
- With the help of the administrator. The administrator can remotely update the version of the app on your device by using the Kaspersky Security Center remote administration system.
Updating the app from the Kaspersky website
To update the app from the Kaspersky website:
- Go to the Kaspersky website.
- Find Kaspersky Security for Mobile on the website.
- Tap Show Downloads.
- Select a version of the app and tap Download.
- Open the downloaded APK file and follow the instructions on the screen.
Kaspersky Endpoint Security for Android is updated.
Updating the app via Kaspersky Security Center
Updating the app via Kaspersky Security Center consists of the following steps:
- The administrator sends to your mobile device the distribution package of the app whose version meets the corporate security requirements.
A prompt to install Kaspersky Endpoint Security on your device is displayed.
- Accept the update terms and conditions.
The new version of the app will be installed to your device. The app does not require additional configuration after the update.
Updates functionality (including providing anti-malware signature updates and codebase updates), as well as KSN functionality may not be available in the software in the U.S.
Page top
Removing the app
The administrator can block you from removing the app on your own. If this is the case, you cannot remove Kaspersky Endpoint Security.
Kaspersky Endpoint Security can be removed by the following methods:
- Manually in the device settings.
- With the help of the administrator. The administrator can remotely remove the app from your device by using the Kaspersky Security Center remote administration system.
On corporate devices, Kaspersky Endpoint Security for Android can be removed only by the administrator by resetting the device to factory settings.
Removal in the device settings
The app is removed by following the standard procedure for the Android platform. To remove the app, administrator rights for Kaspersky Endpoint Security must be disabled in the device security settings.
On devices running Android 7 or later, if the administrator has blocked removal, the device will be locked if an attempt is made to remove the app in the Android settings. To unlock the device, contact your administrator.
Removal via Kaspersky Security Center
App removal by using Kaspersky Security Center consists of the following steps:
- The administrator sends the app removal command to your mobile device.
Your mobile device displays a prompt to confirm removal of Kaspersky Endpoint Security.
- Confirm app removal.
The app will be removed from your device.
Applications with a briefcase icon
Apps marked with a briefcase icon (corporate apps) are stored on your device in the corporate container. Corporate container is a safe environment on your device in which the administrator can manage apps and accounts without restricting your capabilities to work with personal data.
The corporate container lets you store corporate data separately from personal data. This keeps corporate data confidential and protects it against malware. When a corporate container is created on your device, the following corporate apps are automatically installed in the corporate container: Google Play Market, Google Chrome, Downloads, Kaspersky Endpoint Security for Android, and others.
Page top
Knox app
Knox icon
The Knox app opens a Knox container on your device. A Knox container is a safe environment on your device that has its own desktop, launch panel, apps, and widgets. The administrator can manage apps and accounts in a Knox container without restricting your capabilities to work with personal data.
A Knox container lets you store corporate data separately from personal data. This keeps corporate data confidential and protects it against malware.
In a Knox container, you can access your company mailbox, the contact information of enterprise employees, file storage, and other applications.
For more details about working with Knox, please visit the Samsung technical support website.
Page top
Using the Kaspersky Security for iOS app
This Help section describes features and operations that are available to users of the Kaspersky Security for iOS app.
Articles in this section comprise all the options that can be available or visible on a mobile device. The actual layout and behavior of the app depends on the remote administration system that is implemented and how the administrator configures your device in accordance with corporate security requirements. Some functions and options described in this section may not apply to your actual experience with the app. If you have any questions about the app on your specific device, contact your administrator.
App features
Kaspersky Security for iOS offers the following key features.
Protection against online threats
The Web Protection component provides protection against online threats.
Web Protection blocks malicious websites that distribute malicious code, and phishing websites designed to steal your confidential data and gain access to your financial accounts. Web Protection scans websites before you open them by using the Kaspersky Security Network cloud service. Web Protection also checks the online activity of the apps on your device.
For Web Protection to work, you must allow the app to add a VPN configuration.
Jailbreak detection
When Kaspersky Security for iOS detects a jailbreak, it displays a critical message and informs your administrator about the issue.
The app cannot guarantee the security of your device, because a jailbreak bypasses security features and can cause numerous issues, including:
- Security vulnerabilities
- Stability issues
- Disruption of Apple services
- Potential crashes and freezes
- Shortened battery life
- Inability to apply iOS updates
Installing the app
To install the Kaspersky Security for iOS app:
- Find the email message with the administrator's invitation to install the Kaspersky Security for iOS app from the App Store.
- Go to the App Store in one of the following ways:
- Tap the link in the message if you are reading it on the iOS device on which you want to install the app.
- Scan the QR code using the iOS device on which you want to install the app, if you are reading the message on a computer.
The invitation link is valid for 24 hours. If you don't manage to install the app in time, contact your administrator for a new invitation.
- Download and install the app from the App Store by following the standard installation procedure on the iOS platform.
The Kaspersky Security for iOS app is installed on your device. To protect the device, active the app.
Page top
Activating the app
To activate the Kaspersky Security for iOS app:
- Start the app on your device.
- Accept the agreements and statements by selecting the End User License Agreement and Products and Services Privacy Policy checkboxes.
Optionally, accept the Kaspersky Security Network Statement to allow statistics to be sent to Kaspersky Security Network. This improves the performance of the app and ensures its uninterrupted operation.
- Tap Next. The app connects to the Kaspersky Security Center remote administration system and gets license information.
- Allow the app to add a VPN configuration. The app uses the VPN configuration to check websites for phishing and protect your device from web threats.
- Allow the app to send push notifications. The app uses notifications to inform you about security issues and your license.
The Kaspersky Security for iOS app on your device is activated.
Page top
Activating the app with an activation code
When you install the Kaspersky Security for iOS app on your device, the app connects to the Kaspersky Security Center remote administration system and gets license information automatically. If your device is not connected to Kaspersky Security Center, you can enter the activation code manually. To get the activation code, contact the administrator.
Activate the app manually only when instructed to do so by the administrator.
To enter the activation code:
- In the message that says that the app is not activated, tap Activate the app.
- In the activation window, enter the activation code that the administrator gave you, and then tap Activate.
If the activation code is correct, a notification is displayed saying that the app has activated, along with the license expiration date.
The Kaspersky Security for iOS app on your device is activated.
Page top
Main window at a glance
The appearance of the main window slightly differs for different screen resolutions.
The main window displays:
- Overall protection status of your device.
- Messages that indicate app component statuses and protection issues.
There are three types of messages:
- Highlighted in green. Status messages that inform you that protection is active in the specified area.
- Highlighted in yellow. Information messages that inform you about events that may affect device security.
- Highlighted in red. Critical messages that inform you about events of critical importance to device security.
You can tap a message for details.
Page top
Updating the app
You can download the latest version of the Kaspersky Security for iOS app from the App Store and install it on your device by following the standard update procedure on the iOS platform. You can also turn on automatic updates. The app does not require any additional configuration after the update.
The following conditions must be met in order for the app to be updated:
- You must have an Apple ID.
- The device must be linked to your Apple ID.
- The device must be connected to the internet.
To learn more about creating an Apple ID, linking your device to your Apple ID, or working with the App Store, see the Apple support website.
Updates functionality (including providing anti-malware signature updates and codebase updates), as well as KSN functionality may not be available in the software in the U.S.
Page top
Using diagnostics to troubleshoot issues
If you experience issues with Kaspersky Security for iOS, Kaspersky Technical Support specialists may ask you to send them a file with diagnostic information. This file allows Technical Support specialists to track down the causes of problems in the operation of the app.
In order to share a file with diagnostic information, diagnostics must be enabled in Kaspersky Security for iOS.
We recommend that you enable diagnostics only if asked to do so by a Kaspersky Technical Support specialist.
Saving diagnostic information may affect your internet connection speed and the performance of your device, Kaspersky Security for iOS, and other apps.
You can delete the file with diagnostic information manually in the Files app.
To enable diagnostics:
- In the main window, tap
.
- In the About the App window that opens, tap Diagnostics.
- In the Diagnostics window that opens, enable diagnostics using the Diagnostics toggle switch.
- Accept the Support Statement. The Support Statement describes what data is saved in the file with diagnostic information.
- Tap OK.
Diagnostics will be enabled on your device. Data on the operation of Kaspersky Security for iOS will now be saved in a file with diagnostic information. If you experience an issue, you can share this file with a Kaspersky Technical Support specialist.
Page top
Removing the app
To remove the Kaspersky Security for iOS app, follow the standard procedure on the iOS platform:
- On the Home screen, touch and hold the app icon.
- Remove the app.
The Kaspersky Security for iOS app is removed from your device.
Page top
Application licensing
This section provides information about the general terms related to licensing Kaspersky Secure Mobility Management.
About the End User License Agreement
The End User License Agreement (EULA) is a binding agreement between you and AO Kaspersky Lab, stipulating the Terms and Conditions on which you may use Kaspersky Secure Mobility Management.
We recommend carefully reading the Terms and Conditions of the EULA before using Kaspersky Secure Mobility Management.
You can view the Terms and Conditions of the EULA in the following ways:
- During installation of components of Kaspersky Secure Mobility Management.
- By reading the license.txt file included in the self-extracting archive of the distribution kit for installing the Kaspersky Endpoint Security for Android app.
- In the About the app section in Kaspersky Endpoint Security for Android.
- In the About the App → Agreements and Statements section in Kaspersky Security for iOS.
- In the Advanced → Accepted License Agreements section in the Administration Server properties. This feature is available in Kaspersky Security Center version 12.1 and later.
- In the General → End User License Agreements section in the Administration Server properties of Kaspersky Security Center Web Console.
- At step 4 of the process of connecting mobile devices to Kaspersky Security Center Web Console, if Administrator was selected at step 3. The administrator will be prompted to accept the EULA.
- During app installation, if Users was selected at step 3 of the process of connecting mobile devices to Kaspersky Security Center Web Console. The mobile device user will be prompted to accept the EULA.
By confirming that you agree with the End User License Agreement (EULA) when installing the components of Kaspersky Secure Mobility Management, you signify your acceptance of the Terms and Conditions of the End User License Agreement. If you do not accept the terms of the End User License Agreement, you must cancel installation of Kaspersky Secure Mobility Management components and refrain from using them.
Page top
About the license
A license is a time-limited right to use Kaspersky Secure Mobility Management, granted under the terms of the signed License Contract (End User License Agreement).
The scope of services and validity period depend on the license under which the solution is used.
The following license types are provided:
- Trial
A free license intended for trying out the Kaspersky Secure Mobility Management.
A trial license is valid for 30 days. When a trial license expires, the Kaspersky Endpoint Security for Android mobile app and the Kaspersky Security for iOS mobile app stop performing most functions, except for synchronization with the Administration Server. To continue using the apps, you need to purchase a commercial license.
- Commercial
A paid license.
When a commercial license expires, the mobile apps continue to work, but with limited functionality.
In limited functionality mode, the following components are available depending on the app.
- Kaspersky Endpoint Security for Android app:
- Anti-Malware. Real-time Protection and malware scan of the device are available, but anti-malware database updates are not available.
- Anti-Theft. Only sending commands to mobile device is available.
- Synchronization with the Administration Server.
Kaspersky Endpoint Security for Android stops exchanging information with Kaspersky Security Network, Google Analytics for Firebase, Firebase Performance Monitoring, and Crashlytics if the Kaspersky key is blocked, if a trial license expires or if a license is missing (the activation code is removed from the policy).
- Kaspersky Security for iOS app:
- Synchronization with the Administration Server.
Kaspersky Security for iOS stops exchanging information with Kaspersky Security Network if a trial license expires or if a license is missing (the activation code is removed from the policy).
The remaining components of the mobile apps are not available to the device user and you cannot configure policy settings.
To continue using the full functionality of the apps and configure policy settings, you must renew your commercial license. To ensure uninterrupted protection of your users' devices against all security threats, we recommend renewing the license term or buying a new license before the current one expires.
With a license that does not provide extended Kaspersky Secure Mobility Management functionality, only basic device protection settings are available in the Kaspersky Mobile Devices Protection and Management plug-in.
- Kaspersky Endpoint Security for Android app:
Viewing license information
The Kaspersky Mobile Devices Protection and Management plug-in lets you view the following information about the current license:
- License key
- The number of devices on which the license key can be used
- License type
- License expiration date and time
- Number of days until the license expires
- The type of functionality available under the current license
To view information about the current license:
- In the main window of Kaspersky Security Center Web Console, select Assets (Devices) → Policies & profiles. In the list of group policies that opens, click the name of the policy that you want to configure.
- In the policy properties window, select Application settings.
- Click License.
The License window containing information about the license opens.
Page top
About the subscription
Subscription for Kaspersky Secure Mobility Management is an order for using the mobile app with the selected parameters (subscription expiry date, number of mobile devices protected). You can order subscription for Kaspersky Secure Mobility Management from your service provider (such as your ISP). Subscription can be renewed manually or automatically, or you may cancel your subscription. You can manage your subscription on the website of the service provider.
Subscription can be limited (for example, one-year) or unlimited (with no expiration date). To keep Kaspersky Secure Mobility Management working after expiry of the limited subscription term, you have to renew your subscription. Unlimited subscription is renewed automatically provided a prepayment to the service provider was timely.
If the subscription is limited, when it expires you may be offered a grace period for renewing the subscription, during which time the apps will retain their functionality. The availability and duration of such grace period are at the discretion of the service provider.
To use Kaspersky Secure Mobility Management under subscription, you have to apply the activation code received from the service provider. After the activation code is applied, the key is installed for the license for using the application under subscription.
The possible subscription management options may vary with each service provider. The service provider may not offer a subscription renewal grace period during which the apps will retain their functionality.
Activation codes purchased under subscription cannot be used for activating earlier versions of Kaspersky Secure Mobility Management.
Page top
About the license key
A license key is a sequence of bits that you can apply to activate and then use the integrated solution Kaspersky Secure Mobility Management in accordance with the terms of the End User License Agreement. License keys are generated by Kaspersky specialists.
You can add a license key for the mobile app by using a key file or an activation code:
- If your organization has deployed the Kaspersky Security Center software suite, you have to apply the key file and distribute it to Android mobile apps. The license key is displayed in the interface of Kaspersky Security Center and the interface of the Android mobile app as a unique alphanumeric sequence.
After adding license keys, you can replace them with other license keys.
You can't activate the Kaspersky Security for iOS app with a key file.
- If your organization does not use Kaspersky Security Center, you have to share the activation code with the user. The user enters this activation code in the Android or iOS mobile app. The license key is displayed in the mobile app interface as a unique alphanumeric sequence.
The license key may be blocked by Kaspersky if, for example, the terms of the End User License Agreement have been violated. If the license key has been blocked, the mobile apps stop performing all their functions except for synchronization with the Administration Server. To continue using the apps, you need to add a different license key.
Page top
About the activation code
Activation code is a unique sequence of 20 alphanumeric characters. You enter an activation code to add a key that activates the Kaspersky Endpoint Security for Android mobile app or the Kaspersky Security for iOS mobile app. You receive the activation code at the email address that you have specified after purchasing the integrated solution Kaspersky Secure Mobility Management or after ordering the trial version of Kaspersky Secure Mobility Management.
To activate the mobile app by using the activation code, you need internet access to connect to Kaspersky activation servers.
If you have lost your activation code after you activated the app, it can be restored. You may need your activation code, e.g., to register with Kaspersky CompanyAccount. To restore the activation code, contact Kaspersky Technical Support.
Page top
About the key file
A key file is a file with the .key extension that you receive from Kaspersky. The purpose of a key file is to add a key that activates the Kaspersky Endpoint Security for Android app.
You can't activate the Kaspersky Security for iOS app with a key file.
You receive a key file at the email address that you provided when you bought the integrated solution Kaspersky Secure Mobility Management or ordered the trial version of Kaspersky Secure Mobility Management.
You do not need to connect to Kaspersky activation servers in order to activate the application with a key file.
You can restore a key file if it has been accidentally deleted. You may need a key file to register a Kaspersky CompanyAccount, for example.
To restore your key file, perform any of the following actions:
- Contact the license seller.
- Receive a key file through Kaspersky website by using your available activation code.
Data provision in Kaspersky Endpoint Security for Android
Kaspersky Secure Mobility Management complies with the General Data Protection Regulations (GDPR).
To install the app, either you or a device user must read and accept the terms of the End User License Agreement. In addition, you can configure a policy to accept the Statements listed below globally, for all users. Otherwise, users will be prompted by a notification on the main app screen to accept the following Statements regarding the processing of the user's personal data:
- Kaspersky Security Network Statement
- Statement regarding data processing for Web Protection
- Statement regarding data processing for marketing purposes
If you choose to accept the statements globally, the versions of the statements accepted via Kaspersky Security Center must match the versions already accepted by users. Otherwise, the users will be informed about the issue and prompted to accept the version of a statement that matches the version accepted globally by the administrator. The device status in the Kaspersky Mobile Devices Protection and Management plug-in will also change to Warning.
The user may accept the terms of a Statement or decline them at any time in the About the app section in the settings of Kaspersky Endpoint Security for Android.
Information exchange with Kaspersky Security Network
To improve real-time protection, Kaspersky Endpoint Security for Android uses the Kaspersky Security Network cloud service for operating the following components:
- Anti-Malware. The app obtains access to the Kaspersky online knowledge base regarding the reputation of files and apps. The scan is performed for threats whose information has not yet been added to anti-malware databases but is already available in KSN. Kaspersky Security Network cloud service provides full operation of Anti-Malware and reduces the likelihood of false alarms.
- Web Protection and Web Control. The app uses data received from KSN to scan websites before they are opened. The app also determines the website category to control internet access to users, based on lists of allowed and blocked categories (for example, the "Internet communication" category).
- App Control. The app determines the app category to restrict the startup of apps that do not meet corporate security requirements, based on lists of allowed and blocked categories (for example, the "Games" category).
Information on the type of data submitted to Kaspersky when using KSN during operation of Anti-Malware and App Control is available in the End User License Agreement. By accepting the terms and conditions of the License Agreement, you agree to transfer this information.
Information on the type of data submitted to Kaspersky when using KSN during operation of Web Protection is available in the Statement regarding data processing for Web Protection. By accepting the terms and conditions of the Statement, you agree to transfer this information.
Information on the type of statistic data submitted to Kaspersky when using KSN during operation of the Kaspersky Endpoint Security for Android mobile app is available in the Kaspersky Security Network Statement. By accepting the terms and conditions of the Statement, you agree to transfer this information.
Data provision under the End User License Agreement
Where the Activation Code is used to activate the Software, in order to verify legitimate use of the Software, the End User agrees to periodically provide the Rightholder the following information:
- format of the data in the request to Rightholder infrastructure; accessed IPv4 address of the web service; size of the content of the request to Rightholder infrastructure; protocol ID; Software activation code; data compression type; Software ID; set of IDs of Software that can be activated on the user's device; Software localization; full version of the Software; unique device ID; date and time on the user's device; Software installation ID (PCID); OS version, OS build number, OS update number, OS edition, extended information about the OS edition; device model; operating system family; format of the data in the request to Rightholder infrastructure; checksum type for the object being processed; Software license header; ID of a regional activation center; Software license key creation date and time; Software license ID; ID of the information model used to provide the Software license; Software license expiration date and time; current status of the Software license key; type of Software license used; type of the license used to activate the Software; Software ID derived from the license.
In order to protect the Computer against information security threats, the End User agrees to periodically provide the Rightholder the following information:
- checksum type for the object being processed; checksum of the object being processed; the Software component ID;
- ID of the triggered record in the Software's anti-malware databases; timestamp of the triggered record in the Software's anti-malware databases; type of the triggered record in the Software's anti-malware databases; name of the detected malware or legitimate software that can be used to damage the user's device or data;
- name of store from which the application was installed; application package name; public key used to sign the APK file; checksum of the certificate used to sign the APK file; digital certificate timestamp;
- full version of the Software; Software update ID; type of installed Software; the config identifier; the result of the Software action; error code;
- numbers that are derived from the Android application APK file according to certain mathematical rules and that do not allow restoration of the original file content; this data does not contain file names, file paths, addresses, phone numbers, or other personal information of users.
If You use the Rightholder's update servers to download the Updates, the End User, in order to increase the efficiency of the update procedure, agrees to periodically provide the Rightholder the following information:
- Software ID derived from the license; full version of the Software; Software license ID; type of Software license used; Software installation ID (PCID); ID of the Software update start; web address being processed.
The Rightholder can use such information also for receiving statistical information about the distribution and use of the Software.
The received information is protected by Kaspersky in accordance with the requirements established by law. The original received information is stored in encrypted form and is destroyed as it is accumulated (twice per year) or at the request of the User. General statistics are stored indefinitely.
Data provision under the Kaspersky Security Network Statement
Use of the KSN could lead to increase the effectiveness of protection provided by the Software, against information and network security threats.
If you use a license for 5 or more nodes, the Rightholder will automatically receive and process the following data during use of the KSN:
- ID of the triggered record in the Software's anti-malware databases; timestamp of the triggered record in the Software's anti-malware databases; type of the triggered record in the Software's anti-malware databases; release date and time of the Software's databases; OS version, OS build number, OS update number, OS edition, extended information about the OS edition; OS Service Pack version; detect characteristics; checksum (MD5) of the object being processed; name of the object being processed; flag indicating whether the object being processed is a PE file; checksum (MD5) of the mask that blocked the web service; checksum (SHA256) of the object being processed; size of the object being processed; object type code; the Software's decision on the object being processed; path to the object being processed; directory code; version of the Software's component; version of the statistics being sent; accessed address of the web service (URL, IP); type of client used to access the web service; accessed IPv4 address of the web service; accessed IPv6 address of the web service; web address of the source of the web service request (referer); web address being processed;
- information about scanned objects (application version from AndroidManifest.xml; the Software's decision on the application; method used to get the Software's decision on the application; store installer package name; package name (or bundle name) from AndroidManifest.xml; Google SafetyNet category; flag indicating whether the SafetyNet is enabled on the device; SHA256 value from Google SafetyNet response; APK Signature Scheme for the APK certificate; version code of the installed Software; serial number of the certificate that was used to sign the APK file; name of the APK file that is being installed; path to the APK file that is being installed; issuer of the certificate that was used to sign the APK file; public key used to sign the APK file; checksum of the certificate used to sign the APK file; date and time when the certificate expires; date and time when the certificate was issued; version of the statistics being sent; algorithm for calculating the digital certificate thumbprint; MD5 hash of the installed APK file; MD5 hash of the DEX file located within the APK file; permissions granted dynamically to the application; third-party software version; flag indicating whether the application is the default SMS messenger; flag indicating whether the application has Device Administrator rights; flag indicating whether the application is in the system catalog; flag indicating whether the application uses accessibility services);
- information about all potentially malicious objects and activities (fragment content of the object being processed; date and time when the certificate expires; date and time when the certificate was issued; ID of the key from the keystore used for encryption; protocol used to exchange data with KSN; fragment order in the object being processed; data of the internal log, generated by the anti-malware Software module for an object being processed; certificate issuer name; public key of the certificate; calculation algorithm of public key of the certificate; certificate serial number; date and time of signing the object; certificate owner name and settings; digital certificate thumbprint of the scanned object and hashing algorithm; date and time of the last modification of the object being processed; date and time of creating an object being processed; objects or its parts being processed; description of an object being processed as defined in the object properties; format of the object being processed; checksum type for the object being processed; checksum (MD5) of the object being processed; name of the object being processed; checksum (SHA256) of the object being processed; size of the object being processed; Software vendor name; the Software's decision on the object being processed; version of the object being processed; source of the decision made for the object being processed; checksum of the object being processed; parent application name; path to the object being processed; information about file signature check results; logon session key; encryption algorithm for the logon session key; storage time for object being processed; algorithm for calculating the digital certificate thumbprint);
- build type, for example, "user" or "eng"; full product name; product/hardware manufacturer; whether apps can be installed from outside of Google Play; status of the cloud service for verification of Google apps; status of the cloud service for verification of Google apps being installed through ADB; current development codename or "REL" for production builds; incremental build number; user-visible version string; user device name; user-visible Software's build ID; firmware fingerprint; firmware ID; flag indicating whether the device is rooted; operating system; Software name; type of Software license used;
- information about the quality of KSN services (protocol used to exchange data with KSN; ID of the KSN service accessed by the Software; date and time when statistics stopped being received; number of KSN connections taken from the cache; number of requests for which a response was found in the local request database; number of unsuccessful KSN connections; number of unsuccessful KSN transactions; temporal distribution of cancelled requests to KSN; temporal distribution of unsuccessful KSN connections; temporal distribution of unsuccessful KSN transactions; temporal distribution of successful KSN connections; temporal distribution of successful KSN transactions; temporal distribution of successful requests to KSN; temporal distribution of requests to KSN that timed out; number of new KSN connections; number of unsuccessful requests to KSN caused by routing errors; number of unsuccessful requests caused by KSN being disabled in the Software settings; number of unsuccessful requests to KSN caused by network problems; number of successful KSN connections; number of successful KSN transactions; total number of requests to KSN; date and time when statistics started being received);
- device ID; full version of the Software; Software update ID; Software installation ID (PCID); type of installed Software;
- device screen height; device screen width; information about the overlapping application: MD5 hash of the APK file; information about the overlapping application: MD5 hash of the classes.dex file; information about the overlapping application: name of the APK file; information about the overlapping application: path to the APK file without the file name; overlap height; information about the overlapped Software: MD5 hash of the APK file; overlapped application information: classes.dex file MD5 hash; overlapped application information: APK file name; overlapped application information: path to APK file without file name; overlapped application information: application package name (for the overlapped application: if the advertisement is shown on an empty desktop, the value should be "launcher"); overlap date and time; information about the overlapping application: application package name; overlap width;
- settings of the Wi-Fi access point in use (detected device type; DHCP settings (checksums of gateway local IPv6, DHCP IPv6, DNS1 IPv6, DNS2 IPv6; checksum of network prefix length; checksum of local address IPv6); DHCP settings (checksums of the local IP address of the gateway, DHCP IP, DNS1 IP, DNS2 IP, and subnet mask); flag indicating whether the DNS domain exists; checksum of the assigned local IPv6 address; checksum of the assigned local IPv4 address; flag indicating whether the device is plugged in; Wi-Fi network authentication type; list of available Wi-Fi networks and their settings; checksum (MD5 with salt) of the MAC address of the access point; checksum (SHA256 with salt) of the MAC address of the access point; connection types supported by the Wi-Fi access point; Wi-Fi network encryption type; local time of the start and end of the Wi-Fi network connection; Wi-Fi network ID based on the MAC address of the access point; Wi-Fi network ID based on the Wi-Fi network name; Wi-Fi network ID based on the Wi-Fi network name and the MAC address of the access point; Wi-Fi signal strength; Wi-Fi network name; set of authentication protocols supported by this configuration; authentication protocol used for a WPA-EAP connection; internal authentication protocol; set of group ciphers supported by this configuration; set of key management protocols supported by this configuration; the network's final privacy category in the Software; the network's final security category in the Software; set of block ciphers for WPA that are supported by this configuration; set of security protocols supported by this configuration);
- installation date and time for the Software; Software activation date; identifier of the partner organization via which the Software license order was placed; Software ID derived from the license; serial number of the Software license key; Software localization; flag indicating whether participation in KSN is enabled; ID of the licensed Software; Software license ID; OS ID; operating system bit version.
Also, in order to achieve the declared purpose of increasing the effectiveness of protection provided by the Software, the Rightholder may receive objects that could be exploited by intruders to harm the Computer and create information security threats.
Providing the above information to the KSN is voluntary. You can opt out of participating in Kaspersky Security Network at any time.
If the latest version of the Kaspersky Security Network Statement is not accepted, only statistics listed in the previously accepted version of the Statement are sent to Kaspersky Security Network.
Data provision under the Statement regarding data processing for Web Protection
According to Web Protection Statement the Rightholder processes data in order for Web Protection functionality. The stated purpose includes detecting web threats and determining the categories of visited websites using Kaspersky Security Network (KSN).
With Your consent, the following data will be automatically sent on a regular basis to the Rightholder under the Web Protection Statement:
- Product version; Unique device identifier; Installation ID; Product type.
- URL address of the page, port number, URL protocol, URL, which refers to the requested information.
Data provision under the Statement regarding data processing for marketing purposes
The Rightholder uses third-party information systems to process data. Their data processing is governed by the privacy statements of such third-party information systems. The following are the services that the Rightholder uses and the data they process:
Google Analytics for Firebase
During use of the Software, the following data will be sent to Google Analytics for Firebase automatically and on a regular basis in order to achieve the declared purpose:
- app info (app version, app ID, and the ID of the app in the Firebase service, instance ID in the Firebase service, name of the store where the application was obtained, timestamp of the first launch of the Software)
- ID of app installation on the device and method of installation on the device
- information about the region and language localization
- information about the device screen resolution
- information about the user obtaining root
- information about setting Kaspersky Endpoint Security for Android as an Accessibility feature
- information about transitions between application screens, session duration, beginning and end of a screen session, screen name
- information about the protocol used to submit data to the Firebase service, its version, and ID of the data submission method used
- details on the type and parameters of the event for which data is submitted
- information about the app license, its availability, the number of devices
- information about the frequency of anti-malware database updates and synchronization with Administration Server
- information about the Administration Console (Kaspersky Security Center or third-party EMM systems)
- Android ID
- advertising ID
- information about the User: age category and gender, identifier of the country of residence, and list of interests
- information about the User's computer where the Software is installed: computer manufacturer name, type of computer, model, version and the language (locale) of the operating system, information about the application first opened in the last 7 days and the application first opened more than 7 days ago
Data is forwarded to Firebase over a secure channel. Information about how data is processed in Firebase is published at: https://firebase.google.com/support/privacy.
Firebase Performance Monitoring
During the use of the Software, the following data will be sent to Firebase Performance Monitoring automatically and on a regular basis in order to achieve the declared purpose:
- unique installation ID
- application package name
- version of the installed software
- battery level and battery-charging state
- carrier
- app foreground or background state
- geography
- IP address
- device language code
- information about the radio/network connection
- pseudonymous Software instance ID
- RAM and disk size
- flag indicating whether the device is jailbroken or rooted
- signal strength
- duration of automated traces
- network, and the following corresponding information: response code, payload size in bytes, response time
- device description
Data is forwarded to Firebase Performance Monitoring over a secure channel. Information about how data is processed in Firebase Performance Monitoring is published at: https://firebase.google.com/support/privacy.
Crashlytics
During the use of the Software, the following data will be sent to Crashlytics automatically and on a regular basis in order to achieve the declared purpose:
- Software ID
- version of the installed software
- flag indicating whether the Software was running in the background
- CPU architecture
- unique event ID
- event date and time
- device model
- total disk space and amount currently used
- name and version of the OS
- total RAM and amount currently used
- flag indicating whether the device is rooted
- screen orientation at the time of the event
- product/hardware manufacturer
- unique installation ID
- version of the statistics being sent
- the Software exception type
- text of the error message
- a flag indicating that the Software exception was caused by a nested exception
- thread ID
- a flag indicating whether the frame was the cause of the Software error
- a flag indicating that the thread caused the Software to terminate unexpectedly
- information about the signal that caused the Software to terminate unexpectedly: signal name, signal code, signal address
- for each frame associated with a thread, exception, or error: the name of the frame file, line number of the frame file, debug symbols, address and offset in the binary image, display name of the library with the frame, type of the frame, flag indicating whether the frame was the cause of the error
- OS ID
- ID of the issue associated with the event
- information about events that happened before the Software terminated unexpectedly: event identifier, event date and time, event type and value
- CPU register values
- event type and value
Data is forwarded to Crashlytics over a secure channel. Information about how data is processed in Crashlytics is published at: https://firebase.google.com/terms/crashlytics-app-distribution-data-processing-terms.
Providing the above information for processing for marketing purposes is voluntary.
Page top
Data provision in Kaspersky Security for iOS
Kaspersky Secure Mobility Management complies with the General Data Protection Regulations (GDPR).
To install the app, a device user must read and accept the terms of the following statements regarding the processing of the user's personal data:
- End User License Agreement
- Products and Services Privacy Policy
Optionally, the user may read and accept the terms of the following statement:
- Kaspersky Security Network Statement
- Support Statement
The user can view the terms of these documents at any time in the About the App → Agreements and Statements section in the settings of Kaspersky Security for iOS. In this section, the user can also accept or decline the terms of the KSN Statement.
Information exchange with Kaspersky Security Network
To improve real-time protection, Kaspersky Security for iOS uses the Kaspersky Security Network cloud service for operating the Web Protection component. The app uses data received from KSN to scan web resources before they are opened.
Information on the type of data submitted to Kaspersky when using KSN during operation of Web Protection is available in the End User License Agreement. By accepting the terms and conditions of the License Agreement, you agree to transfer this information.
Information on the type of statistic data submitted to Kaspersky when using KSN during operation of the Kaspersky Security for iOS mobile app is available in the Kaspersky Security Network Statement. By accepting the terms and conditions of the Statement, you agree to transfer this information.
Data provision under the End User License Agreement
Where the Activation Code is used to activate the Software, in order to verify legitimate use of the Software, the End User agrees to periodically provide the Rightholder the following information:
- Format of the data in the request to Rightholder's infrastructure; accessed IPv4 address of the web service; size of the content of the request to Rightholder infrastructure; protocol ID; Software activation code; data compression type; Software ID; set of IDs of Software that can be activated on the user's device; Software localization; full version of the Software; unique device ID; date and time on the user's device; Software installation ID (PCID); currently used Software activation code; OS version, OS build number, OS update number, OS edition, extended information about the OS edition; device model; mobile carrier code; operating system family; Software ID derived from the license; list of agreements presented to the user by the Software; type of legal agreement accepted by the user while using the Software; version of the legal agreement accepted by the user while using the Software; flag indicating whether the user has accepted the terms of the legal agreement while using the Software; checksum type for the object being processed; Software license header; ID of a regional activation center; Software license key creation date and time; Software license ID; ID of the information model used to provide the Software license; Software license expiration date and time; current status of the Software license key; type of Software license used; type of the license used to activate the Software; Software ID derived from the license.
The Rightholder can use such information also for obtaining statistical information about the distribution and use of the Rightholder's Software.
In order to protect the Computer against information security threats, the End User agrees to periodically provide the Rightholder the following information:
- Format of the data in the request to Rightholder's infrastructure; accessed address of the web service (URL, IP); port number; web address of the source of the web service request (referrer).
- Full version of the Software; Software update ID; type of the installed Software; Software ID; the configuration identifier; the result of the Software action; error code.
- Web address being processed; accessed IPv4 address of the web service; digital certificate thumbprint of the scanned object and hashing algorithm; certificate type; contents of the digital certificate being processed.
Data provision under the Kaspersky Security Network Statement
When the KSN Statement is accepted, the Rightholder automatically receives and processes the following data:
- Information about the quality of KSN services (protocol used to exchange data with KSN; ID of the KSN service accessed by the Software; date and time when statistics stopped being received; number of KSN connections taken from the cache; number of requests for which a response was found in the local request database; number of unsuccessful KSN connections; number of unsuccessful KSN transactions; temporal distribution of cancelled requests to KSN; temporal distribution of unsuccessful KSN connections; temporal distribution of unsuccessful KSN transactions; temporal distribution of successful KSN connections; temporal distribution of successful KSN transactions; temporal distribution of successful requests to KSN; temporal distribution of requests to KSN that timed out; number of new KSN connections; number of unsuccessful requests to KSN caused by routing errors; number of unsuccessful requests caused by KSN being disabled in the Software settings; number of unsuccessful requests to KSN caused by network problems; number of successful KSN connections; number of successful KSN transactions; total number of requests to KSN; date and time when statistics started being received).
- Device ID; full version of the Software; Software update ID; Software installation ID (PCID); type of the installed Software.
- Installation date and time for the Software; Software activation date; Software localization; flag indicating whether participation in KSN is enabled; ID of the licensed Software; Software license ID; OS ID; version of the operating system installed on the user's computer; operating system bit version.
Providing the above information to the KSN is voluntary. You can opt out of participating in Kaspersky Security Network at any time.
Data provision under the Support Statement
When diagnostics are enabled in Kaspersky Security for iOS, the app processes and stores the following personal data for further analysis by Technical Support:
- Event date and time.
- HTTP codes and data for server requests to the Rightholder's systems: request body; request URL; server responses; errors.
- Data on all network requests: request URL; traffic check status.
- License information: license ID and activation code; validity period of the current license data package; current Software key status; operating mode after the license expires; Software activation date; license expiration date; order number when purchasing the license.
- Information about the connection with the Administration Server: certificate password; Administration Server connection address; unique device ID; users' certificates data; Administration Server certificates data; Software settings received from the Administration Server.
- System events: opening and closing the Software; push notifications from the Software.
- Information about the operation of the Software and its modules.
- OS version; OS type.
- Device ID; device type.
- Software ID; Software language ID; Software version; Software installation ID.
- Information about Software errors.
Providing the above information to the Technical Support is voluntary.
Page top
Comparison of solution features by management tool
You can manage mobile devices in Kaspersky Security Center using the following management tools:
- Microsoft Management Console-based (hereinafter referred to as "MMC-based") Administration Console of Kaspersky Security Center
- Kaspersky Security Center Web Console
The table below compares the features that are available in these tools.
Availability of features by management tool
|
MMC-based Console |
Web Console |
---|---|---|
Mobile device management |
||
Android device management |
||
iOS device management |
||
Aurora device protection |
Not available |
|
Deployment |
||
Add devices using an App Store link |
Available |
|
Add devices by creating an installation package |
||
Add devices directly to the administration group after devices connect |
Not available |
|
Create policies divided by operating modes |
Not available |
|
Send commands to mobile devices |
||
Remove mobile devices from Kaspersky Security Center |
||
Certificate management |
||
Issue mail certificates |
||
Issue VPN certificates |
||
Issue mobile certificates |
||
Issue mobile certificates through Administration Server tools |
||
Specify certificate files |
||
Integrate with Public Key Infrastructure (PKI) |
||
Policy management |
||
Role-based access to configuring group policies |
Available |
|
Configure mobile device synchronization with Kaspersky Security Center |
||
Configure malware scans on mobile devices |
||
Configure anti-malware database updates |
||
Configure device protection on the internet |
||
Configure protection of stolen or lost device data |
||
Configure the device unlock password strength |
||
Configure user access to websites |
||
Configure App Control |
||
Configure Compliance Control |
||
Configure permission granting rules for installed apps |
||
Configure Android work profiles / corporate containers |
||
Configure device feature restrictions |
||
Configure connections to Wi-Fi networks |
||
Configure VPN |
||
Manage app configurations |
||
Samsung Knox |
||
iOS MDM Server features |
||
Install and configure iOS MDM Server |
||
Issue APNs certificates |
||
Connect iOS MDM devices |
||
Sign an iOS MDM profile by a certificate |
||
iOS MDM Server events |
||
Install apps |
||
Add a configuration profile |
||
Add a provisioning profile |
Not available |
|
Other features |
||
Global acceptance of EULA in Kaspersky Security Center |
||
Configure Kaspersky Private Security Network |
Contact Technical Support
This section describes how to get technical support and the terms on which it is available.
How to get technical support
If you can't find a solution to your issue in the Kaspersky Secure Mobility Management documentation or in any of the sources of information about Kaspersky Secure Mobility Management, contact Technical Support. Technical Support specialists will answer all your questions about installing and using Kaspersky Secure Mobility Management.
Kaspersky provides support of Kaspersky Secure Mobility Management during its lifecycle (see the product support lifecycle page). Before contacting Technical Support, please read the support rules.
You can contact Technical Support in one of the following ways:
- By visiting the Technical Support website
- By sending a request to Technical Support from the Kaspersky CompanyAccount portal
Technical support via Kaspersky CompanyAccount
Kaspersky CompanyAccount is a portal for companies that use Kaspersky applications. The Kaspersky CompanyAccount portal is designed to facilitate interaction between users and Kaspersky specialists through online requests. You can use Kaspersky CompanyAccount to track the status of your online requests and store a history of them as well.
You can register all of your organization's employees under a single account on Kaspersky CompanyAccount. A single account lets you centrally manage electronic requests from registered employees to Kaspersky and also manage the privileges of these employees via Kaspersky CompanyAccount.
The Kaspersky CompanyAccount portal is available in the following languages:
- English
- Spanish
- Italian
- German
- Polish
- Portuguese
- Russian
- French
- Japanese
To learn more about Kaspersky CompanyAccount, visit the Technical Support website.
Page top
Sources of information about the application
Kaspersky Secure Mobility Management web page on the Kaspersky website
On the Kaspersky Secure Mobility Management page, you can find general information about the application, its features and operation parameters.
The web page of Kaspersky Secure Mobility Management provides a link to eStore. There you can purchase or renew the application.
Kaspersky Secure Mobility Management web page in the Knowledge Base
Knowledge Base is a section on the Kaspersky Customer Service website.
On the Kaspersky Secure Mobility Management page in the Knowledge Base you can find articles that contain useful information, recommendations and answers to frequently asked questions on the application purchasing, installation, and use.
Knowledge Base articles can answer questions relating to not only to Kaspersky Secure Mobility Management but also to other Kaspersky applications. Knowledge Base articles can also include Technical Support news.
Help
The Help of the application comprises help files.
The context help of administration plug-ins for Kaspersky Secure Mobility Management provides information about the windows of Kaspersky Security Center: a description of Kaspersky Secure Mobility Management settings and links to descriptions of the tasks that use these settings.
Full help of the Kaspersky Endpoint Security for Android and Kaspersky Security for iOS apps provides information on how to configure and use mobile apps.
Discussing Kaspersky applications on Kaspersky Support Forum
If your question does not require an immediate answer, you can discuss it with Kaspersky experts and other users on our Forum.
On the Forum, you can view discussion topics, post your comments, and create new discussion topics.
Page topGlossary
Activating the application
Switching the application to fully functional mode. Application activation is performed by the user during or after installation of the application. You should have an activation code or key file to activate the application.
Activation code
A code that you receive when purchasing a license for Kaspersky Endpoint Security. This code is required for activating the application.
The activation code is a unique sequence of twenty letters and numbers in the format xxxxx-xxxxx-xxxxx-xxxxx.
Administration group
A set of managed devices, such as mobile devices grouped according to the functions they perform and the set of apps installed on them. Managed devices are grouped so that they can be managed as a single whole. For example, mobile devices running the same operating system can be combined into an administration group. A group may include other administration groups. It is possible to create group policies and group tasks for group devices.
Administration Server
A component of Kaspersky Security Center that centrally stores information about all Kaspersky applications that are installed within the corporate network. It can also be used to manage these applications.
Administrator's workstation
The computer on which Kaspersky Security Center Web Console has been deployed. If the application administration plug-in is installed on the administrator's workstation, the administrator can manage Kaspersky Endpoint Security mobile apps deployed on user devices.
Anti-malware databases
Databases that contain information about computer security threats known to Kaspersky as of when the anti-malware databases are released. Entries in anti-malware databases allow malicious code to be detected in scanned objects. Anti-malware databases are created by Kaspersky experts and updated hourly.
Apple Push Notification service (APNs) certificate
Certificate signed by Apple, which allows you to use Apple Push Notification. Through Apple Push Notification, an iOS MDM Server can manage iOS and iPadOS devices.
Application management plug-in
A dedicated component that provides the interface for managing Kaspersky applications through Web Console. Each application that can be managed through Kaspersky Security Center SPE has its own management plug-in. The management plug-in is included in all Kaspersky applications that can be managed via Kaspersky Security Center.
Basic control
A device operating mode for personal iOS devices. This operating mode lets you perform the protection and basic management of devices.
Basic protection
A device operating mode for personal iOS devices. This operating mode lets you perform the protection against web threats and jailbreak detection on devices using the Kaspersky Security for iOS.
Certificate Signing Request
File with the settings of an Administration Server, which is approved by Kaspersky and then sent to Apple to obtain an APNs certificate.
Compliance Control
Verification that the settings of a mobile device and Kaspersky Endpoint Security for Android comply with corporate security requirements. Corporate security requirements regulate the device usage. For example, real-time protection must be enabled on the device, the anti-malware databases must be up-to-date, and the device password must be strong enough. Compliance control is based on a list of rules. A compliance rule includes the following components:
- Device check criterion (for example, absence of prohibited apps on the device)
- Time interval allocated for the user to fix the noncompliance (for example, 24 hours)
- Action that will be taken on the device if the user does not fix the noncompliance within the time set (for example, locking the device)
Corporate container
A safe environment on the user's device in which the administrator can manage apps and user accounts without restricting the use of personal data by the user. When a corporate container is created on the user's mobile device, the following corporate apps are automatically installed in the corporate container: Google Play, Google Chrome, Downloads, Kaspersky Endpoint Security for Android, and others. Corporate apps installed in the corporate container and notifications of these apps are marked with a briefcase icon. You have to create a separate Google corporate account for the Google Play app. Apps installed in the corporate container appear in the common list of apps.
Corporate device
A device operating mode for company-owned Android devices. This operating mode lets you have full control over the entire device and configure an extended set of security settings and features.
Device administrator
A set of app rights on an Android device that enables the app to use device management policies. It is necessary to implement full functionality of Kaspersky Endpoint Security on Android devices.
Device management profile
A profile that contains a set of settings for connecting iOS mobile devices to the Administration Server. A device management profile makes it possible to distribute iOS configuration profiles in background mode using the iOS MDM Server, and also receive extended diagnostic information about mobile devices. A link to the device management profile needs to be sent to a user in order to enable the iOS MDM Server to discover and connect the user's iOS mobile device.
End User License Agreement
Binding agreement between you and AO Kaspersky Lab that stipulates the terms on which you may use the application.
Group task
A task intended for an administration group and performed on all managed devices included in the group.
IMAP
Protocol for accessing email. In contrast to the POP3 protocol, IMAP provides extended capabilities for working with mailboxes, such as managing folders and handling messages without copying their contents from the mail server. The IMAP protocol uses port 134.
Installation package
A set of files created for remote installation of a Kaspersky application by using the remote administration system. An installation package is created on the basis of dedicated files included in the application distribution package. The installation package contains a range of settings needed to install the application and get it running immediately after installation. The values of settings in the distribution kit correspond to default values of application settings.
iOS MDM device
An iOS mobile device controlled by the iOS MDM Server.
iOS MDM profile
A profile that contains a set of settings for connecting iOS mobile devices to the Administration Server. An iOS MDM profile makes it possible to distribute iOS configuration profiles in background mode using the iOS MDM Server, and also receive extended diagnostic information about mobile devices. A link to the iOS MDM profile needs to be sent to a user in order to enable the iOS MDM Server to discover and connect the user's iOS mobile device.
iOS MDM Server
A component of Kaspersky Endpoint Security that is installed on a client device, allowing connection of iOS mobile devices to the Administration Server and management of iOS mobile devices through Apple Push Notifications (APNs).
Kaspersky categories
Predefined data categories developed by Kaspersky experts. Categories can be updated during application database updates. A security officer cannot modify or delete predefined categories.
Kaspersky Private Security Network (KPSN)
Kaspersky Private Security Network is a solution that gives users of devices with Kaspersky applications installed access to reputation databases of Kaspersky Security Network and other statistical data—without sending data from their devices to Kaspersky Security Network. Kaspersky Private Security Network is designed for corporate customers who are unable to participate in Kaspersky Security Network for any of the following reasons:
- Devices are not connected to the internet.
- Transmission of any data outside the country or the corporate LAN is prohibited by law or corporate security policies.
Kaspersky Security Center Administrator
The person managing application operations through the Kaspersky Security Center remote centralized administration system.
Kaspersky Security Center Web Server
A component of Kaspersky Security Center that is installed together with Administration Server. Web Server is designed for transmission, over a network, of stand-alone installation packages, iOS MDM profiles, and files from a shared folder.
Kaspersky Security Network (KSN)
An infrastructure of cloud services that provides access to the Kaspersky database with constantly updated information about the reputation of files, web resources, and software. Kaspersky Security Network ensures faster responses by Kaspersky applications to threats, improves the performance of some protection components, and reduces the likelihood of false positives.
Kaspersky update servers
HTTP(S) servers at Kaspersky from which Kaspersky applications download database and application module updates.
Key file
A file in xxxxxxxx.key format that makes it possible to use a Kaspersky application under a trial or commercial license. The application generates the key file based on the activation code. You may use the application only when you have a key file.
License
A time-limited right to use the app, granted under the End User License Agreement.
License term
A time period during which you have access to the application features and rights to use additional services. The services you can use depend on the type of the license.
Malware
A program that infects other ones, by adding its code to them in order to gain control when infected files are run. This simple definition allows identifying the main action performed by any malware: infection.
Manifest file
A file in PLIST format containing a link to the app file (ipa file) located on a web server. It is used by iOS devices to locate, download, and install apps from a web server.
Network Agent
A Kaspersky Security Center component that enables interaction between the Administration Server and Kaspersky applications that are installed on a specific network node (workstation or server).
Personal device
A device operating mode for personal Android devices. This operating mode lets you perform the protection and basic management of devices.
Phishing
A type of internet fraud aimed at obtaining unauthorized access to users' confidential data.
Policy
A set of settings of the application and Kaspersky Endpoint Security mobile apps applied to devices in administration groups or to individual devices. Different policies can be applied to different administration groups. A policy includes the configured settings of all functions of Kaspersky Endpoint Security mobile apps.
POP3
Network protocol used by a mail client to receive messages from a mail server.
Proxy server
A computer network service which allows users to make indirect requests to other network services. First, a user connects to a proxy server and requests a resource (e.g., a file) located on another server. Then the proxy server either connects to the specified server and obtains the resource from it or returns the resource from its own cache (if the proxy has its own cache). In some cases, a user's request or a server's response can be modified by the proxy server for certain purposes.
Quarantine
The folder to which the Kaspersky application moves probably infected objects that have been detected. Objects are stored in Quarantine in encrypted form in order to avoid any impact on the computer.
SSL
A data encryption protocol used on the internet and local networks. The Secure Sockets Layer (SSL) protocol is used in web applications to create a secure connection between a client and server.
Standalone installation package
An installation file of Kaspersky Endpoint Security for the Android operating system, which contains the settings of application connection to the Administration Server. It is created on the basis of the installation package of this application and is a particular case of mobile app package.
Subscription
Enables use of the application within the selected parameters (expiration date and number of devices). You can pause or resume your subscription, renew it automatically, or cancel it.
Supervised device
iOS or iPadOS device whose settings are monitored by Apple Configurator, a program for group configuration of iOS and iPadOS devices. A supervised device has the supervised status in Apple Configurator. Every time a supervised device connects to the computer, Apple Configurator checks the device configuration against the specified reference settings, and then redefines them if necessary. A supervised device cannot be synchronized with Apple Configurator installed on a different computer.
Every supervised device provides more settings to redefine through the Kaspersky Device Management for iOS policy than a non-supervised device. For example, you can configure an HTTP proxy server to monitor internet traffic on a device within the corporate network. By default, all mobile devices are non-supervised.
Unlock code
A code that you can get in Kaspersky Security Center. It is needed to unlock a device after the Lock & Locate, Alarm, or Mugshot commands have been executed, and when Self-Defense is triggered.
Virtual Administration Server
A component of Kaspersky Security Center, designed for management of the protection system of a client organization's network.
Virtual Administration Server is a particular case of a secondary Administration Server and has the following restrictions as compared with a physical Administration Server:
- Virtual Administration Server can be created only on a primary Administration Server.
- Virtual Administration Server uses the primary Administration Server database in its operation. Data backup and restoration tasks, as well as update scan and download tasks, are not supported on a virtual Administration Server.
- Virtual Server does not support creation of secondary Administration Servers (including virtual Servers).
Information about third-party code
You can download and read information about third-party code in the following files:
- legal_notices_Android.txt (for the Kaspersky Endpoint Security for Android app)
- legal_notices_iOS.txt (for the Kaspersky Security for iOS app)
- legal_notices_iOS_MDM.txt (for iOS MDM Server and the iOS MDM Server settings plug-in)
On mobile devices, information about third-party code is available in the About the App section of the mobile apps.
Page top
Trademark notices
Registered trademarks and service marks are the property of their respective owners.
Adobe, Flash, and PostScript are either registered trademarks or trademarks of Adobe in the United States and/or other countries.
AMD64 is a trademark or registered trademark of Advanced Micro Devices, Inc.
Amazon, Amazon EC2, Amazon Web Services, AWS, and AWS Marketplace are trademarks of Amazon.com, Inc. or its affiliates.
Apache is either a registered trademark or a trademark of the Apache Software Foundation.
Apple, Apple Configurator, AirDrop, AirPlay, AirPort, AirPort Express, AirPrint, Aperture, App Store, Apple Music, Apple TV, Apple Watch, AppleScript, Bonjour, Face ID, FaceTime, FileVault, Find My, Find My Friends, Handoff, iBeacon, iBooks, iBooks Store, iCal, iCloud, iCloud Keychain, iMessage, iPad, iPadOS, iPhone, iPhoto, iTunes, iTunes Store, iTunes U, Keychain, macOS, OS X, Safari, Siri, Spotlight, and Touch ID are trademarks of Apple Inc.
Aruba Networks is a trademark of Aruba Networks, Inc. in the United States and certain other countries.
The Bluetooth word, mark and logos are owned by Bluetooth SIG, Inc.
Aironet, Cisco, Cisco AnyConnect, and IOS are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
Debian is a registered trademark of Software in the Public Interest, Inc.
Dell Technologies, Dell, SecurID, and other trademarks are trademarks of Dell Inc. or its subsidiaries.
F5 is a trademark of F5 Networks, Inc. in the U.S. and in certain other countries.
Google, Android, Chrome, Chromebook, Chromium, Crashlytics, Firebase, Gmail, Google Analytics, Google Assistant, Google Chrome, Google Mail, Google Maps, Google Mobile, Google Play, Google Safe Browsing, Google SafeSearch, Google Translate, Nexus, SPDY, and YouTube are trademarks of Google LLC.
HTC is a trademark of HTC Corporation.
HUAWEI and EMUI are trademarks of Huawei Technologies Co., Ltd.
IBM and Maas360 are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide.
Juniper Networks, Juniper, and JUNOS are trademarks or registered trademarks of Juniper Networks, Inc. in the United States and other countries.
Linux is the registered trademark of Linus Torvalds in the U.S. and other countries.
Microsoft, Active Directory, ActiveSync, Forefront, Microsoft Intune, Outlook, Tahoma, Windows, Windows Mobile, Windows Phone, and Windows Server are trademarks of the Microsoft group of companies.
MOTOROLA and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC.
Mozilla and Firefox are trademarks of the Mozilla Foundation in the U.S. and other countries.
OPPO is a trademark or registered trademark of Guangdong OPPO Mobile Telecommunications Co., Ltd.
Oracle, JavaScript are registered trademarks of Oracle and/or its affiliates.
Red Hat and Red Hat Enterprise Linux are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the United States and other countries.
The BlackBerry trademark is owned by Research In Motion Limited and is registered in the United States and may be pending or registered in other countries.
Samsung is a trademark of SAMSUNG in the United States or other countries.
SonicWALL, Aventail, and SonicWALL Mobile Connect are trademarks of SonicWall, Inc.
SOTI and MobiControl are registered trademarks of SOTI Inc. in the United States and in other jurisdictions.
Symantec is a trademark or registered trademark of Symantec Corporation or its affiliates in the U.S. and other countries.
Symbian trademark is owned by the Symbian Foundation Ltd.
AirWatch, VMware, and VMware Workspace ONE are registered trademarks and/or trademarks of VMware, Inc. in the United States and other countries.
Page top