Compliance policies enable you to act upon devices that do not comply with set standards. For example, you can create compliance policies that detect when users install forbidden applications. Then configure the system to act automatically on devices with the non-compliance status.
You can create compliance policies for single applications using the Compliance List View, or for lists of applications using application groups. Although you are not required to use application groups, these groups enable you to take preventive actions on large numbers of non-compliant devices.
Example of Compliance Policy Actions
The compliance engine detects a user with a game-type application, which is one of the blacklisted applications in a blacklisted app group list. You can configure the compliance engine to take several actions.
- Send a push notification to the user prompting them to remove the application.
- Remove certain features such as Wi-Fi, VPN, or email profiles from the device.
- Remove specific managed applications and profiles.
- Send a final email notification to the user copying IT Security and HR.
Supported Platforms for Compliance Policies and Applications
You can configure an application list compliance policy for several platforms that acts on non-compliant devices.
- Apple iOS
For information on how to configure compliance policies for application management, see Build an Application Compliance Policy.
For information on compliance policies and app groups, see Application Groups and Compliance.