Profiles are the primary means to manage devices. Configure profiles so your Windows Desktop devices remain secure and configured to your preferred settings.

Overview

You can think of profiles as the settings and rules that, when combined with compliance policies, help you enforce corporate rules and procedures. They contain the settings, configurations, and restrictions that you want to enforce on devices.

A profile consists of the general profile settings and a specific payload. Profiles work best when they contain only a single payload. For more information on general profile settings, see Add General Profile Settings.

Windows Desktop profiles apply to a device at either the user level or the device level. When creating Windows Desktop profiles, you select the level the profile applies to. Some profiles can only be applied to the user level or device level. Workspace ONE UEM executes commands that apply to the device context even if the device has no active enrolled user login. User-specific profiles require an active enrolled user login.

Device Access

Some device profiles configure the settings for accessing a Windows Desktop device. Use these profiles to ensure that access to a device is limited only to authorized users.

Some examples of device access profiles include:

Device Security

Ensure that your Windows Desktop devices remain secure through device profiles. These profiles configure the native Windows security features or configure corporate security settings on a device through AirWatch.

Some examples of device security profiles include:

Device Configuration

Configure the various settings of your Windows Desktop devices with the configuration profiles. These profiles configure the device settings to meet your business needs.

Some examples of device configuration profiles include: