Best Practices
See Manage Default Profiles for more information.
2. Though it is possible to save all settings in a single profile, an option worth considering is to create separate profiles dedicated to the implementation of a single setting group. You can apply multiple profiles at once to a device or group. For example, you could name a profile 'Android_passcode_profile' and configure only the passcode rules. You could create another called 'Android_VPN_settings' and so on. Adding or removing a profile from a device would let you quickly troubleshoot if a particular setting is causing issues.
See Create Configuration Profiles for more details.
3. Each license allows you to enroll one Windows / Mac / Linux endpoint or 5 mobile devices for a single user. You will need additional licenses for each device you add for a user. We encourage admins to evaluate the average number of devices per user and to set max. enrollments accordingly.
See Enroll Users' Devices for Management for more details.
4. Creating a group of devices is a great time-saver if the policies applied to them are going to be the same.
See Manage Device Groups for more details.
5. The first level of defense on any device is to set a complex passcode policy. Xcitium allows you specify passwords which are a combination of numbers, letters, special symbols and of a minimum length set by you. You can also set passcode lifetimes, reuse policy and define whether data should be automatically wiped after a certain number of failed logins.
6. Decide what restrictions are required for your company and your users. For example, disabling cell-phone cameras might be expected and mandatory in certain corporate environments but could be seen as a savage affront to liberties in more relaxed offices. Xcitium offers flexible restrictions for Android devices over items such as Wi-Fi, packet data, bluetooth connectivity and use of camera. iOS restrictions are much more granular and also include App purchases, game center, voice dialing and more.
See Profiles for Android Devices and Profiles for iOS Devices for more details.
7. Keep an eye on the apps you allow in your organization. Apps can be useful and productive to your employees but some may pose a malware or data-leak risk for your organization. Xcitium provides you the ability to blacklist and whitelist apps, to govern how apps behave and to determine whether users are allowed to install apps from 3rd party vendors. You can also remotely uninstall unwanted applications from Windows devices.
See Software Inventory for more details.
8. Keeping enrolled devices free from malware is vital to your organization's security. It is advisable to run antivirus scans on devices regularly per your company's needs. Xcitium allows you to create a scheduled antivirus scan profile that automates the process of AV scans. If needed, AV scans can also be run instantly for selected devices or all enrolled devices.
9. You can create custom roles for users which determine their permissions within Xcitium.
See Configure Role Based Access Control for Users for more details.
10. Keep on top of your devices. Check device status regularly for compliance with deployed profiles, and take advantage of Xcitium's detailed reporting system. See The Dashboards, Manage Devices and Security Systems or more details.