More

    Detection of failed attempts to exit Scalefusion

    Share On

    Scalefusion helps companies to lock down the devices and enforce policies which make it easy to manage these devices and put them to effective use. Many times users might try to get out of the lock mode. They try to do this by entering different combinations of the Exit Passcode on the devices. In such cases, there should be a mechanism in place which will alert the administrator about the failed attempts made to exit the lockdown mode on the device.

    As organizations enforce device usage policies they need to stay informed if any user is trying to break these usage policies. In order to detect these failed attempts and alert the administrator about these attempts, we have included – Security Incidents.

    Enter Passcode

    If a user tries to exit the Scalefusion lockdown mode by entering wrong Exit Passcode more than 3 consecutive times, the device will automatically capture the image of the user through the front camera and an entry is made in the Security Incidents logs with the captured image and device details.

    Once this feature is enabled, it will record the incident in security Incidents log for every failed attempt made by the user to exit Scalefusion lockdown mode on the device.

    You can enable the Security Incident feature from our Android Device Management dashboard.

    1) Log in on our dashboard.
    2) Go to Enterprise Store -> Security Incidents.

    Security Incidents

    3) Click on Enable Security Incidents.

    And you are done.

    The image below shows the failed attempt to break out of Scalefusion.

    Security Incidents

    Once enabled the administrator can see the logs every time there is a failed attempt made to exit Scalefusion on the device.

    Try our product with a 30-day free trial.

    Ps – You don’t need your credit card to try out our product.

    For product demo contact [email protected]

    Check out our app on the Google Play store

    download-android-button-196x60

    Latest Articles

    What is Assigned Access in Windows devices

    Windows devices are built for versatility. But when you only need one app and zero distractions, that versatility can get in the way. Assigned Access...

    Looking beyond AWS: Best IAM alternatives for 2025

    You’ve probably felt it too: AWS isn’t always the best fit, but it’s often the default. For many teams, staying with AWS has more...

    Veltar Secure Web Gateway Now on Windows, macOS, and Linux Desktops

    Desktops remain central to how work gets done, but they also carry the highest exposure to web-based risks. From unsafe browsing to unmanaged cloud...

    Latest From Author

    Why Customer Support is Important in SaaS Business

    Customers are 5.1 times more likely to recommend a brand and 3.5 times more likely to make a purchase following positive customer experiences1. The...

    Scalefusion – Mobile Application Management

    John, the CEO of FieldForce+ is super-excited because he’s just secured a major win with CellPlus, a game-changer cellular service provider. He’s also nervous:...

    Leverage Geotechnologies to Better Manage Remote Employees

    In today’s work-space scenario, more and more employees are working on-the-go, away from the workplace, making physical offices boundary-less. Mobility has enabled working away...

    More from the blog

    5 Easy Ways to Upgrade from Windows 10 to...

    Microsoft has officially announced that support for Windows 10 will end on October 14, 2025. This means there will...

    3 Easy Methods to Set Up Kiosk Mode in...

    Whether it is a retail store running a customer-facing self-service terminal, a hospital using a check-in screen at reception,...

    What are connected classrooms and why schools need UEM...

    Modern classrooms are no longer confined to traditional tools like whiteboards and printed textbooks. As digital tools grow, schools...