More

    Detection of failed attempts to exit Scalefusion

    Share On

    Scalefusion helps companies to lock down the devices and enforce policies which make it easy to manage these devices and put them to effective use. Many times users might try to get out of the lock mode. They try to do this by entering different combinations of the Exit Passcode on the devices. In such cases, there should be a mechanism in place which will alert the administrator about the failed attempts made to exit the lockdown mode on the device.

    As organizations enforce device usage policies they need to stay informed if any user is trying to break these usage policies. In order to detect these failed attempts and alert the administrator about these attempts, we have included – Security Incidents.

    Enter Passcode

    If a user tries to exit the Scalefusion lockdown mode by entering wrong Exit Passcode more than 3 consecutive times, the device will automatically capture the image of the user through the front camera and an entry is made in the Security Incidents logs with the captured image and device details.

    Once this feature is enabled, it will record the incident in security Incidents log for every failed attempt made by the user to exit Scalefusion lockdown mode on the device.

    You can enable the Security Incident feature from our Android Device Management dashboard.

    1) Log in on our dashboard.
    2) Go to Enterprise Store -> Security Incidents.

    Security Incidents

    3) Click on Enable Security Incidents.

    And you are done.

    The image below shows the failed attempt to break out of Scalefusion.

    Security Incidents

    Once enabled the administrator can see the logs every time there is a failed attempt made to exit Scalefusion on the device.

    Try our product with a 30-day free trial.

    Ps – You don’t need your credit card to try out our product.

    For product demo contact [email protected]

    Check out our app on the Google Play store

    download-android-button-196x60

    Latest Articles

    What Are the Types of iOS Device Enrollment?

    Apple has come a long way, and so has iOS, fundamentally transforming the way we perceive mobile phones and their capabilities. Renowned for their...

    Insight or Oversight? Pros and Cons of Monitoring Your Employees

    The business world today is watermarked by technological advances and flexible work arrangements. Hence, the management and security of corporate data have become a...

    Robust Passcode Policy for Improved Workplace Security: A CISO Guide

    “I’m not a robot”. Sure, you’re not, and that confirmation security net is to catch spambots. Humans have a beautiful and dangerous thing—the mind!...

    Latest From Author

    Why Customer Support is Important in SaaS Business

    Customers are 5.1 times more likely to recommend a brand and 3.5 times more likely to make a purchase following positive customer experiences1. The...

    Scalefusion – Mobile Application Management

    John, the CEO of FieldForce+ is super-excited because he’s just secured a major win with CellPlus, a game-changer cellular service provider. He’s also nervous:...

    Leverage Geotechnologies to Better Manage Remote Employees

    In today’s work-space scenario, more and more employees are working on-the-go, away from the workplace, making physical offices boundary-less. Mobility has enabled working away...

    More from the blog

    Insight or Oversight? Pros and Cons of Monitoring Your...

    The business world today is watermarked by technological advances and flexible work arrangements. Hence, the management and security of...

    Robust Passcode Policy for Improved Workplace Security: A CISO...

    “I’m not a robot”. Sure, you’re not, and that confirmation security net is to catch spambots. Humans have a...

    Evaluating Apple Business Essentials for MDM: Is It Up...

    Being a $2.66 trillion technology and product company is no mean feat. That’s Apple for you!  Apple's reputation for crafting...