More

    Detection of failed attempts to exit Scalefusion

    Share On

    Scalefusion helps companies to lock down the devices and enforce policies which make it easy to manage these devices and put them to effective use. Many times users might try to get out of the lock mode. They try to do this by entering different combinations of the Exit Passcode on the devices. In such cases, there should be a mechanism in place which will alert the administrator about the failed attempts made to exit the lockdown mode on the device.

    As organizations enforce device usage policies they need to stay informed if any user is trying to break these usage policies. In order to detect these failed attempts and alert the administrator about these attempts, we have included – Security Incidents.

    Enter Passcode

    If a user tries to exit the Scalefusion lockdown mode by entering wrong Exit Passcode more than 3 consecutive times, the device will automatically capture the image of the user through the front camera and an entry is made in the Security Incidents logs with the captured image and device details.

    Once this feature is enabled, it will record the incident in security Incidents log for every failed attempt made by the user to exit Scalefusion lockdown mode on the device.

    You can enable the Security Incident feature from our Android Device Management dashboard.

    1) Log in on our dashboard.
    2) Go to Enterprise Store -> Security Incidents.

    Security Incidents

    3) Click on Enable Security Incidents.

    And you are done.

    The image below shows the failed attempt to break out of Scalefusion.

    Security Incidents

    Once enabled the administrator can see the logs every time there is a failed attempt made to exit Scalefusion on the device.

    Try our product with a 30-day free trial.

    Ps – You don’t need your credit card to try out our product.

    For product demo contact [email protected]

    Check out our app on the Google Play store

    download-android-button-196x60

    Latest Articles

    Understanding LDAP: The Lightweight Directory Access Protocol

    Lightweight Directory Access Protocol, or LDAP, isn’t a new kid on the block. In fact, its history dates back to 1993. Tim Howes and...

    Who Verifies Your Identity Online? Understanding Identity Providers

    Hey You! The eternal Pink Floyd song! Decades later, a similar question beckons us online in a world outside that musical masterpiece. It goes...

    From Onboarding to Offboarding: User Lifecycle Management Explained

    It’s always exciting for organizations when their business scales well, and with that, there’s an increase in their employee base. This also means onboarding...

    Latest From Author

    Why Customer Support is Important in SaaS Business

    Customers are 5.1 times more likely to recommend a brand and 3.5 times more likely to make a purchase following positive customer experiences1. The...

    Scalefusion – Mobile Application Management

    John, the CEO of FieldForce+ is super-excited because he’s just secured a major win with CellPlus, a game-changer cellular service provider. He’s also nervous:...

    Leverage Geotechnologies to Better Manage Remote Employees

    In today’s work-space scenario, more and more employees are working on-the-go, away from the workplace, making physical offices boundary-less. Mobility has enabled working away...

    More from the blog

    Who Verifies Your Identity Online? Understanding Identity Providers

    Hey You! The eternal Pink Floyd song! Decades later, a similar question beckons us online in a world outside...

    From Onboarding to Offboarding: User Lifecycle Management Explained

    It’s always exciting for organizations when their business scales well, and with that, there’s an increase in their employee...

    Multi-Factor Authentication (MFA): The Extra Layer of Security for...

    Ever thought of the risks associated with accessing sensitive data using just a single set of credentials? Enter user...