Seqrite Seqrite Enterprise Mobility Management

Seqrite Enterprise Mobility Management is an EMM solution that helps the administrator of an organization to remotely monitor, secure, manage, and track the mobile devices & Tabs. Seqrite Enterprise Mobility Management is a simple, comprehensive & extremely powerful tool to manage all your mobile devices running on Android and iOS. It allows the administrator to get total control over the apps being installed on official devices, monitor the internet usage patterns, track the device location, apply policies as per location and time and provide support through remote device control as well as file transfer. This allows the organization to remain in total control of what’s happening with its data even beyond their own network. In case the mobile devices are lost or stolen, the organizations are always at the risk of business data misuse or loss. Seqrite Enterprise Mobility Management helps the organizations to block the stolen or lost devices, prevent data security by wiping the data from the device, and trace the device location to help recover the devices.

Benefits of Seqrite Enterprise Mobility Management:

  • Secure and manage all the Android and iOS devices.
  • Secure data and resources, enhance user productivity, reduce costs, and maintain communications.
  • Perform console administration functions.
  • In Built Antivirus that protects your device from Viruses, Trojans, Ransomware & organized Cyber attacks.
  • Enable Web Security Policies.
  • Make device compliant with policies and configurations.
  • Monitor network data usage and Call/SMS.
  • Manage device app with app configuration.
  • Track devices on the map real-time & view historical location data.
  • Prevent misuse of the device by launching Seqrite Launcher.
  • Monitor the device by applying fencing parameters such as time, location, and Wi-Fi.
  • Generate the customized reports.
  • Ability to take remote access of the mobile device.

Seqrite Enterprise Mobility Management can be used for mobiles, tablets, and phablets.

Seqrite Enterprise Mobility Management is beneficial for those organizations that intend to centrally manage and secure their devices.

Seqrite Enterprise Mobility Management supports any size of Businesses who wish to control BYOD or CYOD Mobile devices, be it Small, Medium & Enterprise Customers.

When you are going to use Seqrite Enterprise Mobility Management, make sure that you have either of the following devices with the supported versions and operating systems (O.S.).

Yes.

  • Android 5.0 & later versions.
  • iOS 10 and later versions.
  • Devices connected to Internet.

  • Google Chrome (latest versions)
  • Firefox (latest versions)
  • EDGE (latest versions)

Yes, Seqrite Enterprise Mobility Management supports Android N.

To register for Seqrite Enterprise Mobility Management follow the steps below:

  • Please access the Sign Up URL: https://hawkkeye.seqrite.com/csm/signup/2
  • Enter the First Name, Last Name, Business Email Address, Mobile Number, Job Role, Company Name, Industry, Company Size, Country, State & City.
  • Select I’m not a Robot option & Click on Sign Up.
  • You will receive a confirmation link on your registered email to set the password.
  • Click the Confirmation link & On the Set Password option, enter the Password, Confirm Password, and Security Code.
  • A password should have at least one number, one special character, one upper case character, and one lower case character.Click Submit.
  • You can then access the Enterprise Mobility Management Console from the Sign In option.

You can use the Forgot Password link to reset your password. An email will be sent to your registered email address with reset password link.

Device Enrollment is the process of enrolling the mobile device with the Seqrite Enterprise Mobility Management console. After enrollment, the mobile device users become members of the Seqrite Enterprise Mobility Management console. After completing the enrollment, you can manage the device functionality, configurations, and Devices perform the actions remotely.

The device can be enrolled using:

  • Enrollment via Email/SMS : In this process, the enrollment command is sent through email or SMS. You can select this option when the device is with the user.
  • Enrollment via QR Code : Select this method of enrollment when you have the mobile devices with you and will be doing the enrollment on your own. Additionally, this QR code can also be sent to the user using email and the user can scan that QR Code to enroll the device.
  • Enrollment via ADO Enablement : ADO stands for Android device owner. Seqrite Enterprise Mobility Management requires Android Debug Bridge (ADB) to enable Device Owner Mode on the device. Thus, ADB helps to set a bridge between the computer and the connected device, and also perform multiple device actions, which in turn helps to set Seqrite Enterprise Mobility Management as Android device owner (ADO).

The Send Enrollment request option is used by the admin. From the Seqrite Enterprise Mobility Management portal, the admin sends an enrollment email and also an SMS to the user whose device needs to be enrolled with Enterprise Mobility Management. It contains the client app download link, OTP, and the company code. The device users can download the client app and complete the enrollment process by entering the OTP and company code on the enrollment wizard.

You can select this option when the device is with the users. To enroll the devices via email/SMS follow these steps:

  • Log on to the Seqrite Enterprise Mobility Management portal and click Manage > Devices.
  • On Devices list page, select single or multiple devices.
  • From the With selected list, select Send Enrollment Request > Enrollment via Email/SMS > and then click Submit.
  • After sending the enrollment request, the device user receives the enrollment details (Company Code and OTP) via Email and SMS. The user has to tap the enrollment link on the device, which navigates the user to the enrollment screen. The user has to follow the instructions given on the enrollment screen. The user must download and install the Enterprise Mobility Management client app and enter the Company Code and OTP in the given text boxes on the enrollment wizard.
  • After the device user enters the correct details on the device, the user enrollment will be completed and the admin receives the enrollment approval request. After the user completes the enrollment, the device status on Enterprise Mobility Management portal changes to Approval pending.
  • The admin has to approve the enrollment request by sending the Approve command. On Devices list page, select the device. From the With selected list, select Device actions > Approve > click Submit.After the device is approved, the enrollment process is completed.

This option is beneficial when the admin themselves have the mobile devices and can proceed with the enrollment. This QR code is also sent to the user via email and the user can scan that QR Code to enroll the device. To follow this process of enrollment, take these steps:

  • Log on to the Seqrite Enterprise Mobility Management portal and click Manage > Devices > select the device.
  • On Devices list page, select single or multiple devices.
  • From the With selected list, select Send Enrollment Request > Enrollment via QR Code > click Submit.
  • In the enrollment details dialog, the company code, OTP, Enrollment URL, Owner Email, Device Id, and the Auto Approval check box is displayed.The Auto Approval check box will be selected by default to approve the device automatically.
  • Bring the device in front of the computer screen to scan the QR code.
  • On the Enrollment Details screen of the device, tap the arrow available on the header of the enrollment wizard. The Scan QR Code option is displayed.
  • Tap the arrow next to the Scan QR Code option to scan the QR code on the device. The camera app opens.
  • Bring the device before the QR code available on the computer and scan it.
  • After the QR code is detected, the Activate Device Admin screen is displayed on the device.
  • To activate the Device Admin, tap Activate. The QR code details will be validated. The device gets enrolled with the help of QR code.

Yes, the admin can enroll different email domains that belong to a single user within the Enterprise Mobility Management portal.

Yes, an uninstalled device can be enrolled again on the portal. To enroll the device, a new enrollment request should to be sent from the Device list page or device Overview page.

Once a device has been approved, a connection is established between the device and the server. Default anti-theft/web security/app configuration, and default policies are pushed and applied on the device. Thus, the admin can manage the device through the Enterprise Mobility Management portal.

The QR code enrollment feature is designed to make the device enrollment process easy and convenient. It helps the admins or users to enroll mobile devices simply by scanning a QR code.

The Group QR Code option provides the facility to enroll multiple Android or iOS devices of any group in a single instance. The devices enrolled using Group QR Code option will be added to Seqrite Enterprise Mobility Management console as per the group name with incremental numbering. For example; if the group name is QR Group, then the devices added to the Seqrite Enterprise Mobility Management console will have the nomenclature as QR Group-1, QR Group-2 and so on.

To enroll the devices using Group QR Code, a group owner must be assigned, who will receive all the information about the QR code via email. Other than the group owner, you can also send this QR code details to any other user as well. When the device user scans the QR code created for a group, the device will be assigned to that group and the policy applied to the group will be automatically applied to the device on approval. The validity of generated QR Code can be set to 30 or 60 or 90 days.

We support QR Code for both Android and iOS devices.

Seqrite Enterprise Mobility Management takes care of not enrolling any unauthorized devices. But in case, any unauthorized device gets the enrollment request and if the admin notices this circumstance, then the admin will disapprove the device enrollment.

When the device enrollment request is disapproved, the Enterprise Mobility Management client app will be uninstalled from the device. The admin can directly disapprove the device enrollment request from the notifications section or send an SMS to disapprove the device enrollment.

The admin can disapprove the enrollment request as follows:

  • Log on to the Seqrite Enterprise Mobility Management portal and click Enrollment Notification (mobile icon).
  • On the enrollment notification dialog, in the section of requested enrollment notification click the Disapprove option. In the confirmation dialog, click Disapprove.When the mobile number of the device is available, the admin can send the device enrollment disapproval via SMS also.
  • On the confirmation screen, select the Disapprove device by sending SMS check box.

After the implementation of Seqrite Enterprise Mobility Management, you should create users, devices, groups and then enroll the devices.

Seqrite Enterprise Mobility Management communicates in the form of notifications. When the Enterprise Mobility Management client app communicates with the admin portal, it sends non-compliant reports, enrollment requests, and scan reports to the server. These reports show up as notifications on the portal.

Seqrite Enterprise Mobility Management offers different types of notifications that are received and displayed on the upper-right section of the title bar. Notifications inform you about all the actions taken on the Enterprise Mobility Management account and device status.

Notifications dialog box

As you click on any notification icon, a notification dialog box appears. The notification dialog box shows few of the newly received notifications with the description and date and time when the notification was received.

The notifications dialog box shows the following options:

Options Description
View all notifications This option when clicked, navigates you to that specific notifications list page where all the notifications are displayed.
Clear all With this option, all the notifications from the notification dialog box are cleared.
Mark as read (multiplication sign) When the multiplication sign is clicked, that notification is marked as read and is removed from the notification dialog box. All the notifications Marked as read are added to the notifications list page.

Notifications List Page

When you click the View all Notifications link on notifications dialog box, you are directed to the notifications list page. Seqrite Enterprise Mobility Management has different types of notifications. The notifications table shows the following information about the specific notification type:

Columns Description
Notified on Shows when the notification was received.
Notification details Shows the details of the notification.
Action Delete is the available action for all the individual notifications.

Yes.

Yes, the admin can clear or delete the read or unwanted notifications.

The admin can use the following options to remove the notifications from the notifications dialog:

  • Clear all: With this option all the notifications are cleared from the Notifications dialog.
  • Mark as read: With this option, the Admin can mark the notification as read and the notification is removed from the notification dialog. All the notifications Marked as read are added to the notifications list page.

The device app request report provides the details of all the app requests received and the number of pending app requests. The admin can select the app request and approve or reject the request.

Yes. All the notifications can be deleted by the Admin in one go. All the Notification pages have the Delete all Notifications option.

To navigate to Notification page, click the View all Notifications link on any notifications dialog. The admin can use the Delete all Notifications button or select the notifications and use the With selected option to delete all the notifications.

Users, departments, devices, groups, policy, configuration, and app configuration are defined as different entities of Enterprise Mobility Management.

Dashboard is the default screen that is displayed after you log on to the Seqrite Enterprise Mobility Management console.

Dashboard helps to navigate easily to all the components of the Seqrite Enterprise Mobility Management console.

Here, you can have a look on the current status including device statistics, data usage, malware detection status, devices enrolled, Workspace details, main menu among other features.

Informative section includes information on License Agreement and Privacy Policy.

When on any list page of any entity, you can use the Filter columns tab to add or remove any column from the table.

The With selected option is visible only when you select a single or multiple entities on any main page of the entity. The With selected list provides different actions which you can carry out on a single or multiple selected entities.

The people who use devices such as mobile, tablet, and phablet are identified as users. When adding the users, the users are aligned with the groups.

You can search users using only three search criteria. You can modify the search criteria to get the desired search results.

Check these factors:

  • You can select and display maximum of four columns on the Users’ list page.
  • When searching the users with respect to any criteria, make sure the criteria-related column is available in the users’ list table.For example: when using search criteria of mobile number, make sure the mobile number column is available in the users’ list table.

Yes. You can change the user role privileges by editing the user.

To assign admin privileges to the selected user, edit the user and in the Privileges section select the Allow admin access check box.

Yes. The Enterprise Mobility Management admin can add multiple users by using the import functionality. Make sure that a CSV file is created with user details before importing.

Yes, you can export all the users of Seqrite Enterprise Mobility Management. To export the user details:

  • On the Users page, select all the users & With Selected option –> Click Export CSV option –> Submit.

The device ownership is categorized as follows:

  • Personal: You can install Seqrite Enterprise Mobility Management on your Personal device.
  • Corporate: You can install Seqrite Enterprise Mobility Management on your Corporate device.

Departments help to categorize the users and further create groups. Departments can be assigned up to N-level hierarchy.

As you can add departments up to N-level hierarchy; the first level is considered as a parent department and the sub-levels are considered as child departments.

Yes. When creating a department, you should select the Create Group check box. Thus a new group will be created with the same department name at the same time.

If the group name already exists, then Enterprise Mobility Management will create a group with similar group name including a number.

Yes, you can import maximum of 1000 departments in a single instance. The user should use the CSV file format to import the departments.

Yes, you can export the department details for a single or multiple departments in CSV format.

  • Select the Departments to be exported, then With Selected Option –> Click Export CSV –> Submit.

The Devices option is the most significant module of the Seqrite Enterprise Mobility Management console. You can perform the following actions on the devices:

  • Add a new mobile device, assign ownership, assign an owner to the device, and assign a group.
  • View and edit the device information.
  • Send an enrollment request and perform the required actions on the device.
  • Apply or edit configurations and apply other security settings on the device.
  • Trace the location of the device and view a list of the applications that were installed on the device.
  • View and manage the apps.
  • View the activity report of the device.
  • Monitor the network data usage and view the calls and SMS report.

Following is the list of supported versions and operating systems (O.S.) of the mobile devices.

  • Android 5.1 & later versions.
  • iOS 12 and later versions.

A smartphone, tablet, or phablet is supported by the Seqrite Enterprise Mobility Management application.

Yes, device must be connected to the Internet via any network (Mobile data/Wi-Fi).

If a user has not applied any policy/configuration which has been sent to the device by the admin, then this device goes into non-compliance mode. The non-compliance mode shows that the user has violated/not followed the configurations/policies as suggested by the admin.

Accessibility service is required to secure the device and to apply and implement the Enterprise Mobility Management policies and configurations on the device.

It is a database of virus definitions which helps in scanning files for viruses & it is an effective way to detect known viruses. To stay secure and keep your devices protected, your virus definition database should be up to date.

If you disable Device Admin on the device for Seqrite Enterprise Mobility Management, the device becomes vulnerable to the Enterprise Mobility Management app uninstallation. This means any unauthorized user can easily uninstall the Enterprise Mobility Management client app from the device. It is recommended that you must always keep the Device Admin check box enabled to prevent unauthorized uninstallation.

  • Check the selected search criteria. If result is not desired, change the criteria. By default, You can search for User, Device, Group, Policy, Configuration, App or Fence Configuration.
  • In Advanced Search option, you have options for App Non-Compliant, Policy Non-Compliant, Configuration Non-Compliant, Launcher Non-Compliant, Forcibly Client Removal, Device Fully Compliant & Agent Vulnerable Criteria.
  • To search any device with respect to any criteria, make sure the criteria-related column is available in the table. For example, if you are searching devices with mobile number, then make sure the mobile number column displays in the table.
  • On Devices list page, only Nine columns can be displayed.

The device ownership is categorized as follows:

  • Personal: You can install Seqrite Enterprise Mobility Management on your Personal device.
  • Corporate: You can install Seqrite Enterprise Mobility Management on your Corporate device.

Yes, you can send the device enrollment request when adding a device.

Each device in Seqrite Enterprise Mobility Management database shows a device status. All the statuses are represented by symbols. The mouse hover over the symbol shows the device status tooltip.

Device status includes:

  • Approval Pending: Device has requested the server for approval.
  • Inactive: Device is inactive for specific time period.
  • Disapproved: Server has not granted permission for the device enrollment.
  • Approved: Device is approved by the server.
  • Blocked: Device is blocked by the admin.
  • Uninstalled: Seqrite Enterprise Mobility Management has been removed from the device.
  • Disconnected: The admin has disconnected the device.

If the device is in uninstalled or pending state, then the Select an Action list shows Three options; Enrollment using Email/SMS, Enrollment using QR Code & Enrollment using ADO Enablement.

If the device status is in Approval Pending state, then the Select an Action list shows three options; Approve, Disapprove, and Disconnect.

If the device is in Approved state, you can perform the following actions from the device Overview page.

  • Locate: This command is to receive the latest location of the device. (Note: To get the location, Location Services/GPS must be enabled on the device. Enabling GPS could cause battery consumption.)
  • Fetch Logs: This command is to fetch the activity logs, which are performed on the device. Click Download Device Logs on the upper-right side of the Device Details page to download the logs. You can download the logs in formats such as .txt, .log, crash files, etc.
  • Scan: This command is to initiate a scan on the device. The scan report is viewable on the server side.
  • Sync: This command is to sync devices with the server. Scan reports and non-compliance alerts are sent to the server once this sync is initiated.
  • Block: This command is to block the device completely.
  • Unblock: This command is to unblock a device that has been previously blocked.
  • Wipe: This command is to wipe all data from a user’s device. This includes data from the SD card, contacts, text messages, calendar entries and synced accounts.
  • Uninstall Enterprise Mobility Management: This command is to uninstall the client app from the user’s device.
  • Push Policy: This command is to push a policy (a policy which is already mapped to the device) to a device. If a policy has failed to reach a device in the past, then we can re-push that policy to the device.
  • Push Web Security Configuration: This command is to push a web security configuration to a device. If a configuration has failed to reach a device in the past, then we can again push the Web security configuration to the device.
  • Remote Buzz: This command plays the ringtone on the selected Android device.
  • Exit Launcher: This command allows the user to exit the launcher temporarily or permanently.
  • Reset Password: This command is to reset the password of the selected device through Seqrite Enterprise Mobility Management.
  • Push App Configuration: This command reapplies the latest mapped App Configuration on the selected device. You can use this command only when the previously applied app configuration fails to execute on the device.
  • Push Data Usage Configuration: This command is to reapply the latest version of the Network Usage configuration on the selected device. You can use this command only when the previously applied Network Usage configuration fails to execute on the device.
  • Push Fence Configuration: This command is to apply a fence configuration on the selected device.
  • Update Enterprise Mobility Management Virus Signatures: This command will update the Virus Signatures on the selected device.
  • Push Files(s) / Messages: This command is to broadcast a message or files URLs to the Android and iOS devices.
  • Disconnect: This command will disconnect the device from the Seqrite Enterprise Mobility Management server. After the command is executed on the device, the device cannot be managed by the Seqrite Enterprise Mobility Management console.

  • Turn ON / OFF the Fence configuration.
  • Unblock the blocked device using Secret Code.
  • Exit launcher temporarily or permanently.
  • You can exit launcher temporarily or permanently as follows:
    • Exit launcher permanently : When exiting the launcher permanently, the launcher exits for the infinite time duration. To reactivate the launcher, the admin will send the activate command using the Activate Launcher link on the device overview page. When the Enable launcher command reaches on the device, the launcher gets activated.
    • Exit launcher temporarily : When exiting the launcher temporarily, the admin can specify the duration to exit the launcher in minutes, hours, and days. To send the exit launcher command, the admin uses the Exit Launcher option from the device actions list on the device overview page. After completing the exit time, the launcher activates automatically. The admin has the privilege to exit the launcher or activate the launcher at any time. In any case, the device user wants to exit the launcher, the device user requires a passcode and the passcode is provided only by the admin.

The secret code is used by the admin to unblock the device when there is no network or Internet connection on the device.

With the Exit Launcher feature, the user can request to disable the functioning of Seqrite Launcher for a specified duration. If the user wants to exit the launcher, then the user must enter a passcode to exit the launcher for a limited time. User has to contact admin for the passcode. The admin can use the permanent or temporary exit launcher feature from the Enterprise Mobility Management console as per requirement.

  • In permanent exit scenario, the launcher exits for the infinite time duration. Thus to reactivate the launcher, the admin has to send the activate command using the Activate Launcher link available on the device overview page. When the enable launcher command reaches the device, the launcher gets activated.
  • In temporary exit duration, the admin can specify the duration to exit the Launcher in minutes, hours, and days. The admin has the privilege to exit the Launcher or activate the Launcher at any time.

In any case, if the device user wants to exit the Launcher, the device user requires a passcode and the passcode is provided only by Seqrite Enterprise Mobility Management admin.

To activate the Launcher, follow these steps:

  • Log on to the Seqrite Enterprise Mobility Management portal and click Manage > Devices > select the device > click Edit icon.
  • On the device Overview page, Seqrite Launcher status is displayed as Deactivated and Activate Launcher link is provided.
  • To exit the launcher deactivation mode, click the Activate Launcher link.
  • The command to activate the Launcher is sent to the device. When the Enable launcher command reaches the device, the Launcher gets activated.

In any case, if the device user wants to exit the Launcher, the device user requires a passcode and the passcode is provided only by Seqrite Enterprise Mobility Management admin.

To reactivate the launcher, the admin has to send the activate command using the Activate Launcher link available on the device Overview page. When the enable launcher command reaches the device, the launcher gets activated again.

This command will wipe off the device data. The Wipe option includes different types of wipes such as Full Wipe, SD Card, Factory Reset, and Custom Wipe.

To configure the Wi-Fi settings on a device, follow these steps:

  • Log on to the Seqrite Enterprise Mobility Management portal and click Manage > Devices > select the device > click Edit icon > click Edit tab > click Configurations.
  • Select/update the Wi-Fi configuration as required from the Wi-Fi list.

 

To apply Web security on a device, follow these steps:

  • Log on to the Seqrite Enterprise Mobility Management portal and click Manage > Devices > select the device > click Edit icon > click Edit tab > click Configurations.
  • Select/update the web security configuration as required from the Web Security list.

To apply anti-theft settings on a device, follow these steps:

  • Log on to Seqrite Enterprise Mobility Management and click Manage > Devices > select the device > click Edit icon > click Edit tab > click Configurations.
  • Select/update the anti-theft configuration as required from the Anti-Theft list.

To apply anti-theft settings on a device, follow these steps:

  • Log on to Seqrite Enterprise Mobility Management and click Manage > Devices > select the device > click Edit icon > click Edit tab > click Configurations.
  • Select/update the anti-theft configuration as required from the Anti-Theft list.

In order to add a large number of devices, follow these steps:

  • Log on to Seqrite Enterprise Mobility Management and click Manage > Devices.
  • On Devices list page, click Import > select the file to be imported > click Import.

The file must be in CSV file format. You also have the option to download the CSV file format and check the required format.

To broadcast files and message, follow these steps:

  • Log on to the Seqrite Enterprise Mobility Management console and in the left pane, click Devices > select the device > click Edit icon.
  • The Device Details page is displayed. From Select an Action list, select Broadcast Files(s) / Message and then click Submit.
  • The Broadcast Files(s) / Message dialog box is displayed.
  • Enter the message or file URL to the broadcast message. For bulk file distribution, you can enter comma-separated URLs of the file
  • Select the required message type:
    • Download file/message silently: Select this option if you want the file and the message to be downloaded silently on the device. Make sure the file path is correctly defined, or the file will not be downloaded.
    • Prompt user to download file/message: Select this option if you want to send a prompt to the user to download the file or message manually.
  • Enter the download path. Make sure to give correct download path or the file will not be downloaded. Click Broadcast.
  • The broadcast message is sent successfully.

You can send broadcast messages to a single or multiple device users.

The device location can be located with Locate option.

To locate the device location, follow these steps:

  • Log on to the Seqrite Enterprise Mobility Management console and in the left pane, click Devices.
  • On the Devices page, select a device that is to be located and click the Edit icon > Location tab and on the map, click Locate. In the confirmation dialog box, click Locate. Please make sure the GPS option on the device is enabled.
  • To send an SMS and get the confirmation to locate the device, select the Locate device by sending SMS check box. Then click Locate.

You are viewing this message as there may be an issue with the device’s GPS location.

Yes, you can select multiple devices at the same time & send a scan command. Once the command reaches the device, the Scan Task is started. The scan command is supported only by the Android devices.

App Inventory is the list of apps installed on the mobile device. If any command is pending with respect to app inventory; a small exclamatory icon is displayed on the App Inventory tab and also on the app in the app list. When hovered over the icon, the pending command is displayed.

The App Inventory tab for the iOS devices will be in read-only format and only the downloaded apps will be listed. It will not show any system apps. With the App Inventory option, you can perform multiple actions.

The Add option on the upper-right side of the App Store page helps you to add a new app to the store. This helps you whenever you want to recommend the app in case the app is not present in the app store. Seqrite Enterprise Mobility Management provides the following options to add apps to the repository:

  • Google Play Store
  • iTunes Store
  • Custom App URL
  • Upload Custom APK
  • You can also upload the latest version of the app, which is already there in the repository.

The app status includes:

  • Installed: This status is showed when the app is already installed on the device.
  • Published: App that is recommended by the admin to install on the device will have the status as Published.
  • Recommended: If the user installs the app, which has Published status, then the app will have the status as Recommended.
  • Whitelisted: If any installed app is whitelisted by the admin then that app will have the status as Whitelisted.
  • Blocked: The app shows blocked status if the app is fully blocked or when the app is uninstalled using the Uninstall command in App Inventory. When the app is added to the uninstall list from App Configuration, then the app will have the status as Blocked.

The Uninstall Launcher button indicates the launcher status and informs about the action to be taken.

  • If this button shows Uninstall Launcher, it means that the Launcher is active and if you want to uninstall the launcher from the device, click Uninstall Launcher.
  • If this button shows Install Launcher, it means that the Launcher is not active and if you want to install the launcher on the device, click Install Launcher.

The admin can install or uninstall the app Launcher only when the app configuration with launcher is applied to the selected device.

The Network Usage option lets you monitor Internet data usage of the selected device if the network usage configuration is applied on the device. The Seqrite Enterprise Mobility Management app monitors the Internet data with respect to Wi-Fi, Mobile data, and in roaming status.

Enabling the call and SMS of a particular device, the user can view the calls and SMS details of the device on the console. The calls and SMS can be monitored after enabling the Call/SMS Monitoring option and synchronizing the device call and SMS logs with the server.

Note: You can enable this option only when the device is approved.

To enable call/SMS monitoring, follow these steps:

  • Log on to the Seqrite Enterprise Mobility Management console and in the left pane, click Devices.
  • Perform one of the following steps:
    • On the Devices page, select the device and click Edit icon > Call/SMS Logs.
    • When you select the device, the With selected option is displayed. From the With selected list select Device actions and then from next list select Call/SMS Monitoring ON and then click Submit.
  • Turn the Call/SMS Monitoring slider to ON.
  • The Sync Logs option is displayed. Click Sync Logs.

The device syncs with the server and the latest calls and SMS logs are displayed.

IT admins can view logs for incoming/outgoing/missed/rejected voice calls or video calls. Incoming and outgoing SMS/MMS logs are also stored and can be viewed.

Navigate to Manage > Devices > select the device > click Edit icon > Call/SMS Logs. In this section, all the available call/SMS logs can be viewed.

Seqrite Enterprise Mobility Management does not provide call/SMS blocking features. The admin can only view the call/SMS logs from devices.

No. Seqrite Enterprise Mobility Management only provide logs from default Call / SMS apps installed on Android devices.

No. Seqrite Enterprise Mobility Management will show the call/SMS logs from when the Call/SMS Monitoring feature was enabled. Previous call/SMS records cannot be viewed.

Yes, the device user can export these logs from the Call/SMS logs tab on the Device Details page.

Call/SMS Monitoring is only supported on those devices which have calling/messaging facilities enabled on them.

When the admin sends any commands to a device, the records are stored in the device details Reports page. If the status shows Success, then it implies that the command has been successfully sent to the device. The different command statuses are as follows:

Following are the various statuses of the activities:

  • Pending: This status appears when the command/policy/configuration has not yet reached the device. The Cancel option is provided to end the request if you do not want the command to be executed. Note: In case the command is in pending state and you want to send the command again, you have to cancel that command & send the command again from the Device Actions list.
  • Notified: This status appears when the command/policy/configuration has reached the device, but its status has not yet been received by the server.
  • In Progress: This status appears when the command/policy/configuration is reached to the device and it is in a continued state. This status is applicable to locate, trace on, scan, and wipe process.
  • Failed: This status appears when the command/policy/configuration was not able to reach the device due to unavailability of Internet connection or if the phone is switched off or any other reasons. You can view the reason for the failure so that you can act accordingly.
  • Cancelled: This status appears when the FCM server is unable to communicate with the device and the command gets cancelled. You can view the reason for the cancellation so that you can act accordingly.
  • Expired: This status appears when the command/policy/configuration has reached the set timeout and has not reached the device. After the request has expired, the Retry link appears. Clicking Retry will send the same request again to the device.
  • Success: This status appears when the command/policy/configuration has been successfully executed on the device. You can view the policy/configuration version so that you can know the version number that is applied to the device.

This is a command that can be sent by the admin to fetch the Enterprise Mobility Management app logs from any device. Once the command has been successfully sent, the Download Device Logs button will be visible on the device overview page.

Seqrite Launcher can only be uninstalled by the Seqrite Enterprise Mobility Management portal admin in the following ways:

  • Navigate to Manage > Devices > select the device > Edit icon > Edit tab > Configurations. From App Configuration list, select the desired app configuration which does not have the Seqrite Launcher setting enabled.
  • Navigate to Manage > Devices > select the device > Edit icon > App Inventory. Click Uninstall Launcher > click App Launcher Off. To send SMS and disable the launcher, select the Disable Seqrite launcher by sending SMS check box.

The Launcher can be viewed in a normal and Kiosk mode.

Normal mode: Yes. In Normal mode, the device user can request multiple apps.

Kiosk mode: No. In Kiosk mode, the user cannot request apps. Only one app is visible on the Launcher tray and that app is recommended by the admin.

The app that is requested by a user can be a pre-installed app or it can be a new app from Google Play.

To request the app in normal launcher mode, follow these steps:

  • On the Seqrite Launcher screen, to request any new app, tap the Google Play Store icon.
  • To request the in-built app, tap Request App. The list of installed app is displayed.
  • Tap the bell icon available in front of the required app.In the Request App screen, select the priority of the request, enter the description, and then tap REQUEST. Your request will be sent to the Enterprise Mobility Management portal.
  • After the Enterprise Mobility Management admin approves the requested app, the app gets listed in the App list of Launcher tray.

The admin can send the wipe command from Seqrite Enterprise Mobility Management portal. Following methods can be used by the admin to remotely wipe the data from a mobile device:

  • Full Wipe – To wipe the internal memory and SD card memory.
  • SD Card Wipe – To wipe the memory of the mounted SD card.
  • Factory Reset – To wipe internal memory, SD card data, app data, and customized settings.
  • Custom Wipe – The wipe can be customized for specific folders and files.
    • Custom Folder – To delete a specified folder either on internal or external storage only.
    • File Type – To wipe a particular file type such as image, video, audio or others.

The device Activity section shows all the various actions performed on the selected device. You can also view the status of the action such as Pending, Notified, Expired, Success, Cancelled, Failed, and In progress. This section also shows policy and configuration applied along with their name, version, and status. Also get the scanned report of the device.

This refers to a group of devices having the same policies/restrictions. The admin cannot apply any policy directly on any device within the group. Rather, admin has to apply a policy to any group and all the devices within the group will be configured with the same policy.

If the admin wishes to apply the same policy to multiple devices, then the admin needs to carry out the following steps:

  • Create a group and add devices into that group.
  • Apply policy/configuration to that group.
  • Applied policy/configuration is then pushed to all the devices of that group.

Yes you can import groups. In one instance, the maximum of 1000-device groups can be imported.

In Seqrite Enterprise Mobility Management, the admins are assigned different user roles and privileges.

There are five different admin roles & the Admin roles are based on privileges with restricted access to the Enterprise Mobility Management console.

  • Super Admin: The Super Admin role is created at the time of Seqrite Enterprise Mobility Management company creation. For the entire Seqrite Enterprise Mobility Management console, a single Super Admin is assigned. The Super Admin can create multiple Admins with administrator role. The Super Admin has all the privileges such as read, create, update, delete, assign/unassign, approve/disapprove, perform basic, advance, and critical actions, for all the modules of Seqrite Enterprise Mobility Management. The Super Admin also has the privilege to set up services such as APNS, Agent upgrade, Agent preference etc. and also can customize the reports as per requirement.
  • Admin: The Admin can access those users, which are assigned in a particular department and have all the privileges similar to Super Admin. The Admin can create multiple Administrators with restricted or complete access to the Seqrite Enterprise Mobility Management console.
  • Advanced: The Advanced Admin role type has all the privileges except the delete privilege for the assigned department only. The Advanced Admin role doesn’t have any privilege to create, update, assign/unassign, and delete Admin role. Also, cannot upgrade or renew the license.
  • Standard: The Standard Admin role type has all the privilege such as update, assign, and unassign. The Standard Admin role is restricted only to the assigned department. The Standard Admin role cannot:
    • Create or delete users, departments, groups, policies, configurations. Also, cannot renew or upgrade the license.
    • Create/delete/update/assign/unassign any Admin role.
    • Create/delete/approve/disapprove devices.
    • Perform any advance action such as wipe/lock/unlock/uninstall/Push policy or configuration.
    • Delete the notifications.
  • Basic: The Basic Admin role type has Read-Only privileges, with restricted visibility of Enterprise Mobility Management console. The Basic Admin role can export the data and view the privileges but cannot assign any privileges to the user.

Seqrite Enterprise Mobility Management offers the following policies:

  • Password policy: This type of policy consists of all the policies that are used to apply password restrictions on the device. For instance, Requires Password, Password Minimum Length, Age, Autolock, and Password History.
  • Device Policy: This type of policy consists of all the policies that are used to apply restrictions on the mobile device. For instance, Block Voice Dialing on Lock Screen, Block USB Connection, Restrict Safe Mode Access, Block Camera, Block Factory Reset, Block Bluetooth, Block Wi-Fi, Block Screen Capture, Block Voice Recording, Block Siri, Block Enterprise Mobility Management Uninstall and so on.
  • Device Applications Policy: This type of policy consists of all the policies that can be used to manage device applications. For instance, Block App Store.
  • App Security Policy: This policy can be used to secure the apps on the device. For example, Block iTunes App.
  • Policy for App Stores: This policy lists the policies related to the device applications.
  • Policy for Downloaded Apps: The App Security policy is related to the security of the apps.
  • Policy for ADO enabled devices: The ADO policy is applicable to those devices where Seqrite Enterprise Mobility Management Agent is the device owner.
    • All the ADO policies are super scripted with “D” for easy identification.
    • This policy is applicable to the devices where the Seqrite Enterprise Mobility Management Agent is the device owner. Also, check on the Seqrite Enterprise Mobility Management console the specific OS versions of the devices to which this policy can be applied. Policy for KNOX supported devices : The KNOX policies are applicable to the Samsung KNOX-supported devices.
    • All the KNOX policies are super scripted with “K” for easy identification.

Policies are applied to the groups and the devices of the group.

No. Policies are not applicable to all the devices or operating systems. There may be many policies which support Android devices, but may not support iOS devices. Similarly, there may be some Policies which support iOS devices, but may not support Android devices.

On the Enterprise Mobility Management portal, the admin must navigate to policy/configuration page and select the policy/configuration and click the Edit icon.

When the settings are updated, the version gets incremented by 1 (the default setting is always 1). Immediately after the update, the updated policy/configuration is reapplied to the respect

You can apply multiple Wi-Fi policies to one device. However, you can only apply one web security/anti-theft/network usage policy to a single device.

To apply a policy on the device, follow these steps:

  • Log on to the Enterprise Mobility Management portal and click Manage > Devices > select the device to which policy is to be applied > click Edit icon.
  • On Overview page, from the Select an Action list, select Push Policy and then click Submit.

This policy helps to apply a screen lock and set the type of password on the device. You can set the password category to high, medium or low as per the password policy.

To set the length of the password, turn on the Password Minimum Length policy. This policy is dependent on the Requires Password policy. After applying this policy on the device, the user must set the password as per the recommended password length.

  • If the password type is Low, then the password length must be in between 4 to 16.
  • If the password type is Medium, then the password length must be in between 6 to 16 alphanumeric letters.
  • If the password type is High, then the password length must be in between 8 to 16 letters.

The user has to set the password with at least one character, one numeric, and one special character.

To set the age limit of the password, turn on the Age policy. You can apply an age limit till a specific period. This policy is dependent on the Requires Password policy. After applying this policy on the device, the user has to set the age of the password. The age of the password can be 15 Days, 30 Days, 45 Days, and 90 Days. After the specified time expires, the user should reset the password. Otherwise, the device will be shown as a Non-compliant device.

After applying this policy on the device, if the device screen remains idle until the selected time, the device will be automatically locked.

Yes. It will be helpful to maintain a history of old passwords and to restrict the user from using the old passwords again.

This policy restricts any unauthorized users to do a factory reset on the Android devices from device setting section.

After applying the “Block Voice Dialing on Lock Screen” policy on the device, the user will not be able to use voice dialing when the device is locked with a password.

Yes. The GPS policy can be turned on or off according to the requirement. This policy helps to restrict the user from connecting to the GPS.

This policy can be used to restrict the access to Safe Mode on any selected device. Once this policy has been applied, the device gets blocked and the password, as per the password policy needs to be set. Once this password has been set, the device will not be allowed to access the Safe Mode.

The Block USB Connection policy can be used to block a device from connecting to the other devices through USB connections. If the user attempts to use the USB connection, the device will get locked and it will be unlocked when the USB is disconnected.

You can restrict the user from using the device camera by applying the Block use of Camera policy. If the user tries to launch the device camera, the Seqrite Enterprise Mobility Management will automatically close it.

Seqrite Enterprise Mobility Management provides following different policies:

  • Block Bluetooth: Helps to block Bluetooth.
  • Block Wi-Fi: Helps to block the Wi-Fi.
  • Blocks Open Wi-Fi: Helps to prevent the user from connecting to the available open Wi-Fi networks.
  • Block Mobile Hotspot: If this policy is applied, the user cannot switch on the Mobile Hotspot on the device.
  • Block NFC: After applying this policy on the device, the user has to turn off the NFC option on the device manually as per the policy.

Yes, there are multiple device-related or calling or roaming policies such as:

  • Block Auto-Sync while Roaming: This policy restricts the user to use the Mobile Auto Sync during roaming option.
  • Block Outgoing Call in Roaming: If this policy is applied, the user cannot make the outgoing calls or voice roaming during roaming.
  • Block Certificate: On applying this policy, the user will not be able to open any untrusted websites.
  • Block Screen Capture: This policy blocks any screen capture on the device.
  • Block Voice Recording: With this policy, the user will not be able to record the voice on the device.
  • Block Text Copy Paste: This policy doesn’t allow to copy and paste the text on the device.
  • Block Primary Microphone: Blocks the device microphone.
  • Block Siri: This policy blocks any request or action to Siri. You can block Siri entirely or you can block Siri only when the device is blocked.
  • Force Auto Time Zone: This policy helps to set automatic date and time, and time zone on the user’s device.

Yes, Seqrite provide application related policies:

  • Block Voice Dialing from Lock Screen
  • Block USB Connection
  • Block Safe Mode
  • Block Camera
  • Block Face Time
  • Block Factory Reset from Device Setting
  • Block Bluetooth
  • Block Wi-Fi
  • Block Open Wi-Fi
  • Block Mobile Hotspot
  • Block NFC
  • Block Auto-Sync while Roaming
  • Block Outgoing Call in Roaming
  • Location Service (GPS)
  • Sync Frequency
  • Block Certificate
  • Block Screen Capture
  • Block Text Copy and Paste
  • Set Google Account
  • Block Primary Microphone
  • Block Siri
  • Device Time-out
  • Set Auto Time Zone
  • Block Profile Switch
  • Device Accessibility Service & App Usage

Yes, all the policies can be imported to get the details. Only one policy can be imported in a single instance. When performing the import action, a specific file format is required.

Whenever there is a change to any policy, a new version of the policy is created. The policy history maintains the versions of the policy with all the details.

The configurations are as follows:

  • Wi-Fi Configuration: To grant the user access to Wi-Fi networks and to push Wi-Fi settings to the device so that the user can access the network.
  • Web Security Configuration: To protect the device from malicious and phishing websites and to control Internet usage by blocking web categories, which the admin does not want the user to access.
  • Anti-Theft Configuration: To protect the device from theft and loss, to block device in an emergency, and to secure users.
  • Schedule Scan: Helps you to scan all the enrolled devices of Enterprise Mobility Management at fixed intervals.
  • Network Data Usage: Helps you to monitor the Internet data usage with respect to Wi-Fi, Mobile Data, and in Roaming status.
  • App Configuration: The app configuration option lets you control and apply app restrictions on the device.

No. You can apply one-type of single configuration to multiple devices and groups except the Wi-Fi configuration.

  • That means, you can apply only one Web Security configuration, or one anti-theft configuration, or one Network Usage configuration to multiple groups or devices at a time.
  • But you can apply multiple Wi-Fi configurations to multiple groups or devices at a time.

Yes, you can apply single configuration, of all types of configurations to multiple groups or devices at a time.

For example, you can select one Web Security configuration, one anti-theft configuration, one Network Usage configuration, and one Wi-Fi configuration and apply to multiple groups or devices at a time.

Yes, you can apply multiple Wi-Fi configurations at the same time.

The Wi-Fi configuration helps you to enable Wi-Fi on the user’s device without sharing the Wi-Fi credentials. You can revoke Wi-Fi configuration whenever it is not required. This helps you to create Wi-Fi configurations and later apply to the device.

The anti-theft configuration helps you to block the device and trace the device in case of loss or theft.

You can apply configurations in either ways:

From configurations section:

  • Go to Manage > Profiles > Configurations > select the configuration that is to be applied > from With selected list select Apply to Device > click Select Devices > select the devices > click Apply.

From devices section:

  • Go to Manage > Devices > select the devices to which the configuration is to be applied or select a single device.
  • From with selected list, select Apply Configuration > select the type of configuration > select the actual configuration > click Submit

In both the above ways, you can select a single device, then click Edit icon > Edit tab > Configuration > then apply the desired configuration.

You can add up to nine (9) mobile numbers of the admins and these numbers get displayed on the blocked screen of the device for the user to contact the admin.

Seqrite Enterprise Mobility Management provides options such as Lock device on SIM Change/Block device on SIM change, and Notify admin on SIM Change. These options prove beneficial if any unauthorized person inserts a new SIM in the device or the device gets stolen. In such a scenario, the device gets locked/blocked and a notification message is sent to the alternate numbers if the SIM is changed.

The Block device on SIM change is part of the anti-theft configuration. This option is beneficial when the admin does not want the device user to use any new/unauthorized SIM.

When the admin selects this option on the Enterprise Mobility Management portal and if the device user inserts a new SIM in the device, the device will be blocked.

When the device is blocked and the device user removes the newly inserted SIM, the device will be unblocked.

The admin can blacklist/whitelist specific websites by adding their name or certain keywords related to the name in the Blacklist/Whitelist URLs or keyword section of the Web Security configuration.

Yes. Web Security configuration will work only the Google Chrome browser on the Android devices.

The Web Security configuration will work only on the supervised iOS devices.

The Web Security configuration of Enterprise Mobility Management works on Google Chrome.

In such a case, the admin can add a specific URL in the whitelisted URLs section and block the other category by adding the other site’s domain keyword in the blacklisted section. The whitelisted URL will be accessible.

Data usage can be monitored over Wi-Fi, mobile networks, and roaming networks. Additionally, alert prompts can be set for users if a certain percentage of the mobile data plan is exceeded.

No, Wi-Fi or mobile data cannot be monitored independently. If the network usage configuration is pushed to a device, then both Wi-Fi data and mobile data will be monitored.

No, we cannot monitor only company Wi-Fi data usage. If we enable Data usage monitor configuration then it will monitor all Wi-Fi and Mobile data together.

To monitor data usage through a company’s Wi-Fi, a network usage configuration should be created by selecting Monitor All Wi-Fi option from the Monitor Wi-Fi Usage list.

No, a user cannot be restricted from accessing the Internet when the user exceeds the data usage limit. Only an alert prompt will be shown on the device when the data usage limit is exceeded.

To see the data usage stats for individual devices, the admin should follow these steps: On Enterprise Mobility Management portal navigate to Manage > Devices > select the device > Edit icon > Network Usage tab. This tab shows the data usage by individual device for the selected date range.

No. You cannot set different limits for data usage for mobile or Wi-Fi. However, if we set the limit, an alert prompt appears on the device when the usage limit reaches.

  • To set the limit on Enterprise Mobility Management portal, navigate to Manage > Devices > select the device > Edit icon > Network Usage tab.
  • In the Data Plan Information section, click the Settings icon.
  • In this section, you can change the billing cycle start date, number of days, mobile data plan limit, and Wi-Fi daily usage limit at the device level.

The App Repository stores all the installed apps of the enrolled devices of Seqrite Enterprise Mobility Management. The App Repository manages these apps and helps to add new apps. You can also upload the multiple versions of the app when you add the app via Custom URL and Custom APK options.

The apps stored in app repository shows the following statuses:

  • Recommended apps: The apps that are suggested to install on users device.
  • Apps to Uninstall: The apps that are restricted to install on the users device.

Seqrite Enterprise Mobility Management categorizes the apps as follows:

  • Downloaded: These apps are downloaded by the user. Only the downloaded apps can be deleted.
  • System: These apps are inbuilt in the device.
  • Suggested: These apps are suggested by the admin.
  • Restricted: These apps are restricted by the admin.

Seqrite Enterprise Mobility Management categorizes apps in different categories such as Books and References, Business, Comics, Communication, Education, Entertainment, Finance, Health and Fitness, Libraries and Demo, Lifestyle, Live Wallpaper, Media and Video, Medical, Music and Video, Medical, Music and Audio, News and Magazines, Personalization, Photography, Productivity, Shopping, Social, Sports, Tools, Transportation, Travel and Local, Weather, and Game.

  • Mark as suggested: With this option, the admin can recommend the user to install the selected apps on the user’s device. The admin can suggest single or multiple selected apps at the same time.
  • Mark as restricted: This option helps the admin to mark the selected apps as restricted and to uninstall them from the user’s device. The admin can suggest single or multiple selected apps to be uninstalled from the devices.

You can delete a single or multiple selected apps only if the app is not associated with any device or app configuration.

Only the Android applications that are uploaded via a custom URL or custom APK can be upgraded.

You can add the apps to the app repository using the following options:

  • Google Play Store: With this option you can add a new app to App Repository from Google play store. This is applicable only to the Android device users.
  • iTunes Store: With this option you can add a new app to App Repository from iTunes store. This is applicable only to the iOS device users.
  • Custom App URL: You can add a new app to the App Repository using the Custom App URL option. This option is applicable only to the Android device users. You can also add the other versions of the app via Custom App URL.
  • Upload Custom APK: The Upload Custom APK option helps you to add a new app to the App Repository. This option is applicable only to the Android device users. You can also upload the other versions of the app to the app repository via Upload Custom URL.

When uploading the app using the custom app URL, ensure:

  • you provide the correct version name and version code of the custom app.
  • only HTTP, HTTPS, FTP, and SFTP URLs are provided and the URL should direct to the APK file.

Please check the following details when uploading the custom APK:

  • The maximum file size of APK file can be up to 150 MB.
  • Only the files with APK extensions are allowed.

The app configuration option lets you control and apply the app restrictions on the device. You can create new app configurations and apply the configurations on the devices. You can block access for any newly installed apps on the Android devices and block the apps based on the selected app categories that are available in Seqrite Enterprise Mobility Management. You can apply restrictions to block apps for full time. You can also recommend apps for installation on the user devices. You can add a particular version or multiple versions of the apps as suggested, restricted, fully blocked, or whitelisted.

App configurations are beneficial to apply to the groups or devices. You can whitelist the apps, uninstall the apps, fully block the apps, or recommend the apps.

  • Apply to Groups: Helps the admin to apply the selected app configuration to the groups. You can apply the single configuration to multiple groups at the same time.
  • Apply to Device: Helps the admin to apply the selected app configuration to the multiple selected devices.

App Categories section help to block different categories to which the applications belong. The app category blocking is applicable only to the Android devices. The admin can select either a single or multiple or all the app categories.

The white listed apps are accessible, even if their category is blocked. The admin can also white list the versions and those versions of the application will be accessible to the user and other versions would be blocked. The admin can remove single or multiple versions of the app from the whitelist.

This feature is beneficial when the admin wants the user to uninstall a particular or all the versions of the app. Thus the admin should select and add those app versions to Uninstall list. The selected single or multiple app versions will be blocked and the other app versions will be accessible. This functionality is applicable only to the Android and iOS devices.

The Apps to Block option helps you to add the particular version of the app to the block list. The selected single or multiple app versions will be blocked and the other app versions will be accessible. If you want the user to block all the versions of the app, then select the entire application. You can fully block the apps of Android mobile devices.

  • The Apps to remove and Apps to block lists are not visible to the ADO and KNOX supported devices.

This option helps you to recommend a complete app or a specific version of the app and add to the recommend list.

In order to publish a higher version of an installed app, the admin needs to upload the new .apk in the app repository from the “Upload Custom APK” option or add the new URL from the “Custom App URL” option in the repository (Manage > Apps > Repository > Add). Then the admin should check the app configuration recommend list (Manage > Apps > Configurations > Edit Configuration > Recommended Apps) and select the specific version of the app which needs to be pushed.

On the device, the user will be able to see the Upgrade button in the Recommended list. Thus the user can update the app as per their convenience.

In order to publish a lower version of an installed app, the admin needs to upload the old veriosn of .apk in the app repository from the “Upload Custom APK” option or add the old URL from the “Custom App URL” option in the repository (Manage > Apps > Repository > Add). Then the admin should go to the app configuration recommend list (Manage > Apps > Configurations > Edit Configuration > Recommended Apps) and select the specific version of the app which needs to be pushed. The user will then need to uninstall the existing version of the app and then install the recommended version.

Version name and version code, both refer to the release version of the application code, as it should be shown to its users. “Version Name” is a string value whereas “Version Code” is an integer value that represents the release version.

In Blacklisted Apps section, you can restrict the apps by adding the apps to the Apps to remove list and Apps to block list

Note: Apps added to the Apps to block list are not visible/disabled on the ADO and KNOX supported devices.

Apps added to Apps to remove list can be remotely uninstalled or disabled from ADO and KNOX devices.

For iOS devices only those apps can be uninstalled which are added by Enterprise Mobility Management console.

  • To add the apps to the list, click Apps to remove. Click the Add Apps button. In new window, select the apps. Add Apps button gets visible. Click Add Apps.
  • To add apps to fully blocked list, click Apps to block. Click the Add Apps button. In new window, select the apps. Add Apps button gets visible. Click Add Apps. When adding apps to Apps to remove or Fully Blocked list, you can also perform an advanced search to view the separate list of downloaded, system, suggested, and restricted apps.

In this case, only the pushed version codes of an app will be accessible or recommended to the device. All other versions of that app will be blocked on the device.

No. Once the admin publishes a higher/lower version of an app, then all other installed versions of that app will be blocked.

Seqrite Launcher is an application through which an IT admin can restrict Android device users from accessing certain applications or settings. With the Seqrite Launcher, the apps and settings which the device user accesses, can be customized by the admin. Thus the Admin gains complete control over how the device perform, what apps are launched, how the home screen appears and more.

Using App Configuration, the admin can only block the apps which are unwanted. However, with the help of Seqrite Launcher, the Admin can customize the mobile device completely and only enable the non-restricted apps to be visible on the device.

In case a user of a device does not install or activate Seqrite Launcher, that user’s device falls under the Launcher Non-Compliance list. The admin can view this list at any time and be updated about the non-compliant devices.

To configure/activate Seqrite Launcher on a device, follow these steps:

  • Make sure an app configuration is created with active Seqrite Launcher (go to Manage > Apps > Configuration > Add > create the configuration and activate the Launcher and its settings).
  • Push the app configuration (with Seqrite Launcher) to a device (Manage > Apps > Configuration > Edit tab > Devices > Apply configuration to device > select the device > Apply).
  • Once the admin pushes the app configuration (with Seqrite Launcher) to a device, the device user receives a prompt to install Seqrite Launcher.
  • Then the user should download and install the Seqrite Launcher app on the device. After installation, the user will be prompted to select one of the launchers present on the device. Thus, the user should select Seqrite Launcher and also select the Always option.

To add and activate apps on Seqrite Launcher:

  • Navigate to Manage > Apps > Configurations > select the configuration > click Edit icon > Launcher.
  • In Settings section, turn ON Seqrite Launcher.
  • Click Active Apps > Add Apps > select desired apps > click Add Apps > click Save.

Yes, you can add a particular version or all the versions of the app on the Launcher. When adding an app, click the triangle present in the name column of the app. The app versions will be displayed. Select the desired app version.

Seqrite Launcher mode/view can be a normal or Kiosk mode.

  • Normal: In normal mode multiple applications can be viewed or requested.
  • Kiosk: In Kiosk mode, only single app will be accessible.

Kiosk Mode creates an extremely restricted environment on the Launcher. In this mode the admin can select only a single app for the Launcher tray, which would then be in auto-launch mode on the device. As soon as the configuration is applied on the device, the user can only use the single selected app and the Enterprise Mobility Management client app on the device.

In Kiosk Mode, camera, call, and SMS settings will be disabled.

In normal Launcher mode, the device user can request for single or multiple apps. The requested app can be a pre-installed app or it can be a new app.

To request the app in normal launcher mode, follow these steps:

  • On the Seqrite Launcher screen, to request any new app, tap the Google Play Store icon.
  • To request the in-built app, tap Request App. The list of installed app is displayed.
  • Tap the bellicon available in front of the required app.
  • In the Request App screen, select the priority of the request, enter the description, and then tap REQUEST. Your request will be sent to the Enterprise Mobility Management portal.
  • After the Enterprise Mobility Management admin approves the requested app, the app gets listed in the App list of Launcher tray.

To accept or reject the app requests, follow these steps:

  • Log on to the Seqrite Enterprise Mobility Management console and click Alerts. In the Alert dialog box, click App Request.
  • The details of app request are displayed with Accept and Reject options.
    • Accept: Click this button to accept the app request received from the user.
    • Reject: Click this button to reject the app request received from the user. Enter the rejection reason and then click Reject.

Device Enrollment is the process of enrolling the mobile device with the Seqrite Enterprise Mobility Management console.

After enrollment, the mobile device users become members of the Seqrite Enterprise Mobility Management console.

After completing the enrollment, you can manage the device functionality, configurations, and Devices perform the actions remotely. The device can be enrolled using Email/SMS, QR Code, or Enrollment with ADO Enablement.

  • After sending the enrollment request, the device user will receive the enrollment details (Company Code and OTP) using email and SMS. The user must tap the enrollment link on the device, which navigates the user to the enrollment page. The user must follow the instructions given on the enrollment page. Now, the user must download and install the Seqrite Enterprise Mobility Management Agent along with inbuilt wakeup app and enter the Company Code and OTP in the given text box on the enrollment wizard.
  • After the user taps the Enroll button, the Activate Device Administrator screen is displayed.
  • To activate the Device Administrator, tap Activate. The company code and OTP details will be validated. The device gets enrolled with the help of email/SMS.
  • After completing the enrollment process, the enrollment request gets auto approved and all the mapped policy and configurations are applied on the device.

Yes you can exit the Launcher in the following ways:

  • In permanent exit scenario, the launcher exits for the infinite time duration.
  • In temporary exit duration, the admin can specify the duration to exit the Launcher in minutes, hours, or days. The admin has the privilege to exit the Launcher or activate the Launcher at any time.

In any case, if the device user wants to exit the Launcher, a passcode is required. The passcode is provided only by the Seqrite Enterprise Mobility Management admin.

To exit the Launcher temporarily or permanently, the admin can send the exit launcher command to the device as follows:

  • Log on to the Enterprise Mobility Management portal and navigate to the device overview page. From device action list, select Exit Launcher > click Submit.
  • In the Confirmation to Exit launcher screen, select the mode of exit.
  • If Exit launcher permanently is selected, add Security Code and click Exit Launcher.
  • If Exit launcher temporary is selected, then add Launcher Exit Duration, select the time, add the Security Code, and then click Exit Launcher. The command is sent to the device and the launcher is withdrawn according to the selections.

Device user can make a call (through device Menu) and contact the admin, and can get the passcode to exit the launcher for set time (the default Launcher Exit Duration in app configuration is 30 minutes).

The admin can reactivate the launcher again by sending the activate command. The admin can use the Activate Launcher link available on the device Overview page. When the enable launcher command reaches the device, the launcher is activated again.

Fencing is a virtual boundary for a device with protected policies and configurations. The fencing technique uses geographical locations, Wi-Fi SSIDs, and time as boundaries.

Fencing allows you to setup rules to allow or to restrict the user by applying the profiles, Web security configurations or app configurations to the user device.

Fencing is supported only by the Android devices.

Fence is applied to groups and the devices of the groups. When required you can add or remove the groups to which the fence configuration is applied.

The Wi-Fi fencing is a technique that uses Wi-Fi SSID to define the fence. Whenever the user device gets connected to the defined SSID, the Wi-Fi fence triggers and then the selected restrictions in that Wi-Fi fence are applied on the device.

Geo fencing helps to create the fence with restrictions in a geographical area. This option lets you allow or restrict the usage of the features within a specific area by tracking the device via GPS (global positioning system).

In an organization there can be many Geo fences and it is difficult to track the details of multiple Geo fences. Thus, the Geo fence details can be imported. Maximum of 1000 fences can be imported.

If GPS is blocked in any policy then it will not map with Geo Fence.

Please be informed that the Geo fence triggers only when you select High Accuracy mode in location service.

You can create multiple Geo fences from the same map by selecting locations. If you want to see all the created Geo fences, click Show All Geo Fences.

With Time fencing you setup the time-based rules to be applied on the user devices. Whenever the defined time is executed on the device, then the fence triggers on the device and the restrictions are applied on the device. If you want to execute time fencing for particular days within the defined time range, you can select the days that you want to execute fencing. You can also exclude executing the fencing on a particular date from the defined fencing period.

To add a Wi-Fi fence, follow these steps:

  • Log on to the Seqrite Enterprise Mobility Management portal and click Manage > Fencing > Fences > Add > Wi-Fi Fence.
  • In Add Wi-Fi page, enter the name of the Wi-Fi and then select Wi-Fi SSID. If the Wi-Fi SSID is a new one, then enter SSID. If you want to use the existing SSID from Wi-Fi configuration, then select Existing Wi-Fi SSID. After selecting existing Wi-Fi SSID, all the configured Wi-Fi SSIDs of Wi-Fi configuration are displayed.
  • Click Add.

If the Wi-Fi is blocked in any policy then it will not map with the Wi-Fi Fence.

To apply the Geo fence, follow these steps:

  • Log on to the Seqrite Enterprise Mobility Management portal and click Manage > Fencing > Fences > Add > Geo Fence.
  • Enter the place name to select the location and define the boundaries. The place name you entered will show the exact location on the map or will help to locate the place. Then click Add Geo Fence.
  • In Save Geo Fence dialog, enter the Fence Name, radius in meters, and then click Save.

To apply time fence on the devices, follow these steps:

  • Log on to the Seqrite Enterprise Mobility Management portal and click Fencing > Fences > Add > Time Fence.
  • Select Set Time Fence on option (select the date range or days or both).
  • In case you want to exclude the fence on certain dates, clear those check boxes. Then select the time range and click Save.
  • If required, exclude the dates from the time fence.

The Fences can be deleted by using either of the options:

  • On Fences list page, select a single fence and click the Delete icon in Actions column.
  • On Fences list page, select a single or multiple devices. The With selected option is displayed. Click With selected list and select Delete and then click Submit.

The fencing configurations allow you to map with the defined fences and implement the applied restrictions on the devices. With the help of fencing configurations, you can configure the policies, Web Security and app configurations on the device.

The Fencing Configuration option lets you control and apply restrictions on the device. The restrictions include policies, Web Security, and app configurations.

Fence group includes the list of fences, actions, policies, and restrictions that are to be applied on the device when the device meets the defined fence condition. You can select the actions and restrictions to be applied on the device. You can create multiple fence groups in one fence configuration. The multiple fence groups help to apply restrictions on the device based on the defined fence conditions. You can also apply the fence group as per priority. The first priority is given to the latest fence group created. You can edit the name of the fence group and delete the fence group if required.

You need to define fence to create new fence for Geo, time, and Wi-Fi.

  • Compel the user to enable Location Service on device: You need to select this check box to force the user to enable GPS on the device.
  • Compel the user to enable WiFi on device: You need to select this check box to force the user to enable Wi-Fi on the device.

The Fence Relation option helps to combine and apply all types of fences as a group or just a single fence.

AND: Helps to combine and apply all the fences in the respective fence group.

OR: Helps to apply either of the fences from the fence group.

Fence In is one of the fence triggering options. When you select the Fence In option, the restrictions will be applied on the device when the device comes into the defined fence. When defining the fence configuration, you can select this option and provide its criteria.

Fence Out is one of the fence triggering options. When you select the Fence Out option, the restrictions will be applied on the device when the device goes out of the defined fence.

When defining the fence configuration, you can select this option and provide its criteria.

Seqrite Enterprise Mobility Management provides actions such as Block, Trace, and Notification. So if the admin has selected any of these options, then that respective action takes place if the device comes inside the defined fence. You can define following actions:

  • Block: If the device comes in the defined fences, then the device gets blocked.
  • Trace: If the device comes in the defined fences, then the device will be traced.
  • Notification: If the device comes in the defined fences, then Seqrite Enterprise Mobility Management Admin will get the notifications.

In the Fence Group section if this option is selected, the admin will receive Email notification when the fence is triggered.

When fence is triggered, the following restrictions are applied; policies, Web Security, and app configurations.

Fence configuration is applied to the groups.

Please check your GPS and Wi-Fi is enabled. If GPS is blocked in any policy then it will not map with Geo Fence. If Wi-Fi is blocked in any policy then it will not map with Wi-Fi Fence.

If the configuration is edited, its current version will be changed.

Seqrite Enterprise Mobility Management supports On Demand and customized reports.

  • On Demand Reports : In Standard reports you get detailed reports about infection status, network data usage, and app non-compliance.
  • Custom Reports : The customized reports provide options to customize and generate the reports according to your requirement.
  • Scheduled Reports : On Demand & Custom Reports can be scheduled to be generated at the fixed date and time. You can schedule to generate the report on daily basis or weekly or monthly.

The infection status report displays the detailed information related to the threats and infected devices.

To view the status reports for the threats detected or the devices, follow these steps:

  • Log on to the Seqrite Enterprise Mobility Management portal and click Reports > On Demand Reports. Select appropriate filter criteria to view the reports.
  • In Report Type list, select Malware Detection Report.
  • In Select Type list, either select Threat Name or Device (as per the requirement) and Date Range, and then click Search.
  • The list of detected threats for the selected date range is displayed. The Malware Detection report shows details about Threat Name, Threat Type, Device Count, and View Details.

Note: If any particular date is not selected, a list of all the devices or threats that were detected is displayed.

Yes, you can view the network data usage according to the devices.

To view the network usage report for the device within the Enterprise Mobility Management network, follow these steps:

  • Log on to the Seqrite Enterprise Mobility Management portal and click Reports > On Demand Reports. Select appropriate filter criteria to view the reports.
  • In the Report Type list, select Internet Data Usage Report.
  • In the Select Type list, select Device. Select the Date Range and then click Search.
  • The list of devices that utilized Internet data for the selected date range is displayed. The report shows details about Id, Device Name, Mobile Data (in MB), Wi-Fi Data (in MB) and Roaming.

Note: If any particular date range is not selected, usage for all the devices is displayed.

Yes, you can view the network data usage according to the apps.

If you have recommended, installed, or have informed the user to upgrade the app and the user has not taken any action according to the admin’s suggestion, then the app goes into the non-compliance mood.

Check if there is a date range selected when creating a report. Then check what date range is selected. Make sure the date range is in continuous form and that you have not selected two different date ranges.

If the report generates huge data then the report will show a warning message. Try to filter your search criteria to get the expected search results.

The root entities include User, Department, Device, Device Group, User Role, Policy, App Repository, Configurations, and Fence Configurations.

No, you cannot add multiple root entities. Only one root entity is to be selected.

Check the number of columns added. You can add maximum of 15 columns.

The Where Operator in custom report includes Less than, Greater than, Equals, Less than equal, Greater than equal, Not equal, In, Not In, Contains, Does not contain, Starts with, and Ends with.

The supported operators for Boolean data are Yes and No.

The Group By functionality is used to group rows that have similar values. It gives the summary of the database.

Aggregate function allows you to perform calculation on multiple rows of a single column of a table and give a single value.

The aggregate functions include:

  • COUNT: The COUNT aggregate function gives the total number of values in a field.
  • AVG: The AVG aggregate function gives the average of the values in a specified column. It is applicable only for numeric data.
  • SUM: The SUM aggregate function gives the sum of the values in a specified column and is applicable only for the numeric data.
  • MAX: The MAX aggregate function gives the largest value from the specified table field.
  • MIN: The MIN aggregate function gives the smallest value from the specified table field.

In Seqrite Enterprise Mobility Management, the admin will get many useful attributes for devices when creating a custom report.

  • Device statistics such as; battery level, CPU usage, Signal strength, network details
  • Device level setting such as; enabling call/SMS log sync.
  • Device mobile number or device IMEI number
  • Information of SIM carrier or SIM ID
  • Device application network usage

Admin Settings

The Enterprise Mobility Management Upgrade setting will help you to send the updated version of the Enterprise Mobility Management client app from the server to the user’s device.

Enterprise Mobility Management app can be upgraded via default location, custom URL of Enterprise Mobility Management, or by uploading Enterprise Mobility Management app APK.

When you want to upgrade the Enterprise Mobility Management app using the Seqrite App Store, then you can use the default location option.

To update the Seqrite Enterprise Mobility Management app via Seqrite App Store, follow these steps:

  • Log on to the Seqrite Enterprise Mobility Management console and in the left pane, click Admin > Setup Services > Agent Upgrade > Enterprise Mobility Management Upgrade.
  • Turn ON the Enterprise Mobility Management Upgrade Notification and select the Alert To Upgrade Enterprise Mobility Management duration in hours.
  • Select the App Source Type as Default Location. The Package ID option will be Pre-filled.
  • Click Save.

The custom URL option helps you to download the Enterprise Mobility Management client app from the custom URL on your own company’s Cloud. After you upload the Enterprise Mobility Management client app on Cloud, the user receives a prompt about the availability of the updated Enterprise Mobility Management client app. Thus the user can download and install the updated Enterprise Mobility Management client app from the company’s Cloud URL.

To upload custom URL on Cloud, follow these steps:

  • Log on to the Seqrite Enterprise Mobility Management console and in the left pane, click Admin > Setup Services > Agent Upgrade > Enterprise Mobility Management Upgrade.
  • Turn ON the Enterprise Mobility Management Upgrade Notification and select the duration from the Alert To Upgrade Enterprise Mobility Management list.
  • Select the App Source Type as Custom URL. The Custom URL section is displayed.
  • Enter Version Name, Version Code, Package Id, and URL of .apk file in the respective text boxes.
  • Click Save.

The Custom URL setting is saved successfully and the user will receive a prompt to download and install the updated Seqrite Enterprise Mobility Management Agent.

The Upload Enterprise Mobility Management App option gives the privilege to upload the APK on Seqrite Enterprise Mobility Management Cloud. After the APK is uploaded on the Seqrite Enterprise Mobility Management Server, the Enterprise Mobility Management client app will be downloaded to the device and the user needs to install it on the device.

To upload APK on Seqrite Enterprise Mobility Management server, follow these steps:

  • Log on to the Seqrite Enterprise Mobility Management console and in the left pane, click Admin > Setup Services > Agent Upgrade > Enterprise Mobility Management Upgrade.
  • Turn ON the Enterprise Mobility Management Upgrade Notification and select the duration from the Alert To Upgrade Enterprise Mobility Management list.
  • Select the App Source Type as Upload Enterprise Mobility Management App. The Package ID option will be Pre-filled. 4. Select the APK file and click Save.

If an older version of Seqrite Enterprise Mobility Management Agent is installed on the device, then as soon as the device syncs with the server, the APK will be downloaded automatically on the device and the user will be promoted to install the new version of the Seqrite Enterprise Mobility Management Agent.

On the device, tap the Install button to install the latest Seqrite Enterprise Mobility Management Agent.

The admin can use the Launcher Upgrade settings to send the updated version of Launcher client app from the server to the user’s device.

The Launcher can be upgraded via default location, custom URL of launcher, or by uploading Launcher app apk.

To update the Launcher using the default location, follow these steps:

Log on to the Seqrite Enterprise Mobility Management console and in the left pane, click Admin > Setup Services > Agent Upgrade > Launcher Upgrade.
Turn ON the Launcher Upgrade Notification option and select the frequency, in hours to send the alert to the user to upgrade the Launcher.
From the App Source Type option, select Default Location. Package ID is Pre-filled.
Click Save.
If the old version of Launcher is installed on the device, as soon as the device syncs with the server, the APK will be downloaded automatically on the device. The user will be prompted to install the new version of the Launcher Agent.

The custom URL option is helpful to you to download the Launcher client app from the custom URL on your own company’s Cloud. After you upload the Launcher client app on Cloud, the user receives a prompt about the availability of the update. The user can download and install the updated Launcher client app from the company’s Cloud URL.

To upload the custom URL on Cloud, follow these steps:

Log on to the Seqrite Enterprise Mobility Management console and in the left pane, click Admin > Setup Services > Agent Upgrade > Launcher Upgrade.
Turn ON the Launcher Upgrade Notification option and select the frequency, in hours. This will help you to send an alert to the user to upgrade the Launcher Agent.
From the App Source Type option, select Custom URL.
Enter Version Name, Version Code, Package Id, and URL of .apk file.
Click Save.
The Custom URL setting is saved successfully and the user will receive a prompt to download and install the updated Launcher Agent.

With this option you can upload the Launcher APK on Seqrite Enterprise Mobility Management Cloud. After the APK is uploaded on the Seqrite Enterprise Mobility Management server, the Seqrite Launcher app will be downloaded to the device and the user needs to install it on the device.

To upload the Launcher APK on Seqrite Enterprise Mobility Management server, follow these steps:

Log on to the Seqrite Enterprise Mobility Management console and in the left pane, click Admin > Setup Services > Agent Upgrade > Launcher Upgrade.
Turn ON the Launcher Upgrade Notification option and select the frequency, in hours. This will help you to send an alert to upgrade the Launcher Agent.
From the App Source Type option, select Upload Launcher App. The Package ID option will be Pre-filled.
Select the file from your computer to upload the APK and click Save. If the old version of Launcher is installed on the device, then as soon as the device syncs with the server, the APK will be downloaded automatically on the device. The user will be prompted to install the new version of the Seqrite Enterprise Mobility Management Agent.
On device, tap the Install button to install the latest Seqrite Launcher Agent.

Please ensure your Launcher Upgrade Notification is enabled. If not, then turn it on.

The Alert To Upgrade Launcher option helps the admin to send the alerts to the users to upgrade their Launcher app. The alert will be sent in the interval of selected hours.

Version Name’ is a string value whereas ‘Version Code’ is an integer value that represents the release version.

Company settings gives privilege to edit the company name, logo, Launcher wallpaper, and QR code validity of the logged in tenant.

As soon as you update the company name, it gets reflected on the Enterprise Mobility Management portal, About screen of Enterprise Mobility Management client app, and on the Launcher app. Whenever, the device syncs with the server, the updated logo reflects on the Launcher.

To have a good user experience, the Launcher wallpaper can be edited. You can upload the Launcher wallpaper from Seqrite Enterprise Mobility Management portal and this wallpaper reflects on Seqrite Launcher Home screen. The updated wallpaper reflects on the device when the device syncs with the server or the admin sends a sync command.

Yes, there is a specification for image used as a launcher wallpaper as follows: The device wallpaper image resolution must be 1080 x 1920.

Please check the launcher version. The Launcher Wallpaper functionality is applicable for the Launcher 1.1.44 and later versions.

Yes. The Activity Logs section helps you to keep a track of the actions performed by all the Admins. The activity logs are created when any of the Admin perform any action on the Seqrite Enterprise Mobility Management console. You can search the Admin activity using different search criteria and also export the activity logs.

To export the activity logs, you can use the advanced search criteria. This helps to keep the documented record of all the admin activities. The activity logs are exported in CSV file.

To export the activity logs, follow these steps:

  • Log on to the Seqrite Enterprise Mobility Management console and in the left pane, click Reports > Activity Logs > Advanced Search. Search criteria are displayed.
  • Select the entities, change log context, and change log action.
  • Select the number of days or date range and click Export. Exported data will be based on the selected search criteria, so choose the search criteria properly.
  • On confirmation screen, click OK.

This is a search option to find the change logs in context of selected entity. For example, if the admin want to search and view the logs in user context, then the admin need to select “User” from the Select Change Log Context list.

The Change Log Action are all the possible actions that can be carried out on the selected entities.

The Action Logs section helps you to keep a track of the device actions executed on the devices by the Seqrite Enterprise Mobility Management portal. If the admin performs any action on bulk devices, then using the action logs, the admin can track the status/progress of that action for all the devices.

You can use the Advanced Search parameters to search different action logs.

  • As action logs track device actions, you can keep track of each and every actions carried out by every device that is enrolled with Seqrite Enterprise Mobility Management.
  • Secondly, you can export the action log details and make use of the exported data.

To export the action logs, you can use the advanced search criteria. The action logs are exported in CSV file.

To export action logs, follow these steps:

Log on to the Seqrite Enterprise Mobility Management console and in the left pane, click Reports > Action Logs > Advanced Search. Search criteria are displayed.
Select the action type and then select the action days or date range, and click Export. Exported data will be based on the selected search criteria, so choose the search criteria properly.
On confirmation screen, click OK.

The License Management table displays the product key of the license.

For the trial version, the admin can only manage the approved number of devices through Seqrite Enterprise Mobility Management. You can purchase a license for as many devices as you wish. License subscription is based on the number of devices.

For the Free/Trial version, the admin should send an email to corporate@seqrite.com in order to increase the number of devices or you can contact the respective sales executive.

You need to send an email to corporate@seqrite.com in order to extend the Enterprise Mobility Management trial period duration or you can contact the respective sales executive.

Once your Trial Period has expired, the admin will not be able to manage any device. All options and functionalities will be disabled. However, the admin will have the ability to uninstall the Enterprise Mobility Management client app from devices with Approved or Approval Pending status.

For security reasons, we have restricted the user from uninstalling the Enterprise Mobility Management client app from their device. Only the admin can send the uninstall command to uninstall the Enterprise Mobility Management application from a device.

In case of a factory reset, the Enterprise Mobility Management application will get removed from a device. The status of the device will show Uninstalled. Admin can Enable the Block Factory Reset from Device setting option. Thus, the device user cannot factory reset the device.

Devices can be deleted using any of the either options:

  • On Devices list page, select a single device and click the Delete icon in Actions column.
  • On Devices list page, select single or multiple devices. The With selected option is displayed.
  • Select Delete and then click Submit.

In case you need to assign a device to another user, you need to change the owner of the device.

Go to Manage > Devices > select the device whose owner is to be changed > click Edit icon > click Edit tab. In Edit details section, click Change Owner > click the required user name > click Save.

To provide admin access to another user:

  • Go to Manage > Users > select the user to provide admin access > click Edit icon > click Edit tab > click Privileges. Select the Allow admin access check box.
  • From User Role list, select Admin and click Save.
  • The user will then get an email to set password. After resetting the password, the user can access the portal as an admin.

Seqrite Enterprise Mobility Management portal has an informative section in the lower section of the portal.

  • Support:The Support option includes the following options:
    • Contact: This option helps you to know the various ways to contact Seqrite support such as Email Support, Live Chat Support, Phone Support, FAQs, and Online Help.
  • Privacy Policy: This section helps you to view the privacy policies of Seqrite Enterprise Mobility Management.
  • License Agreement: This section helps you to view the complete license agreement of Seqrite Enterprise Mobility Management.
  • Share Feedback: The Share Feedback option is a simple approach for you to reach us. To share your feedback, click Share Feedback. You can also share your feedback with the help of the Support option.
  • Release Notes: This option includes the release notes of the current version.

If the device is blocked, then the user should call on the mobile number visible on the blocked screen and ask to unblock the device. The Admin can send the secret code to the user mentioned against the Device Status option to unblock the device. To view the secret code, click Secret Code.

Seqrite Enterprise Mobility Management client app always displays the Threats Detected status when any threat is detected during the scan on the device. The device user can uninstall or skip the threat as required.

To resolve the threat, follow these steps:

  • Open Seqrite Enterprise Mobility Management and check the status tab. If any threat is detected, then tap Threats Detected.
  • To sort the threats by Resolved and Not Resolved status, tap View.
  • To remove the threat from the device, tap Uninstall.

Device User cannot check the Data Usage, but if Admin has Set Data Notification at % limit of Data Usage, Device user will get a Popup for the %limit Internet Usage.

Admin can check the network data usage of the device, go to menu and tap Data Usage. Admin can view the data usage as per Daily, Weekly, and Monthly basis.

No, in Kiosk mode the user cannot request any app. The user can access only the app added in the kiosk mode. The app will be auto launched when the kiosk mode is applied on the device or the user restarts the device or if the user locks and unlocks the device.

Published Apps functionality helps the user to add the apps to the Published Apps list and view the list. You can select the entire app or a specific version of the app and add to the recommended list. The selected app version will be recommended and the other app versions will be blocked. If you want the user to access all the versions of the app, then select the entire app and add to the recommended list. If the Restrict new app installation on ADO & Knox Enabled Devices check box is selected in the app configuration settings, then you will receive a prompt to clear the check box and then recommend the apps.

Log on to the Seqrite Enterprise Mobility Management console and in the left pane, click Apps > Configuration > The App Configuration page is displayed.
In Edit Details section of the App Configuration, go to Published Apps section, to recommend any Android app or app version, click Add Apps.
In next window, select the apps. Add Apps button gets visible then Click Add Apps.

If you want the user to uninstall all the versions of the app, then select the entire package to uninstall all the versions. You can also add the particular version of the app to the uninstall apps list. The selected single or multiple app versions will be blocked and the other app versions will be accessible. This functionality is only applicable to the Android devices.

Log on to the Seqrite Enterprise Mobility Management console and in the left pane, click Apps > Configuration > The App Configuration page is displayed.
In Edit Details section of the App Configuration, go to Blacklisted Apps section, to remove any Android app or app version, click Apps to Remove.
In Blacklisted Apps section, you can restrict the apps by adding the apps to the Apps to remove list

The Profiles section shows the applied configurations and policies. The table displays the Profile Type and Profile Name.

To view the Profiles information on the device, tap menu > Device Info > Profiles.

If a device is non-complaint due to any policy, you should apply that policy on the device. To make the device compliant, Open Seqrite Enterprise Mobility Management App, tap the Device Compliance message. You are directed to the Enterprise Mobility Management Policies section with Non-complaint and Compliant list. Under Non-compliant list, check the policies which are not applied and tap Apply. You are directed to the respective device settings. Make the required changes.

The policy is applied and the device becomes compliant.

Share App option allows the device user to share Enterprise Mobility Management Client apk. or different files through Bluetooth or other available options on the device.

To share apps from device, tap menu > Share App > select your preferred option of file sharing.