Configure mobile policies for iOS/iPadOS devices in your organization based on your security requirements.
![]() |
Important
|
Procedure
- On the Trend Vision One console, go to .
- Click the iOS/iPadOS tab.
- Click Create or click the name of an existing policy.
- On the General Settings screen, specify a policy name and select the protection strength that best suits
your needs, or click Custom to customize your own policy.
Important
The protection strength selected in the General Settings screen provides predefined settings accordingly in subsequent steps. You can modify the predefined settings during later configuration.If you modify the predefined settings, the protection strength changes to Custom. - Configure proxy settings.To use Service Gateway as a proxy to connect managed devices to Trend Vision One services and other internet resources, select Send Mobile Agent traffic through the Service Gateway proxy service. This feature helps you control mobile device access within your company.For this feature to work, make sure that you have deployed Service Gateway in your network with the Forward Proxy Service enabled and properly configured to allow connection to destination services. If you have deployed multiple Service Gateways in the network, the Mobile Agent will connect to any Service Gateway based on availability.
Important
-
The Mobile Agent uses a local VPN to connect to the Service Gateway. Make sure that your end users have enabled the local VPN in their Mobile Agents for the traffic to be forwarded to Service Gateway.
-
Compared with Service Gateway, Zero Trust Secure Access (ZTSA) provides more powerful Internet access control functionality. If your network is using ZTSA with Internet Access and AI Service Access enabled, Mobile Agents in the network will send traffic to ZTSA instead of the Service Gateway proxy service.
-
- Configure Malware Detection settings.
Note
This feature is not available when you integrate with Google Workspace or Microsoft Entra ID, or with other MDMs through managed configuration.- Click Malware Detection.
- Choose the scan scope.
- Configure malware scan criteria.
-
Malware
-
Unofficially modified app content/data
-
Transmission of personal data without consent
-
System/App vulnerabilities
-
- Configure Wi-Fi Protection settings.
- Click Wi-Fi Protection.
- Configure Wi-Fi scan criteria.
-
Automatic decryption of HTTPS trafficThe Wi-Fi network traffic is decrypted, which may result in data leakage.
-
Unsafe access pointThe device is connected to an insecure Wi-Fi network.
-
- Configure Configuration Manager settings.
Note
This feature is not available when you integrate with an MDM through managed configuration.- Click Configuration Manager.
- Configure configuration scan criteria.CriteriaDescriptionJailbroken deviceThe device is jailbroken.Lock screen disabledThe device is not locked with a passcode, Touch ID, or Face ID.Outdated OSThe device operating system is out of date.Vulnerable OSThe device operating system is vulnerable.
Note
This option is available only when you integrate with Microsoft Endpoint Manager (Intune).
- Configure Web Reputation settings.Trend Micro Web Reputation technology assigns websites a "reputation" based on an assessment of the trustworthiness of a URL, derived from an analysis of the domain.
- Click Web Reputation.
- Select a security level.
- To automatically approve or block certain websites, specify the websites in the following
formats based on device platforms and add them to the allow list or to the block list.ItemFormatWebsite format
-
URL
-
FQDN
Wildcard character support*Tip
-
* : Matches any number of characters
-
? : Matches a single character in a specific position
-
- Configure policy targets.
- Click Targets.
- Specify one or more groups, assignment groups, or organizational units.
Note
Specifying a group, assignment group, or organizational unit that is on the target list of another policy removes it from the previous policy. The previous policy no longer affects the group, assignment group, or organizational unit.
- Configure advanced settings to schedule Mobile Security scanning by selecting Scheduled scan and specifying the scan frequency.
Note
This feature is not available when you integrate with an MDM through managed configuration. - Click Save.
- (Optional) Click Continue if you are prompted to confirm the policy changes.
Note
This step is required only if you have added or deleted policy targets when editing a policy.