![]() ![]() Table: If Table is clicked, all the fence configuration details are displayed in table format.To view the details of the fence, you have to locate the fence and click on it. Map: On Fences list page if Map is clicked, all the fences and their details are displayed on the map.You can change the look of Fences list page either as a map or in the table format. The Fences list page displays all the configured fences. ![]() Note: Fencing is applicable only to the Android devices. Select the required configuration type and click Search.Select Configuration type: Select this option to search fences of a particular configuration types including Wi-Fi, Geo, and Time.Log on to the Seqrite mSuite console and in the left pane, click Fencing > Fences > Advanced Search. ![]() The Advanced Search option allows you to perform an advanced search for different fences created in Seqrite mSuite. Seqrite mSuite provides the following fences: Wi-Fi Fence, Geo Fence, and Time Fence. You can create a boundary of the fencing and apply the fence restrictions on the device. The Fences option helps you to add new fences and modify the details of the fences. The configurations must be applied on the device to limit the usage of the features on the device. The fencing technique uses geographical locations, Wi-Fi SSIDs, and time as boundaries.Īfter the fence is created, apply the restrictions on the device. You can set up the triggers when the device meets the defined boundaries. The virtual barrier allows you to know the user device entry or exit of defined boundaries. The fence triggers and sends alerts when the device leaves the assigned boundaries. Seqrite mSuite defines the safe areas for the devices. The Fencing feature acts as a virtual boundary.įencing allows you to setup rules to allow or to restrict the user by applying the profiles or app configurations to the user device. Seqrite mSuite upholds a very strong feature of fencing for securing the confidential data. With the rise in the number of mobile devices, securing the confidential data has become crucial. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |