Policies

Imposing and enforcing rules
for using the devices

Create your own policies or use pre-made ones

The Proget solution allows you to create and impose various policies that define the basic configuration and usage conditions of devices added to the console. The available policies depend on the operating system of the given device and, consequently, its activation type. When creating a new policy, you must specify its compatibility with one selected activation type. In Proget, you will also find a practical set of predefined policies configured appropriately for a chosen device activation type.

screen with view of Proget console, policy tab

Assign policies sets collectively and remotely

You can very easily assign the policies you create to specific user groups. Remote and bulk configuration assignment speeds up the whole process of deploying devices and also improves the management of the company’s growing fleet of equipment. The use of policies eliminates the need to manually enter settings and allows you to fully control and quickly update them from the console. As a result, it saves time, eliminates errors, and enables configuration consistency – thus reducing security vulnerabilities.

auto-enrollment icon, update symbol, document and phone
Password
Enforce the necessity of a password on the device and configure the requirements associated with it.
  • all systems and activations
Applications
Set policies for installations and updates, grant permissions to use the given applications.
  • Android Enterprise activations, iOS, macOS
Security
Specify access to various settings that affect the security of the device, such as the ability to perform a reset.
  • Android, Windows, iOS
Functionality
Control how the device
is used by allowing or blocking
specific functions.
  • Android Enterprise activations, iOS, macOS, Windows
Location
Select the location mode, and decide whether the user can turn the location function on and off.
  • Android Enterprise Device Owner
BitLocker
Manage options related
to device encryption with the
BitLocker tool.
  • Windows
Education
Establish restrictions for the Classroom app for Apple devices in supervised mode.
  • iOS, macOS
Media
Define policies for viewing, purchasing, downloading and playing content on devices.
  • iOS
Web content filter
Block access to inappropriate websites by creating lists of allowed and disallowed URLs.
  • Android Enterprise, iOS

Assign permissions according to job titles

Assigning policies to groups also allows restriction leveling, i.e., imposing greater or lesser limitations that can reflect permissions based on specific positions. Suppose the organization’s security policies change or new legal directives emerge. In that case, Proget allows all or selected policies to be quickly modified to comply with current regulations. Privilege management can also prove very useful when a device changes users, and the company’s policy suite needs to be updated.

icon of the organizational structure diagram in the company

Enforce compliance with rules and procedures

Policies make it possible to impose, enforce, and thus comply with rules set by the organization or required by law. They also reduce common security oversights, such as not locking a device, using too weak passwords, forgetting to change them, and others. This, in turn, contributes to ensuring a higher level of protection for corporate equipment, the data stored on it, and the infrastructure to which corporate devices connect, thus eliminating the most common reason for security breaches in companies.

icon of document and shield with starred passwords

What will your next step be?

Start free trial of the system and arrange a consultation with an expert
to discuss how Proget will help you meet your specific business needs.

Grupa Eurozet logo
Murapol logo
POLATOM logo
Reinert Logistics logo
KupBilet.pl logo
DawTrans logo