Skip to content
  • There are no suggestions because the search field is empty.

Security Component

Security Component

The Security Policy Component is used to control how secure a device must be.
It lets you manage screen lock requirements, encryption, system restrictions, and what actions users are allowed to take on the device.

Use this component when you need to protect data and prevent misuse of a managed device.

security-component


Security requirements

Default Wi-Fi state

Controls whether Wi-Fi is enabled or disabled by default on the device.

Recommended:
Keep enabled unless the device must strictly use mobile data only.


Default airplane mode state

Defines whether Airplane mode is on or off by default.

Recommended:
Keep disabled unless the device must remain offline.


Default data roaming state

Controls whether the device is allowed to use data while roaming.

Recommended:
Disable to avoid unexpected mobile data charges.


Default USB data signaling availability

Controls whether data can be transferred over USB when connected to a computer.

Recommended:
Disable for secure environments to prevent data extraction.


Connectivity management

USB data access

Controls the ability to transfer data using a USB cable.

Recommended:
Disable for corporate or shared devices.


Default VPN configuration

Controls whether a VPN is automatically required or applied to the device.

Recommended:
Enable if your organization uses VPN for secure communication.


Wi-Fi network configuration

Controls whether users can modify Wi-Fi network settings.

Recommended:
Disable on kiosk / enterprise devices.


Tethering and sharing

Tethering settings

Allows or blocks mobile hotspot / tethering

Recommended:
Disable for cost and security control.


NFC / Bluetooth / File sharing

Controls multiple sharing methods including Bluetooth and NFC.

Recommended:
Disable unless device requires sharing capability.


Setup & system restrictions

Factory Reset Protection (FRP)

Controls whether a Google account is required after a factory reset.

Recommended:
Enable to prevent theft and unauthorized reset.


Block USB debugging

Prevents the use of developer mode USB debugging.

Recommended:
Enable for security.


Add custom lock message

Displays a message on the lock screen such as:

“This device is managed by your administrator”

Useful for:

  • Lost & found messages
  • Ownership identification
  • Compliance warnings

Password & screen lock

Required password policies

You can enforce:

  • PIN / Password length
  • Complexity requirements
  • Minimum character types
  • Max failed attempts
  • Password expiration

Recommended for: Corporate-owned and regulated devices.


Screen lock settings

Control how the screen lock behaves:

  • Timeout before locking
  • Automatic lock
  • Required authentication

This prevents unauthorized physical access to the device.


User account restrictions

Accounts that can’t be managed by the user

You can prevent users from adding or removing certain accounts.

Recommended:
Block personal email or cloud storage accounts on managed devices.


Supervised / work profiles

You can control:

  • Access to personal apps
  • Access to work apps
  • Access to data between profiles

Recommended for BYOD or dual-use devices.


Hardware restrictions

You can allow or block access to:

  • 📷 Camera
  • 📍 Location
  • 🎤 Microphone
  • 📡 Bluetooth
  • 🌐 Wi-Fi
  • 📞 Phone calls
  • 📩 SMS
  • 📲 NFC
  • 💾 External storage
  • 📤 Clipboard sharing

Tip:
Only enable what is absolutely necessary for device use.


Summary

Use the Security Policy Component to:

✔ Enforce lock screen and password rules
✔ Prevent data leakage (USB, NFC, Bluetooth)
✔ Control network and roaming activity
✔ Restrict apps and system access
✔ Protect against device tampering
✔ Enforce company security standards

This is the most important component for enterprise compliance and data protection.