Events and Alerts

The Events & Alerts tab shows an audit trail of incidents and actions that occurred on the devices, for example, Application installation and Profiles detected on devices.

Events & Alerts table:

Item

Description

Date/Time

Displays the date and time when the event occurred.

Severity level

  • Critical:

    • Indicates a malicious threat (such as a malware application) that has immediate impact on the device and sensitive corporate data.

    • Requires immediate action.

    • Triggers an alert on the user device to remediate the threat (for example, remove the malware, disconnect from the infected Wi-Fi network).

    • Sends an email/SMS alert to the administrators (if you define in the dashboard settings).

  • Warning: Indicates a potential threat by a legitimate application, configuration or company policy violation.

    Examples:

    • Backup tools (Application) might be legitimate for personal use but will risk the organization if extracts information to unknown destinations.

    • Enable USB Debugging on Android might be legitimate for developers but is a potential risk for regular users.

  • Information – Indicates that no further action is required. Appears most often when an Application is removed.

Note - Low risk events do not trigger an alert on the end-user devices.

Attack Vector

Specifies the nature of the Event/Alert:

  • Application

  • Cellular network

  • Device

  • Network Security

  • OS Exploits

  • Text message

  • WiFi network

  • iOS profiles

Threat Factors

Specifies the threat factor for the event that occurred. Explains the reason for the severity level.

Event

Specifies the user or the action taken by the Mobile Security solution.

  • Noncompliant

  • Compliant

  • Policy changed

  • Active (Device is active)

  • Inactive (Device is inactive)

  • Disconnected

  • Detected

  • Ended

  • Installed

  • Removed

  • Blocked

  • Prevented

  • Deleted

  • Approved

  • Enabled

  • Disabled

Event Details

Additional details about the Event, such as name of application installed or removed Wi-Fi SSIDClosed Service Set Identifier. The technical term for a wireless network name that you see when you connect your device to your wireless home network. or Identifying information, and so on. Event Details can link to an iOS Profile detail, Network detail, or App Analysis detail.

OS

Operating System of the device (iOS/Android). It is determined by the information received from the device when the application is installed.

Device ID

The device ID in the Mobile Security dashboard.

User email

Device user's email address. It is manually set by the Admin or automatically by UEMClosed Unified Endpoint Management. An architecture and approach that controls different types of devices such as computers, smartphones and IoT devices from a centralized command point. when the devices are provisioned.

Note - For Android devices, you get a Phishing alert on the dashboard when Mobile Security detects and blocks a SMS phishing attempt on the mobile device. This feature works only if the end-user has granted access to Harmony Mobile Protect App to scan the SMS received on the device.

 

For more information on how to grant the access on the device:

Filtering the Events & Alerts Table

  1. Click the icon above the Events & Alerts table.

    The Filters pane appears on the right side.

  2. Expand the required category and select the filter.

Exporting Events Data to CSV File

To export Events data to a CSV file, click Export above the Events & Alerts table.

The system creates a comma separated values file that can be opened in spreadsheet applications such as Microsoft Excel. Use filter to select the required information for the file.

If the number of events exceeds 10,000, processing the data may take time. So the export is performed offline and an email is sent to the registered address with the link to download the CSV file. The link is valid for 7 days. For privacy reasons, PII data is obfuscated in the CSV file.

Generating Mobile Security Report

The Mobile Security Report provides an overview of the security status of all the mobile devices associated with your account. You can generate and download this report in PDF format whenever you need it, or set up a schedule to automatically generate and receive it on a weekly or monthly basis.

There are two types of security reports:

  • Operational report - Contains the Operational Overview details such as Device Status, Licensing Information, Mobile Models and so on.

  • Full report - Contains both the operational overview and the detailed security status of all mobile devices in your account. It provides full visibility to the Mobile Security usage.

To generate the report, click PDF Report above the Events & Alerts table.

The system generates and downloads the report in this format:
mobile-security-report-yyyy-mm-dd-hh-mm

To select the report type and schedule the Mobile Security Report, go to SettingsAdministratorsNotifications. See Scheduling Mobile Security Report.

Viewing Events by Device Risk

In addition to Events view, you can view the events according to device risk (not available when privacy mode is enabled):

This view shows all the necessary risk information per device in the system, and the number of the devices with a specific risk level.

The top table shows the list of devices with their risk levels and the number of devices.

Item

Description

Device Risk

Device risk is determined by both the accumulative threats risk levels found on it and different settings present on the device. (Debugging tools, Jailbreak, Developer Tools, and so on).

Risk levels:

  • High – Indicates a device is in a malicious state and an immediate action is needed.

  • Medium – Indicates a potential threat by a legitimate application or configuration which contradicts the company policy.

  • Low – Indicates a device might present potential risky behavior caused by a legitimate application or configuration. This might be caused by a legitimate application which uses an unusual ad network or an application which has access to the device contacts with no reasonable explanation but no potential risk is applied.

  • None – Indicates a device has zero risk.

User Info

User name and email as configured in the devices screen.

Device Info

Device Info determined by the information received from the device post the Protect installation:

  • Device type (OS)

  • OS Version

  • Device details

Policy

The device policy, determined according to the device group. Can be Global or custom.

Member Of

The device groups.

Status

Indicates the device current state:

  • Processing – A temporary state that occurs between adding the device manually and the Registration Invitation has been sent.

  • User Notified – A Registration Invitation was sent, device has not yet registered.

  • Provisioned – Device was added via UEM, device has not yet registered.

  • Active – Harmony Mobile Protect App is installed, the device was successfully registered, and the device was successfully scanned.

  • Inactive – Harmony Mobile Protect App was installed, the device was registered with Mobile Security dashboard, and then Harmony Mobile Protect App was removed, or the device has not connected to the Dashboard in more than X days.

Last Seen

Last seen field indicates the last time the device communicated with Mobile Security servers.

You can filter every column in the table:

  1. Click Filter above the table.

  2. On the Filters pane on the right side, select the information you want to view.

  3. You can also export the mobile devices information from the table to CSV file, which creates a comma separated values file that can be opened in spreadsheet applications such as Microsoft Excel. Use filter to select the required information for the file. Later you can use those details to approach end-users and instruct them how to remove the risk off their mobile devices, or other related actions.

The lower table on the screen shows the chosen device row events details.

This table has two modes:

  1. Active Events (default): Shows only the active events on the device.

  2. All Events: Shows active and historic events.

You can filter every column in the table:

  1. Click Filter above the table.

  2. On the Filters pane on the right side, adjust information you want to view.