Applying quarantine actions

Learn about quarantine actions and understand their role in protecting devices in your organization.

In MaaS360, quarantine refers to a state where a device or a user is isolated or restricted due to security concerns. Quarantine actions are applied if a device or a user is identified as a security risk. These actions allow you to enforce security measures that restrict access for risky devices and users. You can apply quarantine actions based on various factors such as risk score, number of risk incidents, and risk type. These actions are designed to mitigate potential security risks and block unauthorized access to corporate resources.

When quarantine actions are enforced, users or devices may be blocked from accessing specific applications, emails, or networks until certain criteria is met. For example, if a user attempts to access an SSO-enabled app from a risky device, quarantine actions may prompt them to complete the Multi-Factor Authentication (MFA) challenge to ensure their identity. Enable the Threat Management or the Mobile Threat Defence services to enable quarantine actions on risky devices and users.

Access privileges

MaaS360 administrators require the Quarantine access rights to view the quarantine action in the Security Dashboard. By default, MaaS360 grants Quarantine access rights to the following roles:
  • Administrator
  • Administrator Level 2
  • Security Manager
  • Service Administrator

You can grant the Quarantine access rights when you create new roles or update the existing roles.