Features>HarmonyOS Management

HarmonyOS device management

For organizations that want to expand their IT infrastructure outside of Android and Apple devices, HarmonyOS presents a strong alternative. Admins can get the best out of these devices when used for work by bringing them under the umbrella of management with a comprehensive unified endpoint management and security tool like Endpoint Central.

The need to manage HarmonyOS devices

Without a robust device management tool in place, devices used for work remain unmanaged and can present security threats to the organization. Further, admins will have a hard time configuring the necessary settings, apps, and resources onto these devices, which can hamper employee productivity.

With Endpoint Central, admins can onboard these devices into management, configure security policies, automate device management actions, and carry remote commands to keep devices work-ready.

Features of HarmonyOS device management solutions

Deploy devices that are ready for work

  • USB-based enrollment

    Leverage Android Debug Bridge and the help of a Windows or Mac machine to bring devices under management.

  • FCM-less management

    Though Google's Firebase Cloud Messaging services cannot be leveraged to manage HarmonyOS devices, with Endpoint Central you can still manage them through pre-configured periodic communication between devices and the server.

  • Device baselining

    Centrally manage device configurations like Wi-Fi, VPN, email, certificates, and more.

  • Advanced device setups

    Lock devices to a single app or a specific set of apps, manage home screens, and implement restrictions, thereby allowing devices to function as single-purpose, dedicated devices that provide a secure and streamlined user experience. Also configure Shared Device mode that enables the same device to be used by different employees at different times, with each of them having access to their own personalized workspace.

  • Corporate data isolation

    For personally-owned devices under the BYOD policy, containerize and exclusively manage the corporate workspace to keep corporate data secure while ensuring device user privacy.

  • Group-based management

    Categorize devices into groups based on departments or OUs. Then deploy group-based policies in bulk to devices to ensure each team has access to the right set of resources.

 

Manage device apps and content

  • Intervention-free app installation

    Deploy enterprise-developed apps over the air to corporate-owned devices and have them silently installed.

  • Multi-app version management

    Manage multiple versions of the same enterprise app to aid in testing out beta versions before distribution to the production environment, and distribute different versions of the same app to different teams based on their need.

  • Self-service portal

    Facilitate self-service by adding apps to an app catalogue within the device, allowing users to install the apps they wish to use without resorting to third-party sources. Distribute content to the self-service portal to provide secure access to work files.

  • Resources kept up-to-date

    Keep distributed content updated on devices by simply updating it on the content repository within the Endpoint Central console.

 

Implement robust security policies

  • Device Passcodes that meet standards

    Mandate device passcodes and dictate passcode type, complexity, and age to ensure devices containing corporate data have secure and compliant passcodes set.

  • Restrictions on functionalities

    Restrict device functionalities like camera, microphone, factory reset, etc., and restrict users from modifying settings configured by Endpoint Central, thereby preventing the misuse of business-critical devices.

  • Mandated encryption

    Add an additional layer of security to device data by enforcing encryption measures and further deter the unauthorized access of corporate data.

  • App and web blocklisting

    Block the access of malicious apps and web domains to keep devices protected from app- and web-based security threats.

  • Location-based access

    Setup geofences that automate security actions such as alerts and data wipes to be performed if the device leaves or enters a specific geographical boundary.

  • Conditional access policies

    Allow only managed devices to access corporate resources, including apps and the Exchange server, to effectively implement a conditional access policy.

  • Vulnerable device detection

    Automatically detect and remove devices that are rooted to eliminate the threats these devices can pose to the corporate network.

 

Manage mobile assets

  • Remote troubleshooting

    Remotely view and control device screens right from the Endpoint Central console to resolve technical issues. To simplify issue resolution, simultaneously carry out remote commands and chat with the device user during the troubleshooting session.

  • Device location tracking

    Track the location of essential devices and maintain a history of locations traversed by them to stay updated on their whereabouts always.

  • Lost device management

    Execute commands to remotely lock, set off an alarm, reset the password, track the location, and initiate Lost Mode on devices that are reported as misplaced to aid in their recovery. For devices that can't be recovered, initiate a data wipe or execute a factory reset command to prevent device data from falling into the wrong hands.

  • Comprehensive inventory management

    Gain a bird's-eye view of all devices from a single window and drill down to view granular details about a single device.

  • Alerts and announcements

    Automate sending alerts to the admin for critical device events like device reboot, wrong password entry, SIM card change, and more. Configure announcements and important news to be sent to devices in the form of notifications to keep device users informed.

  • Report generation

    Gain insights on your managed fleet by automating report generation through a set of predefined reports or by creating custom reports.