Installation on iOS systems

Protection deployment overview

The installation process of the protection on iOS devices consists of a series of steps that depend on whether there is an MDM (Mobile Device Management) solution implemented in the organization:

Find unprotected devices on the network

Find devices on the network without protection installed or with a third-party security product that needs replacing or complementing with Advanced EPDR. Verify that you have purchased enough licenses for the unprotected devices. See Licenses.

Advanced EPDR enables you to install the software even when you do not have enough licenses for all the computers you want to protect. Computers without a license show in the management console with some information (such as installed software and hardware), but are not protected.

Determine device default settings

When the software is installed on the computer or device, Advanced EPDR assigns the All group security settings to it. However, during installation, you can select a different target group for the computer with the required network settings. To create and assign new settings profiles, see Managing settings.

Select a deployment strategy

The iOS agent deployment process varies depending on whether the target device is managed with an MDM solution or not.

For more information about possible scenarios in Advanced EPDR, see Basic concepts.

If the target device is managed with the Cytomic MDM solution, see Managing the Apple ID and digital certificates.