Skip to main content

Settings Overview

The Settings module provides system-wide configuration options for CDOT MDM. Configure security policies, system parameters, and administrative settings.

Available Settings​

Passcode Settings​

Configure device passcode requirements and security policies.

Features:

  • Define password complexity requirements
  • Set minimum passcode length
  • Require specific character types
  • Create multiple security levels
  • Assign policies to profiles

Use Cases:

  • Standard user security
  • High-security environments
  • Executive devices
  • Kiosk mode devices

Settings Categories​

Security Settings​

  • Passcode Policies – Device passcode requirements
  • Encryption – Data encryption standards (Coming Soon)
  • Certificates – Certificate management (Coming Soon)
  • VPN – VPN configuration (Coming Soon)

System Settings​

  • Update Policies – System and app updates (Coming Soon)
  • Network – Wi-Fi and network configurations (Coming Soon)
  • Notifications – System notification settings (Coming Soon)
  • Compliance – Compliance rules and monitoring (Coming Soon)

Administrative Settings​

  • User Management – Admin user configuration (Coming Soon)
  • Audit Logs – System audit and logging (Coming Soon)
  • Backup – System backup settings (Coming Soon)
  • Integration – Third-party integrations (Coming Soon)

Configuration Workflow​

Planning​

  1. Assess Requirements

    • Identify security needs
    • Define compliance requirements
    • Consider user experience
    • Document policies
  2. Create Policies

    • Configure security settings
    • Set appropriate levels
    • Test configurations
    • Document changes

Implementation​

  1. Configure Settings

    • Access Settings module
    • Create necessary policies
    • Set parameters
    • Validate configurations
  2. Assign to Profiles

    • Link settings to profiles
    • Test on sample devices
    • Roll out gradually
    • Monitor effectiveness

Maintenance​

  1. Regular Review

    • Review settings periodically
    • Update as needed
    • Monitor compliance
    • Adjust for changes
  2. Documentation

    • Document all settings
    • Track changes
    • Maintain audit trail
    • Update procedures

Best Practices​

Policy Management​

  • Start with moderate settings
  • Test thoroughly before deployment
  • Communicate changes to users
  • Provide adequate support
  • Document all configurations

Security​

  • Balance security with usability
  • Meet compliance requirements
  • Regular security reviews
  • Update for new threats
  • Maintain backup configurations

User Experience​

  • Consider user workflows
  • Minimize disruption
  • Provide clear communication
  • Offer training if needed
  • Collect feedback

Next Steps​

Learn how to: