This article provides guidance of the App Configuration Policies in Microsoft InTune required for bulk enrolment of the Traced app into Traced Control corporate-owned, managed iOS devices: In Traced Control, navigate to Devices > Mobile Device Management Click “Generate a new key” Follow this MS guide to create an app configuration policy using the configuration editor. […]
A data breach can cost your organisation heavily in fines, reputation, lost customers, but Mobile Threat Defense protects your remote workforce from data theft and loss?
Introduction Rather than releasing our usual weekly incident response lab, this week we’re releasing a practical learning experience of an open source capture the flag competition. You may be asking yourself how this ties in with Android incident response training, you’ll have to use some advanced techniques associated with the identification phase of Android incident […]
Introduction In this lab we remain focused on the identification phase of responding to an Android incident. This time we uncover a little bit more by extracting a suspicious APK from our device and identify some of its capabilities. TL;DR Using ADB run the following commands to retrieve an APK from our test device: Then, […]