Getting Started Guide – Unmanaged Customer

Trustd MTD will keep your business, mobiles, employees and data secure from cyber criminals. In order to protect your business, there are a few quick and easy steps to follow.

If you’re only protecting a few devices, you only need to follow Step 1 and Step 2


Step 1 – Login to Trustd MTD for the first time

  1. Search your mailbox for an email from “noreply@control.traced.app” with the subject “Trustd console sign in invitation
  1. Press “Start using the Trustd console” and sign in with your email and the temporary password from the email in the previous step.
  1. Set a unique password, agree to our terms and conditions, then press “Update

Step 2 – Add your first device

  1. Login to Trustd MTD with the new password you set in step 1
  2. Enter the email address for the first user you wish to protect, then press “Next

Note: If you are using an MDM to deploy the Trustd app to your first device, press the “Have an MDM?” button and skip to “(Optional) Bulk enrol devices”.

  1. On the mobile device that you wish to protect, follow one of these instructions:
  1. Once your device is reporting “protected”, you’re all set. You can return to the Trustd MTD console and hit “Done” if you wanted to familiarise yourself with the dashboard, or if you want to protect more devices, follow the instructions in the previous section for each device.

Note: If you’re enrolling more than 10 devices, refer to (Optional) Bulk enrol devices”.


 (Optional) Bulk enrol devices

If you would like to add multiple devices at once, there are a number of options available. To see these options, navigate to “Devices” -> “Import” in the Trustd MTD dashboard.

If you don’t use Microsoft Azure AD, Microsoft Intune or another MDM, then you simply need to hit “Get Started” under the “CSV” header and follow the instructions to upload a list of emails to be invited.


(Optional) Bulk enrol via Azure AD

If you’d like to bulk enrol your Azure Active Directory users via email, follow these steps:

  1. Hit “Get Started” under “Microsoft Azure AD” in “Devices” -> “Import” in the Trustd MTD dashboard.
  1. If you haven’t already done so, click the “authorise us” link to integrate Trustd MTD with Microsoft Azure AD.
  1. Check that your Microsoft user and tenant meet the requirements section, and if so, press “Authorise Now”.
  1. Authenticate with your Microsoft credentials and press “Accept” to link Trustd MTD with your Azure AD Tenant.
  1. Press the “Invite people” link then “List Users
  1. From the list, select the users you want to invite, then click “Invite Selected Users”.
  1. Select Personal or Corporate mode, depending upon who owns this device. 

Note: for more information on the differences between these two modes, go to What my company can see.

  1. On the mobile devices that you wish to protect, the user should follow one of these instructions:

(Optional) Bulk enrol via Microsoft Intune

If you’d like to bulk enrol your devices via Microsoft Intune, follow these steps:

  1. Hit “Get Started” under “Microsoft Azure AD” in the page from “Devices” -> “Import” in the Trustd MTD dashboard.
  2. If you haven’t already linked Trustd MTD with your Microsoft Tenant,  Press “Authorise Now”. Otherwise, press “Skip” and skip to step 5.
  1. Authenticate with your Microsoft credentials and press “Accept” to link Trustd MTD with your Azure AD Tenant. 
  1. Press “Next”.
  1. If you’re protecting only Apple iOS devices, skip to step 7 below. Otherwise, add the Trustd app for Android to Microsoft Intune as a Managed App from the Google PlayStore: https://play.google.com/store/apps/details?id=app.traced&hl=en_GB&gl=US 
  2. Create a Managed Devices – App Configuration Policy for the Android app. When prompted select “Configuration settings format” choose “Enter JSON Data” and copy and paste the contents of the Android template section from step 4. 
  3. If you’re protecting only Android devices, skip to step 9 below. Otherwise, add the Trustd app for iOS to Microsoft Intune as a Managed App from the Apple AppStore: https://apps.apple.com/gb/app/id1519403888  
  4. Create a Managed Devices – App Configuration Policy for the iOS app. When prompted to select “Configuration settings format” choose “Enter XML Data” and copy and paste the contents of the iOS template section in step 4. 
  5. Deploy the Trustd app to your device(s) through Microsoft Intune. Then press “Next”.
  1. You may want to copy and paste the email instructions to circulate amongst your users which will guide them through the few clicks that they’ll need to follow to protect their devices.

(Optional) Automatic VPN Configuration via Microsoft Intune

  1. Follow the instructions in this guide to automatically configure VPN-based Web Protection

(Optional) Automatic Configuration for Supervised iOS via Microsoft Intune

  1. Login to Microsoft Intune (aka Microsoft Endpoint Manager)
  2. Navigate to Devices -> iOS/iPad -> Configuration Profiles
  3. Click “Create Profile” and choose:
    • Platform: iOS / iPadOS
    • Profile Type: Templates
    • Template Name: Device Features
  4. At the “Configuration Settings” page, input the following configuration:
    • App Notifications: Add
      • App Bundle ID: app.traced
      • App Name: Trustd Mobile Security
      • Publisher: Traced Ltd
      • Notifications: Enable
      • Show in Notifications Centre: Enable
      • Show on Lock Screen: Enable
      • Alert Type: Banner
      • Badges App Icon: Enable

(Optional) Bulk enrol via an MDM

If you’d like to bulk enrol your devices via an MDM, follow these steps:

  1. Hit “Get Started” under “MDM” in the page from Devices” -> “Import in the Trustd MTD dashboard.
  1. Enter the configuration values for the managed app configuration into your MDM’s app configuration template.

Note: make sure you replace the “app.traced.globalEnrollmentKey” value with the key shown by pressing the pink “Show” button.

  1. Deploy the app out to your devices
  2. You may want to copy and paste the email instructions to circulate amongst your users which will guide them through the few clicks that they’ll need to follow to protect their devices. 

(Optional) Setup zero-trust conditional access

If you’d like to setup Trustd MTD to automatically restrict access to company data for users with untrusted mobile devices, follow these steps:

  1. Navigate to Devices > Zero Trust
  1. If you haven’t already linked Trustd MTD with your Microsoft Tenant, “Integrations”, then click “Authorise Now”. Otherwise, press skip to step 5.
  1. Authenticate with your Microsoft credentials and press “Accept” to link Trustd MTD with your Azure AD Tenant.
  1. Navigate back to Devices > Zero Trust
  1. Toggle On the “Zero trust is enabled” setting – this will create the Conditional Access Policy and Azure AD Group in your connected Azure AD Tenant. 

Note: You may want to check these by looking for the Azure AD Group “Trustd conditional access policy” and Conditional Access Policy “Access to Cloud requires Trustd on mobile”

  1. You can now choose when you want Trustd to automatically revoke access to users from mobile devices. To help explain the scenarios that Trustd will restrict access to company data from users with untrusted mobile devices, please refer to the below diagram:

See what the settings in the Zero Trust page do when turned on.


(Optional) Reporting and Notifications

Trustd MTD has a number of reporting and notification options prebuilt. 

You can:


Download this guide as a PDF