<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What can be monitored using Meraki MDM ? in Endpoint Security</title>
    <link>https://community.cisco.com/t5/endpoint-security/what-can-be-monitored-using-meraki-mdm/m-p/5443527#M12842</link>
    <description>&lt;P&gt;Refer to Apple's official doc. Meraki SM (and other MDM products that use Apple's MDM features) only have the controls available that Apple provides. &lt;/P&gt;&lt;P&gt;&lt;A href="https://www.apple.com/business/docs/resources/Managing_Devices_and_Corporate_Data_on_iOS.pdf" target="_blank" rel="nofollow noopener noreferrer"&gt;https://www.apple.com/business/docs/resources/Managing_Devices_and_Corporate_Data_on_iOS.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The answers you are looking for can be found in that doc under the "MDM cannot see personal data such as" list.&lt;/P&gt;</description>
    <pubDate>Fri, 06 Mar 2020 18:28:54 GMT</pubDate>
    <dc:creator>Noah_Salzman</dc:creator>
    <dc:date>2020-03-06T18:28:54Z</dc:date>
    <item>
      <title>What can be monitored using Meraki MDM ?</title>
      <link>https://community.cisco.com/t5/endpoint-security/what-can-be-monitored-using-meraki-mdm/m-p/5443525#M12840</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;I have an iPhone and my organization uses Meraki MDM. We have installed a meraki profile on our phones and the company has pushed some apps including email setup. I wanted to know what all can be accessed/monitored by my company as most of us use the phone for personal use too. I had the following questions:&lt;/P&gt;&lt;P&gt;1. Can the company access my personal files, photos etc on my iphone and keep a backup of my files&lt;/P&gt;&lt;P&gt;2. Can the company access apps on my iphone and monitor social media messages (whatsapp, twitter, etc)&lt;/P&gt;&lt;P&gt;It would be very helpful if someone could answer my questions. &lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 04:03:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/what-can-be-monitored-using-meraki-mdm/m-p/5443525#M12840</guid>
      <dc:creator>tinkushal</dc:creator>
      <dc:date>2020-03-06T04:03:16Z</dc:date>
    </item>
    <item>
      <title>Re: What can be monitored using Meraki MDM ?</title>
      <link>https://community.cisco.com/t5/endpoint-security/what-can-be-monitored-using-meraki-mdm/m-p/5443526#M12841</link>
      <description>&lt;P&gt;Basically, the Company will not be able to access your personal data outside of the apps managed by Meraki SM.&lt;/P&gt;&lt;P&gt;Perhaps someone can chime in if this is still true if the iPhone is enrolled via Apple DEP.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 09:44:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/what-can-be-monitored-using-meraki-mdm/m-p/5443526#M12841</guid>
      <dc:creator>Christian_Ney</dc:creator>
      <dc:date>2020-03-06T09:44:03Z</dc:date>
    </item>
    <item>
      <title>Re: What can be monitored using Meraki MDM ?</title>
      <link>https://community.cisco.com/t5/endpoint-security/what-can-be-monitored-using-meraki-mdm/m-p/5443527#M12842</link>
      <description>&lt;P&gt;Refer to Apple's official doc. Meraki SM (and other MDM products that use Apple's MDM features) only have the controls available that Apple provides. &lt;/P&gt;&lt;P&gt;&lt;A href="https://www.apple.com/business/docs/resources/Managing_Devices_and_Corporate_Data_on_iOS.pdf" target="_blank" rel="nofollow noopener noreferrer"&gt;https://www.apple.com/business/docs/resources/Managing_Devices_and_Corporate_Data_on_iOS.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The answers you are looking for can be found in that doc under the "MDM cannot see personal data such as" list.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 18:28:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/what-can-be-monitored-using-meraki-mdm/m-p/5443527#M12842</guid>
      <dc:creator>Noah_Salzman</dc:creator>
      <dc:date>2020-03-06T18:28:54Z</dc:date>
    </item>
    <item>
      <title>Re: What can be monitored using Meraki MDM ?</title>
      <link>https://community.cisco.com/t5/endpoint-security/what-can-be-monitored-using-meraki-mdm/m-p/5443528#M12843</link>
      <description>&lt;P&gt;Thanks a lot for your reply. My organization's meraki profile has the following permissions: &lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Meraki.jpg" style="width: 248px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.jpeg"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/263119i9B4A147F8315E1B5/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.jpeg" alt="image.jpeg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;As can be seen, its written that they can erase all date and settings; however, apple's document mentions only company's data can be erased. Also, its written they can install and remove applications and data. Does that mean they can remove my personal applications and data? Thanks in advance. Awaiting your reply&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2020 23:15:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/what-can-be-monitored-using-meraki-mdm/m-p/5443528#M12843</guid>
      <dc:creator>tinkushal</dc:creator>
      <dc:date>2020-03-09T23:15:56Z</dc:date>
    </item>
    <item>
      <title>Re: What can be monitored using Meraki MDM ?</title>
      <link>https://community.cisco.com/t5/endpoint-security/what-can-be-monitored-using-meraki-mdm/m-p/5443529#M12844</link>
      <description>&lt;P&gt;Hi. Can you throw some light on iPhone enrolled via Apple DEP? I have never heard about that. &lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2020 23:17:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/endpoint-security/what-can-be-monitored-using-meraki-mdm/m-p/5443529#M12844</guid>
      <dc:creator>tinkushal</dc:creator>
      <dc:date>2020-03-09T23:17:15Z</dc:date>
    </item>
  </channel>
</rss>

