Zum Inhalt springen
  • Blog
  • Cookie Policy (EU)
  • Datenschutzerklärung
  • EBF Docs
  • Onboarder Source and Target
  • Test
  • EBF product documentation

    Find help using and administering EBF applications

    EBF MIDA

    • Release Notes
    • 01. Getting Started
    • 02. Initial Setup
    • 03. MIDA Overview
    • 04. Apps
    • 05. Policies
    • 06. iBooks
    • 07. App lists
    • 08. Compliance Actions
    • 09. Audit Logs
    • 10. ENS Events
    • 11. MIDA Installation Guide
    • 12. MIDA Configuration Parameter
    • 13. Import & Sync Workers
    • 14. About the Event Notification Service (ENS)
    • 15. Troubleshooting
    • 16. Browser Support
    • 17. Contact
    View Categories
    • Home
    • EBF Docs
    • EBF MIDA

    08. Compliance Actions

    3 min read

    Actions configuration

    When opened, the current compliance actions are displayed, including the executed action. These can be created, edited or deleted here.

    Rebuild

    1. Click „New Compliance Action“.
    2. Assign a speaking name.

    This compliance action can then be used in Black and White-App Lists.

    Possible measures

    Block Device

    • Effect: ActiveSync and AppTunnel functions are blocked directly.

    and/or:

    Notification

    • Through Apple Push Notification(iOS) / GCM (Android) service with a predefined text
    • SMS to the device
    • Email to the user
    • Email to another address

    Several compliance actions can be combined in one App List.

    Edit / Check

    1. Click a compliance action to start the edit mode.
    2. Make changes, check and save.

    Via the X in the upper right corner you leave the editing mode without saving the changes.

    A compliance action can be deleted via the trash can icon in the overview.

    Parameterize compliance message

    Messages (not the subject!), can be provided with the following parameters to include details about the violation in the message:

    1. {{app}}
      displays the bundle ID of the app
    2. {{device}}
      displays the MDM internal device code(uuid) of the device
    3. {{appList}}
      Displays the name of the app list

    Example of parameterized e-mail

    You could use the following email as an example of sending email to an administrator
    use
    Device: https://mida.emm/#/devices/{{device}}

    App: {{app}}

    Violation of App List: {{listName}}
    If you are already logged into MIDA in your default browser on the desktop, clicking on the device link will directly open the device concerned.
    If a device violates a black or white app list by installing an app, the device will show:
    Blacklist: Prohibited App Policy has been violated.

    Whitelist: Allowed app policy was violated.

    For Compliant, a red X is assigned to the device. The MIDA Admin can check which app triggers the violation by opening the App tab in the Device Details.

    The offending app will be highlighted in red.

    About the MIDA Compliance Check Architecture

    Introduction

    The MIDA Compliance Check is a background process for a MIDA instance that determines the inventory of devices against MIDA app lists.

    Its goal is to find unauthorised apps on devices and perform configured actions when such apps are found.

    This chapter describes in detail how to perform the MIDA conformity check.

    Technical architecture

    The MIDA Compliance Check runs in the same process as the MIDA REST API and is executed by the Spring Task Scheduling /Execution mechanism.

    In a system with multiple MIDA servers, a lock system is used to prevent running with the same data.

    Stacked design

    The compliance check is performed throughout the day.

    The scan is performed by two separate repetitive tasks. One task is named AppHound, the other is AppPoliceman.

    Both tasks use batched execution. When a task starts, it first reads a configurable amount of data (e.g. an app list) from the database. The details of the app list are read out and the position at which the data was read out is marked. At the next start, the previously processed data is read, the value is increased by one to process the next data set (app list). If increased number is greater than the number of all data records (App Lists), the counter is set to 0 again and works its way through the App Lists from the beginning again. In this way, the App Lists are processed several times throughout the day. The interval between the batched executions is configurable. The default values are: Every 5 minutes for the AppHound, every 2 seconds for the AppPoliceman.

    App Hound

    The AppHound task is responsible for scanning the app list table to check which devices violate an app list. The result of this task are, in case of violation, violation entries in the table „violation_record“.

    The procedure is as follows:

    • Take an app list from the database
    • Load devices from the MI Core that are assigned to the App Listen Label
    • The following procedure is repeated for each device found:
      • Load the apps installed on the device
      • Check the installed apps for the apps in the app list depending on the list type
      • Create entries for the device in the violation_records table in case of violation
    • Confirm the existing records in the database if necessary
    • Proceed to the next app list

    App Policeman

    The AppPoliceman task is responsible for scanning the violation_record table. A compliance action is executed in the event of a violation.

    If the device no longer violates the app list, the entry in the table, which is therefore no longer correct, deleted and actions, such as BLOCK, reversed (for example, to allow access again).

    The following procedure is used here:

    • Read Violation entry from the database
    • Check the Violation if it is still valid
    • Check if the Violation should be executed (There is a parameter for this so that users do not get too many messages during the day)
      • If the Violation should be executed
      • Ensures that the Violation entry remains
      • Do not execute if messages have already been sent
    • If the Violation is no longer valid:- Undo previously performed actions (e.g. BLOCK device)
    • Delete Violation entry

    Was this article useful?

    Still stuck? How can we help?

    How can we help?

    Updated on 3. Februar 2022
    07. App lists09. Audit Logs
    Table of Contents
    • Actions configuration
      • Rebuild
    • Possible measures
      • Block Device
      • Notification
      • Edit / Check
      • Parameterize compliance message
    • Example of parameterized e-mail
    • About the MIDA Compliance Check Architecture
      • Introduction
      • Technical architecture
      • Stacked design
      • App Hound
      • App Policeman
    Linkedin-in Phone
    Workplace Management
    • UEM Solutions
    • Migrations
    • Services
    Modern Work Tools
    • Sync Contacts
    • Hybrid Data Management
    • Secure Mobile Printing
    • eSIM Management
    • App Management
    IT Security
    • IAM
    • Modern Threat Defense
    • Cyber Risk Management
    • Secure Development
    • Zero Trust
    • Security Check
    AI Solutions
    • AI Consulting
    • AI Development
    Company
    • About Us
    • References
    • Partners
    • Sustainability
    • Careers
    • Trends
    © 2026 EBF-EDV Beratung Föllmer GmbH
    • Privacy Policy
    • GTC
    • EULA
    • Imprint
    Manage Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Immer aktiv
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Optionen verwalten
    • Dienste verwalten
    • Verwalten von {vendor_count}-Lieferanten
    • Lese mehr über diese Zwecke
    View preferences
    • {title}
    • {title}
    • {title}
    EBF Status Check