Kaspersky Endpoint Security Cloud allows you to detect root access on a device. System files are unprotected on a hacked device, thus becoming available for modification. Moreover, third-party applications from unknown sources can be installed on hacked devices. Once you detect a hack attempt, we recommend that you immediately restore the proper functioning of your device (for example, by resetting the device to the factory settings).
Device hack detection is available only on Android devices.
When a device is hacked, you receive a notification after the mobile device is synchronized with Kaspersky Endpoint Security Cloud. We do not recommend disabling notifications about hacks, but it is possible to do this in the event notification settings.
By using the Compliance Control feature, you can impose restrictions on the user's activity on the device if the device is hacked (for example, you can lock the device).
Page top