Skip to main contentSkip to search
Powered by Zoomin Software. For more details please contactZoomin
Jamf Learning HubJamf Learning Hub
Learning Hub
Jamf Learning Hub
  • Home
  • Publications
  • EnglishDeutschEspañolFrançais日本語Nederlands繁體中文
  • Login

Jamf Protect Documentation

Threat Prevention Categories Reference

Save PDF
Save selected topicSave selected topic and subtopicsSave all topics
Share
Share to emailCopy topic URL
Expand All
Print
Contents
  • Jamf Protect Documentation
  • About Jamf Protect
    • System Requirements
    • Network Communication used by the macOS Security Portal
    • Security Standards in the macOS Security Portal
    • Complying with GDPR Requests in macOS Security
  • macOS Security Portal
    • Setting Up Your Portal
      • Creating Users in the macOS Security Portal
        • Single Sign-On (SSO) in Jamf Account
      • User Roles and Groups in macOS Security
      • Email Notifications for macOS Security
    • Agent Overview
    • Dashboards
    • Deployment
      • Deploying Jamf Protect
      • Jamf Protect Updates
      • Uninstalling Jamf Protect
      • protectctl Command-Line Tool
    • Data Integrations
      • macOS Security Data Types
      • Data Stream Integrations by Vendor
        • Amazon S3
        • Datadog
        • Elastic
        • Google Security Operations
          • Creating an Ingestion Feed in Google SecOps Using a Webhook
          • Creating an Ingestion Feed in Google Security Operations Using Amazon S3
        • Microsoft Sentinel
          • Migrating from Deprecated Microsoft Sentinel Data Forwarding
        • Splunk
        • Sumo Logic
    • Jamf Protect API
      • Jamf Protect API
      • Setting Up an API Environment in Altair GraphQL Client
      • GraphQL Schema and Documentation
      • Queries and Mutations
      • API Scripts
    • Compliance Baseline for macOS
      • Compliance Workflow Example
      • Enabling Compliance Baseline Reporting in a Jamf Protect Plan
      • Compliance Baseline Summary
    • Computer Management
    • Alerts for macOS Security
      • macOS Security Alerts and Logs Dictionary Reference
    • Analytics
      • Jamf-Managed Analytics
      • Creating Custom Analytics
      • Creating Analytic Sets
      • Analytic Chains
      • Analytic Settings
      • Setting Up Analytic Remediation With Jamf Pro
    • Plans
      • Jamf Protect Plans in Jamf Pro
      • Creating a Jamf Protect Plan
      • Switching from Manually Uploaded Jamf Protect Plans to Synced Plans in Jamf Pro
    • Actions
      • Creating an Action Configuration in the macOS Security Portal
      • macOS Security Data Batching for HTTP Endpoints
      • macOS Security Action Configuration Settings Reference
    • Threat Prevention
      • Advanced Threat Controls
      • Tamper Prevention
        • Enabling Tamper Prevention with Jamf Protect
        • Making Jamf Protect a Non-Removable System Extension
      • Endpoint Threat Prevention
      • Custom Prevent Lists
      • Web Protection
    • Exceptions
    • Device Controls
    • Unified Logging for macOS
    • Telemetry for macOS
      • Getting Started with Telemetry in Jamf Protect
      • Migrating from Jamf Protect's Deprecated Telemetry
      • Telemetry Event Categories
      • Creating a Telemetry Configuration
      • Telemetry Exception Rules
      • Telemetry Optimization
        • Summarization for Telemetry Events
        • Simple Log File Collection
      • (Deprecated) Creating a Telemetry Configuration
        • (Deprecated) Collecting Performance Metrics
        • (Deprecated) Telemetry Log Levels
        • (Deprecated) Optimizing Log Volume
          • Telemetry Diagnostic and Crash File Collection
        • (Deprecated) Telemetry Log Field Descriptions
        • (Deprecated) Telemetry Log Data Examples
    • Administrative Settings
      • Change Management
      • Data Retention
      • Audit Logs
  • Jamf Security Cloud Portal
    • Deploying Content Controls and Network Security Capabilities
      • Creating an Activation Profile for Content Controls and Network Security
      • Distribution Methods for the Jamf Trust App
    • Data Streams for Jamf Security Cloud
      • Jamf Security Cloud Data Stream Types and Targets
      • Configuring Root Level Integration to Export Logs for Data Streams
      • Data Stream Configuration by Target
        • Generic HTTP
        • Generic Syslog
        • Microsoft Sentinel
        • Jamf-Owned AWS S3
        • Customer-Owned AWS S3
        • Data Stream Configuration Errors
      • Data Stream Integrations by Vendor
        • Elastic
          • Configuring the Threat Events Data Stream for Elastic
          • Configuring the Network Traffic Data Stream for Elastic
        • Datadog
        • IBM QRadar via AWS S3
          • Uploading the Jamf Security Cloud CEF Log File Extension for IBM QRadar
          • Configuring the Jamf Security Cloud Log Source for IBM QRadar
        • Microsoft Cloud App Security
        • Splunk
          • Configuring the Threat Events Stream for Splunk via Syslog
          • Configuring the Threat Events Stream for Splunk via HTTP Event Collector
          • Configuring the Threat Events Stream for Splunk via AWS S3
            • Configuring the Splunk Add-On for AWS
            • Importing Jamf Security Cloud Events into Splunk
        • Sumo Logic
        • Workspace ONE Intelligence
      • Data Stream Dictionary References
        • Network Traffic Stream Dictionary
        • Threat Events Stream Dictionary
          • Threat Events Stream Event Types
        • Device Data Stream Dictionary
        • App Insights Stream Dictionary
        • Vulnerability Data Stream Dictionary
    • Internet Content Filtering and Usage Controls
      • Requirements
      • Content Filtering Policy
        • Content Filtering Policy Controls
        • Content Filtering Policy Schedules
        • Configuring your Content Filtering Policy
        • Common Content Filtering Policy Rules
        • Content Filtering Policy Categories
      • Data Usage Policy
        • Data Usage Policy Settings
        • UEM Signaling
          • UEM Tags
          • Configuring UEM Signaling to Control Tethering via Jamf Pro
          • Configuring UEM Signaling to Control Tethering via Microsoft Intune
          • Configuring UEM Signaling to Control Tethering via Workspace ONE
          • Configuring UEM Signaling to Control Tethering via Ivanti Neurons for MDM
        • Data Counting
      • Contextual Policy
      • Notifications
        • Recommended Settings
      • Restricting Mobile Hotspot Devices to Only Associated Windows Devices
      • Exporting a Report for All Devices or Selected Devices
      • Internet Reports
    • Endpoint and Network Security
      • Requirements
      • Threat Prevention Policy
        • Configuring your Threat Prevention Policy
        • Configuring Signal UEM Using Jamf Security Cloud
          • Configuring Conditional Access for Microsoft Intune
        • Responding to a Vulnerable App Notification
        • Setting Notifications for an Out-of-Date OS
        • Threat Severity and Risk Scores
        • Automating Security Responses with Your Threat Prevention Policy
        • Threat Prevention Categories Reference
          • Vulnerable Apps Threat Category
      • Custom Threat Intelligence
      • App Watchlist
      • App Blocking
      • Security Reports
        • App Insights Report
        • App Risk Score
        • Vulnerability Management Report
  • Copyright and Trademarks
Table of Contents

Threat Prevention Categories Reference

Save PDF
Save selected topicSave selected topic and subtopicsSave all topics
Share
Share to emailCopy topic URL
Expand All
Print
  • Last UpdatedOct 16, 2025
  • 9 minute read
    • Jamf Protect
    • Technical Documentation

Threat Prevention Policy Threat Categories

The following tables outline the threat categories covered by threat prevention policies.

Web Content

Threat CategoryThreat SubcategorySeverity (default)Supported PlatformsThreat Description

Phishing

5

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

  • macOS

  • Windows

A site designed to deceive the end user into submitting sensitive personal or corporate information through a seemingly trusted web form

Data leaks

App data leak: credit card

4

  • iOS, iPadOS and visionOS

  • Samsung Android

An app-based communication that includes a credit card number in an unencrypted (or easily decrypted) format

Data leaks

Web data leak: credit card

4

  • iOS, iPadOS and visionOS

  • Samsung Android

A browser-based communication that includes a credit card number in an unencrypted (or easily decrypted) format

Data leaks

App data leak: password

3

  • iOS, iPadOS and visionOS

  • Samsung Android

An app-based communication that includes a password in an unencrypted (or easily decrypted) format, significantly increasing the risk of compromise

Data leaks

Web data leak: password

3

  • iOS, iPadOS and visionOS

  • Samsung Android

A browser-based communication to a network service that includes a password in an unencrypted (or easily decrypted) format, significantly increasing the risk of compromise

Data leaks

App data leak: email

2

  • iOS, iPadOS and visionOS

  • Samsung Android

An app-based communication transmitted across the Internet that includes an email address in an unencrypted (or easily decrypted) format

Data leaks

App data leak: location

2

  • iOS, iPadOS and visionOS

  • Samsung Android

An app-based communication that includes the device's physical geolocation in an unencrypted (or easily decrypted) format

Data leaks

App data leak: user identity

2

  • iOS, iPadOS and visionOS

  • Samsung Android

An app-based communication that includes an identifiable service username in an unencrypted (or easily decrypted) format

Data leaks

Web data leak: email

2

  • iOS, iPadOS and visionOS

  • Samsung Android

A browser-based communication transmitted across the Internet that includes an email address in an unencrypted (or easily decrypted) format

Data leaks

Web data leak: location

2

  • iOS, iPadOS and visionOS

  • Samsung Android

A browser-based communication that includes the device's physical geolocation in an unencrypted (or easily decrypted) format

Data leaks

Web data leak: user identity

2

  • iOS, iPadOS and visionOS

  • Samsung Android

A browser-based communication that includes an identifiable username for access to a service in an unencrypted (or easily decrypted) format

Malware network traffic

4

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

  • macOS

  • Windows

Network access from an app to a web service that is known to demonstrate malicious behavior. This can include downloading unauthorized software to a device, disrupting normal operation or gathering sensitive information.

Cryptojacking

3

  • iOs, iPadOS and visionOS

  • Samsung Android

  • Other Android

  • macOS

  • Windows

A site designed to secretly hijack the target's device to mine cryptocurrencies

Spam

3

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

  • macOS

  • Windows

Irrelevant or unsolicited content that is disseminated for the purposes of advertising, phishing or spreading malware

Third-Party app store traffic

2

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

  • macOS

  • Windows

A connection was made to a third-party app store. These stores often contain apps that may pose security risks.

App

Threat CategoryThreat SubcategorySeverity (default)Supported PlatformsThreat Description

Malware

Adware

5

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

Malware that aggressively displays ads, negatively affecting user productivity and device performance

Malware

Banker

5

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

Malware that steals bank credentials

Malware

Generic malware

5

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

A malicious application that demonstrates harmful behavior and disrupts the device

Malware

Ransomware

5

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

Malware that blocks access to a device until a ransom is paid

Malware

Rooting

5

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

Malware that attempts to obtain escalated system privileges

Malware

SMS

5

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

Malware that causes SMS-related charges

Malware

Spyware

5

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

Malware that is monitoring and collecting information about a user and the device

Malware

Trojan

5

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

Malware that obtains unauthorized access to your device

Malware

Potentially unwanted application

4

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

A potentially unwanted application that can cause harm to your device

Device admin app installed

3

  • Samsung Android

  • Other Android

Unauthorized apps with device admin privileges pose a security risk in an organization

Sideloaded app installed

3

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

Apps that are not installed through official channels, such as through official app stores or a UEM service, are unlikely to have gone through the rigorous quality checks expected of an app store release and may be poorly written or malicious.

Third-party app stores installed

2

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

Third-party application stores are applications that can download and install other applications and they might distribute malicious applications because those apps are not diligently tested against malicious behavior.

Vulnerable app installed

2

  • iOS, iPadOS and visionOS

  • macOS

  • Samsung Android

  • Other Android

An application that has a critical vulnerability identified by the CVE system.

You can find these details in Jamf Security Cloud by navigating to Reports > Security > Threat view, Device view, or Vulnerability management, and then viewing the details of individual security events.

Vulnerable applications should be updated or removed immediately.

Network

Note:

The app must be running to detect the attack.

Threat CategoryThreat SubcategorySeverity (default)Supported PlatformsThreat Description

Dangerous certificate

5

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

A suspicious third-party root certificate that could compromise the authenticity of trusted SSL connections by enabling the stealthy interception of encrypted communications

Adversary-in-the-Middle (formerly Man-in-the-Middle)

Adversary-in-the-Middle (compromised trust store)

5

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

The device has been manipulated to fully trust unauthorized third-party certificates.

Adversary-in-the-Middle

Adversary-in-the-Middle (SSL strip)

5

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

An intermediate server is using advanced techniques to impose as a genuine service.

Adversary-in-the-Middle

Adversary-in-the-Middle (targeted certificate spoof)

4

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

An intermediate server is actively attempting to impose as a genuine service.

Risky hotspots

3

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

SSL interception is taking place, but using an untrusted certificate (common for paid hotspots).

Device

Threat CategorySeverity (default)Supported PlatformsThreat Description

Jailbreak

5

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

A modified build of an operating system (OS) that has removed original manufacturer limitations, leaving the device and its data more vulnerable to attack

Vulnerable OS (major)

4

  • iOS, iPadOS and visionOS

  • macOS

  • Samsung Android

  • Other Android

An operating system (OS) that has an exploitable critical vulnerability identified by the CVE system. Jamf recommends that you investigate these CVEs and upgrade to a more recent OS version if possible.

You can find these details in Jamf Security Cloud by navigating to Reports > Security > Threat view, Device view, or Vulnerability management and then viewing the details of individual security events.

Major vulnerabilities should be resolved immediately.

App inactivity

3

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

  • macOS

  • Windows

Jamf Trust has been inactive on the device for a specified amount of time.

Device encryption disabled

3

  • Samsung Android

  • Other Android

On Android devices, if device encryption is disabled, the device can become susceptible to data exfiltration attacks.

Lock screen disabled

3

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

Once the lock screen is disabled, including disabling Touch ID or Face ID, the device encryption is rendered useless against physical attacks.

Risky iOS profile

3

iOS, iPadOS and visionOS

Device configurations that may put corporate and personal data at risk

Vulnerable OS (minor)

3

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

  • macOS

An operating system (OS) that has a critical vulnerability identified by the CVE system. Jamf recommends that you investigate these CVEs and upgrade to a more recent OS version if possible.

You can find these details in Jamf Security Cloud by navigating to Reports > Security > Threat view , Device view, or Vulnerability management and then viewing the details of individual security events.

Even if minor vulnerabilities are not exploitable, they should still be considered risky.

Android security patches missing

2

  • Samsung Android

  • Other Android

Devices missing security patches for more than 3 months become vulnerable.

Out-of-date OS

2

  • iOS, iPadOS and visionOS

  • Samsung Android

  • Other Android

  • macOS

  • Windows

An older version of an OS (operating system) that does not contain the latest features and bug fixes

Unrecognized sources enabled

2

  • Samsung Android

  • Other Android

Applications installed from unknown sources do not pass vigorous security tests performed by official app marketplaces.

USB app verification disabled

2

  • Samsung Android

  • Other Android

Apps installed through USB do not get checked for harmful behavior.

User password disabled

2

macOS

A device without a password set compromises the physical security of the device and/or data, as anyone with physical access can log in.

Developer mode enabled

1

  • Samsung Android

  • Other Android

Once developer mode is enabled, side-loading from unknown sources, USB debugging and other configurations that can lead to security risks can be enabled.

USB debugging enabled

1

  • Samsung Android

  • Other Android

Lower level access to the Android device through the USB channel can pose a security risk.

App Inactivity Threat Category

The App Inactivity threat category indicates when the Jamf Trust app is inactive on a device, thus posing a potential risk. An application is considered inactive if Jamf has not received an application status from a user for a specified amount of time, or if the application was never activated at all. You can enable this feature and use it in combination with conditional access policies to encourage your users to fully enroll into Jamf.

A device may have an inactive app for various reasons, but is often due to users not completing the activation process. It is also possible that some users have activated the app, but have later removed it. Notifying or restricting users without an active app on their devices helps you ensure that devices are adequately protected.

There are two modes relating to this threat category:
  • Active—

    Threat occurrences are reported in the Reports > Security > Threat View or Device View, and notifications (if set up) are sent.

  • Log-Only—

    Threat occurrences are only visible in the Event Log, and are not reported on the Threat View or Device View. Users and admins are not notified.

While all other threat categories are active by default and can be changed, the App Inactivity threat category is in Log-Only mode mode by default.

To view the App Inactivity threat category in Jamf Security Cloud, select Policies > Security > Threat Prevention, then scroll down to the Device list.

The severity of a threat affects the Device Risk Level. If you enable the App inactivity threat category, the threat will affect device risk posture and reporting. Select the Settings icon to adjust the threshold for when a device should be considered inactive. If the threshold is set to 7 days, the default setting, the risk level and any UEM conditional access policies will be applied to devices that have not sent a status update to Jamf for 7 days.

If your method of device enrollment allows, you can encourage your users to complete the app activation process by selecting Alert User.

Conditional Access Policy

To enforce the activation of the Jamf Trust app, you can set a UEM conditional access policy so that users without an active app will not be able to access some of your company resources, such as emails or internal portals. This can be done by using the Signal UEM column for most UEM solutions, or by letting the threat affect the Risk Level for Microsoft Intune.

For more information, see Configuring Signal UEM Using Jamf Security Cloud.

Out-of-Date Operating System Threat Category

The Out-Of-Date OS threat category feature detects whether the OS of the device needs to be updated. Keeping devices up to date with the latest OS as promptly as possible can help minimize the impact of security vulnerabilities.

With this threat category, you can configure how frequently administrators receive summary email notifications, and also trigger a notification for end users to receive, informing them that they need to upgrade their device to the latest OS version.

With this threat category, you can configure:

  • Admin summary email notifications

  • Out-of-Date OS end-user notifications

To configure Out-Of-Date OS threat detection in Jamf Security Cloud, select Policies > Security > Threat Prevention, then scroll down to the Device list.

Admin Summary Email Notifications

These email notifications are a summary of threats across the organization's devices, and aggregate the threat data to provide a comprehensive overview of the exposure to a certain risk.

The summary email notifications are sent once for each defined period, so admins do not receive an excessive number of emails.

Note:
  • The content of the summary email notifications is set by Jamf and so cannot be customized by admins.

  • An OS upgrade should only be triggered if a newer version is available for the device model, on the same carrier, and for the same territory.

After you have enabled the Admin Summary for a threat category, you can set the frequency for the notifications.

Out-of-Date OS End User Notification

You can trigger an in-app notification for end users to receive when their OS version is out of date. This informs them that they need to upgrade to the latest OS version for their device by specifying the number of days after a new version has been released.

Adversary-in-the-Middle SSL Strip

SSL Strip is a sophisticated type of Adversary-in-the-Middle (formerly Man-in-the-Middle) attack that forces a victim's browser into communicating with an adversary in plain text over HTTP. This allows the attacker to intercept all unencrypted traffic, steal sensitive information, and manipulate communication between the two parties.

As part of SSL Strip detection, you can configure custom settings for this type of threat. These threats are reported under the Adversary-in-the Middle threat category in the Threat View and Device View pages.

Configure SSL Strip in Jamf Security Cloud on the Policies > Security > Threat Categories page.

On This Topic

For an enhanced experience and access to additional features, log in to the Jamf Learning Hub with your Jamf ID.

Login
Jamf's purpose is to simplify work by helping organizations manage and secure an Apple experience that end users love and organizations trust. Jamf is the only company in the world that provides a complete management and security solution for an Apple-first environment that is enterprise secure, consumer simple and protects personal privacy. Learn about Jamf.
Quick Links
  • Jamf Support
  • Training & Certifications
  • Jamf Account
  • Jamf Resources
  • Jamf Integrations
  • Jamf Blog
  • Jamf Nation
  • Marketplace
  • Become a Partner
  • Find a Partner
Solutions
  • The Jamf platform
  • Zero-touch deployment
  • Mobile Device Management (MDM)
  • Application management
  • Inventory management
  • Self Service
  • Identity and access management
  • Endpoint protection
  • Threat prevention and remediation
  • Content filtering and safe internet
  • Zero Trust Network Access (ZTNA)
  • Security visibility and compliance
  • CookiesCopyrightPrivacyTerms of UseTrustModern Slavery Act StatementTwitterLinkedInYouTubeInstagramFacebook
TitleResults for “How to create a CRG?”Also Available inAlertDownload