Device Security Features - How to prevent keyboard hijacking by whitelisting 3rd party keyboards?

Device Security Features - How to prevent keyboard hijacking by whitelisting 3rd party keyboards?

Hello and Welcome to WeGuard Enterprise Visual Knowledge-base Series.
In this KB article, We will explain the procedure of whitelisting 3rd party keyboards.

Have you ever heard data breach can also happen through the keyboard?
Allowing the workforce to use an unauthorized 3rd party keyboard can cause severe loss to any organization as it can leak the data to personal containers. By default, WeGuard allows default keyboards on the registered devices; however, to use external or 3rd party keyboards, they should be whitelisted first in the EMM console.

  • Login to WeGuard Console with valid credentials.
  • Go to policy groups by clicking on "Policy Groups" in left navigation menu
  • Go to policy details by clicking on the policy name . For this article, we will use a Work Managed policy.


  • Go to Security tab, scroll down a bit and notice "Permitted Input Methods"
  • By default the restriction is disabled. To whitelist 3rd party keyboard, enable the option and provide package name of the application that controls 3rd party keyboard.


 
                 

  • After adding the package name to the policy, click on Save and Continue to impose the policy on all devices tagged to the policy.
  • From a security standpoint WeGuard allows to whitelist five 3rd party keyboards for now. Clicking on "+" will let admins add other keyboard package names.


 
                
 
We hope this article was useful. Thank you for reading.
For more WeGuard insights, please explore the Visual Knowledge-base Series
For more details, please do visit https://www.weguard.com
If you need any help on this, do call up WeGuard Support +1 833-936-2253 or contact WeGuard Support Email

    • Related Articles

    • Device Security Features - What is Device Hardening?

      ​​Hello and Welcome to WeGuard Enterprise Visual Knowledge-base Series. In this KB article, We will explain how to harden your device for security measures.  ​ We will discuss the process of securing a device by reducing its surface of vulnerability. ...
    • How to Enable or Disable the Camera via WeGuard Policy

      Controlling camera access on managed devices is a critical component of organizational security and productivity. By disabling the camera, administrators can prevent unauthorised data capture, ensure compliance with strict privacy policies (such as ...
    • Device Security Features - What is WeGuard Admin lock functionality?

      Hello and Welcome to WeGuard Enterprise Visual Knowledge-base Series. In this KB article, We will explain about the Admin lock and how to use the functionality. WeGuard adds one more "the most important security" feature to its wings. With "Admin ...
    • Managing Bluetooth Settings via WeGuard Policy

      Controlling Bluetooth connectivity is essential for maintaining both security and operational efficiency. Unrestricted Bluetooth can pose data leakage risks or allow unauthorized peripheral connections. WeGuard enables administrators to enforce ...
    • Managing 'Erase All Content and Settings' on iOS Devices

      The Erase All Content and Settings feature on Apple devices allows a user to wipe all personal data and restore the hardware to its factory default state. Within the WeGuard ecosystem, administrators typically disable this option to prevent ...