Device Security Features - How to prevent keyboard hijacking by whitelisting 3rd party keyboards?

Device Security Features - How to prevent keyboard hijacking by whitelisting 3rd party keyboards?

Hello and Welcome to WeGuard Enterprise Visual Knowledge-base Series.
In this KB article, We will explain the procedure of whitelisting 3rd party keyboards.

Have you ever heard data breach can also happen through the keyboard?
Allowing the workforce to use an unauthorized 3rd party keyboard can cause severe loss to any organization as it can leak the data to personal containers. By default, WeGuard allows default keyboards on the registered devices; however, to use external or 3rd party keyboards, they should be whitelisted first in the EMM console.

  • Login to WeGuard Console with valid credentials.
  • Go to policy groups by clicking on "Policy Groups" in left navigation menu
  • Go to policy details by clicking on the policy name . For this article, we will use a Work Managed policy.


  • Go to Security tab, scroll down a bit and notice "Permitted Input Methods"
  • By default the restriction is disabled. To whitelist 3rd party keyboard, enable the option and provide package name of the application that controls 3rd party keyboard.


 
                 

  • After adding the package name to the policy, click on Save and Continue to impose the policy on all devices tagged to the policy.
  • From a security standpoint WeGuard allows to whitelist five 3rd party keyboards for now. Clicking on "+" will let admins add other keyboard package names.


 
                
 
We hope this article was useful. Thank you for reading.
For more WeGuard insights, please explore the Visual Knowledge-base Series
For more details, please do visit https://www.weguard.com
If you need any help on this, do call up WeGuard Support +1 833-936-2253 or contact WeGuard Support Email

    • Related Articles

    • Device Security Features - What is Device Hardening?

      ​​Hello and Welcome to WeGuard Enterprise Visual Knowledge-base Series. In this KB article, We will explain how to harden your device for security measures.  ​ We will discuss the process of securing a device by reducing its surface of vulnerability. ...
    • Device Security Features - What is WeGuard Admin lock functionality?

      Hello and Welcome to WeGuard Enterprise Visual Knowledge-base Series. In this KB article, We will explain about the Admin lock and how to use the functionality. WeGuard adds one more "the most important security" feature to its wings. With "Admin ...
    • Security - Security Settings

      Hello and Welcome to WeGuard Enterprise Visual Knowledge-base Series. In this KB article, We will explain about security settings available on WeGuard Enterprise Portal. Security settings, In this section, you have a wide variety of security setting ...
    • Device states - Device states in WeGuard

      Hello and Welcome to WeGuard Enterprise Visual Knowledge-base Series. In this KB article, We will explain the device states available in WeGuard. Overall, below are the states available as of today. Enrolled : Devices that are activated to the policy ...
    • Time Fencing - How to configure time-fencing policy?

      Hello and Welcome to WeGuard Enterprise Visual Knowledge-base Series. In this KB article, We will explain how to configure time-fencing policy. Enabling certain security settings, blacklisting of apps within a specific time frame in WeGuard is called ...