<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: iOS 13 Devices Marked as Compromised in Workspace ONE Discussions</title>
    <link>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520554#M2694</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Do you use app wrapping or sdk with compromised detection on your internal app by an chance?&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 18 Sep 2019 18:07:18 GMT</pubDate>
    <dc:creator>Stansfield</dc:creator>
    <dc:date>2019-09-18T18:07:18Z</dc:date>
    <item>
      <title>iOS 13 Devices Marked as Compromised</title>
      <link>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520537#M2677</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Hey All,&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Curious if anyone has any folks already upgrading to iOS 13 and if they are seeing any issues with devices being marked as compromised. We have 9 developers that have upgraded for testing and 3 of the 9 have been marked as compromised after upgrading but 6 of them seem to be fine. I'm guessing something is going a little weird during the update process that confuses Intelligent Hub but was curious if anyone else is seeing odd behavior.&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2019 16:49:57 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520537#M2677</guid>
      <dc:creator>mibir</dc:creator>
      <dc:date>2019-06-06T16:49:57Z</dc:date>
    </item>
    <item>
      <title>Re: iOS 13 Devices Marked as Compromised</title>
      <link>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520538#M2678</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In the past, new iOS versions will be flagged as Compromised when the Intelligent Hub (AirWatch) agent is not updated accordingly. Are all of your developers running iOS 13 with the same Hub version? With iOS 9 release, AirWatch called all customer directly to make sure that the 'Enterprise Wipe' upon compromise setting for this very same reason.&lt;/P&gt;&lt;BR /&gt;&lt;P&gt;Currently, the setting is located in Groups &amp;amp; Settings -&amp;gt; Apps -&amp;gt; Settings and Policies -&amp;gt; Security Policies -&amp;gt;Compromised Protection. My site is set to Disabled. &lt;BR /&gt; I do not recommend enabling it unless you understand the impact in your environment.&lt;/P&gt;&lt;BR /&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2019 17:13:27 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520538#M2678</guid>
      <dc:creator>RicardoPachecoR</dc:creator>
      <dc:date>2019-06-06T17:13:27Z</dc:date>
    </item>
    <item>
      <title>Re: iOS 13 Devices Marked as Compromised</title>
      <link>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520539#M2679</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;We too have this setting disabled due to the false positives in the past with new iOS versions, and handle compromise detection with a compliance policy. &lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2019 17:35:07 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520539#M2679</guid>
      <dc:creator>BRIANJENKINSBRI</dc:creator>
      <dc:date>2019-06-06T17:35:07Z</dc:date>
    </item>
    <item>
      <title>Re: iOS 13 Devices Marked as Compromised</title>
      <link>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520540#M2680</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Thanks, &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Any official information regarding the update of the client ? &lt;/SPAN&gt;&lt;BR /&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Jun 2019 12:35:01 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520540#M2680</guid>
      <dc:creator>ahakimb</dc:creator>
      <dc:date>2019-06-13T12:35:01Z</dc:date>
    </item>
    <item>
      <title>Re: iOS 13 Devices Marked as Compromised</title>
      <link>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520541#M2681</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Don't expect any updates really. It's not a priority at the moment. It could get fixed by the iOS beta releases as well, who knows.&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Jun 2019 13:15:25 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520541#M2681</guid>
      <dc:creator>LukeDC</dc:creator>
      <dc:date>2019-06-13T13:15:25Z</dc:date>
    </item>
    <item>
      <title>Re: iOS 13 Devices Marked as Compromised</title>
      <link>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520542#M2682</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Getting Ready for Apple Fall 2019 Releases&lt;/SPAN&gt;&lt;BR /&gt;&lt;A href=" https://support.workspaceone.com/articles/360024561354" rel=" nofollow noreferrer"&gt;https://support.workspaceone.com/articles/360024561354&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Dynamic Compromised Detection is a new feature which allows SDK applications to securely update the compromised detection algorithm over-the-air. This will allow for a faster turnaround when false positive issues are found. Customers and developers with apps using these new SDK versions which support dynamic compromised detection will no longer have to update and/or re-release their apps. It is recommended to ensure your users are on the minimum supported version especially for Dynamic Compromised Detection.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Note: The Workspace ONE team has already found an issue in iOS 13 beta 1 giving false positives for compromised detection. We hope to have this resolved as soon as possible.&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jun 2019 13:17:40 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520542#M2682</guid>
      <dc:creator>sturmanc</dc:creator>
      <dc:date>2019-06-14T13:17:40Z</dc:date>
    </item>
    <item>
      <title>Re: iOS 13 Devices Marked as Compromised</title>
      <link>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520543#M2683</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Sorry but they lost my trust in compromised protection a long time ago and we won't be enabling it anytime soon. When their iOS AirWatch Agent app caused the false positive compromised detection and erased student iPads we have not turned it on since. We only had false positives and it never found a really compromised device.&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jun 2019 15:09:23 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520543#M2683</guid>
      <dc:creator>RichB2u2</dc:creator>
      <dc:date>2019-06-14T15:09:23Z</dc:date>
    </item>
    <item>
      <title>Re: iOS 13 Devices Marked as Compromised</title>
      <link>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520544#M2684</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;So how does everyone handle their compliance policy then? Manually review everything that is marked as compromised? Surely you can't just ignore a device marked as compromised - in the event it is jailbroken, rooted, etc it would need to be dealt with.&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jun 2019 16:21:38 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520544#M2684</guid>
      <dc:creator>mibir</dc:creator>
      <dc:date>2019-06-14T16:21:38Z</dc:date>
    </item>
    <item>
      <title>Re: iOS 13 Devices Marked as Compromised</title>
      <link>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520545#M2685</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Shared SaaS: 19.5.0.2 (1905)&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I suggest you disable the setting and setup a compliance policy that detects jailbroken devices. Setup a 1st notification by email, 2nd warning by email and inform of enterprise wipe action and a 3rd with the actual enterprise wipe action. As for the time span in between them, it would be best for you to work with your Data Security, Risk &amp;amp; Compliance and IT Leadership. There is action that needs to be taken for jailbroken devices. &lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jun 2019 16:35:05 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520545#M2685</guid>
      <dc:creator>RicardoPachecoR</dc:creator>
      <dc:date>2019-06-14T16:35:05Z</dc:date>
    </item>
    <item>
      <title>Re: iOS 13 Devices Marked as Compromised</title>
      <link>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520546#M2686</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Yeah, makes sense. That also allows for exclusion then which means we can have an assignment group that adds iOS 13 devices as they check in and get excluded from the compliance policy.&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jun 2019 17:21:13 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520546#M2686</guid>
      <dc:creator>mibir</dc:creator>
      <dc:date>2019-06-14T17:21:13Z</dc:date>
    </item>
    <item>
      <title>Re: iOS 13 Devices Marked as Compromised</title>
      <link>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520547#M2687</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Does anyone know if there's currently a version of Workspace One that is compatible with iOS 13?&amp;nbsp; I'm seeing the same issue where when an enrolled iOS 13 is upgraded, it's immediately flagged as compromised.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Which setting disables this behavior?&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Jul 2019 15:36:10 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520547#M2687</guid>
      <dc:creator>antherITguy</dc:creator>
      <dc:date>2019-07-25T15:36:10Z</dc:date>
    </item>
    <item>
      <title>Re: iOS 13 Devices Marked as Compromised</title>
      <link>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520548#M2688</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;As shown above:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;' Groups &amp;amp; Settings -&amp;gt; Apps -&amp;gt; Settings and Policies -&amp;gt; Security Policies -&amp;gt;Compromised Protection. My site is set to Disabled.'&amp;nbsp; &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Until the Intelligent Hub gets updated it will continue to flag iOS 13 as compromised which is a false positive.&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Jul 2019 16:17:34 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520548#M2688</guid>
      <dc:creator>RichB2u2</dc:creator>
      <dc:date>2019-07-25T16:17:34Z</dc:date>
    </item>
    <item>
      <title>Re: iOS 13 Devices Marked as Compromised</title>
      <link>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520549#M2689</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;We stopped seeing iOS/iPadOS 13 being detected as compromised with HUB version 19.06 for iOS.&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Jul 2019 18:35:43 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520549#M2689</guid>
      <dc:creator>sturmanc</dc:creator>
      <dc:date>2019-07-25T18:35:43Z</dc:date>
    </item>
    <item>
      <title>Re: iOS 13 Devices Marked as Compromised</title>
      <link>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520550#M2690</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since iOS 13 Beta 5 we also get a false compromised report but only when opening Boxer. Therefore Boxer wipes its data but any other enterprise apps are untouched.&lt;BR /&gt; It also only happens on Boxer with VPN using VMware Tunnel. We also have an alternative setup where Boxer only uses a certificate for authentification and no VPN and the problem does not occur with that setup.&lt;BR /&gt; Compromised detection is disabled as writen by @Rich B. We are on-prem v1810.&lt;BR /&gt; Anyone experienced the same thing or has a solution?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Aug 2019 09:56:06 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520550#M2690</guid>
      <dc:creator>ThomasBeckerTho</dc:creator>
      <dc:date>2019-08-23T09:56:06Z</dc:date>
    </item>
    <item>
      <title>Re: iOS 13 Devices Marked as Compromised</title>
      <link>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520551#M2691</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Can any boby please guide that is it possible to migrate the iOS device enrolled using container to Hub in 18.10 UEM version? what is the impact?&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2019 11:16:29 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520551#M2691</guid>
      <dc:creator>SumitVedi</dc:creator>
      <dc:date>2019-08-29T11:16:29Z</dc:date>
    </item>
    <item>
      <title>Re: iOS 13 Devices Marked as Compromised</title>
      <link>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520552#M2692</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;The latest release for Boxer (5.10) and Hub (19.08) seem to have fixed my problem.&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Sep 2019 06:33:47 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520552#M2692</guid>
      <dc:creator>ThomasBeckerTho</dc:creator>
      <dc:date>2019-09-05T06:33:47Z</dc:date>
    </item>
    <item>
      <title>Re: iOS 13 Devices Marked as Compromised</title>
      <link>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520553#M2693</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;We are seeing the same when the MAG/VPN Tunnel is opened via an internally developed app.&amp;nbsp; Compromised Protection is enabled currently on the console and Hub Version is 19.08.0.&amp;nbsp; Is the solution to temporarily turn off Compromised Protection?&amp;nbsp; Does turning this off in a production environment affect anything else?&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Sep 2019 17:35:30 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520553#M2693</guid>
      <dc:creator>EmilGhoting</dc:creator>
      <dc:date>2019-09-18T17:35:30Z</dc:date>
    </item>
    <item>
      <title>Re: iOS 13 Devices Marked as Compromised</title>
      <link>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520554#M2694</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Do you use app wrapping or sdk with compromised detection on your internal app by an chance?&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Sep 2019 18:07:18 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520554#M2694</guid>
      <dc:creator>Stansfield</dc:creator>
      <dc:date>2019-09-18T18:07:18Z</dc:date>
    </item>
    <item>
      <title>Re: iOS 13 Devices Marked as Compromised</title>
      <link>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520555#M2695</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Yes, we are using App wrapping&amp;nbsp; (w/VM Tunnel) + Compromised Protection under Settings&amp;gt; Apps&amp;gt; Settings and Policies&amp;gt; Security Policies.&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Sep 2019 18:12:31 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520555#M2695</guid>
      <dc:creator>EmilGhoting</dc:creator>
      <dc:date>2019-09-18T18:12:31Z</dc:date>
    </item>
    <item>
      <title>Re: iOS 13 Devices Marked as Compromised</title>
      <link>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520556#M2696</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Are you using the latest version to wrap the app? it has to be updated along with the Hub&lt;/SPAN&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Sep 2019 19:00:19 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/Workspace-ONE-Discussions/iOS-13-Devices-Marked-as-Compromised/m-p/520556#M2696</guid>
      <dc:creator>Stansfield</dc:creator>
      <dc:date>2019-09-18T19:00:19Z</dc:date>
    </item>
  </channel>
</rss>

