- July 15th 2012, version 1, SecurityCenter 4.4
- Required Tools: PVS
- Download Example - Apple iPod, iPad and iPhone
- Download Template - Apple iPod, iPad and iPhone
If you are interested in mobile device security policy and how Tenable solutions can help with compliance then the recorded webinar entitled "A Layered Approach to Mobile Device Security" is a very good starting point for research.
See the news article "Defense to spy on its own data" in relation to a recent case involving iPads and PVS detection.
Mobile devices don't have to use an organization's wireless network as a gateway to access internal networked resources. Connectify is a Windows software solution that can share a network connection with multiple wireless devices using a wireless card or USB adapter. Using a Mac that has an AirPort card is even simplier because there's no need for additional software (see this link but with a disclaimer that the author of this post does not consider WEP secure, not even relatively secure). And of course there is always the possibility somebody might try to connect their own personal wireless access point appliance to an available wired ethernet port. The first chapter of the template will help identify abuses of network policy by identifying Apple iPod, iPad and iPhone connected devices in network locations that are in violation of network use policy.