Understanding Device Management Screen on Esevel Platform

Created by Jessica Tisnadjaya, Modified on Tue, 13 Jun, 2023 at 2:21 PM by Nalene Lyhor

Roles: IT and HR Admin 


Mobile Device Management (MDM) enables organisations to administer and maintain devices, including virtual machines, physical computers, mobile devices, and IoT devices. Device management is a critical component of any organisation's security strategy.


The device management program installed on your company’s devices is dependent on the device manufacturer. 


Why Does Your Company Need Mobile Device Management (MDM)?

MDM keeps your business data protected and ensures your company retain control over confidential information. If a mobile device is lost or stolen, MDM can remotely lock and wipe all data. Remote locking and wiping capabilities enable companies to keep devices and data secure.


To find out more, check out here [Device Management]


A. Statuses for Device Actions

     These statuses will reflect the results / status of your actions performed on Device Management.

  • Active: Default status of the device
  • Pending: MDM command is being queued.
  • Success: MDM command is sent successfully.
  • Failed: MDM command is not sent successfully.


B. Device Actions

  • Lock Device: Automatically locks the screen and turns on the screen saver if a managed device is inactive for a specified period of time.
  • Erase Device: Command to immediately erase the hard drive on the device, even if the device is locked. Everything on the hard drive, including software, is removed.
  • Restart Device: Command to immediately restart the device.
  • Shut Down Device: Command to immediately shut down the device. Any unsaved work on the device is lost.
  • Enable MFA Login: Activates the Multi-Factor Authentication (MFA) on securing data and applications where a system requires a user to present a combination of two or more credentials to verify a user's identity for login.
  • Disable MFA Login: Disables the  Multi-Factor Authentication (MFA) on securing data and applications where a system requires a user to present a combination of two or more credentials to verify a user's identity for login.


C. Devices’ Search Engine

  • In the Search Bar, perform search by: 
    • By owner: example: Roxanne Rich.
    • By serial number: EU6B2L5YKG.
    • By Operating System (OS):Mac OSX Monterey.
    • By model: Macbook Pro 13” M2 2022.
  • Status: Active, Pending, etc. 


D. Devices List 

     This tells you the details of your device management include:

  • Serial Number: This should be a unique identifier for each asset. 
  • Device Owner: The current employee who owns the asset.
  • Device Manufacturer: The entity that designs and develops a mobile computing device.
  • OS: the software that supports a computer's basic functions.
  • Status: Active, Pending, Failed, Success.
  • Actions: Lock Device, Erase Device, etc.



Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons

Feedback sent

We appreciate your effort and will try to fix the article