Documentation

Go to Portal Website

Detection Controls

Detection controls identify risky device, app, screen, network, or runtime conditions and apply a configured response. Use them first in Log mode to understand real-world posture, then move high-confidence events to Message, Redirect, or Terminate after testing on representative devices.

For per-control setup details, open the linked control reference pages below.

A good detection rollout separates signal collection from enforcement. Logging answers "what is happening?" before stricter responses answer "what should the app do about it?"

Control Matrix

Minimum plan means the lowest public tier where the control is available. Enterprise tenants include Team controls.

ControlPlatformsMinimum planExecutionRecommended first rollout
Accessibility Service DetectionAndroidTeamRuntimeLog, then Message for sensitive workflows.
App Cloning DetectionAndroidTeamRuntimeLog during fraud analysis, then Message or Terminate for account-abuse flows.
App Tamper DetectionAndroid, iOSTeamRuntime integrityLog during rollout, then Terminate for modified or repackaged builds.
Apple App AttestiOSEnterprisePlatform attestationLog first, then enforce for supported production iOS apps.
Debuggable DetectionAndroid, iOSTeamRuntimeLog in QA, then Terminate for production apps after validation.
Debugger DetectioniOSTeamRuntimeLog in QA, then Terminate for production releases.
Developer Options DetectionAndroid, iOSTeamRuntimeLog or Message; use as a posture signal rather than a standalone block in broad consumer apps.
Device Lock DetectionAndroid, iOSTeamRuntimeMessage with remediation guidance before enforcing.
Emulator DetectionAndroid, iOSTeamRuntimeTerminate for production apps that should only run on physical devices.
Google Play IntegrityAndroidEnterprisePlatform attestationLog and tune before blocking unsupported or low-integrity devices.
Hook DetectionAndroidTeamRuntimeLog in early rollout, then Terminate for high-risk apps.
Hooking DetectioniOSTeamRuntimeLog in early rollout, then Terminate for high-risk apps.
Jailbreak DetectioniOSFreeRuntimeMessage or Terminate depending on policy.
Location Spoofing DetectionAndroid, iOSTeamRuntimeLog first; false-positive tolerance depends on how location is used.
Memory Tamper DetectioniOSTeamRuntimeTerminate for apps protecting payments, credentials, or licensed content.
Overlay DetectionAndroidTeamRuntimeMessage for payment, login, and approval screens.
Proxy Usage DetectionAndroid, iOSTeamRuntimeLog or Message; coordinate with enterprise customers that use managed network inspection.
Root DetectionAndroidFreeRuntimeMessage or Terminate depending on device policy.
Screen Capture DetectionAndroid, iOSTeamRuntimeLog first; use Android Screen Capture Protection when strict Android screenshot blocking is required.
Screen Mirroring DetectionAndroid, iOSTeamRuntimeMessage for workflows that cannot be displayed externally.
Screen Recording DetectionAndroidTeamRuntimeLog first; use Android Screen Capture Protection when strict Android recording blocking is required.
Third-Party Keyboard DetectionAndroid, iOSTeamRuntimeMessage on credential, payment, and personal-data screens.
Time Tampering DetectionAndroid, iOSTeamRuntimeLog first, then enforce where tokens, trials, or certificates depend on trusted time.
Unknown Sources DetectionAndroid, iOSTeamRuntimeMessage or Terminate for official-store distribution policies.
USB Connection DetectionAndroidTeamRuntimeLog for most apps; Message or Terminate for managed-device environments.
Virtual App DetectionAndroidTeamRuntimeLog first, then enforce for anti-abuse and high-risk apps.
VPN DetectionAndroid, iOSTeamRuntimeLog or Message; enforce only where policy clearly disallows VPN use.

Response Actions

ActionCustomer-facing behaviorBest use
LogRecords the event while allowing the app to continue.Baseline rollout, false-positive measurement, and silent monitoring.
MessageShows a configured alert explaining what the user should do next.User-remediable states such as device lock, VPN, developer options, or unsupported keyboards.
RedirectSends the user to a configured support, policy, or update URL.Compliance pages, upgrade flows, device policy pages, and help-center guidance.
TerminateCloses the app after the detection fires.High-confidence threats such as repackaging, debugging, runtime hooks, or prohibited device states.
App profileSuggested baseline
Consumer app with moderate data sensitivityRoot or jailbreak detection, emulator detection, debuggable detection, screen capture detection, and proxy usage detection in Log mode.
Financial, healthcare, identity, or regulated appAdd debugger, hook, memory tamper, device lock, third-party keyboard, overlay, and app integrity controls. Use Message or Terminate once validated.
Enterprise-managed appAdd developer options, USB connection, VPN, unknown sources, and device lock controls according to your device policy.
Fraud-sensitive appAdd app cloning, virtual app, location spoofing, time tampering, emulator, and unknown sources controls.

Rollout Guidance

  1. Enable candidate detections in Development or Staging with Log responses.
  2. Test on physical devices, managed devices, beta builds, older OS versions, and common customer device profiles.
  3. Review events in the security dashboard and device logs before changing response actions.
  4. Use Message for states a legitimate user can fix, such as enabling a lock screen or disabling a VPN.
  5. Use Terminate only for high-confidence threats where continuing would create unacceptable risk.
  6. Document customer support guidance before enforcing controls that may affect legitimate users.

Response Selection Checklist

QuestionResponse guidance
Could a legitimate user fix this condition?Prefer Message or Redirect with clear remediation.
Is the signal noisy during QA or pilot rollout?Keep Log until false-positive behavior is understood.
Does continued app use create unacceptable risk?Consider Terminate after validation and support review.
Does the condition affect only sensitive screens?Pair broad logging with targeted prevention or product-level handling where appropriate.

Detection And Prevention Together

Detection controls tell you that a condition exists. Prevention controls actively block or harden the behavior. For sensitive workflows, use both where appropriate.

RiskDetection controlPrevention or hardening pair
Screenshots or visual disclosureScreen Capture DetectionAndroid Screen Capture Protection, or Screenshot Prevention for iOS screens
Screen recordingScreen Recording DetectionAndroid Screen Capture Protection, or Screen Recording Prevention for iOS screens
Network interceptionProxy Usage DetectionCertificate Pinning and TLS 1.3 Only
Runtime analysisDebuggable Detection, Debugger Detection, Hook Detection, Hooking DetectionSet Debuggable to False and Code Obfuscation
Sensitive input leakageThird-Party Keyboard DetectionClipboard Protection, Keyboard Cache Prevention, and Autofill Suggestion Prevention