Skip to main content

Device Details (KMA)

View a device's info, policies, apps, and logs in one place for efficient troubleshooting and compliance checks.

Updated over 5 months ago

1. Summary Tab

Notes:

  • All information is reported by the KC client on the device and may have some delay.

  • Compliance status is based on real-time comparison between device status and policy configuration. After a policy change, wait for the next report for accurate status.

  • Location information depends on location permissions enabled on the device. If disabled or signals are weak, the map may appear empty.

1.1 Feature Overview

The "Summary" tab presents key status information of the device to help users quickly understand its operational and compliance state.

  • Device Location Info: Current location via GPS or IP

  • Registration & Compliance Status:

    • Whether the device is registered to the KC platform and registration time

    • Current compliance state (compliant / non-compliant)

  • Device Identity Info: Brand, model, serial number, device ID

  • OS & Patch Info: Android version, firmware version, security patch level

  • Network Info:

    • Connected Wi-Fi SSID, IP address, MAC address

    • SIM card info (if available): ICCID, carrier, phone number

  • Device Security State:

    • Whether PIN, ADB, or developer mode is enabled

    • Whether storage encryption is enabled, and if unknown sources are allowed

1.2 Applicable Scenarios

  • Compliance check: Quickly determine if device meets bound policy requirements

  • Regional identification and grouping: Use location data for geo-based device grouping and policy delivery

  • Asset review and management: View basic info like SN, model, firmware, etc.

  • Security validation: Identify risky states like ADB enabled or unknown sources

  • Deployment QA sampling: For operations to spot-check registration status, network configuration, and uptime

2. Applications Tab

Notes:

  • App data is reported periodically by the device and may be delayed

  • If the device is not bound to an app policy, lists like “allowed apps,” “blocked apps,” or “mandatory apps” may be empty

  • System apps are hidden by default; only user-installed apps are shown

2.1 Feature Overview

The "Applications" tab shows the currently installed user apps and compares them with policy-defined allow/block/mandatory apps to assist with policy verification, compliance validation, and issue diagnosis.

  • User App List:

    • Lists all currently installed user apps (excluding system apps)

    • Shows app name, package name, version, source of policy, and installation time

  • Policy-configured Apps (if policy is bound):

    • Allowed Apps (Whitelist): Apps allowed by policy, optional to install

    • Blocked Apps (Blacklist): Apps forbidden by policy; presence is a violation

    • Mandatory Apps: Must be installed per policy; absence = policy non-compliance

  • Policy Comparison Indicators:

    • System compares policy and actual installation to flag missing, extra, or wrong-version apps

    • Compliance indicators (✔ / ❌) are shown

3. Policy Tab

Notes:

  • Policy execution status relies on device reporting; if the device has been offline for a long time, displayed information may be outdated.

  • Compliance determination for some policy fields is based on field-by-field comparison and does not represent the delivery status of the entire policy.

  • If the policy is inherited from a group, modifications must be made in the group, and cannot be unbound individually from here.

3.1 Feature Overview

The “Policy” tab displays all currently effective policies and their execution status for this device. It also provides compliance assessment and execution history to help confirm policy source, delivery, and results.

Overview of Effective Policies

Effective Policies Overview (Left Details + Right Navigation) The left panel displays the following policy configuration blocks by type:

  • Device Policy

  • Application Distribution Policy

  • Application Update Policy

  • Kiosk Policy

  • File Distribution Policy

Each policy block shows basic info and configuration details including:

  • Policy Name and ID

  • Policy Type

  • Execution Version

  • Policy Delivery Time

  • Detailed Policy Configuration

The right side contains a quick navigation menu for switching between multiple configuration blocks.

Policy Compliance Status

  • Displays whether the current device status meets the requirements after policy execution.

  • If compliance fails, the reason will be highlighted (e.g., “App not installed”, “PIN not set”).

Associated Policies

  • Shows all policies currently bound to this device.

  • Helps identify policy sources and coverage to avoid conflicts or duplicate configurations.

Policy Delivery History

Displays all past policy delivery records in chronological order, including:

  • Policy Name, Type

  • Executed Version, Latest Version

  • Execution Result (Success / Failure)

  • Delivery Timestamp

4. Device Groups Tab

Notes:

  • A single device can belong to multiple groups. If groups apply the same type of policy, the platform will automatically merge them by type.

  • Changing group assignments may trigger system actions such as policy re-pushing or file reissuing.

  • When the same type of policy is inherited from multiple groups, the effective policy is a merged result.

4.1 Feature Overview

The “Device Groups” tab displays all groups that the current device is assigned to, along with the policy types mounted to each group. It supports adding or removing group associations.

  • Group List:

    • Shows all groups the device currently belongs to

    • Displays mounted policy types and policy names for each group

    • Helps identify the group inheritance structure of policies

  • Quick Operations:

    • Add to Group: Assign the device to a new group

    • Remove from Group: Remove the device from a current group

Group changes take effect immediately and may cause policy re-execution. Please operate with caution.

5. Device Tab

Notes:

  • Information in this tab is reported by the device itself. If the device is offline, some fields may be missing or outdated.

  • Available fields vary depending on the device model and firmware version.

  • Only devices recognized and managed by KC will display relevant information.

5.1 Feature Overview

The “Device” tab presents detailed hardware specifications, software version, network identifiers, and security configurations of the device. It is useful for operations, technical support, and asset management.

Device Information

  • Device ID

  • Device management mode (e.g., KMA)

  • Android API level

  • Brand / Model / Manufacturer

  • Serial Number

  • Baseband version

Network

  • Wi-Fi MAC address

  • IMEI / MEID

  • SIM card ICCID

  • Carrier Name

  • Phone Number

Security

  • Whether PIN lock is enabled

  • Whether ADB / developer mode is enabled

  • Whether installation from unknown sources is allowed

  • Whether encryption is enabled

  • Whether install protection is enabled

6. System Settings Tab

Notes:

  • System settings are reported periodically by the device; some configuration states only update after reboot or policy push.

  • If the device is not bound to a system policy or is offline, fields may show as “Not Set.”

  • Supported settings may vary by model and firmware version; unsupported items will be hidden.

6.1 Feature Overview

The “System Settings” tab displays the actual configuration status of the device’s system parameters. These values reflect the final result after policy delivery and allow users to confirm whether key parameters are properly controlled.

Connectivity Settings

  • Whether Wi-Fi is enabled

  • Whether mobile hotspot is enabled

  • Whether Bluetooth is enabled

  • Bluetooth name or alias (if supported)

Display & Sound

  • Screen brightness

  • Volume level

  • Screen timeout duration

Security & Permissions

  • Whether compliance detection is enabled

  • Whether USB debug protection is enabled

  • Whether Google Settings / Play Store is accessible

  • Whether installation from unknown sources is allowed

6.2 Policy Compliance Evaluation

By comparing actual device configuration with policy settings (refer to “Policy” tab), users can:

  • Check if important switches like Wi-Fi, USB Debugging, screen timeout, etc. are set correctly

  • Identify non-compliant values (e.g., volume not muted, Bluetooth still enabled)

  • Determine whether policy delivery was successful and took effect

6.3 Troubleshooting & Debugging

This tab should be used in combination with the “Policy” and “System Logs” tabs to:

  • Identify whether a device is not executing policy as expected

  • Check reasons for failure, such as device being offline or policy being overridden

  • Support technical teams in analyzing root causes of device misbehavior

7. Location Tab

Notes:

  • Location data is reported by the device client, based on GPS or IP.

  • Location acquisition depends on whether the location permission is enabled and whether signal/network is available. If not available, the map will appear empty.

  • Only the latest location is displayed here; this is not a continuous real-time tracking map.

  • Lost Mode enables enforced reporting and screen lock.

7.1 Function Overview

The "Location" tab shows the latest reported location of the device and supports basic location-related remote operations.

Device Location Data

  • Displays the device’s last known location on a map

  • Shows the geocoded address, coordinates, and reporting timestamp

  • Displays the positioning method (GPS or IP-based)

Remote Operations

  • Enable Lost Mode

    • Force the device to report location

    • Lock the device screen and display the Lost Mode interface

  • View Location History

    • Redirect to the [Location Trace] tab to view the historical movement path of the device

7.2 Linkage with Other Functions

  • Policy compliance inspection: Use with the "System Settings" tab to check whether location permission is enabled

  • Device operation dispatching: Assist in dispatching the nearest field technician

  • Risk investigation: Determine whether the device is in an abnormal geographic area or has gone offline

8. Operation Log Tab

Notes:

  • Only shows remote manual operations actively triggered by platform users.

  • Status is based on device feedback; if the device is offline, operations may remain in “executing” status.

  • The same operation performed on multiple devices will generate separate records for each device.

8.1 Function Overview

The “Operation Log” tab records all historical manual operations executed on the current device. It supports multi-condition filtering and log detail viewing.

Operation Log List

Each row corresponds to a single operation record and displays:

  • Task ID

  • Operation Type (e.g., Reboot, Lock Screen, Lost Mode, Reset Device, Install App, etc.)

  • Operator: The user who triggered the operation

  • Operation Time

  • Operation Reason (if filled in during execution)

  • Execution Result: Success / Failure

  • Log Details: Click to view specific status or error message

Filtering Options

Supports filtering by:

  • Operation type

  • Execution result (success/failure)

  • Operation time

  • Keyword search (e.g., operator name, task ID)

9. System Log Tab

Notes:

  • The log list is reported by the KC client app; it may not be updated if the device is offline or if logs exceed the report interval.

  • System logs differ from operation logs: they record device-side behaviors and are triggered by automated policy enforcement or app activity.

  • Some logs will only appear if the corresponding policy feature is enabled (e.g., forbidden app monitoring, kiosk exits, etc.).

9.1 Function Overview

The “System Log” tab displays behavior events automatically reported by the device agent. It provides context for compliance monitoring, debugging, and policy effectiveness validation.

Log List Structure

Each row contains one log entry with the following fields:

  • Log Type (e.g., App Uninstall, App Install, Forbidden App Opened, Device Reboot, Policy Executed, App Crashed)

  • Log Message (detailed description of the behavior)

  • Timestamp

  • App Info (if applicable): Package name, version

  • Policy Source (if applicable): Policy name and type

  • Trigger Mode: Passive (e.g., system monitoring) or active (e.g., user action)

Log Display Rules

  • Sorted in reverse chronological order (latest first)

  • Only shows logs from the current device

  • Max retention time and volume may be subject to platform limits

Did this answer your question?