Skip to main content

Device Details (GMA)

View complete GMA device details including apps, policies, groups, logs, and remote actions for full lifecycle management.

Updated yesterday

1. Features and Objectives

The Device Details (GMA) module provides administrators with complete information and operational access for a single device. It is a core component of device operations and maintenance in the KiwiCloud platform. Through this module, administrators can gain a clear view of device operating status, application and policy configurations, as well as perform remote operations and compliance checks, ensuring devices remain secure, stable, and efficient throughout their lifecycle.

The main functions are organized into nine tabs:

  • Summary: Displays key information and operating status of the device.

  • Applications: View and manage applications installed on the device.

  • Policies: Show the device’s associated device policies, app policies, and compliance status.

  • Device Groups: Display the groups the device belongs to and inherited policies.

  • Device: View hardware, system, and network information.

  • Restrictions: Display and adjust restricted features (e.g., USB, Bluetooth).

  • Location Tracking: Support for real-time device location and historical route playback.

  • Operation Logs: Record administrator actions performed on the platform.

  • System Logs: Record system operation and compliance logs automatically reported by the device.

Objectives:

  • Provide IT administrators with a single device view, avoiding dispersed queries.

  • Support lifecycle-wide device monitoring and operations.

  • Enhance enterprise compliance management, application control, and troubleshooting.

  • Reduce manual maintenance costs and improve response time through remote operation capabilities.

2. Summary Tab

Description

The Summary tab provides a centralized view of the key operational status and basic attributes of a single GMA device. It helps administrators quickly assess the device’s health and compliance status. The page covers critical elements such as device identification, hardware and OS information, network configuration, compliance state, and security settings. It is the default entry point of the device details module.

On this page, administrators can:

  • View real-time operating data (e.g., memory usage, battery level);

  • Quickly verify device registration time, manufacturer, model, and serial number;

  • Access OS parameters such as version, patch level, and kernel version;

  • Check if the device meets platform compliance requirements and identify non-compliance reasons;

  • Review network identifiers (IMEI, Wi-Fi MAC, etc.) to assist with connectivity or troubleshooting;

  • Confirm security configurations (PIN/password, ADB, encryption, protection mechanisms) to ensure alignment with enterprise security policies.

Notes

  • Some data (e.g., battery level, memory usage) is based on the latest device report; values may be delayed if the device is offline.

  • Compliance checks depend on the device’s OS version and strategy configuration; different strategy combinations may trigger a “non-compliant” status.

  • Certain network fields (e.g., IMEI, ICCID, phone number) may be empty or unsupported depending on the device.

  • Security configurations (e.g., ADB, developer mode) should be enabled only when necessary, to avoid security risks.

Features Overview

image-20250830161041393

  1. Operating Status

    • Memory usage: Displays used/total memory with percentage visualization.

    • Battery level: Shows the current remaining battery percentage.

  2. Compliance

    • Indicates whether the device complies with active strategy configurations; if non-compliant, the reason will be displayed (e.g., unsupported Android API level).

  3. Device Registration & Basic Info

    • Registration time: When the device first connected to the platform.

    • Device name, manufacturer, model, serial number, baseband version, management mode, etc.

  4. Operating System Info

    • OS type, kernel version, security patch level, ADP version, etc.

  5. Network Info

    • IMEI, Wi-Fi MAC, ICCID, phone number, carrier name.

  6. Device Security

    • Current security settings such as PIN/password, unknown sources, ADB, storage encryption, and protection mechanisms.

Typical Use Cases

  • Health Check: IT administrators quickly evaluate memory usage, battery level, and security settings to assess device health.

  • Compliance Check: Validate compliance after applying new strategies via the Summary tab.

  • Troubleshooting: Use network and system data (e.g., IMEI, patch level) to locate anomalies or compatibility issues.

  • Asset Management: Track devices using registration time, model, and serial number for inventory and audit purposes.

3. Applications Tab

Description

The Applications tab provides a centralized view and management of the application installation status on the device. Administrators can quickly review the list of installed applications, version information, package names, installation status, and associated application publish/update policies. It also distinguishes between allowed and blocked applications. The tab supports search and filtering to help locate target applications in complex environments.

The page is divided into three sub-tabs:

  1. User Applications List: Displays all user-installed applications on the device.

  2. Allowed Applications List: Shows applications permitted for installation by policy.

  3. Blocked Applications List: Shows applications restricted from installation by policy.

Notes

  • Application data comes from the latest report from the device; information may be delayed if the device is offline.

  • Application status is controlled by Application Publish Policy or Application Update Policy; some information is only displayed when policies are linked.

  • If no allow/deny rules are configured, the corresponding sub-tab may be empty.

  • The User Applications List only displays user-level apps; system apps are excluded.

  • Administrators can quickly locate target apps using the search box by app name or package name.

Features Overview

  1. User Applications List

    • Displays all applications currently installed on the device, including:

      • Application name, version, and package name;

      • Status (e.g., Installed);

      • Associated application publish policy name;

      • Application update policy;

      • Installation time.

    • Supports searching by name or package name for quick location.

  2. Allowed Applications List

    • Displays the whitelist of apps permitted for installation by policy.

    • Primarily used to confirm whether policies were correctly applied.

    image-20250830161335792

  3. Blocked Applications List

    • Displays the blacklist of apps prohibited by policy.

    • If non-compliant apps are detected, the system will automatically uninstall them and mark them here.

Typical Use Cases

  • Compliance Check: Verify quickly whether the device complies with enterprise application control policies using the allowed/blocked lists.

  • Troubleshooting: When users report issues installing or using an app, check here to confirm if restrictions apply.

  • Operational Monitoring: Monitor critical business apps (e.g., POS software) to ensure proper installation and linkage to the correct publish policy.

  • Application Asset Management: Understand application deployment status on a single device to support version updates and maintenance planning.

4. Policies

Description

The Policies tab provides a centralized view of all policies associated with the current device, including effective policy overview, compliance status, linked policies, and policy deployment history. This enables administrators to clearly understand policy configurations and execution results, helping them quickly identify compliance risks and policy conflicts.

Key functions include:

  1. Effective Policy Overview

    • Summarizes the actual effective policies on the device (device policies, application policies, Kiosk policies, etc.) and displays core configurations by category.

    • Administrators can review password rules, Wi-Fi configurations, security and restriction settings, as well as application whitelists/blacklists.

  2. Device Compliance

    • Shows whether the device meets compliance requirements based on applied policies.

    • Displays “Non-compliance Reasons” such as “Android API level not supported.”

    • Supports viewing compliance/non-compliance details by policy dimension.

  3. Associated Policies

    • Lists all policies currently associated with the device, including policy name, type, version, operator, and binding time.

    • Supports pushing new policies to ensure device configurations align with enterprise requirements.

  4. Policy Deployment History

    • Logs all historical policy deployments for the device, including policy name, type, executed version, latest version, result, and timestamp.

    • Allows administrators to trace and review policy deployments, supporting operational audits and troubleshooting.

Notes

  • A device may be associated with multiple policies simultaneously; the system calculates the final effective result based on the “module-level merge, latest version takes precedence” principle.

  • For duplicate policy types (e.g., multiple Wi-Fi configurations), the latest applied configuration takes effect.

  • Compliance status depends on device-side reporting and comparison with policies, which may be delayed if the device has not synced.

  • If a deployed policy requires changes, it must be updated in the policy center and redeployed.

Features Overview

  1. Effective Policy Overview

    • Through the Effective Policy Overview, administrators can review the device’s final security and restriction settings to ensure alignment with enterprise standards.

  2. Device Compliance

    • Quickly determine whether the device is compliant and identify non-compliance reasons and their scope.

  3. Associated Policies

    • Allows administrators to view and manage all policies bound to the device, reducing risks of missing or conflicting configurations.

  4. Policy Deployment History

    • Provides complete logs of policy deployments, enabling post-event reviews, operational tracing, and compliance auditing.

Typical Use Cases

  • Compliance Validation: Ensure devices adhere to enterprise security policies and investigate specific non-compliance causes.

  • Operational Troubleshooting: Review current effective policies and deployment history to identify possible conflicts causing abnormal device behavior.

  • Version Control: Compare policy versions and history to ensure devices are running the latest policies.

  • Audit Evidence: Export policy history and compliance status for enterprise compliance and security audits.

5. Device Grouping

Description

The Device Grouping tab displays the groups to which the current device belongs and supports adjusting group memberships. This feature allows administrators to quickly verify the device’s assigned groups, review associated policies and applications, and perform add/remove group operations.

Key functions include:

  • View Group Information: Display group name, number of devices, number of linked policies, whitelist/blacklist apps, operator, and last modification time.

  • Add to Group: Add the current device to other existing groups.

  • Remove from Group: Remove the device from selected groups.

  • Operational Tracking: Confirm the responsible operator for group adjustments.

Notes

  • A device can belong to multiple groups, inheriting policies from all groups.

  • When in multiple groups, policies are merged using the rule: merge across modules, with the latest version taking precedence.

  • Removing a device from a group means it no longer inherits that group’s policies, which may affect configuration and compliance.

  • Group changes take effect immediately. It is recommended to perform adjustments during off-peak business hours to avoid service impact.

  • Operator actions are logged for audit and traceability.

Feature Details

image-20250830162014466

  1. Group Information Display

    • Lists all groups the device currently belongs to.

    • Includes group name, device count, number of linked policies, whitelist/blacklist apps, operator, and last modification time.

  2. Add to Group

    • Click Add Device to Group, then select the target group in the popup window.

    • After confirmation, the device is immediately added and inherits the group’s policies and application settings.

  3. Remove from Group

    • Select the target group to remove, then click Remove Device from Group.

    • After confirmation, the device is removed immediately and no longer inherits policies or configurations from that group.

Typical Use Cases

  • Organizational Management: Manage devices across different regions, stores, or business units via groups to improve operational efficiency.

  • Policy Inheritance: Apply policies at the group level to simplify repetitive configuration for individual devices.

  • Troubleshooting: Check device group membership and linked policies to identify potential causes of abnormal behavior.

  • Dynamic Adjustment: Reassign devices to new groups when they move to different business contexts or regions to ensure proper policy and application delivery.

6. Device

Description

The Device tab displays detailed information about the device’s hardware and system, including device info, brand, display parameters, as well as network, security, and password policy configurations. Administrators can use this page to gain insights into the device’s basic attributes and security status, supporting asset management, compliance checks, and troubleshooting.

The page is divided into four sub-tabs:

  1. Device Information: Shows basic details such as Device ID, User ID, management mode, running status, and Android API level.

  2. Network: Displays the device’s network identifiers, such as IMEI, Wi-Fi MAC, ICCID, phone number, and carrier name.

  3. Security: Shows device security configurations including PIN/password setup, ADB, developer mode, storage encryption, protection mechanisms, and security risk alerts.

  4. Password Requirements: Displays policy-related password rules, such as complexity, failed attempt limits, history requirements, and expiration policies.

Notes

  • Device information is reported by the device; if the device is offline, there may be delays.

  • Network information may vary by device type (e.g., MEID and ICCID may be empty on some models).

  • If security configurations do not meet enterprise policy requirements, the device may be flagged as non-compliant.

  • Password requirements are controlled by the deployed policies; if no password policy is configured, this section may show “No Requirements.”

  • Certain security risk alerts (e.g., “Hardware verification failed”) should be evaluated in the context of both policy and device conditions.

Feature Details

  1. Device Information

    • Displays unique identifiers (Device ID, User ID, Serial Number), along with runtime status and API level.

    • Useful for asset ledger management or API integration validation.

  2. Brand & Display

    • Provides brand, hardware name, model, and baseband version.

    • Display section shows screen ID, resolution, and refresh rate, useful for verifying display settings and compatibility.

  3. Network Information

    • Shows IMEI, Wi-Fi MAC, ICCID, and other identifiers.

    • Useful for diagnosing network issues, SIM configuration, or device tracking.

  4. Security Information

    • Displays whether PIN/password, ADB, developer mode, storage encryption, and protection mechanisms are enabled.

    • Provides security risk alerts (e.g., “Unknown OS,” “Hardware not verified”) for proactive handling.

    image-20250830162416822

  5. Password Requirements

    • Displays the enforced password policy, including complexity, maximum failed attempts, password history, and expiration rules.

    • Helps administrators confirm compliance with enterprise security standards.

Typical Use Cases

  • Asset Management: Build device records with Device ID, model, and serial number.

  • Compliance Audits: Verify whether devices meet corporate password and security requirements.

  • Troubleshooting: Diagnose connection or identifier issues using network information.

  • Security Protection: Detect and respond when ADB or developer mode is enabled, reducing risk exposure.

7. Restrictions

Description

The Restrictions tab displays the device’s restriction status across four categories: Security, System Updates, Network & Connectivity, and Other System Settings. This information is reported by Google ADP, helping administrators understand the current restrictions applied to the device and its operational scope, supporting compliance reviews and policy validation.

The main content includes:

  • Security Restrictions: Whether camera access, screenshots, microphone, developer mode, or factory reset are allowed.

  • System Updates: Configuration of system update installation policies.

  • Network & Connectivity: Whether airplane mode, Wi-Fi, Bluetooth, NFC, USB file transfer, hotspot sharing, etc., are allowed.

  • Other Restrictions: Policies related to app installation/uninstallation, screen timeout, wallpaper and theme changes, and screen resolution adjustments.

Notes

  • All data in this tab is reported by Google ADP. The platform only displays the data and does not support direct modification.

  • Reporting content may vary depending on device model and OS version.

  • If restrictions conflict with enterprise policies, the latest deployed policy takes precedence.

  • Restrictions such as USB file transfer and hotspot sharing involve potential security risks and should be carefully managed based on business needs.

  • Restrictions like screen timeout, wallpaper changes, and resolution settings mainly affect user experience and are not recommended to change arbitrarily.

Feature Details

image-20250830162533438

  1. Security: Shows whether camera, screenshots, microphone, developer mode, and factory reset are allowed or blocked.

  2. System Update Policy: Displays the installation method for system updates (e.g., automatic updates), ensuring devices receive patches continuously.

  3. Network & Connectivity: Displays restriction status for mobile networks, airplane mode, Wi-Fi settings, NFC, USB file transfer, Bluetooth, and hotspot sharing.

  4. Others: Displays app installation/uninstallation policies, screen timeout, resolution settings, wallpaper changes, and theme adjustments to help administrators assess user control boundaries.

Typical Use Cases

  • Compliance Review: Verify whether device restrictions comply with enterprise security and management standards.

  • Troubleshooting: Identify whether functional issues (e.g., camera or Wi-Fi not working) are caused by restriction policies.

  • Risk Control: Prevent data leaks caused by risky features such as USB file transfer, ADB, or hotspot sharing.

  • Experience Optimization: Confirm whether endpoints support customized experiences such as fixed resolution or unified wallpapers.

8. Location Tracking

Description

The Location Tracking tab displays the device’s real-time geographic location and historical positioning data. It helps administrators monitor the geographic distribution of devices, enhancing asset tracking and security management capabilities. The page defaults to showing the latest device location on a map view and provides detailed location information.

Key features include:

  • Real-time Location Display: Visually show the device’s current position on a map (or satellite image).

  • Location Details: Display the most recent report time, detailed address, and latitude/longitude coordinates.

  • Tracking Status: Indicate whether the device has location tracking enabled.

  • Feature Operations: Support enabling Lost Mode and viewing Location History.

Notes

  • Location data relies on device reporting; if the device is offline, updates may be delayed or unavailable.

  • Different device models may have varying location accuracy due to hardware differences.

  • Enabling Lost Mode may trigger additional security measures (e.g., screen lock, forced location reporting).

  • If location permissions or services are disabled on the device, the latest location cannot be obtained.

Feature Details

image-20250830162613719

  1. Map Display

    • Provides both standard map and satellite view options for flexible usage.

    • Device location is marked with a coordinate point.

  2. Location Details

    • Shows the last reported timestamp.

    • Displays the detailed address and latitude/longitude coordinates for precise identification.

  3. Tracking Status

    • Indicates whether location tracking is currently enabled on the device.

  4. Additional Features

    • Enable Lost Mode: Forces the device into lost state, with continuous location reporting for recovery.

    • Location History: Displays the device’s movement history within a set timeframe, with time-based filters.

Typical Use Cases

  • Asset Tracking: Administrators can quickly determine the distribution of devices across different regions.

  • Theft Recovery: When a device is lost, enable Lost Mode to continuously track its position.

  • Operations Scheduling: For large-scale deployments, use location tracking to assign maintenance tasks efficiently.

  • Security Monitoring: Analyze historical movement patterns to detect abnormal relocation or misuse.

9. Operation Logs

Description

The Operation Logs tab records and displays all actions performed by administrators on the platform for the selected device. Each log entry includes key information such as operation ID, operation type, operator, reason for the action, execution result, and timestamp. This helps administrators track device management activities, supporting auditing and troubleshooting.

Administrators can:

  • Filter logs by operation type, time range, or operation ID.

  • View detailed records of device actions such as policy distribution, restoration, or modification.

  • Analyze reasons for failed operations to aid in issue identification and resolution.

Notes

  • Operation logs only record manual actions initiated from the platform, excluding system-automated actions (which are recorded in the System Logs tab).

  • Log entries display the latest device-reported results; delays may occur if the device is offline or unresponsive.

  • Logs are paginated by default, with options to adjust items per page or export logs.

  • Only administrator accounts with proper log viewing permissions can access full records.

Feature Details

image-20250830162647691
  1. Log Query

    • Filters available for operation type, time range, and operation ID.

    • Supports search and reset to quickly locate specific logs.

  2. Log Display

    • Operation ID: Unique identifier for each device action.

    • Operation Type: Examples include policy distribution and restoring default policies.

    • Operator: Administrator account that executed the action.

    • Reason: Optional notes entered for certain actions, such as restoring a policy.

    • Execution Result: Indicates whether the action succeeded or failed.

    • Timestamp: Exact time the action occurred.

  3. Additional Features

    • Refresh logs to get real-time updates.

    • Export logs for long-term retention or compliance reporting.

Typical Use Cases

  • Audit Tracking: Export complete operation logs during security or compliance audits as verifiable evidence.

  • Issue Diagnosis: Verify whether failed device configurations were due to policy distribution errors or abnormal operations.

  • Accountability: Use the "Operator" field to identify responsible administrators for specific actions.

  • Routine Monitoring: Regularly review logs to ensure device operations and policy distributions are functioning as expected.

10. System Logs

Description

The System Logs tab displays system-level operation logs reported by the device. These logs record execution details during processes such as policy distribution, configuration changes, and application installations. This feature helps administrators monitor device execution results in real time, quickly identify issues, and support both operations and compliance audits.

Administrators can:

  • Query various system operation records executed by the device.

  • View key fields such as operation ID, operation type, execution result, duration, and start/end times.

  • Trace whether the device correctly received and executed assigned policies or commands.

Notes

  • System logs are automatically reported by the device, and the platform only collects and displays them.

  • They record only system-level execution results, complementing the Operation Logs (which track manual actions by administrators).

  • If the device is offline or has an unstable network, logs may be delayed or missing.

  • Execution results include success/failure statuses; failure causes must be further analyzed using log details.

  • It is recommended to regularly export logs for long-term archiving and security audits.

Feature Details

image-20250830162712781

  1. Log Query

    • Supports filtering by operation type, time range, and operation ID.

    • Includes search and reset functions for efficient log retrieval.

  2. Log Display

    • Operation ID: Unique identifier for each device execution.

    • Operation Type: Examples include policy distribution, application policy creation, policy editing, and policy termination.

    • Execution Result: Indicates whether the action succeeded.

    • Duration: Displays the total time taken from initiation to completion, useful for evaluating efficiency.

    • Start/End Time: Provides exact timestamps for execution tracking.

  3. Additional Features

    • Supports log refresh and export, making it easier for administrators to view logs in real time or archive them.

Typical Use Cases

  • Execution Confirmation: Verify through logs whether a device successfully applied a newly issued policy.

  • Issue Diagnosis: Identify specific causes of failure when a device does not reach the expected state.

  • Performance Analysis: Use duration data to assess device efficiency and optimize policy configurations.

  • Compliance Auditing: Export system logs as important evidence for operational and security audits.

Did this answer your question?