Skip to main content

App Update Policy

Manage update strategies for Google Play and Enterprise apps. Support auto, scheduled, and controlled updates on GMA, KMA, and IMA devices.

Updated yesterday

1. Purpose and Use Cases

The Application Update Policy module is designed to centrally manage application update behavior on enterprise devices, ensuring critical apps remain in a stable, controllable version state while preventing unexpected version changes that may disrupt business operations. The platform allows different strategy types based on device types (GMA / KMA / IMA) to suit both Google Play and enterprise app update scenarios.

The platform provides comprehensive configuration options for update policies, including update method (force / prompt / default), network control (WiFi preferred / disable auto-update), and timing control (immediate / scheduled / time window). Admins can precisely control the update schedule and behavior per app, device, or device group to enhance O&M efficiency and terminal stability.

Policy Types:

  • GP App Update Policy: For GMA devices only, supporting Google Play public/private apps;

  • KC App Update Policy: For KMA and IMA devices only, supporting Enterprise Private/Public/Web apps;

  • Supported application types are aligned with the "App Publishing Policy" and only apply to eligible apps.

Update Mechanism:

  • GP App Update Policies are delivered and enforced via Google Play official channels (e.g., AMAPI);

  • KC App Update Policies are distributed by KiwiCloud and enforced on the device side;

  • Policies only apply to published apps; drafts/unpublished apps will not receive updates;

  • If an app is targeted by multiple policies, the system follows the “policy stacking” mechanism (merge across modules, use the latest for duplicates);

  • Apps configured as "Latest Version" will default to "Immediate Update + Force Install + WiFi Preferred";

  • KC App Update Policies allow per-app fine-tuning, such as enabling post-update auto-reboot.

Primary Operations:

Operation

Description

Create GP App Update Policy

Create update policies for GMA devices, supporting Google Play public/private apps with update behavior settings.

Create KC App Update Policy

Create update policies for KMA/IMA devices, supporting Enterprise apps with update controls.

Secondary Operations:

Operation

Description

Submit

Submit draft policies for approval (if enabled) or directly to publishing.

Approve

Approve or reject submitted policies.

Details

View configuration, bindings, delivery status, and logs of a policy.

Edit

Edit an existing published policy, create a new version with full changes.

Deploy Policy

Manually push the policy to devices to ensure prompt enforcement.

Disable / Enable

Control whether the policy takes effect on devices (enters or exits stack).

Archive

Convert disabled policy to archived state, removing all bindings.

Revert

Restore an archived policy to draft for editing and republishing.

Delete

Permanently delete archived policies and remove platform records.

Typical Use Cases:

  • Prevent automatic app updates via Google Play that may disrupt business workflows;

  • Schedule updates during off-hours (e.g., at night or on weekends) to avoid peak impact;

  • Enforce mandatory upgrades for critical apps to ensure version consistency and functionality;

  • Combine with “App Publishing Policy” to manage test vs. production versions;

  • Fine-tune update network strategies (e.g., avoid mobile data usage) per device group.

2. Main Operations

2.1 Create GP App Update Policy

Description

In the App Update Policy module, users can create GP App Update Policies to manage how Google Play apps (public/private) are updated on GMA devices.

Each app can only be associated with one update policy. Policies are executed using a “policy stacking mechanism,” meaning the latest version for each module will apply on the device.

Creating a policy involves four steps:

  1. Select Apps

  2. Configure Update Policy

  3. Set Update Scope

  4. Approve the Policy (if the “App Update Policy Approval” switch is enabled)

After creation, the policy must be submitted before the system will distribute it according to the defined "App Distribution Schedule".

Notes

  • GP App Update Policies only support Google Play Public and Private apps, and can only be applied to GMA-type devices;

  • Each app can only have one update policy. If multiple policies are configured, only the latest version will apply according to the stacking and overwrite mechanism;

  • Policies are not delivered immediately upon creation—they follow the defined "App Distribution Schedule";

  • GP update policies do not include compliance detection or enforcement mechanisms;

  • Once delivered, the policy cannot be revoked from the device.

Steps

1. Select Apps

  • Click [Create App Update Policy] in the upper right to begin;

  • Enter a policy name;

  • Select Google Play apps to manage (only Public/Private apps are supported);

  • Click [Next] to configure update behavior.

image-20250801165459853

2. Configure Update Policy

  • Choose an update mode (Default / Postpone / Immediate):

    • Default: Updates occur only when all of the following are true: the device is idle, connected to unmetered network, charging, and the app is not running in foreground;

    • Postpone: Updates are delayed for up to 90 days, but users may still update manually via the Play Store;

    • Immediate: The system updates apps as soon as possible with no conditions;

  • Click [Next] to configure device scope.

image-20250801165519140

3. Set Update Scope

  • Choose how the policy will be delivered:

    • All Devices: Applies to all GMA devices in the current enterprise;

    • Phased Release: Manually select devices or groups;

    • Percentage Release: Apply the policy randomly to a specified percentage of devices;

  • Set the distribution time:

    • Immediate: Effective as soon as the policy is submitted;

    • Scheduled Time: Choose a specific time to begin delivery;

    • Time Window: Define a time range during which the system will deliver the policy;

  • Click [Submit] to complete the policy creation.

image-20250801165608971

4. Approve the App Update Policy

  1. Go to the policy list page and filter for those in Pending Review status;

  2. Click the [Approve] button;

  1. Choose Approve or Reject;

  2. Once approved, the policy status updates to Published.

image-20250801165655373

2.2 Create KC App Update Policy

Description

The KC App Update Policy is used to control how enterprise public, private, or web apps are updated on KMA / IMA devices. By configuring update methods, setting update conditions, and defining delivery time and scope, enterprises can achieve scheduled updates, silent upgrades, or forced updates. This functionality helps simplify version management and improve consistency and operational efficiency.

Notes

  • Only applicable to KMA / IMA devices. Not supported on GMA devices;

  • Supported app types: Enterprise Private Apps, Enterprise Public Apps, Enterprise Web Apps;

  • Apps must be in Published status to be used in an update policy;

  • Two version update modes are supported:

    • Latest Version: Each time a new version is released, the system updates according to the policy;

    • Specified Version: Updates only apply if the device version is lower than the specified version;

  • Strategy modules must be explicitly enabled. Disabled modules won’t be included in policy stacking;

  • If multiple KC policies exist, they are evaluated by “module merge, latest wins” logic;

  • App auto-start after update only applies to selected apps where this setting is enabled;

  • Distribution plan and device scope can be: Immediate / Scheduled; All Devices / Partial (grey release) / Percent-based;

  • After submission, the policy enters a “Pending Review” state and must be approved (if approval is enabled).

Steps

1. Configure Basic Info

  • Click [Create Policy] and choose "KC App Update Policy";

  • Enter a policy name;

  • In the "Select Apps" step, choose the target enterprise apps;

  • Select the app version (“Latest” or a specific version);

  • Click [Next] to proceed.

image-20250801165846634

2. Configure Update Policy (Choose 1 of 2)

2.1 Enable Modules

  • Enable the “App Update Mode” module to include it in policy stacking;

  • Enable the “Start After Update” module to auto-launch the app after updating.

2.2 Set App Update Mode

  • Update Mode (select one):

    • Default: Only shows available updates in the KC app on the device (no forced update);

    • Prompt: Notifies user via system notification. Update proceeds after user confirms;

    • Force: Updates are executed silently without user interaction;

  • Network Control (select one):

    • Wi-Fi only;

    • Wi-Fi preferred;

    • Allow both mobile and Wi-Fi;

    • Disable auto-update;

2.3 Set Distribution Time

  • Immediate: Updates are triggered as soon as the device receives the policy;

  • Start Time: Updates will be executed at the defined time only if the device receives the command before that time;

  • Time Window: Updates are allowed only within a specific window (daily/weekly).

image-20250801165952134

3. Configure Start After Update (Optional)

  • Enable “Start After Update” and select which apps should auto-launch post-update;

  • Recommended for critical foreground apps like POS or ordering systems.

4. Set Delivery Scope

  • Choose the Device Scope:

    • All Devices: All KMA / IMA devices in the organization;

    • Grey Release: Select specific device groups or devices;

    • Percentage Release: Define a rollout ratio, system randomly assigns devices;

  • Choose Effective Time:

    • Currently only “Immediate” is supported;

  • Click [Submit] to complete creation. The policy enters "Pending Review".

image-20250801170016841

5. Approve and Publish Policy

  • Go to the policy list and filter by Pending Review;

  • Click [Approve];

  • In the popup, click Approve, and the system will deliver the policy immediately or at the scheduled time;

  • After approval, policy status becomes Published.

image-20250801170102122

3. Secondary Actions

3.1 Submit

Description

This action is used to submit an app update policy in draft status to the platform's approval workflow. After submission, the policy status changes to “Pending Review,” and must be approved by an administrator (if the “App Update Policy Approval Process” switch is enabled). Only after approval will the policy be delivered and take effect.

Drafts typically come from newly created policies or edits to previously published versions. Once submitted, the policy enters the formal lifecycle management process.

Notes

  • Only policies in “Draft” status can be submitted;

  • If the platform has not enabled the approval process, submission will immediately change the policy status to “Published,” bypassing review;

  • Submission is irreversible. Ensure the policy content is correct before proceeding;

  • Submitted policies cannot be edited directly. Use the “Edit” function to create a new version if changes are needed;

  • Once submitted, the policy will be distributed according to the configured update schedule and device scope.

Steps

  1. Go to the App Update Policy module

    • Open the “App Update Policy” module;

    • Filter the list to show policies with “Draft” status.

  2. Click Submit

    • Locate the target policy and click the “Actions” button on the right;

    • Select Submit from the dropdown. The system will proceed immediately without further confirmation.

image-20250801183524059

3. Status Update

  • After successful submission, the policy status updates to “Pending Review”;

  • If approval is not enabled, the system will automatically mark the policy as “Published” and begin distributing it per the delivery schedule;

  • Submission events are automatically recorded in the operation log.

3.2 Approve

Description

This action is used to approve a submitted app update policy. Once approved, the policy status changes to “Published” and will be delivered to target devices based on the configured update schedule and scope. If the policy is rejected, it reverts to “Draft” status for further editing and resubmission.

This operation is part of the App Update Policy Approval Process, applicable to organizations where approval is enabled. All approval actions are logged for audit purposes.

Notes

  • Only policies with “Pending Review” status can be approved;

  • If the approval process is not enabled, the policy will automatically become “Published” upon submission, bypassing this step;

  • Approval actions are irreversible — verify policy content before proceeding;

  • Once approved, the policy takes effect immediately and cannot be delayed;

  • If rejected, the policy reverts to “Draft” status and must be modified and resubmitted;

  • All approval actions are logged and traceable through the operation log.

Steps

  1. Go to the App Update Policy module

    • Filter the list to display policies with “Pending Review” status;

    • The [Approve] button will appear in the Actions column for each policy.

  2. Click “Approve”

    • A confirmation dialog will appear showing policy details and approval options.

image-20250801183558943

3. Select an approval result

  • Click Approve: The policy status updates to “Published,” and the system will distribute it according to the delivery plan.

  • Click Reject: The policy reverts to “Draft” and must be edited before resubmission.

image-20250801183615315

4. Review approval result

  • The result will be reflected in the policy list immediately;

  • Approval records can be viewed in the Operation Log.

3.3 Details

Description

This feature allows you to view the detailed information of an App Update Policy, including basic configuration, associated apps, execution parameters, target devices, version history, execution status, and operation logs. It supports version switching to review historical versions for auditing, troubleshooting, and comparison.

Details are available for all types of update policies (GP / KC) and all statuses (Draft, Published, Disabled, Archived).

Steps

1. Access Policy Details

  • Open the App Update Policy module;

  • Locate the target policy and click the [Details] button in its row.

2. Review Basic Information

The top section shows key metadata for the policy:

  • Policy name and ID;

  • Current version (with dropdown to switch versions);

  • Creator, last modified time, and update time;

  • Number of associated apps, devices, and device groups.

image-20250801183653879

3. Browse Tabs

The policy detail page includes multiple tabs to display various modules:

Associated Apps

Displays all apps linked to the policy, including:

  • App name and icon;

  • Package name;

  • Category (business tag);

  • Source (Enterprise Private / Public / Web App / Google Play Public / Private App);

  • Version (e.g., “Latest” or specific version);

This section helps verify the policy’s scope and update targets.

image-20250801184109573

Policy Configuration

Shows the main configuration details, such as:

  • Update Mode: Default / Prompt / Force;

  • Update Control Method: e.g., Disable auto update, WiFi only, etc.;

  • Distribution Schedule: Immediate, Scheduled Time, or Time Window;

  • Auto Launch After Update: Whether enabled and list of apps.

This tab highlights how the policy will behave on the device.

image-20250801184123343

Deployment Settings

Displays the delivery method and scope, including:

  • Update Schedule (Immediate / Scheduled);

  • Device Scope: by group or individual devices;

  • Device list: includes name, model, SN, group info.

Useful for verifying the accuracy of policy targeting.

image-20250801184139464

Installation Progress

Displays real-time app installation status post-deployment. Information includes:

  • Status of Required and Whitelisted Apps;

  • For Required Apps: shows the number of required devices and actual installations, supports exporting the delta list;

  • For Whitelisted Apps: shows how many devices currently have the app installed;

  • Supports filtering by app name, package name, device name, or serial number.

image-20250801184151025

Operation Log

Logs all user-initiated actions on the policy, such as:

  • Actions: Submit, Approve, Edit, Disable, Enable, etc.;

  • Operator and timestamp;

  • Execution result (Success / Failure);

Essential for auditing and tracking policy changes.

image-20250801184202852

System Log

Logs system-initiated actions, including:

  • Policy push operations;

  • App update triggers;

  • Retry logic;

  • Error details;

Helpful for troubleshooting and root cause analysis.

image-20250801184215934

3.4 Edit

Description

This operation allows you to edit a published app update policy, including adjusting the policy name, associated apps, update method, distribution settings, and device scope. Each modification automatically creates a new version, while the original version is retained as a read-only historical record.

The updated policy can be saved as a draft or submitted directly for approval. Once the new version is published, it will automatically replace the previous version and be pushed to target devices, ensuring configuration consistency.

Notes

  • Only policies in Published status can be edited; Draft, Disabled, and Archived statuses are not editable.

  • Each edit creates a new policy version; previous versions become read-only.

  • Review the current policy impact and related devices before editing to avoid unintentional changes.

  • Edited policies must be resubmitted and approved (if approval is enabled) to take effect.

  • You can save your edits as a draft at any time before submission.

  • All modifications are logged in the Operation Log and Version History.

Steps

  1. Access the Policy List

    • Open the App Update Policy module;

    • Locate the target policy with “Published” status, click the [Actions] dropdown, and select [Edit].

  2. Edit Policy Content

    You will be guided through a three-step edit process:

    Step 1: Select Apps

    • Optionally modify the policy name;

    • Re-select the associated apps and specify the target version for each app (Latest or a specific version);

    Step 2: Configure Update Strategy

    • Choose an Update Mode: Default / Prompt / Force;

    • Configure the Update Control Method: e.g., Disable Auto-Update, WiFi Preferred, etc.;

    • Set the Distribution Schedule: Immediate / Scheduled / Time Window;

    • Optionally enable Auto Launch After Update, and select the apps to launch post-update;

    Step 3: Define Target Devices

    • Set the policy’s target range: All Devices, Phased Rollout, or Percentage-Based;

    • Select specific devices from the list if needed;

  3. Save and Submit

    • Click [Submit] to create a new version, which will enter Pending Review status;

    • If approval is not required, the policy will immediately switch to Published and be pushed to devices;

    • Alternatively, click [Save] to retain changes as a draft for later editing;

  4. Version Management & Activation

    • Once the new version is effective, it automatically replaces the old version on all target devices;

    • You can view and compare version changes in the policy’s detail page;

    • All changes are logged in the Operation Log for audit purposes.

3.5 Deploy Policy

Description

This operation is used to immediately push a published app update policy to target devices or device groups, ensuring timely delivery and execution on the device side. It is useful in scenarios such as manually triggering synchronization after publication, fixing policy exceptions, or enforcing updates urgently.

The platform will invoke different execution mechanisms depending on the policy type and device type to ensure accurate and effective policy delivery.

Notes

  • Only policies in Published status can be pushed. Policies in Draft, Pending Review, Disabled, or Archived status cannot be pushed.

  • For KC App Update Policies, if no configuration changes are detected or the device is in normal status, the system may skip redundant push actions.

  • For offline devices, the policy will be automatically pushed once the device comes online — no repeated action is needed.

  • When policy stacking is applied, the final configuration is calculated using module-level merge and latest override for the same module.

  • IMA devices cache push instructions for a limited time; if exceeded, re-push is required.

  • All push actions are recorded in the Operation Log and System Log for traceability.

Steps

  1. Go to the Policy List Page

    • Open the App Update Policy module;

    • Locate a policy in “Published” status and click [Actions] > [Deploy Policy] from the actions column.

  2. Confirm Push Action

    • A confirmation dialog will appear showing the policy name and push details;

    • Click [Confirm] to proceed, or [Cancel] to abort the action.

  3. Execution & Result Feedback

    • The system immediately issues the push command to all bound devices;

    • This action is logged in the Operation Log, including operator, time, and result;

    • Device status will be updated under the Install Progress and System Log tabs in the policy detail page.

3.6 Disable Policy

Description

The Disable Policy action is used to change a published app update policy to Disabled status. Once disabled, the platform will immediately remove the corresponding update policy module from the strategy stack on all associated devices, making the policy no longer effective on the device side.

The binding relationship between the policy and devices will be retained, allowing future actions such as Enable or Archive, without erasing historical associations or configurations.

Notes

  • Only policies in Published status can be disabled.

  • Once disabled, all update rules defined in the policy will stop taking effect on the device side.

  • Associated devices will trigger a recalculation of the policy stack and may automatically apply a default policy (if configured).

  • Disabling a policy does not delete its contents or version history.

  • The policy can be re-enabled later via the Enable Policy action.

  • All disable actions are logged in the Operation Log for auditing and tracking.

Steps

  1. Enter the App Update Policy Module

    • Open the App Update Policy list and confirm that the target policy is in “Published” status.

  2. Click Disable

    • Click the [Actions] button on the target policy row and select [Disable Policy].

  3. Confirm Disable

    • A confirmation dialog will appear;

    • Click [Confirm] to proceed, or [Cancel] to abort the action.

  4. System Execution

    • The policy status will be updated to Disabled;

    • The platform will remove all corresponding module configurations from the strategy stack on all bound devices.

  5. Recommended Follow-up

    • If you need to reactivate the policy later, use the Enable Policy function;

    • Check the Operation Log for execution time, user, and status;

    • Use the Install Progress and System Log tabs to verify actual device-side behavior after disabling.

3.7 Enable Policy

Description

The Enable Policy action is used to restore a previously Disabled app update policy back to the Published state. Once enabled, the platform will reintegrate the policy into the update strategy stack of its bound devices or device groups and immediately deliver the configuration, resuming its control on the device side.

This operation is suitable for scenarios such as reusing a previously tested policy, reactivating a temporarily disabled policy, or restoring a previous version for continued use.

Notes

  • Only policies in Disabled status can be enabled.

  • Once enabled, the policy status changes to Published without requiring resubmission or approval.

  • Enabling does not modify the policy content or version number.

  • The configuration will be re-issued to bound devices, which may trigger update actions.

  • For offline devices, the strategy will be cached and applied automatically when the device comes online.

  • All enable actions are recorded in the Operation Log for auditing purposes.

Steps

  1. Go to the Policy List Page

    • Open the App Update Policy module.

    • Filter the list to show policies in Disabled status.

  2. Click Enable

    • Locate the target policy, click the [Actions] button on the right, and select [Enable Policy].

  3. Confirm Enable

    • A confirmation dialog will appear, showing the policy name and a prompt.

    • Click [Confirm] to proceed or [Cancel] to abort.

  4. System Execution

    • The policy status is immediately updated to Published.

    • The platform reintegrates the policy into the stack for all bound devices.

    • Based on module merge rules, the system recalculates the final configuration and pushes it to devices.

    • The enable action is logged in the Operation Log, including operator, timestamp, and result.

  5. Recommended Follow-up

    • Go to the policy’s Details page to check Install Progress and System Logs for confirmation.

    • If updates are not executed immediately, check device online status or use Deliver Policy to force a re-push.

3.8 Archive Policy

Description

The Archive action is used to convert an app update policy in the Disabled state to Archived. Once archived, all bindings with devices, device groups, and applications will be removed. The policy will no longer participate in any device-side strategy stack or update operations and will be retained as a historical version for future viewing, restoration, or deletion.

This action is suitable for retiring outdated policies after version iterations or cleaning up deprecated strategies after their lifecycle ends.

Notes

  • Only policies in the Disabled state can be archived.

  • Archiving will permanently remove all bindings with devices, groups, and apps and cannot be undone.

  • Archived policies can still be restored to Draft status using the Restore action for reuse.

  • Please proceed with caution—archiving is irreversible.

  • All archive actions are logged in the Operation Log for audit tracking.

Steps

  1. Go to the Policy List Page

    Open the App Update Policy module and filter for policies in the Disabled status.

  2. Click Archive

    Locate the target policy, click the [Actions] button on the right, and select [Archive].

  3. System Execution

    • The platform will remove all bindings between the policy and its associated devices, groups, and apps.

    • The policy status will change to Archived and appear under the Archived tab.

  4. Recommended Follow-up

    • If you need to reuse the policy, go to the Archived list and select Restore to convert it back to a draft.

    • All versions, logs, and execution records of the archived policy remain accessible for auditing and reference.

3.9 Revert

Description

The Revert action allows you to revert an Archived app update policy back to Draft status for further editing and reuse. This operation does not alter the original configuration, and all version history and identifiers are preserved. It is ideal for quickly reusing previously retired strategies.

After restoration, the policy status changes to Draft, enabling you to continue the full lifecycle including editing, submission, and approval.

Notes

  • Only policies in Archived status can be restored.

  • Restoration does not automatically reinstate the original bindings with devices, groups, or apps—these must be reconfigured manually.

  • The restored policy returns to Draft status and can be edited and submitted as a new version.

  • All restore actions are recorded in the Operation Log for auditing and tracking.

  • It is recommended to verify and update the configuration immediately after restoring to avoid applying outdated settings.

Steps

  1. Open the Archived Policy View

    Navigate to the App Update Policy page and click the [Archived] tab at the top to switch to the archived policy list.

  2. Execute the Restore Action

    Find the target policy and click the [Actions] button on the right, then select [Revert].

  3. System Execution Result

    • The policy status is immediately updated to Draft and moved to the All policies list.

    • Original configuration remains unchanged, but bindings with devices and groups must be reconfigured.

    • You may continue editing and submitting the policy for approval and publishing.

  4. Recommended Follow-up

    • Verify and update configurations and bindings before submitting.

    • You can review the restore action and operator details in the Operation Log.

3.10 Delete

Description

The Delete action permanently removes an Archived app update policy from the system. This is a logical deletion—once deleted, the policy will no longer appear in any list or view and cannot be restored. It is intended for cleaning up invalid, deprecated, or historical policies to keep the policy list clear and organized.

Deletion is irreversible, so it should only be performed when the policy is confirmed to have no further use.

Notes

  • Only policies in Archived status can be deleted.

  • This is a logical deletion: the platform will remove the policy's visibility from both the UI and API.

  • Deleted policies are permanently removed—they cannot be restored, viewed, or reverted to draft.

  • Deletion does not impact devices that have already received the policy; it does not retroactively remove past deployments.

  • All delete actions are fully recorded in the Operation Log for audit purposes.

Steps

  1. Open the Archived Policy List

    Go to the App Update Policy module and click the [Archived] tab at the top to enter the archived policy view.

  2. Initiate Delete Operation

    Locate the target policy, click the [Actions] button, and select [Delete].

  3. Confirm Deletion

    A confirmation dialog will appear. Click [Confirm] to execute the deletion, or [Cancel] to abort.

  4. System Execution and Result

    • The policy is immediately removed from both All and Archived lists and cannot be recovered.

    • The deletion is logged in the Operation Log for future reference.

  5. Post-action Recommendations

    • Before deleting, ensure the policy is not in use and will not be reused.

    • If the policy should be retained temporarily, consider using Disable or Archive instead.

4. Configuration Reference

Policy configuration items are divided into two categories based on the policy type (GP App Update Policy / KC App Update Policy). All policy settings are pushed to devices using module-level merging logic:

  • Across different modules: configurations are merged and applied together;

  • Within the same module: the latest bound policy module takes precedence.

Note: KMA app update policies are backward-compatible with IMA devices.

4.1 GP App Update Policy Configuration Items

Item

Description

App Selection

The policy supports selecting Google Play public and private apps as update targets. These app types do not support version selection and will always use the "latest" version mode.

Multiple apps can be linked to a single policy, but each app can only be associated with one active update policy configuration at a time. Ensure all selected apps are in the Published state before creating the policy.

Update Behavior

Defines how updates are triggered on the device. Supported modes:

Default Update: Updates only occur when the device meets all of the following: it's idle, connected to an unmetered network, charging, and the target app is not running in the foreground.

Postponed Update: Apps will not auto-update for up to 90 days after a new version is available. Users can still manually update via Play Store.

Immediate Update: The system performs updates as soon as possible without any restrictions.

Distribution Schedule

Controls when the policy takes effect on target devices. Options:

Immediate: Policy is pushed right after submission.

Start Time: Updates are executed at a scheduled time.

Time Window: Defines daily or weekly time slots when updates may be performed. Useful for limiting updates to off-business hours.

Target Devices

Defines the scope of policy delivery:

All Devices: All GMA-type devices under the enterprise.

Phased Rollout: Select specific device groups or individual devices.

Percentage-based Deployment: Apply to a random percentage of devices based on the total device pool.

4.2 KC App Update Policy Configuration Items

Item

Description

App Selection

Supports selecting Enterprise Public Apps, Enterprise Private Apps, and Enterprise Web Apps. All apps must be in Published status. You can set the update target per app as:

Specific Version – The system triggers an update only if the device has a lower version;

Latest Version – The system will automatically execute updates according to the policy once a new version is available.

App Update Behavior Module

When enabled, this module allows the following settings:

Update Behavior:

 - Default: Only displays available update info in the KC App → Apps section;

 - Prompt: Shows update notification in the device's notification bar, requiring user confirmation;

 - Force: Automatically installs updates silently in the background with no user interaction;

Update Control Method:

 - Wi-Fi only / Wi-Fi preferred / Mobile & Wi-Fi allowed / Disable auto-update;

Update Schedule:

 - Immediate / Start time / Time window to control when updates are executed.

Launch After Update Module

When enabled, this allows selected apps within the policy to automatically launch after an update is completed. This is suitable for front-end business apps like POS, ensuring business continuity by auto-launching the updated app.

Policy Distribution Time

Currently supports only immediate effect. Once the policy is approved (if approval is enabled), it will be pushed to target devices immediately. Future versions may support scheduled deployment.

Target Device Scope

Defines which devices receive the policy. Options include:

All Devices – All KMA and IMA devices under the enterprise;

Phased Rollout – Choose specific device groups or individual devices for fine-grained control;

Percentage-based Rollout – Randomly apply the policy to a defined portion (e.g., 10%, 50%) of enterprise devices in phases.

Did this answer your question?