Generating App Reputation Reports

You can generate reports that display information about the breakdown of all apps reported within the organization.

To generate an App Reputation report:

  1. Log in to the SecureAnywhere website.
  2. Click the Go to Mobile Protection button.

    The Mobile Protection console displays with the Status tab active.

  3. Click the Reports tab.

    The Reports tab displays.

  4. In the Select your report column, select App Reputation.

    If needed, click the Expand arrow to expand the Alerts and Infections tree.

  5. Select any of the following reports:
    • App Reputation Distribution — View the status of each app, broken down by reputation, as described in the following table.
    • Android - Top Installed Apps — View the top ten installed Android apps, including its reputation.
    • iOS - Top Installed Apps — View the top ten installed iOS apps, including its reputation.

    The following table describes the app reputation definitions. You can rearrange the order of the distributions, as needed.

    FIELD

    DESCRIPTION

    Benign

    The application is non-whitelisted, contains no dangerous permissions and has received favorable scores from machine classifiers.

    Malicious

    The application was detected as a threat such as Trojan, Rootkit, etc., by Webroot definitions.

    Moderate

    The application does not seem to be suspicious, but contains dangerous permissions such as Send, SMS, Call Phone, etc.

    Moderate**

    This value is returned in a special case when reputation is computed based on package name, that is, no md5 information is available, and means that both malicious and whitelisted application have been found with the same package name.

    Suspicious

    The application has not triggered any definitions but has received machine classifiers in the malicious and unwanted range.

    Trustworthy

    The application displays in our whitelist and is safe to use.

    Unknown

    The application is detected as a Potentially Unwanted Application, or PUA. A PUA is not malware but has unwanted characteristics which may include, aggressive ads and popups, intrusive privacy policies, marketing to contacts, etc.

  1. Do either of the following, as needed:

    • To display specific devices, enter your query in the Search field at the top of the list.
    • To see more information about a specific item, double-click the entry.
  1. When you're done, click the Close button in the Report tab to exit.