Hexnode UEM automates iOS fleet management by enabling the silent and remote execution of commands including Lock, Wipe, Restart, OS Updates, and many more. By replacing manual tasks with scheduled workflows and conditional triggers, it ensures continuous security compliance and rapid incident response across all managed devices without user disruption.
Device Control: Administration Essentials
| Action Name |
Definition |
Use Case: Why Automating this Action Helps |
| Power Off |
Shuts down the iOS device remotely. |
After-Hours Security: Automatically powering off iPads in retail or schools at day-end reduces fire risk and battery degradation while preventing unsupervised use. |
| Restart Device |
Triggers an immediate reboot of the device. |
Stability Maintenance: Scheduling weekly automated restarts clears background processes and system cache, keeping shared-use iPads responsive and bug-free. |
| Rename Device |
Changes the name of the device on the hardware level. |
Standardized Assets: Automatically renaming devices to match Serial Numbers or Asset Tags during enrollment keeps the network and portal organized without manual editing. |
| Set Friendly Name |
Assigns a custom label in the Hexnode portal. |
Inventory Clarity: Using wildcards (like %user%) to automate names allows admins to instantly identify devices in the console based on the current assignee. |
| Clear Password |
Removes the current lock screen passcode. |
Seamless Turnover: Automating a passcode clear when moving a device to “Repair” allows IT to access and wipe the hardware without needing the former user’s PIN. |
| Clear Media |
Removes managed media files (music, videos) from the device. |
Storage Optimization: Automatically clearing large media files when storage reaches 90% ensures critical business apps have the space needed to function. |
| Change Owner |
Reassigns the device to a different user in the UEM. |
Automated Transitions: When HR status changes, automation updates the owner, triggering the removal of old profiles and the push of new department settings. |
| Change Ownership |
Switches status between Personal (BYOD) and Corporate. |
Privacy Enforcement: Automatically switching a device to “Corporate” based on serial number ensures the correct management level is applied immediately upon enrollment. |
| Clear Activation Lock |
Bypasses the iCloud Activation Lock on the device. |
Asset Repurposing: Automating this during offboarding ensures that if an employee leaves without signing out, IT can reset and redeploy the device without being locked out. |
| Update OS |
Deploys the latest iOS/iPadOS updates over-the-air. |
Security Compliance: Scheduling automated updates for 2 AM ensures the fleet stays patched against zero-day vulnerabilities without interrupting the workday. |
| Edit Device Attributes |
Modifies metadata like Asset Tag, Department, or Notes. |
Data Synchronization: Automating attribute updates based on group movement keeps asset records accurate and up-to-date without manual data entry. |
Policy: Compliance Rules
| Action Name |
Definition |
Use Case: Why Automating this Action Helps |
| Associate Policy |
Links a specific configuration or security policy. |
Context-Aware Security: Automation can apply a restrictive “High Security” policy the moment a device joins an unsecured public Wi-Fi, protecting data in real-time. |
| Remove Policy |
Detaches an existing policy from the device. |
Role-Based Flexibility: Automatically removing restricted policies when a device enters a “Safe Zone” (like the home office) allows users to access more features while on-site. |
Scans: Status Checks
| Action Name |
Definition |
Use Case: Why Automating this Action Helps |
| Scan Device |
Refreshes general device info (battery, storage, compliance). |
Proactive Monitoring: Scheduling automated scans every 4 hours ensures the admin portal always has an accurate view of device health for reporting. |
| Scan Device Location |
Fetches the instantaneous GPS coordinates. |
Lost Device Tracking: Automating location scans every 15 minutes for field devices provides a reliable movement history, vital for locating lost hardware. |
| Scan for Apps |
Updates the list of all installed applications. |
Shadow IT Detection: Automating daily app scans helps identify unauthorized or malicious apps instantly, triggering non-compliance alerts automatically. |
Security: Data Protection
| Action Name |
Definition |
Use Case: Why Automating this Action Helps |
| Lock Device |
Instantly forces the device to the lock screen. |
Immediate Theft Response: Automating a lock command if a device leaves a “Work Zone” ensures sensitive data is shielded the moment the hardware leaves control. |
| Enable Lost Mode |
Locks the device and displays a custom message/contact info. |
Asset Recovery: Triggering Lost Mode automatically when a “Missing” flag is set renders the device useless to a thief while showing the finder return instructions. |
| Disable Lost Mode |
Restores normal functionality once the device is found. |
Employee Productivity: Automating the disablement of Lost Mode when the device reconnects to corporate Wi-Fi allows the user to resume work instantly. |
| Wipe Device |
Erases all data (Corporate Wipe or Factory Reset). |
Emergency Data Defense: In a severe security breach (like a SIM swap), automation triggers a full wipe to destroy corporate secrets before they are accessed. |
| Remote Ring |
Forces the device to play a loud sound even if on silent. |
Audit Speed: Automating a ring during a physical inventory audit helps staff quickly locate devices hidden in drawers or misplaced in the office. |
| Hexnode App Logs |
Requests diagnostic logs from the Hexnode UEM app. |
Faster Troubleshooting: Automating log collection when a “Policy Failure” occurs gives IT the technical data needed to fix issues before the user even reports them. |
| Delete Location History |
Wipes movement history stored in the UEM. |
Privacy Law Compliance: Automating the deletion of location history when a device is reassigned ensures previous user data is purged per privacy regulations. |
Network: Connectivity Control
| Action Name |
Definition |
Use Case: Why Automating this Action Helps |
| Enable Data Roaming |
Turns on cellular data for international travel. |
Travel Readiness: Automating roaming when a device is detected at an international airport ensures employees stay connected without calling IT for help. |
| Disable Data Roaming |
Turns off cellular data for international travel. |
Bill Shock Prevention: Automating roaming disablement when a device exceeds a cost threshold prevents massive, unexpected carrier charges. |
| Enable Personal Hotspot |
Turns on the device’s Wi-Fi hotspot feature. |
Remote Work Support: Automatically enabling the hotspot for traveling staff allows them to connect laptops to the internet seamlessly while on the move. |
| Disable Personal Hotspot |
Turns off the device’s Wi-Fi hotspot feature. |
Data Security: Automating hotspot disablement when a device leaves a “Trusted Network” prevents unauthorized third parties from using the corporate data plan. |
| Update SIM (eSIM) |
Remotely activates or updates an eSIM cellular plan. |
Carrier Deployment: Automating eSIM updates allows IT to deploy new data plans to hundreds of devices simultaneously without physical SIM card swaps. |
Alerts: Instant Notifications
| Action Name |
Definition |
Use Case: Why Automating this Action Helps |
| Broadcast Message |
Sends a pop-up text notification to the device screen. |
Urgent Alerts: Automating broadcast messages for office emergencies or system downtime ensures 100% of the fleet is notified instantly. |
App Management: Software Control
| Action Name |
Definition |
Use Case: Why Automating this Action Helps |
| Install Application |
Remotely pushes a new app for installation. |
Day-One Readiness: Automating app installs the moment a user is added to a department group ensures they have every tool ready for their first day. |
| Uninstall Application |
Removes a specific managed app from the device. |
Compliance Cleanup: Automatically uninstalling “Blacklisted” apps (like unauthorized games) ensures the device remains a professional tool. |