Mapping a Zone to a Specific Setting

After creating geofence zones and defining settings, the next step is to map a zone to a specific setting. This mapping links a physical location (zone) with the geofencing behavior (setting) — determining what policies or actions are triggered when a device enters or exits that zone.

Purpose of Mapping a Zone

Mapping ensures that:

  • The right geofence setting (which includes entry and exit rules) is applied to the correct geofence zone (defined by coordinates or radius).

  • Devices associated with that zone automatically follow the configured policies when they move in or out of it.

Essentially, the zone defines where geofencing applies, while the setting defines what happens there.

How to Map a Zone to a Setting

You can perform this mapping from the Deploy Zones and Settings section in the WebUI.

  1. Navigate to Admin → Geofencing → Deploy Zones and Settings.

  2. Click Create Deployment.

  3. From the dropdown list, select the Zone you want to map.

    • The zone must already exist under Manage Geofence Zones.

  4. Next, choose the Geofence Setting you want to associate with that zone.

    • This setting defines the entry and exit policies that should apply to devices.

  5. Select the target devices or groups to which this deployment applies.

    • You can choose specific devices, smart groups, or user roles.

  6. Review the configuration and click Deploy.

Once deployed, the selected devices will automatically enforce the mapped rules based on their real-time location.

How the Mapping Works

After deployment:

  • The system continuously monitors the device’s location through the MDM agent.

  • When a device enters the defined geofence zone:

    • The entry rules from the associated setting are triggered (for example, enabling Wi-Fi or unlocking business apps).

  • When the device exits the zone:

    • The exit rules are applied (for example, disabling camera or removing confidential profiles).

This mapping creates a seamless link between location awareness and policy automation, ensuring devices always comply with organizational requirements.

Example Scenario

Use Case: An IT admin wants to apply stricter security policies when devices leave the company campus.

Implementation Steps:

  1. Create Zone: Define a geofence around the company campus.

  2. Create Setting: Configure an exit policy that disables camera and VPN when leaving the area.

  3. Map Zone to Setting: Deploy the setting to all employee devices.

Outcome: When an employee’s device moves outside the campus zone, the mapped setting automatically applies the exit policy, ensuring sensitive data remains protected.