/

Understand how Monitor actions work

Monitor actions define how your application responds when a protection module detects a threat. Each module can be assigned its own action, so you can log low-confidence detections, terminate the application for critical threats, or execute custom logic for enterprise workflows.


Action Types

SDK Actions

These actions are available in JSON configuration and the Configuration API. They execute inside the application at the point where the threat is detected.

ActionBehaviorUse Case
CloseTerminates the application immediatelyCritical threats (debugger attached, tampering detected)
LogRecords the incident and continues executionNon-critical threats, monitoring, analytics
EraseSecurely deletes sensitive data, then terminatesFinancial or healthcare applications on compromised devices
CustomExecutes your own async handlerSIEM integration, Slack alerts, custom escalation workflows
NoneDetects the threat but takes no actionDevelopment, testing, shadow mode before enforcing

Cloud Dashboard Actions

These actions are available when configuring Workflow Rules in the Cloud Dashboard. They extend the SDK actions with server-side responses.

ActionBehaviorUse Case
Log incidentRecords the incident with full forensic contextAudit trail, compliance, analytics

ByteHide Monitor workflow rules showing IF/THEN configuration for threat detection with Log actionsClick to expand


Action Selection Guide

By Threat Severity

Threat SeverityDevelopmentStagingProduction
Critical (Debugger, Tampering)None / LogCloseClose
High (Jailbreak, Memory Dump)LogCloseClose / Erase
Medium (Simulator, Process Injection)NoneLogLog / Close
Low (Clock Tampering, Network Tampering)NoneLogLog

Common Scenarios

ScenarioActionWhy
Debugger attached in productionCloseImmediate shutdown to prevent reverse engineering
Simulator detected on release buildLogTrack for analytics, block in enterprise settings
Jailbreak on a banking appCloseRegulatory requirement, compromised device cannot be trusted
Tampering detected with sensitive dataEraseDelete Keychain items and credentials before shutting down
New protection in shadow modeNoneObserve detections before enforcing in production
Memory dump attempt detectedEraseWipe sensitive data immediately, terminate the app
Network proxy detectedCustomShow user warning, allow continue or exit based on context

Configuring Actions

Actions can be assigned per protection module from any configuration source:

JSON
{
  "protections": [
    { "type": "DebuggerDetection", "action": "close", "intervalMs": 5000 },
    { "type": "JailbreakDetection", "action": "close", "intervalMs": 60000 },
    { "type": "NetworkTampering", "action": "log", "intervalMs": 30000 }
  ]
}

See JSON Configuration for the full schema reference.


Next Steps

Protection Modules

All available protection modules and what they detect

Custom Actions

Create custom response handlers for enterprise workflows

Cloud Configuration

Configure Workflow rules from the Cloud Dashboard

JSON Configuration

Full schema reference for per-module action configuration

Previous
Anomaly Detection