Determine whether to allow the use of jailbroken or rooted devices.
You might want to block rooted and jailbroken devices as they can be more vulnerable to attacks.
Note:
Detection checks for rooted and jailbroken devices are updated periodically, in line with the latest protection against vulnerabilities.