Deep Compliance
Administrators can find the Deep Compliance section under Policies > Endpoint Security. It consolidates device issues into categories. Administrators can enable warning or critical alerts by selecting the designated box under each category. This will reflect the device's compliance status in My OPSWAT Central Management.
The following categories are available under the Deep Compliance section of a policy:
- Anti-Malware - Ensure devices have anti-malware protection optimally configured.
- Encryption - Verify device data is encrypted and check for approved encryption applications.
- User Authentication - Permit resource access to devices with users that have established layers of authentication.
- Anti-phishing - Prevent phishing links and fraudulent attacks to protect company data.
- Data Loss Prevention - Check for data loss prevention applications to ensure data protection.
- Backup - Monitor backup activity and applications on devices for data management.
- Firewall - Ensure devices have the firewall enabled.
- Hard Drive - Track hard drive storage space on managed devices.
- Operating System - Track operating system versions and monitor reboot schedules on devices.
- Custom Check - Upload a custom script to validate for returned values and determine compliance status.
- Playbooks - Assign playbooks to this policy to enable tasks and actions to be performed on managed devices.
- Peer-to-Peer (P2P) - Detect peer-to-peer applications and alert the running state of those applications on client devices.*
- Communication Tools - Detect communication application and alert the running state of those applications on client devices. *
- Potentially Unwanted Applications - Protect your device from low-reputation applications that might cause unexpected behaviors.
- Security & Health (Mobile) - Prevent personal and business information on your mobile device from being compromised.
- Geofencing - Ensure devices' local location approved.
When these categories are enabled in Deep Compliance, they are disabled in Application Control. For more information, please click here.
Once an Administrator has set their customized checks in their policy, they can review a device's detail page to find the results of it's compliance check based on these categories.
Was this page helpful?