Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Gorbiabimanyu
Employee Alumnus
Employee Alumnus

Endpoint Compliance Blade Real-world Use Cases

Hi,

Based on sk162635, CP endpoint compliance capabilities are :

  • All assigned Software Blades are installed and running on the endpoint computer.
  • Anti-Malware is running and that the engine and signature databases are up to date.
  • Required operating system service packs and updates are installed on the endpoint computer.
  • Only authorized programs are installed and running on the endpoint computer.
  • Required registry keys and values are present.

 

Can anybody share any experience on implementing compliance blade on the customer? what are the specific checks/use cases that were implemented on the customer side? 

 

Like for example, I noticed that CP can check the presence of a certain registry keys/values. But what keys and values are usually checked? 

0 Kudos
1 Reply
G_W_Albrecht
Legend
Legend

Why did you post this in Harmony > Remote Access VPN ? Can you move this to somewhere it fits ?

CCSE CCTE CCSM SMB Specialist
0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    Tue 23 Apr 2024 @ 11:00 AM (EDT)

    East US: What's New in R82

    Thu 25 Apr 2024 @ 11:00 AM (SGT)

    APAC: CPX 2024 Recap

    Tue 30 Apr 2024 @ 03:00 PM (CDT)

    EMEA: CPX 2024 Recap

    Thu 02 May 2024 @ 11:00 AM (SGT)

    APAC: What's new in R82

    Tue 23 Apr 2024 @ 11:00 AM (EDT)

    East US: What's New in R82

    Thu 25 Apr 2024 @ 11:00 AM (SGT)

    APAC: CPX 2024 Recap

    Tue 30 Apr 2024 @ 03:00 PM (CDT)

    EMEA: CPX 2024 Recap

    Thu 02 May 2024 @ 11:00 AM (SGT)

    APAC: What's new in R82
    CheckMates Events