Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Gorbiabimanyu
Employee Alumnus
Employee Alumnus

Endpoint Compliance Blade Real-world Use Cases

Hi,

Based on sk162635, CP endpoint compliance capabilities are :

  • All assigned Software Blades are installed and running on the endpoint computer.
  • Anti-Malware is running and that the engine and signature databases are up to date.
  • Required operating system service packs and updates are installed on the endpoint computer.
  • Only authorized programs are installed and running on the endpoint computer.
  • Required registry keys and values are present.

 

Can anybody share any experience on implementing compliance blade on the customer? what are the specific checks/use cases that were implemented on the customer side? 

 

Like for example, I noticed that CP can check the presence of a certain registry keys/values. But what keys and values are usually checked? 

0 Kudos
1 Reply
G_W_Albrecht
Legend Legend
Legend

Why did you post this in Harmony > Remote Access VPN ? Can you move this to somewhere it fits ?

CCSP - CCSE / CCTE / CTPS / CCME / CCSM Elite / SMB Specialist
0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events