Browser Compliance

About Browser Compliance

Organizations must ensure device compliance with industry-specific and internal security standards to safeguard their operational integrity. These standards define the criteria for device compliance within the organization. Endpoint Central provides compliance standards to help meet these requirements. These standards must be configured and distributed to devices, and end-users cannot modify them. IT admins must enforce compliance to maintain a secure and regulated environment.

The Compliance tab provides a detailed overview of the computers compliant with each of the compliance policies.

Browser Compliance

Compliance Reports

Endpoint Central generates comprehensive compliance reports based on predefined criteria designed to mitigate security risks. A device's adherence to these criteria is evaluated through a security score. This score categorizes devices into the following risk levels:

  • Highly Vulnerable: Devices with critical compliance gaps.
  • Vulnerable: Devices with significant compliance deficiencies.
  • Low-Risk: Devices with minor compliance issues.
  • Secure: Devices that fully meet all compliance requirements.

    Compliance Reports

Create Compliance Policy

Compliance reports are initially generated based on 30 predefined security configurations. You can customize these reports by removing irrelevant standards and focusing on the specific criteria that align with your organization's unique requirements. Follow the steps given below to create a compliance policy:

  1. Open Endpoint Central and navigate to Browsers -> Compliance.
  2. Click Create compliance policy.
  3. Give a name for the policy.
  4. Select the specific rules to obtain customized reports.
  5. Click Save.

    Create Compliance Policy