Organizations must ensure device compliance with industry-specific and internal security standards to safeguard their operational integrity. These standards define the criteria for device compliance within the organization. Endpoint Central provides compliance standards to help meet these requirements. These standards must be configured and distributed to devices, and end-users cannot modify them. IT admins must enforce compliance to maintain a secure and regulated environment.
The Compliance tab provides a detailed overview of the computers compliant with each of the compliance policies.
Endpoint Central generates comprehensive compliance reports based on predefined criteria designed to mitigate security risks. A device's adherence to these criteria is evaluated through a security score. This score categorizes devices into the following risk levels:
Compliance reports are initially generated based on 30 predefined security configurations. You can customize these reports by removing irrelevant standards and focusing on the specific criteria that align with your organization's unique requirements. Follow the steps given below to create a compliance policy: