Viewing a device's policies
On a device's Policies page, you can view the policy group the device belongs to, and the policies that are applied to the device. You can access the Policies page from any page that shows linked device identifiers in the results grid.
Depending on the permissions associated with your user role, the Policies page may not be available.
To view a device's policy group and policies:
- On any page that shows linked device identifiers in the first column of the results grid, such as the All Devices page in the Devices area, click the link for the device that you want to view. Summarized information about the device shows in the page header.
- Click the Policies tab.
The name of the device's current policy group shows at the top of the page followed by the number of devices that belong to the policy group. Depending on the Absolute product licenses associated with your account, one or more policies may be activated on the device, as indicated by its status icon:
For all active policies (excluding Endpoint Data Discovery policies), the following information shows:
- Policy Updated: the date and time when the policy was last activated, or the policy configuration was last updated, on the device
- Data Updated: the date and time when the policy last detected new data on the device
For active Application Resilience policies, the current policy configurations also show.
For an active Endpoint Data Discovery (EDD) policy, the following information shows:
EDD policy configuration |
Details |
|
---|---|---|
Rules |
The predefined and customized EDD rules that are applied when an EDD scan The Secure Endpoint Agent process that opens and analyzes files on a device's hard drive to identify at-risk content, as defined in an Endpoint Data Discovery policy. See also DAR component. is performed on the device. Inactive rules are grayed out. |
|
Scan level |
The file types and file locations that are scanned when an EDD scan is performed on the device. Possible values are Targeted and Moderate. |
|
Full scan |
The schedule for full EDD scans on the device. The schedule is expressed as a repeat frequency (monthly or quarterly) on a day of the month. |
|
Last: The date of the most recent full scan In addition to scheduled scans, a full scan is triggered automatically when an EDD policy's rules or scan level are changed. If the policy was recently edited, the date of the Last scan may not align with the full scan schedule. Similarly, if a one-time full scan was recently requested on the device, the Last scan reflects the date of that scan. If the Warning icon If the error is caused by an issue with the DAR component A lightweight software component of the Secure Endpoint Agent that detects at-risk data stored on a Windows or Mac device during an EDD scan. The DAR component is deployed on a device only when the device is associated with a policy group in which the Endpoint Data Discovery policy is activated., the agent automatically attempts to repair the component. If the error persists, go to the Support page in the Secure Endpoint Console and submit a Support case, quoting the error message. |
Next: The start date of the next scheduled full scan Depending on the scan status, the following information may also show next to the date:
|
|
Delta scan | The schedule for delta EDD scans on the device. The schedule is expressed as a repeat frequency (daily or weekly) on one or more days, at a specified time (local time on the device). | |
Last: The date of the most recent delta scan If a one-time delta scan was recently requested on the device, the Last scan reflects the date of that scan, which may not align with the delta scan schedule. If the Warning icon If the error is caused by an issue with the DAR component A lightweight software component of the Secure Endpoint Agent that detects at-risk data stored on a Windows or Mac device during an EDD scan. The DAR component is deployed on a device only when the device is associated with a policy group in which the Endpoint Data Discovery policy is activated., the agent automatically attempts to repair the component. If the error persists, go to the Support page in the Secure Endpoint Console and submit a Support case, quoting the error message. |
Next: The start date of the next scheduled delta scan Depending on the scan status, the following information may also show next to the date:
|