First steps for Administrators

The Secure Endpoint Console is a web-based user interface that provides you with visibility into your fleet of devices, offering near real-time remediation to protect devices, data, applications, and users.

Before you begin

Before you begin to work with the Secure Endpoint Console and set up your account, review the following considerations and recommendations:

  • [Optional] Review the Absolute Master Subscription Agreement.
  • Review the system requirements and user permissions.
  • Familiarize yourself with the interface.
  • At any point while you are working in the console, click (Help and Support) > Help for this page to view the Help topic for the area you are working in. You can also access the Help system by clicking > Resources.
  • Visit the Learning Hub to learn more about getting started with Absolute. To access the Learning Hub, click (Help and Support) on the quick access toolbar and then click Resources > The Learning Hub.

Setting up your Absolute account

Your first step as an Administrator is to your ensure that the Secure Endpoint Agent on each device is activated and it is successfully sending device hardware and system information to the Absolute Monitoring Center.

You can then enable enhanced data collection and invite other users to access the Secure Endpoint Console.

Task Details
Deploy the agent

Ensure that the Secure Endpoint Agent is deployed to all devices that you want to manage in Absolute.

To check that the devices are actively connecting to the Absolute Monitoring Center, review the Activation report.

Activate available policies

To experience the benefits of enhanced data collection, go to the Global Policy Group and activate one or more of the following policies:

  • Application Resilience

    Controls the collection of information about the status of third party applications, such as BitLocker and SCCM, installed on Windows devices

  • Custom Data

    Controls the collection of data points configured in the Custom Data policy on your Windows devices

  • Endpoint Data Discovery (EDD)

    Controls the collection of information about confidential or at risk file data stored on your Windows and Mac devices

  • Device Usage

    Controls the collection of information about the usage of your devices

  • Full-Disk Encryption Status

    Controls the collection of information about the full-disk encryption products installed on each Windows and Mac device and the encryption status of the devices' system drives

  • Geolocation Tracking

    Controls the collection of geolocation information from your devices that shows in the Devices and Reports areas of the console

  • Installed Applications

    Controls the collection of information about the software applications installed on your Windows and Mac devices.

  • Playbooks

    Allows you to remotely recover a Windows device when a fatal system error prevents it from booting into Windows.

  • Web Usage

    Controls the collection of web usage data from the Chrome browser on your Chromebook and Windows devices

Activate these policies to start collecting information from your devices.

Add users

Add users to your Absolute account by entering each user's information, assigning a role and device group to each user, and then inviting the users to activate their user accounts.

If you plan to set up Single Sign-On, you can automatically provision users from your IdP by setting up SCIM integration. Learn more

Additional steps for Administrators

Depending on the needs of your organization, you may want to add further configurations to your Absolute account by completing one or more of the following tasks:

Task Details
Create device groups Create device groups to organize the devices in your account into logical groupings that are consistent with the needs of your organization. You can then use these device groups to filter reports, add devices to policy groups, and initiate actions.
Create custom policy groups Creating custom policy groups allows you to collect different sets of data for different groups of devices.
Set up Single Sign-On (SSO) If your organization uses a supported SAML 2.0 identity provider An online service or website that creates, maintains, and manages identity information and authenticates users on the Internet using security tokens. (IdP) for user authentication, you can enable single sign-on to the Secure Endpoint Console. You can also provision users from your IdP by setting up SCIM integration.
Enable Two-Factor Authentication You can add an extra layer of security to your Absolute account by enabling Two-Factor Authentication (2FA). When 2FA is enabled, all users need to enter a six digit verification code in addition to a username and password when they log in to the Secure Endpoint Console.
Create custom roles Absolute includes a set of default user roles, but you can create custom roles and assign individual permissions to each role.