Getting started with the Policy Groups area

Within the Policy Groups area, you can create policy groupsA collection of devices to which a set of policies are applied. and assign a product license and a group of devices to each of them. Each policy group includes a set of policies that you can activate to detect specific information on your devices. The assigned product license determines which policies are available. You can view the detected information in Absolute reports and monitor your devices to ensure that they comply with your organization's policies.

Available policies

Depending on the licenses assigned to a policy group, you may be able to activate the following policies:

Policy

Details

Application Persistence

Controls the collection of information about the functional status and compliance of third party applications, such as Microsoft BitLockerĀ® Drive Encryption, installed on your devices. Depending on the Absolute licenses associated with your account, it may also repair or reinstall the application if it is not functional or non-compliant. You can view the collected status information in the Application Persistence report and the Application Persistence Events report.

By default, the Application Persistence policy in your Global Policy Group is set to Inactive, but you can activate it.

Device Usage

Controls the collection of information about the usage of your Windows, Mac, and Chromebook devices

When this policy is activated, the Absolute agentA small software client that resides in devices that are managed in the Absolute console. After the agent is initially installed on a new device, it is activated with its first connection to the Absolute Monitoring Center. The Absolute agent requires an internet connection only; contact with your devices is maintained when they are on or off your corporate network. detects when a user logs in or unlocks a device and records that action as a device usage event. It also detects the number of minutes per hour the device is actively in use. You can view the device usage information in the Device Analytics report and on a device's Usage Event Details page.

By default, the Device Usage policy in your Global Policy Group is set to Inactive, but you can activate it.

Endpoint Data Discovery (EDD)

Controls the detection of confidential or at-risk content that is stored in files on Windows and Mac devices

You can configure the EDD policy to detect content, such as personal health and financial information, credit card numbers, or Social Security numbers, that is stored in files on your devices. You can view EDD data in reports, such as the History report, and on a device's Endpoint Data Discovery page.

By default, the EDD policy in your Global Policy Group is set to Inactive, but you can activate it.

Full-Disk Encryption Status

Controls the collection of information about the full-disk encryption products installed on each Windows and Mac device, and the encryption status of the devices' drives

This policy is preconfigured to detect all available full-disk encryption product data from each device. You can view the detected data in the Full-Disk Encryption Status report or by adding columns to the Devices page or the Devices with Actives Policies report.

By default, the Full-Disk Encryption Status policy in your Global Policy Group is set to Inactive, but you can activate it.

Hardware

Controls the collection of hardware information for Windows, Mac, Android, and Chromebook devices

This policy is preconfigured to perform a daily scan of each device to collect all available hardware data, which can include hundreds of data pointA discreet unit of information that is detected on a device and communicated to the Monitoring Center by the device's Absolute agent.s depending on the device's operating system. For details about the specific hardware information detected for each supported operating system, see Data points collected by activated policies.

You can view the collected hardware information on the All Devices page, and on a device's Device Details page.

NOTE  Depending on the default configuration of your account, the Hardware policy in your Global Policy Group may be set to Active or Inactive by default. If the policy is Inactive you can activate it, but note that you can't deactivate it once it's activated.

Installed Software

Controls the collection of information about the applications installed on Windows devices

This policy is preconfigured to detect all available application data from each device. You can view the detected data on the Applications page in the Assets area and on a device's Applications page.

By default, the Installed Software policy in your Global Policy Group is set to Inactive, but you can activate it.

Software

Controls the collection of information about the software detected on Windows, Mac, and Android devices

This policy is preconfigured to detect all available software data from each device. You can view the detected data in reports, such as the Software Overview report, and on a device's Software page.

By default, the Software policy in your Global Policy Group is set to Inactive, but you can activate it.

Web Usage

Controls the collection of web usage data from the Chrome browser on your Chromebook and Windows devices. Activate the Web Usage policy if you want to view information about the websites and webpages that your users visited most recently. You can view the usage information in the Web Usage (Last 7 Days) report and the Web Usage (Trending) report.

NOTE  Depending on the permissions associated with your user role, and the Absolute product licenses associated with your account, policies other than the Hardware policy may not be available.

How are new devices assigned to policy groups?

When new devices are added to your account, they are added automatically to one of the following policy groups, depending on the status of your Absolute licenses:

Managing policy groups and policies

Within the Policy Groups area, you can manage the custom policy groups you've created, and the policies and devices contained within them. Specifically, you can perform the following tasks:

NOTE  For more information about working with policy groups and policies, review the training videos and interactions in the Learning Hub.