Getting started with policy groups

Within the Policies area, you can create policy groups and assign devices to them.

Each policy group includes individual policies that you can activate to detect specific information on your devices. You can view the detected information in Absolute reports and monitor your devices to ensure that they comply with your organization's policies.

Available policies

Depending on the Absolute product licenses associated with your account, you can activate the following policies in each policy group:

All policies, except the Hardware policy, are set to Inactive by default.

Policy Details

Application Resilience

Controls the collection of information about the functional status and compliance of third party applications, such as Microsoft BitLocker® Drive Encryption, installed on your devices.

Depending on the Absolute licenses associated with your account, it may also repair or reinstall the application if it is not functional or non-compliant. You can view the collected status information in the Application Resilience report and the Application Resilience Events report.

Custom Data

Controls the collection of custom information from your Windows devices

You can configure this policy to retrieve custom Data Points from your devices. You can view the custom Data Points by adding Custom Data columns to supported pages and reports.

By default, the Custom Data policy in your Global Policy Group is set to Inactive, but you can activate it.

Device Compliance

Uses data collected from your Windows and Mac devices to determine their state of compliance based on conditions you set

When this policy is activated, devices are flagged as non-compliant if any conditions you specify are not satisfied. You can view Device Compliance data in the policy group's Devices page or a device's Device Details page, or by adding columns to supported reports such as the Devices with Actives Policies report.

Device Usage

Controls the collection of information about the usage of your Windows, Mac, and Chromebook devices

When this policy is activated, the Absolute agent A small software client—comprised of the core agent, the component manager, and other agent components—that resides in devices managed in the Secure Endpoint Console. The Secure Endpoint Agent requires an internet connection only; contact with your devices is maintained when they are on or off your corporate network. detects when a user logs in or unlocks a device and records that action as a device usage event. It also detects the number of minutes per hour the device is actively in use. You can view the device usage information in the Device Analytics report and on a device's Usage Event Details page.

Endpoint Data Discovery (EDD)

Controls the detection of confidential or at-risk content that is stored in files on Windows and Mac devices

You can configure the EDD policy to detect content, such as personal health and financial information, credit card numbers, or Social Security numbers, that is stored in files on your devices. You can view EDD data in reports, such as the Match Score Summary report, and on a device's Endpoint Data Discovery page.

Playbooks Controls whether you can run playbooks to repair or restore Windows devices that are not functioning correctly.

Full-Disk Encryption Status

Controls the collection of information about the full-disk encryption products installed on each Windows and Mac device, and the encryption status of the devices' drives

This policy is preconfigured to detect all available full-disk encryption product data from each device. You can view the detected data in the Full-Disk Encryption Status report or by adding columns to the Devices page or the Devices with Actives Policies report.

Geolocation Tracking

Controls the collection of location information from your supported Windows, Mac, and Chromebook devices

This policy is preconfigured to collect the current physical location of each device. You can view the detected data by switching to map view in the Devices or Reports area, or by adding Geolocation columns to supported pages and reports.

Hardware

Controls the collection of hardware information for Windows, Mac, and Chromebook devices

This policy is preconfigured to perform a daily scan of each device to collect all available hardware data, which can include hundreds of data point A discreet unit of information that is detected on a device and communicated to the Absolute Monitoring Center by the device's Secure Endpoint Agent.s depending on the device's operating system. For details about the specific hardware information detected for each supported operating system, see Data points collected by activated policies.

You can view the collected hardware information on the All Devices page, and on a device's Device Details page.

The Hardware policy is set to Active by default.

Installed Applications

Controls the collection of information about the applications installed on Windows devices

This policy is preconfigured to detect all available application data from each device. You can view the detected data on the Applications page in the Devices area, the Installed Applications report, and on a device's Applications page.

Web Usage

Controls the collection of web usage data from the Chrome browser on your Chromebook and Windows device. Activate the Web Usage policy if you want to view information about the websites and webpages that your users visited most recently. You can view the usage information in the Web Usage (Last 7 Days) report and the Web Usage (Trending) report.

How are new devices assigned to policy groups?

When devices are enrolled in your account, they are automatically added to the Global Policy Group.

You can leave the devices in this default policy group and activate the group's policies. However, depending on the structure of your organization, it may not make sense to collect the same information from all of your devices. For example, you may want to collect specific information from the devices in your Marketing department, and other information from the devices in your Finance department. You can create as many custom policy groups as is required to meet your needs.

Managing policy groups and policies

Within the Policy Groups area, you can manage the custom policy groups you've created, and the policies and devices contained within them. Specifically, you can perform the following tasks:

For more information about working with policy groups and policies, visit the Learning Hub. To access the Learning Hub, click (Help and Support) on the quick access toolbar and then click Resources > The Learning Hub.