Getting started with policy groups
Within the Policies area, you can create policy groups and assign devices to them.
Each policy group includes individual policies that you can activate to detect specific information on your devices. You can view the detected information in Absolute reports and monitor your devices to ensure that they comply with your organization's policies.
Available policies
Depending on the Absolute product licenses associated with your account, you can activate the following policies in each policy group:
All policies, except the Hardware policy, are set to Inactive by default.
Policy | Details |
---|---|
Controls the collection of information about the functional status and compliance of third party applications, such as Microsoft BitLocker® Drive Encryption, installed on your devices. Depending on the Absolute licenses associated with your account, it may also repair or reinstall the application if it is not functional or non-compliant. You can view the collected status information in the Application Resilience report and the Application Resilience Events report. |
|
Custom Data |
Controls the collection of custom information from your Windows devices You can configure this policy to retrieve custom Data Points from your devices. You can view the custom Data Points by adding Custom Data columns to supported pages and reports. By default, the Custom Data policy in your Global Policy Group is set to Inactive, but you can activate it. |
Uses data collected from your Windows and Mac devices to determine their state of compliance based on conditions you set When this policy is activated, devices are flagged as non-compliant if any conditions you specify are not satisfied. You can view Device Compliance data in the policy group's Devices page or a device's Device Details page, or by adding columns to supported reports such as the Devices with Actives Policies report. |
|
Controls the collection of information about the usage of your Windows, Mac, and Chromebook devices When this policy is activated, the Absolute agent A small software client—comprised of the core agent, the component manager, and other agent components—that resides in devices managed in the Secure Endpoint Console. The Secure Endpoint Agent requires an internet connection only; contact with your devices is maintained when they are on or off your corporate network. detects when a user logs in or unlocks a device and records that action as a device usage event. It also detects the number of minutes per hour the device is actively in use. You can view the device usage information in the Device Analytics report and on a device's Usage Event Details page. |
|
Controls the detection of confidential or at-risk content that is stored in files on Windows and Mac devices You can configure the EDD policy to detect content, such as personal health and financial information, credit card numbers, or Social Security numbers, that is stored in files on your devices. You can view EDD data in reports, such as the Match Score Summary report, and on a device's Endpoint Data Discovery page. |
|
Playbooks | Controls whether you can run playbooks to repair or restore Windows devices that are not functioning correctly. |
Controls the collection of information about the full-disk encryption products installed on each Windows and Mac device, and the encryption status of the devices' drives This policy is preconfigured to detect all available full-disk encryption product data from each device. You can view the detected data in the Full-Disk Encryption Status report or by adding columns to the Devices page or the Devices with Actives Policies report. |
|
Controls the collection of location information from your supported Windows, Mac, and Chromebook devices This policy is preconfigured to collect the current physical location of each device. You can view the detected data by switching to map view in the Devices or Reports area, or by adding Geolocation columns to supported pages and reports. |
|
Controls the collection of hardware information for Windows, Mac, and Chromebook devices This policy is preconfigured to perform a daily scan of each device to collect all available hardware data, which can include hundreds of data point A discreet unit of information that is detected on a device and communicated to the Absolute Monitoring Center by the device's Secure Endpoint Agent.s depending on the device's operating system. For details about the specific hardware information detected for each supported operating system, see Data points collected by activated policies. You can view the collected hardware information on the All Devices page, and on a device's Device Details page. The Hardware policy is set to Active by default. |
|
Controls the collection of information about the applications installed on Windows devices This policy is preconfigured to detect all available application data from each device. You can view the detected data on the Applications page in the Devices area, the Installed Applications report, and on a device's Applications page. |
|
Controls the collection of web usage data from the Chrome browser on your |
How are new devices assigned to policy groups?
When devices are enrolled in your account, they are automatically added to the Global Policy Group.
You can leave the devices in this default policy group and activate the group's policies. However, depending on the structure of your organization, it may not make sense to collect the same information from all of your devices. For example, you may want to collect specific information from the devices in your Marketing department, and other information from the devices in your Finance department. You can create as many custom policy groups as is required to meet your needs.
Managing policy groups and policies
Within the Policy Groups area, you can manage the custom policy groups you've created, and the policies and devices contained within them. Specifically, you can perform the following tasks:
- Adding policy groups
- Viewing policy groups
- Viewing the devices in a policy group
- Moving devices between policy groups
- Activating policies
- Deactivating policies
- Editing policy group properties
- Deleting policy groups
For more information about working with policy groups and policies, visit the Learning Hub. To access the Learning Hub, click (Help and Support) on the quick access toolbar and then click Resources > The Learning Hub.