Report device compliance regarding the status of the Credential Guard, Smartscreen, Bitlocker, Windows Update and Windows Defender Antivirus security components of the Microsoft Operating System as compared against a configurable reference baseline. This will increase security across your enterprise and minimize opportunities for cyberattacks.
Monitor the compliance of the security updates for Microsoft Antivirus for all the devices in the network in order to identify devices that are non-compliant and may be vulnerable to cyberattacks.
Identify which devices have hard drives that are not encrypted using BitLocker encryption, thereby identifying devices with poor data security.
This Product Pack contains both Rules and instructions.
Upload this Product pack with the help of Tachyon Product Pack Deployment Tool.
A Guaranteed State Policy named Windows Security Profile will be created.
Guaranteed State Rules will be created in this policy.
An Instruction set named Windows Security Profile containing all the instructions will be created.
Review any rule, For Example Check default anti-virus solution is Windows Defender.
The precondition ensures it run only on Windows devices.
Adjust the Trigger IntervalHours to meet your requirement.
The Check if Windows Defender is the default antivirus or not on the devices.
Review all the rules in this Policy before deploying it.
Assign the Windows Security Profile Policy to a management group.
Deploy the Windows Security Profile Policy.
Within a period of a day or more you would start seeing the compliance reports on Windows Defender and other rules.
We can also manually run instruction from Explorer to perform various actions or questions related to Windows Security Profile.
Returns information about the source for Windows Update
What source is Windows Update using?
It provides an option to add or remove executables from the blacklist for the specified users (or all users) on end-user devices. This instruction also enables/disables the blacklisting by adding/removing executable names.
%Action% the executable %Executable% to the blacklist for usernames containing string %Username%
Checks if blacklisting is either enabled or disabled on end-user devices for all users. Note: Devices must be rebooted after an update in policy to ensure blacklisting works.
List blacklisting status for users
Returns longitude and latitude location of the device along with a link to Google Maps showing the location
List endpoint location
Provides a list of process names and users for whom those processes are blacklisted
List blacklisted executables - software that is prevented from running
Set device and user settings for Windows Location Services
Set location privacy settings for Device and all users to %Setting%
Lists device and user settings for Windows Location Services
List Location privacy settings
Provides the Windows Defender status details such as AMEngineVersion, AMProductVersion, AntispywareSignatureversion, etc.