Instruction Sets Instruction Policy Rules Preconditions Checks Triggers Fixs Title Ascending Title Descending Most Recent Most Endorsed Recently Modified Most Downloads 61 products packs Managed Reboots Reboot the machine with user interactive user prompts Windows AppLocker Regulate the execution of any specific executable file(s) across devices by creating explicit Hash rules (Allow or Deny) Vulnerability Management Secure your environment from vulnerabilities by running scans and deploying security patches across the organization Linux System Management Manage the Linux based systems BadRabbit Vulnerability Identify machines likely to be impacted by BadRabbit malware by looking for indicators of compromise GDPR Find and tag the documents or spreadsheets which contains PII (with/without match context) and matches the GDPR rules Forensics Gather Forensics information about network usage, energy usage, resource usage, process activity by user 1E Virtual Assistant Self Service instructions to fix common issues with the help of 1E Virtual Assistant 1 2 3 4 5 … 8