Evaluate endpoints for security configuration exposures and software vulnerabilities using industry security standards, vulnerability definitions, and custom compliance checks.

Some Comply 2.10 features listed in the On Prem version of this guide are not yet available for On Prem deployments. For On Prem instructions, please refer to the 2.9 PDF version of the Comply User Guide.

Get started quickly with Comply
  • Succeeding with Comply

    Optimize planning, installing, and evaluating endpoints for security configuration exposures and software vulnerabilities

Learn about Comply
  • Overview

    Understand terminology, scanning options, and how Comply integrates with other Tanium products

  • Requirements

    Review the system requirements for clients and servers, required configurations, and user role configurations

Create and work with assessments
  • Creating assessments

    Create configuration compliance assessments and vulnerability assessments

  • Analyzing findings

    Analyze findings to determine security exposures and software vulnerabilities on endpoints

Other resources
  • Release notes

    Get a list of changes for each Comply release

  • Video tutorials

    Watch tutorials about how to use Comply

  • Community

    Read articles written by Tanium subject-matter experts on Comply best practices

  • Product brief

    Learn about the high-level business and use cases for Comply