Tanium™ Enforce enables unified endpoint management and security by providing centralized policy management across operating system, application, and security for Windows and macOS environments regardless of the device’s location - on premises, remote, or cloud.
To manage and secure endpoints across environments by providing control and visibility to all devices, configure a policy.
Specific settings and controls contained within a policy.
An enforcement occurs when a policy is successfully applied to a computer or user group. Policies can have one of these enforcement states:
A policy has been successfully enforced. All rules and configurations of the policy are in effect on the targeted endpoint.
If ALL settings in one policy are duplicates of ALL settings in another policy, both policies are shown as applied even though only the policy with the lowest priority number is applied.
Some of the policy settings are enforced and some are not. This may be because similar policies with one or more duplicate settings are taking precedence. When some settings are duplicated across different policies, the settings with the lowest number priority are applied and higher number priority settings are not applied. This results in some settings from a policy being enforced while other settings in the same policy are not enforced.
Five is the maximum number of not applied or partially applied settings that can be displayed in the status column.
The policy is not in effect on the endpoint. This could be due to a timing issue if the policy has been sent to the endpoint but not yet executed on that endpoint. See the enforcement state reason for more information.
An unsupported status may be due to a policy being applied to an operating system that does not support the policy settings.
All known and unknown errors.
Use Threat Response findings to create process and network rule policies for Windows endpoints in Enforce to prevent future incidents across the network. Failing to identify and address more fundamental vulnerabilities exploited during an incident leaves the organization with no net improvement to their security posture.
Enforce has built-in integration with Tanium™ Trends for additional reporting of related data. The Trends initial gallery features boards that provide a data visualization of Enforce concepts.
For more information about how to import the Trends boards that are provided by Performance, see Tanium Trends User Guide: Importing the initial gallery.
This documentation may provide access to or information about content, products (including hardware and software), and services provided by third parties (“Third Party Items”). With respect to such Third Party Items, Tanium Inc. and its affiliates (i) are not responsible for such items, and expressly disclaim all warranties and liability of any kind related to such Third Party Items and (ii) will not be responsible for any loss, costs, or damages incurred due to your access to or use of such Third Party Items unless expressly set forth otherwise in an applicable agreement between you and Tanium.
Further, this documentation does not require or contemplate the use of or combination with Tanium products with any particular Third Party Items and neither Tanium nor its affiliates shall have any responsibility for any infringement of intellectual property rights caused by any such combination. You, and not Tanium, are responsible for determining that any combination of Third Party Items with Tanium products is appropriate and will not cause infringement of any third party intellectual property rights.
Tanium is committed to the highest accessibility standards to make interaction with Tanium software more intuitive and to accelerate the time to success. For more information, see Tanium Product Accessibility.
Last updated: 11/19/2020 1:02 PM | Feedback