Simplify and centralize management of all end user computing devices to eliminate and mitigate vulnerabilities and business risk.

Get started quickly with Enforce
Learn about Enforce
  • Overview

    Understand terminology, policies, and deployment options, and how Enforce integrates with other Tanium solutions

  • Requirements

    Review the system requirements for clients and servers, required configurations, and user role configurations

Create policies and enforcements
  • Policies

    Create policies to control applications for computer groups and users

  • Enforcements

    Enforce policy settings on targeted endpoints

Other resources
  • Release notes

    Get a list of changes for each Enforce release

  • Video tutorials

    Watch tutorials about how to use Enforce

  • Community

    Read articles written by Tanium subject-matter experts on Enforce best practices

  • Product brief

    Learn about the high-level business and use cases for Enforce