Enforce Overview

Enforce enables unified endpoint management and security by providing centralized policy management across operating system, application, and security for Windows, Linux, and macOS environments regardless of the device location - on-premises, remote, or cloud.


To manage and secure endpoints across environments by providing control and visibility to all devices, configure a policy.

Policy setting

Specific settings and controls contained within a policy.


An enforcement occurs when a policy is successfully applied to a computer or user group. Policies can have one of these enforcement states:


A policy has been successfully enforced. All rules and configurations of the policy are in effect on the targeted endpoint.

If ALL settings in one policy are duplicates of ALL settings in another policy, both policies are shown as applied even though only the policy with the lowest priority number is applied.

Partially applied

Some of the policy settings are enforced and some are not. This may be because similar policies with one or more duplicate settings are taking precedence. When some settings are duplicated across different policies, the settings with the lowest number priority are applied and higher number priority settings are not applied. This results in some settings from a policy being enforced while other settings in the same policy are not enforced.

Five is the maximum number of not applied or partially applied settings that can be displayed in the status column.

Not applied

The policy is not in effect on the endpoint. This could be due to a timing issue if the policy has been sent to the endpoint but not yet executed on that endpoint. See the enforcement state reason for more information.


An unsupported status might be due to a policy being applied to an operating system that does not support the policy settings.


All known and unknown errors.

Interoperability with other Tanium products

Enforce works with other Tanium products to provide additional features and reporting.

Tanium™ Mac Device Enrollment

Mac Device Enrollment is currently public beta software.

Use Mac Device Enrollment to extend your visibility into macOS endpoints and manage the onboarding experience for these devices, as well as the entire device lifecycle.

For more information, see Mac Device Enrollment User Guide: Overview.

Tanium™ Reporting

Use Enforce with Reporting to view enhanced endpoint details in enforcements. In the Endpoints section on the enforcement details page, click Endpoint Details . Click View Details to open the endpoint details in Reporting. For more information, see View endpoint details and Reporting User Guide: View endpoint details.

Tanium™ Threat Response

Use Threat Response findings to create process and network rule policies for Windows endpoints in Enforce to prevent future incidents across the network. Failing to identify and address more fundamental vulnerabilities exploited during an incident leaves the organization with no net improvement to their security posture.

For more information, see Tanium Threat Response User Guide: Remediate alerts in Tanium Protect or Tanium Enforce.

Tanium™ Trends

Enforce features Trends boards that provide data visualization of Enforce concepts. The Enforce board displays the Enforce tools status, coverage, and policy enforcements. The following sections and panels are in the Enforce board:

  • Deployment
    • Enforce Coverage Status
    • Host Firewall Enabled
    • Enforce Tools Installations
    • Installed Tools Versions
  • Policies
    • Policy Enforcements

For more information about how to import the Trends boards that are provided by Enforce, see Tanium Trends User Guide: Importing the initial gallery.