Enforce Overview

Enforce enables unified endpoint management and security by providing centralized policy management across operating system, application, and security for Windows, Linux, and macOS environments regardless of the device location - on-premises, remote, or cloud.


To manage and secure endpoints across environments by providing control and visibility to all devices, configure a policy.

Policy setting

Specific settings and controls contained within a policy.


An enforcement occurs when a policy is successfully applied to a computer or user group. Policies can have one of these enforcement states:


A policy has been successfully enforced. All rules and configurations of the policy are in effect on the targeted endpoint.

If ALL settings in one policy are duplicates of ALL settings in another policy, both policies are shown as applied even though only the policy with the lowest priority number is applied.

Partially applied

Some of the policy settings are enforced and some are not. This may be because similar policies with one or more duplicate settings are taking precedence. When some settings are duplicated across different policies, the settings with the lowest number priority are applied and higher number priority settings are not applied. This results in some settings from a policy being enforced while other settings in the same policy are not enforced.

Five is the maximum number of not applied or partially applied settings that can be displayed in the status column.

Not applied

The policy is not in effect on the endpoint. This could be due to a timing issue if the policy has been sent to the endpoint but not yet executed on that endpoint. See the enforcement state reason for more information.


An unsupported status might be due to a policy being applied to an operating system that does not support the policy settings.


All known and unknown errors.

Integration with other Tanium products

Tanium™ macOS Device Enrollment

macOS Device Enrollment is currently available only in a limited release. For access, contact Tanium Support.

Use macOS Device Enrollment to extend your visibility into macOS endpoints and manage the onboarding experience for these devices, as well as the entire device lifecycle.

For more information, see macOS Device Enrollment User Guide: Overview.

Tanium™ Threat Response

Use Threat Response findings to create process and network rule policies for Windows endpoints in Enforce to prevent future incidents across the network. Failing to identify and address more fundamental vulnerabilities exploited during an incident leaves the organization with no net improvement to their security posture.

For more information, see Tanium Threat Response User Guide: Remediate alerts in Tanium Protect or Tanium Enforce.

Tanium™ Trends

Enforce has built-in integration with Trends for additional reporting of related data. The Trends initial gallery features boards that provide a data visualization of Enforce concepts.

The following sections and panels are in the Enforce board:

  • Deployment
    • Enforce Coverage Status
    • Host Firewall Enabled
    • Enforce Tools Installations
    • Installed Tools Versions
  • Policies
    • Policy Enforcements

For more information about how to import the Trends boards that are provided by Enforce, see Tanium Trends User Guide: Importing the initial gallery.