Universal Endpoint Management
UEM domain controls.
Endpoint Devices Policy and Procedures
Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures for all endpoints.
Application and Service Approval
Define, document, apply and evaluate a list of approved services, applications and sources of applications (stores) acceptable for use by endpoints when accessing or storing organization-managed data.
Compatibility
Define and implement a process for the validation of the endpoint device's compatibility with operating systems and applications.
Endpoint Inventory
Maintain an inventory of all endpoints used to store and access company data.
Endpoint Management
Define, implement and evaluate processes, procedures and technical measures to enforce policies and controls for all endpoints permitted to access systems and/or store, transmit, or process organizational data.
Automatic Lock Screen
Configure all relevant interactive-use endpoints to require an automatic lock screen.
Operating Systems
Manage changes to endpoint operating systems, patch levels, and/or applications through the company's change management processes.
Storage Encryption
Protect information from unauthorized disclosure on managed endpoint devices with storage encryption.
Anti-Malware Detection and Prevention
Configure managed endpoints with anti-malware detection and prevention technology and services.
Software Firewall
Configure managed endpoints with properly configured software firewalls.
Data Loss Prevention
Configure managed endpoints with Data Loss Prevention (DLP) technologies and rules in accordance with a risk assessment.
Remote Locate
Enable remote geo-location capabilities for all managed mobile endpoints.
Remote Wipe
Define, implement and evaluate processes, procedures and technical measures to enable the deletion of company data remotely on managed endpoint devices.
Third-Party Endpoint Security Posture
Define, implement and evaluate processes, procedures and technical and/or contractual measures to maintain proper security of third-party endpoints with access to organizational assets.