How to Create Security Policy Automations

Automate and Enforce Security with Custom Security Policy Automations

Follow these steps to create and manage security policy automations in Senturo.

Steps to Create Security Policy Automations

1. Navigate to Security Policy Automation

  • Access Security Policy Automations:
    • On the main menu, navigate to the Security Policy Automation section.
      image-png-Jul-22-2024-01-55-10-2136-PM

2. Select a Trigger Rule

  • Choose a Rule:
    • Within the Security Policy Automation section, review the available rules.
      D8682357-98B4-434A-B4A7-EA227B43CC46_1_201_a-1
    • Select the rule that best fits the criteria you want to use as a trigger for the security policy.
    • Configure the policy as required.

3. Add a Group of Devices

  • Specify Device Group or Groups:
    • After selecting the trigger rule, select the groups of devices to which the security policy will apply.

4. Choose an Action

  • Select Preferred Actions:
    • Under the "Actions" section, select the preferred actions to be taken when the specified rule is met.

    • This action defines the response or measures the security policy will implement in response to the activated rule.

5. Set a Schedule

  • Configure Schedule:
    • Configure the schedule for when the security policy should be active.
    • This can include specific times of the day, days of the week, or specific dates.

6. Save the Automation

  • Save Automation:
    • Once satisfied with the configured security policy automation, click the "Save" button.

Conclusion

Creating security policy automations in Senturo allows for automated enforcement of security measures across your device fleet.


FAQs

Q: Can I edit a security policy automation after it has been created? A: Yes, you can edit or update an existing automation by navigating to the Security Policy Automation section and selecting the policy you wish to modify.

Q: How can I monitor the effectiveness of a security policy? A: Senturo provides reporting and monitoring tools that allow you to track the performance and impact of your security policies in real-time via the dashboard.

Q: Is it possible to apply multiple actions for a single trigger rule? A: Yes, you can configure multiple actions when a specific trigger rule is met, allowing for comprehensive security responses.