Security Policy Automations

Create and Manage Security Policies with Preconfigured Rules and Actions

For security policy automations in Senturo, you can choose from various preconfigured rules and actions to build effective security policies.

Preconfigured Rules

  1. Outside Zone:

    • Trigger actions when devices are found outside designated zones.
  2. Inside Zone:

    • Implement rules for devices within specified geofenced zones.
  3. Network Anomaly Detection:

    • Identify and respond to network anomalies.
  4. Scheduled Events:

    • Set up automated processes that follow prearranged timelines.
  5. Time-Locked Access:

    • Restrict device access during specific time intervals.
  6. Senturo Agent Phone Home

    • Specify the maximum duration a device can be disconnected from Senturo servers before being considered at risk.

Available Actions

After selecting a rule, users can choose one or more actions to be executed when the rule is triggered. Available actions in Senturo include:

  1. Senturo Lock:

    • Set a password to lock the device and display a custom lock screen.
  2. Send Broadcast:

    • Send a broadcast message to the device.
  3. Wipe Files:

    • Wipe files from the user directory.
  4. Send Email to Admin:

    • Send a custom email to assigned administrators.
  5. Set Missing Mode:

    • Initiate high-frequency tracking by switching the device status to missing mode.
  6. Pull Current Location:

    • Retrieve the current location of a device.
  7. Take Screenshots:

    • Capture a screenshot of the current on-screen activity.
  8. Pull Current Network Data:

    • Retrieve the latest network data from a device.
  9. MDM Actions:
    • If you have an MDM integrated with Senturo, and have enabled actions, these can also be used as actions.

Scheduling Options

After configuring the actions, you will be directed to the scheduling tab. The scheduling options include:

  1. Set Schedule:

    • Define specific times and days or dates for the policy to be active.
  2. Always On:

    • Keep the policy active at all times.

Conclusion

By selecting preconfigured rules and actions, and setting appropriate schedules, you can ensure your devices are secure and compliant with your organizational policies.


FAQs

Q: Can I combine multiple rules into a single security policy? A: Currently, each security policy is based on a single rule. However, you can create multiple automations to cover different scenarios and rules.

Q: How do I know which actions to select for my security policy? A: Choose actions based on the specific needs and scenarios you are addressing. For instance, use "Senturo Lock" for device security breaches and "Send Broadcast" for essential notifications.

Q: Can I edit or update a security policy after it's created? A: Yes, you can edit or update existing security policies by navigating to the Security Policy Automation section and selecting the policy you wish to modify.