Device Security Health Settings
Defines security posture requirements for Windows clients before connecting to VPAM .
Use the Device Security Health Settings page to define and enforce security health requirements for client devices connecting to Imprivata Vendor Privileged Access Management . These settings let administrators determine which security components must be active or compliant before a Windows client can connect.
-
Device posture settings are currently available only in the legacy UI.
-
These settings apply only to Windows clients. You can optionally exclude macOS, Linux, and Windows Server devices from posture checks.
Accessing the Device Health Settings Page
- Log in as an administrator.
- Navigate to System Settings > Settings > Device Health Settings.
- The Device Security Health Settings page opens.
Configuring Device Posture Checks
-
In the Client Security Health Configuration section, review the available system health components:
-
Firewall
-
Antivirus
-
Auto-update
-
Anti-spyware
-
Internet Settings
-
UAC
-
Service
-
-
For each component, select an enforcement level:
-
Strict – The component must be active and report a Good status for the connection to succeed.
-
Active – The component must be active but can report any status.
-
Report – The status is logged but not enforced.
-
None – The component is not checked.
-
-
(Optional) Select Exclude macOS, Linux, and Windows Server devices from the check to skip posture enforcement on those system.
NOTE:Unless the Exclude macOS, Linux, and Windows Server devices from the check option is enable all platforms other than Windows client versions will be blocked from connecting if any enforcement level is set stricter than Report.
-
Click Save.