Skip to content
  • There are no suggestions because the search field is empty.

Devicie Data Collection: Understanding What and Why

At Devicie, we prioritise security, compliance, and risk reduction. To achieve these goals, we collect specific data points from your environment. Let’s delve into the details:

Security Setting Statuses

What We Collect:

  • Security setting statuses refer to the configuration and state of security-related settings on devices in your environment. These settings include firewall configuration, antivirus status, user rights, and more.

Why We Collect Them:

  • Compliance Evaluation: We use security setting statuses to assess compliance with industry standards and best practices. For instance:

    • CIS Benchmarks: These benchmarks provide guidelines for securing systems. By monitoring security settings, we can evaluate adherence to these standards.

    • ACSC Essential Eight: The Australian Cyber Security Centre (ACSC) outlines eight essential mitigation strategies. Monitoring security settings helps us verify compliance with these recommendations.

Installed Applications

What We Collect:

  • Information about installed applications on devices. This includes both managed and unmanaged software.

Why We Collect Them:

  • Risk Assessment: Detecting unmanaged or out-of-date applications is crucial. Here’s why:

    • Unmanaged Apps: Unauthorised software can introduce vulnerabilities. By identifying unmanaged apps, we reduce the risk of security breaches.

    • Out-of-Date Apps: Older versions of applications may have known security flaws. Monitoring installed apps helps us flag outdated software.

Accounts with Local Admin Permissions

What We Collect:

  • Details about accounts with local admin permissions on devices. These accounts have elevated privileges within the system.

Why We Collect Them:

  • Privilege Management: Admin accounts pose inherent risks:

    • Reducing Risk: By identifying local admin accounts, we can assess the risk associated with elevated privileges.

    • Mitigating Threats: Monitoring these accounts helps us detect anomalies and unauthorised access attempts.

 

Remember that our data collection practices are designed to enhance security, streamline compliance, and minimize risks. If you have any further questions, or need assistance, feel free to reach out to our support team.