Skip to content
  • There are no suggestions because the search field is empty.

Devicie Data Collection: Understanding What and Why

This article explains the purpose of the Health Monitoring configuration profile and the Devicie Telemetry App, details the data they collect, and outlines how this data is utilized to enhance security, compliance, and risk reduction. Note that the information provided below relates to Windows devices only.

Overview

At Devicie, we prioritize security, compliance, and risk reduction. To achieve these goals, we collect specific data points from your environment. This data enables proactive management and provides visibility into the health and security posture of your devices.

Health Monitoring Configuration Profile

The Health Monitoring configuration profile enables Windows devices to send specific "health" and "readiness" signals back to Microsoft Intune.

  • Why We Collect It: Devicie deploys this profile so devices can report metrics to your Intune tenant. We then collect these metrics for reporting purposes in the Devicie dashboard.

  • Data Utilization: This data powers essential reporting, including:

Devicie Telemetry App

The Devicie Telemetry App collects detailed information to assess compliance and security risks.

  1. Security Setting Statuses

    • What We Collect: The configuration and state of security-related settings, including firewall configurations, antivirus status, and user rights assignments.

    • Why We Collect It:

      • Compliance Evaluation: We assess adherence to industry standards, such as CIS Benchmarks and the Australian Cyber Security Centre (ACSC) Essential Eight mitigation strategies.

  2. Discovered Applications

    • What We Collect: Information regarding all installed applications on devices, including managed and unmanaged software.

    • Why We Collect It:

      • Risk Assessment: We identify unmanaged or out-of-date applications to reduce the risk of security breaches introduced by unauthorized or vulnerable software.

  3. Accounts with Local Admin Permissions

    • What We Collect: Details regarding accounts holding local administrator privileges on devices.

    • Why We Collect It:

      • Privilege Management: Monitoring accounts with elevated privileges allows us to detect anomalies, unauthorized access attempts, and mitigate risks associated with over-privileged users.


    Summary of Data Usage

    Our data collection practices are designed to provide:

    1. Enhanced Security: Identifying vulnerabilities and misconfigurations.

    2. Streamlined Compliance: Verifying adherence to industry benchmarks.

    3. Minimized Risk: Proactively detecting threats and unauthorized changes.


    Support

    If you have any further questions regarding data collection or need assistance, please contact the Devicie support team.