Skip to main content

Device Management (MDM)

Introduction

The Devices module provides comprehensive endpoint management for your organization. Enroll devices, deploy security policies, scan for vulnerabilities, and ensure device compliance.

Device List
Search devices...
All (24)Compliant (18)Issues (6)
DeviceOSStatusVulns
MacBook Pro — J. SmithmacOS 15.2Compliant0
ThinkPad X1 — A. ChenWindows 11Compliant1
MacBook Air — L. ParkmacOS 14.7Non-Compliant3
Dell XPS — M. WeberWindows 11Compliant0
MacBook Pro — S. KumarmacOS 15.2Pending0

Key Features

Device Enrollment

Enroll Windows, macOS, and Linux devices with the Bastion agent

Security Checks

Monitor device compliance with security policies

Vulnerability Scanning

Continuous scanning for software vulnerabilities

MDM Query

Run OSQuery commands for detailed device interrogation

Why Device Management?

Endpoint Security Challenges

  • Remote Work - Devices outside corporate network
  • BYOD - Personal devices accessing corporate data
  • Patch Management - Keeping software updated
  • Compliance - Enforcing security baselines

Benefits

  • Visibility into all endpoints
  • Consistent security configurations
  • Rapid vulnerability response
  • Compliance evidence generation

Module Components

Device List

Central inventory of all enrolled devices:

  • Device details and specifications
  • Compliance status
  • Security posture
  • Last check-in time

Learn more about Device Enrollment →

Security Checks

Compliance policies for security enforcement:

  • Device compliance monitoring
  • Passing, failing, and unknown device states
  • Policy-level compliance tracking
  • Remediation guidance

Learn more about Security Checks →

Software

Software inventory and MCP configuration monitoring:

  • Installed software across all devices
  • Vulnerability tracking per software
  • MCP server configuration detection
  • Security issue identification

Learn more about Software →

Vulnerabilities

Continuous vulnerability monitoring:

  • CVE detection
  • Severity scoring
  • Remediation guidance
  • Patch tracking

Learn more about Vulnerabilities →

MDM Query

Advanced device interrogation:

  • OSQuery interface
  • Real-time queries
  • Saved query library
  • Query scheduling

Learn more about MDM Query →

Supported Platforms

PlatformAgentFeatures
Windows 10/11FullAll features
macOSFullAll features
LinuxPartialInventory, vulnerabilities
iOSMDMConfiguration profiles
AndroidMDMConfiguration profiles

Getting Started

  1. Download Agent

    Download the Bastion agent for your platform.

  2. Install on Devices

    Deploy the agent to endpoints.

  3. Create Policies

    Define security policies for your environment.

  4. Assign Policies

    Apply policies to device groups.

  5. Monitor Compliance

    Track device compliance in the dashboard.

Device Dashboard

Key Metrics

MetricDescription
Total DevicesEnrolled device count
CompliantDevices meeting policy
Non-CompliantDevices failing policy
VulnerableDevices with vulnerabilities
OfflineDevices not checking in

Quick Actions

  • Enroll new device
  • Run compliance scan
  • Deploy policy update
  • Export device report

Best Practices

Start with Visibility

Focus on enrollment first. You can't secure what you can't see.

Policy Gradually

Roll out policies in stages. Start with monitoring, then enforcement.

Prioritize Vulnerabilities

Focus on critical and exploited vulnerabilities first.

Regular Check-ins

Ensure devices check in regularly. Stale data indicates problems.

Next Steps