Security

Findings & policy rules

Rule-based findings for software versions, patch baselines and port policies across Windows/Linux.

What this feature delivers

Findings turn raw signals (software inventory, patch status, listening ports, and security posture checks) into a prioritized remediation list. Instead of hunting through dashboards, you get a small set of rule-matched items that explain what’s wrong, why it matters, and what the next action should be.

Software version rules

Software rules let you detect known-bad or out-of-policy versions at scale. Instead of manual spot checks, you define what is acceptable and let findings show you where the estate deviates. This is especially useful during zero-days, where “where is X installed?” and “which versions?” must be answered quickly.

  • Flag versions below a minimum safe version.
  • Mark software as “not allowed” to reduce shadow IT.
  • Optionally pair with actions (e.g., uninstall/upgrade workflows).

Patch baselines

Patch baselines help you keep systems aligned with your maintenance rhythm. Instead of looking at patch data as a raw list, a baseline yields findings such as “missing critical updates”, “stale patch level”, or “host is outside the allowed update age”.

Practical approach

Start with a broad baseline (age-based) and refine to role-based baselines over time (servers vs endpoints, production vs test).

Port policies

Port policies catch risky listeners and unexpected exposure. You can define “deny” or “flag” rules and get findings whenever a system starts listening on a port that is not approved for its purpose or environment.

  • Detect unexpected listeners (e.g., dev tools on servers).
  • Reduce attack surface by keeping exposure intentional.
  • Pair findings with owner workflows or remediation tasks.

Prioritization & workflow

Findings are meant to be operational: a short list that matches your policies, not a wall of telemetry. This makes it easier to triage, delegate, and keep momentum during busy operational cycles.

  • Group by tenant, severity, or policy domain (software / patching / ports).
  • Use consistent naming so teams can recognize patterns quickly.
  • Close the loop by pairing findings with alerts or remote tasks.

Reporting & auditability

Because findings are rule-based, they become explainable. You can show what rule triggered, when it triggered, and how it was resolved. This is valuable for audits, internal controls, and post-incident reviews.

Turn signals into a clear fix list—without a heavy workflow.