Software version rules
Software rules let you detect known-bad or out-of-policy versions at scale. Instead of manual spot checks,
you define what is acceptable and let findings show you where the estate deviates. This is especially useful
during zero-days, where “where is X installed?” and “which versions?” must be answered quickly.
- Flag versions below a minimum safe version.
- Mark software as “not allowed” to reduce shadow IT.
- Optionally pair with actions (e.g., uninstall/upgrade workflows).
Patch baselines
Patch baselines help you keep systems aligned with your maintenance rhythm. Instead of looking at patch data
as a raw list, a baseline yields findings such as “missing critical updates”, “stale patch level”, or “host
is outside the allowed update age”.
Practical approach
Start with a broad baseline (age-based) and refine to role-based baselines over time (servers vs endpoints,
production vs test).
Port policies
Port policies catch risky listeners and unexpected exposure. You can define “deny” or “flag” rules and get
findings whenever a system starts listening on a port that is not approved for its purpose or environment.
- Detect unexpected listeners (e.g., dev tools on servers).
- Reduce attack surface by keeping exposure intentional.
- Pair findings with owner workflows or remediation tasks.
Prioritization & workflow
Findings are meant to be operational: a short list that matches your policies, not a wall of telemetry.
This makes it easier to triage, delegate, and keep momentum during busy operational cycles.
- Group by tenant, severity, or policy domain (software / patching / ports).
- Use consistent naming so teams can recognize patterns quickly.
- Close the loop by pairing findings with alerts or remote tasks.
Reporting & auditability
Because findings are rule-based, they become explainable. You can show what rule triggered, when it triggered,
and how it was resolved. This is valuable for audits, internal controls, and post-incident reviews.
Turn signals into a clear fix list—without a heavy workflow.