Managing Your Device’s Security Policies with Kepler Safe – A Comprehensive Guide

Home » Managing Your Device’s Security Policies with Kepler Safe – A Comprehensive Guide
Managing Your Device’s Security Policies with Kepler Safe – A Comprehensive Guide

Every IT professional knows the importance of managing the security protocol of every device. However, the sheer number of devices and users makes it overwhelming to implement a consistent security protocol in an organization. But Kepler Safe’s all-new device grouping technology using labels makes this whole process much more manageable.

Kepler Safe introduced labels in version 19.2 which was a significant step in maintaining the device’s security protocols. Further on May 14th, Kepler Safe proudly launched its new version 2.0 which further enhances the effectiveness of the device labels feature. This update allows administrators to apply the right policies to specific sets of devices, ensuring precise and targeted security measures.

Let’s walk through the simple and intuitive process of creating labels and explore various ways to leverage this feature effectively:

Custom Labels

If you want to add custom labels, go to the control panel. Click on the Labels tab in the device’s area. 

custom label
On the devices page, you can effortlessly manage the custom labels. You just need to select the device list, select actions and click on add labels.
Add Label
Choose the label that you want to apply to the specific device from the name field.
Label Name
You even get a chance to add multiple labels to one device or apply the same label to different devices.

Pre-Defined Labels

You get pre-defined labels with the launch of our version 2.0. Pre-defined labels will help you to group the devices by Windows PC, Windows Servers, and macOS.
Endpoint Devices
But the catch is that these default labels are permanent and can’t be changed according to your requirements. The only method left is to create your custom labels so that you can manage your devices according to your specific requirements.

Apply Policies by Label

Once you’re done applying labels to the specific set of devices, you can apply the posture policies to the particular group. This way, admins get greater control over how the policies are applied to the devices.

For instance, enabling Development mode on a device could potentially increase its exposure to risks, but it may be necessary for developers to perform their tasks effectively. Consequently, while administrators may wish to enforce device passwords across all devices, they might need to restrict the “Development Mode Enabled” feature to non-developer devices only.

Apply Policies
Further, the admins are given the advantage of adding labels (both custom and pre-defined) to new existing policies alike.
Devices Policies

Still, confused about the labels feature? No need to worry! Our release notes for Kepler Safe’s latest version 2.0 have got you covered. If you still have any questions or need assistance, feel free to reach out to our dedicated team – we’re here to help!