Profile compliance behavior
The security posture of devices in your organization is enforced by deploying profiles.
Within an organization, different levels of Security can be implemented, depending on the overall Security requirements. A common level of security policies might be applied to all devices in the organization, at the Master Action site level, while at the department level, more restrictive policies might be necessary depending on the organizational structure and on the criticality of single devices. Based on the organization's desired Security posture, the Security Administrator creates a "Corporate" profile that enforces the minimal set of required security policies that must be common to all devices. At the department level, depending on the required security level and criticality of the devices, operators can create specific "Department" profiles that enforce more restrictive policies on specific sets of devices. The final result is that on the device the combined parameters from the deployed profiles are always the most restrictive.
Operationally, profile management is implemented as a two-step process. In the first step, Security Administrators define the Security posture of the organization by identifying the policies that must be enforced on the devices. These policies are defined by creating one or more profiles. When an operator creates and saves a profile in a specified site, all computers that are subscribed to that site are checked for relevance regarding the policies set in the profile. If a device becomes relevant for that profile, it means that it is not compliant. When a device is checked against a profile, if more restrictive settings are found, the device is not relevant.
In the second step, when the profile is deployed to the targets that must comply to the policies, the configurations that are defined in the profile are enforced on all targeted devices. This step is completed by a Fixlet that sets the required profile configurations on the selected targets. If the configuration parameters are changed locally on the target, the configuration is reapplied automatically, unless the parameters set locally on the target are more restrictive than the ones currently enforced with the deployed profile. When the profile is deployed successfully, the status on the device for the profile is Fixed.
Managing multiple profiles on a target - profile layering
Profiles are divided into categories. You can enable individual categories that contain one or more settings that you want to enforce on your targets. On Windows 10 targets, each parameter in the categories that are enabled in the profile is mapped to specific device settings according to the WMI infrastructure. On Mac OS X targets, a new OS X profile is created for each enabled category. A maximum of four OS X profiles are created on a Mac device, one for each enforced category in the BigFix profile. You can view OS X profiles from the Profile graphical user interface available in System Preferences on the device.
Operators can define multiple profiles that enforce one or more categories of settings. When the profile is deployed on a target, each setting in every enforced profile category is evaluated against the corresponding setting on the target. If at least one setting in the profile is more restrictive than the corresponding setting on the target, the target is considered relevant (noncompliant) and the profile is applied. You can deploy multiple profiles on a target, and the evaluation is always completed by comparing the individual settings. The final security configuration (security posture) of the target is made up of the union of more profiles where the most restrictive values are enforced.
If policies change either centrally or locally, Administrators can stop the deployments of the currently enforced profiles, and reset the profile configurations on all devices in the organization or in a specific department. New profiles can then be deployed on targets. For more information, see Resetting the Profile Management Configuration.
On Mac OS X devices, if one or more profiles that are not deployed by BigFix Profile Management exist, when you deploy a BigFix profile that sets parameters that belong to the same category of the existing profile, the deployment fails after the "Retry on Failure" counter expires. To solve the problem, you must first remove the existing profile from the device and then redeploy the BigFix profile. For more information about the specific error codes, see Mac OS X Profile Deployment errors
On Windows 10 devices, if one or more parameters in the profile have more restrictive settings than those currently on the device, the profile is always applied.
Use Case Example - Organization with Windows 10 devices
In this example, a corporation has 30 departments and several thousand Windows 10 devices that are distributed in several geographic locations. The Security Officer establishes the security posture of the entire corporation that comprises a set of common policies that all devices must comply to, regardless of their specific department membership. Administrators in each department, based on the devices and the roles of the users, can define specific security settings that are valid only for their specific department and deploy them locally.
In this example, Windows 10 device Win10_DeptB_SWAdm belongs to Department B in the organization, which is geographically located in London. The device is used by the Software Administrator, in charge of installing the required software on the devices in his/her department. To illustrate the layering behavior, three profiles are created and deployed to the device: a corporate profile, a department profile, and a profile that is specific to Software Administrators in the organization. Profile layering checks each setting in each category, and ensures that the most restrictive setting is always enforced.
The Security posture at the corporate level, establishes that all passwords in the organization be at least 8 characters long, and expire after 20 days. Moreover, the use of Cortana is not allowed.
Profile Category | Setting |
---|---|
Password Settings | Password expires after 20 days |
Minimum Password Length is 8 characters | |
Restrictions | Cortana is disabled |
Profile Category | Setting |
---|---|
Password Settings | Minimum Password Length is 15 characters |
Device is put on BitLocker Recovery mode after 3 incorrect password attempts. | |
Password Expires after 10 days | |
Restrictions | Telemetry Level set to Security |
Profile Category | Setting |
---|---|
Password Settings | Minimum Password Length is 12 characters |
App Security | Allow App Store Auto Update is disabled |
Restrictions | Cortana is enabled (default) |
Location Service set to OFF | |
Telemetry Level det to Basic |
Category | Settings |
---|---|
Password Settings | Minimum Password Length 15 characters - from profile Profile_Corp_SWAdmins |
Password Expires after 10 days - from profile Profile_Corp_SWAdmins | |
Device is put on BitLocker Recovery mode after 3 incorrect password attempts - from profile Profile_Corp_SWAdmins | |
App Security | Allow App Store Auto Update is disabled - from profile Profile_London_DeptABC |
Restrictions | Cortana is disabled - from profile ProfileCorp_Win10 |
Location Service set to OFF - from profile Profile_London_DeptABC | |
Telemetry Level set to Security - from profile Profile_Corp_SWAdmins |
Resetting the Profile Management Configuration
In each site where at least one profile exists, a corresponding task for resetting the profile configuration on the device is available for Windows 10 and Mac OS X devices. When you run the task on Windows devices, it removes all parameters of the categories that were enabled by Profile Management, also those parameters that were set manually or by other applications,
- Corporate Security policies have changed and you want to enforce new policies on all your devices.
- You are moving some devices from one department to another, and the new department has different security requirements.
- You want to enforce less restrictive policies on one or more devices, either temporarily or on a permanent basis.
Select Reset in the search field. A list of available reset tasks for Windows and MAC OS X is displayed. You can also use filters to restrict the search to specific sites or operators. Before you run a reset task, you must stop all open deployments of the profiles that are currently enforced on the targets where you want to reset the profile management parameters.
, and typeDepending on the operator login authorizations, you might view more than one Reset task. Deploy the task stored in the Site where the devices you want to reset are subscribed.