Compliance, Remediation, and Policy Enforcement
You can make devices compliant by defining automated policies and executing remediation actions and policy enforcement.
Automated actions are configured via the Compliance Enforcement Settings. When a device is detected as compromised, the system automatically evaluates the policy and triggers the configured action.