Overview
Device Management in DSALTA provides continuous visibility into the security posture of employee devices. It ensures that endpoints meet your organization’s security requirements and remain compliant over time.
Instead of relying on one-time checks or manual confirmations, DSALTA continuously monitors device-level security controls and converts them into audit-ready evidence.
What Device Management Covers
DSALTA Device Management focuses on endpoint security fundamentals, including:
Disk encryption status
Firewall configuration
Antivirus presence
Screen lock enforcement
Password manager usage
Operating system version and device identity
These checks apply to company-owned and employee-owned devices used to access internal systems.
Supported Operating Systems
DSALTA Device Management currently supports:
Windows (Windows 10 and later)
macOS (modern macOS versions with FileVault support)
Linux (major distributions with standard security tooling)
Each operating system is evaluated using native system signals and platform-specific checks.
Structure
Step 1: Device enrollment
Employees install the DSALTA Device Monitor on their device using a secure registration key.
Step 2: Secure activation
The device is authenticated and linked to the employee’s account.
Step 3: Continuous monitoring
DSALTA periodically collects system-level signals required for security and compliance.
Step 4: Status evaluation
Each device is evaluated against predefined security checks.
Step 5: Visibility & action
Admins can instantly see risks, status gaps, and remediation needs.





