Skip to main content

AI Checks

· One min read

Three new AI-related security checks are now available in your policies:

  • Secrets in environment — Detect and prevent exposed secrets in environment variables or runtime context to reduce credential leakage risk.
  • Autonomous agents — Detect autonomous agents and require approved controls before allowing access.
  • Unguarded elevation — Detect and prevent unguarded privilege elevation that can lead to unauthorized high-privilege actions.

Each check can be configured with warning and blocking actions, just like all other policy checks.

Configure your policies

Compliance Goals

· One min read

Policies now support compliance goals, giving you granular control over how and when devices are warned or blocked.

For each security check, you can now configure three separate actions:

  • Set your compliance goal — Define the time period in which devices should become compliant (e.g., 30, 60, or 90 days). This goal is only visible to administrators.
  • Warn users — Choose when users are informed about a risk: before the compliance goal or on the due date.
  • Block a device — Determine when non-compliant devices are blocked from access: before the compliance goal or on the due date.

For version-based checks (OS, browser, reboot), the device detail page now shows timeline badges with the configured goal, warning, and blocking thresholds in days, so you can see at a glance how close a device is to each deadline.

Configure your policies

Device Notes and Tags

· One min read
Device tags & notes

You can now add notes and tags to devices directly from the dashboard to better organize and track your device inventory.

Notes allow you to add custom descriptions or important information about specific devices. Whether it's tracking device assignments, maintenance schedules, or special configurations, notes help you keep all relevant device information in one place.

Tags provide a quick way to categorize and filter devices based on your organizational needs. Create custom tags for departments, locations, device types, or any other classification system that works for your team.

Both features are accessible from the device details view and can help streamline your device management workflow.

Manage your devices

Improved Device Overview

· One min read

Visibility is everything when it comes to security. Our latest XFA Dashboard update makes it even easier to have an overview of devices connected to the business apps and a confirmation that your organization is secure.

This update brings a more detailed view of each device’s security health, a centralized overview of device checks that have been performed, and improved visibility across your team, designed to make device security simpler and your team’s productivity higher.

Take a look at what’s new

Agentless Sign-In

· One min read
Agentless Sign-In

We're excited to introduce Agentless Sign-In, a new way to access your organization's resources without installing the XFA agent. This feature provides a faster, more flexible authentication experience while maintaining security compliance.

What is Agentless Sign-In?

Agentless Sign-In allows users to authenticate and verify device compliance without requiring the XFA agent to be installed. This is perfect for users who don't have installation rights, are using shared devices, or simply want the fastest path to access.

Getting Started

For detailed information about the agentless sign-in process, check out our user guide. For information on how to setup Agentless, check out our documentation.

Trends

· One min read
Trends

We're excited to announce that XFA now includes Trends functionality in the dashboard, allowing administrators to track device security improvements and deteriorations over time.

The new trends feature provides valuable insights into your organization's security posture by displaying historical data and patterns. You can now visualize how your device fleet's compliance has evolved, making it easier to identify security trends and take proactive measures.

Current Features

Currently, you can view trends for:

  • OS Out of Date: Track how many devices have outdated operating systems over time

Coming Soon

We're actively working on expanding the trends functionality to include more comprehensive statistics, giving you deeper insights into:

  • Days since last reboot compliance
  • Device encryption compliance
  • Browser security status
  • And many more security metrics

Get Started

You can explore the new trends feature today by visiting the dashboard. This powerful addition to the XFA dashboard helps you make data-driven decisions about your organization's security policies and understand the impact of your security initiatives over time.

Stay tuned for more trend categories coming soon!

Windows Recall Policy

· One min read

We've added Windows Recall as a check

We're excited to announce that XFA now includes Windows Recall validation as a new security check to enhance data protection on Windows devices.

Windows Recall is a feature that automatically captures screenshots and stores sensitive information from your screen. Our new security check ensures that this feature is properly disabled to protect your organization's confidential data.

This security check allows administrators to:

  • Detect when Windows Recall is enabled on managed devices
  • Warn users about the potential security risks
  • Block access to applications until Windows Recall is disabled

By adding this validation, XFA helps organizations maintain better control over data privacy and prevents sensitive information from being inadvertently captured and stored by Windows Recall.

TrustCloud Export

· One min read

TrustCloud Integration

You can export your devices to TrustCloud to provide device security proof automatically for your compliance needs.

Get started in the TrustCloud Dashboard under Integrations.

Ping Identity integration

· One min read

XFA can be used as a factor through the BYO MFA functionality in OneLogin. This allows XFA to be seamlessly added to any application from within the OneLogin admin dashboard, given that it uses Ping Identity as the identity provider.

When a user authenticates with Ping Identity, as an additional factor after supplying a username & password, the user is redirected to XFA to verify that the device is compliant with the device security policy before authenticating the user. This assures that only devices that comply with the security policy are allowed access.

Click here to get started in the XFA Dashboard.

More info

Enhanced Linux Support

· One min read

Enhanced Linux Support

We’re excited to share that XFA has enhanced its coverage on Linux operating systems, delivering even deeper protection, broader visibility, and faster response to any potential risks. Especially on the systems that are often left out (this one is for the techies).