Skip to main content

3 posts tagged with "Security"

View All Tags

AI Checks

· One min read

Three new AI-related security checks are now available in your policies:

  • Secrets in environment — Detect and prevent exposed secrets in environment variables or runtime context to reduce credential leakage risk.
  • Autonomous agents — Detect autonomous agents and require approved controls before allowing access.
  • Unguarded elevation — Detect and prevent unguarded privilege elevation that can lead to unauthorized high-privilege actions.

Each check can be configured with warning and blocking actions, just like all other policy checks.

Configure your policies

Device Restart Verification

· One min read

New security check: Device restart verification

Device Restart

We've introduced a new security feature that verifies if a device has been restarted recently. This check helps ensure that the device is in a clean state and hasn't been compromised.

Why this matters:

  • Clear potential malware and exploits
  • Complete security updates and patches
  • Reset network connections to prevent unauthorized access
  • Eliminate memory leaks that could lead to vulnerabilities

You can now enforce users to restart their device if it detects that the device hasn't been restarted for an extended period, helping maintain optimal security conditions. Do you want to know more about why you should enforce this check? Check out our blog post.

Biometric Authentication Enforcement

· One min read

🔐 Biometric authentication now mandatory

Biometrics

To enhance security, XFA now makes it possible to require biometric authentication (fingerprint or face recognition) for all sensitive operations. This ensures that only authorized users can access protected features.

Key changes:

  • Enforce biometric authentication for all sensitive operations
  • Support for both fingerprint and face recognition
  • Seamless integration with device security features

This mandatory biometric authentication adds an extra layer of security to ensure that only the rightful owner of the device can access sensitive information and perform critical operations.

Go to the policies page to enable this feature.