Policies

Policies

Updated March 13, 2026

Overview


Policies help sysadmins define the ideal computer state, track computers when they are non-compliant, and assist in bringing computers into compliance. Policies define what software should be installed on your managed computers and what version it should be running. When a computer doesn't match what a policy requires, it's marked as non-compliant. Policies can optionally auto-install software to bring computers back into compliance automatically.

Policies overview

Computer rings


Policies are assigned to Computer Rings - each ring has its own set of policies that a user can configure, and all computers in that ring are evaluated against the policies.

Learn more about computer rings.

Viewing policies


Policies can be viewed and managed on the Policies page. The policy page contains an overview of overall policy compliance, and enables users to view policies by ring and identify non-compliant computers that need attention.

Policy compliance can also be viewed on individual computers by opening the computer, and clicking on the Policies page.

Viewing policies

Version strategies


Each policy uses a version strategy that determines what "compliant" means:

Strategy Behavior
Always latest The computer must be running the latest known version of each app. Checked against the latest version in the synced package catalog.
Latest with delay The computer must be running a version that's been available for at least N days. Gives you a buffer before new versions are enforced. Requires setting a delay in days.
Pinned version The computer must be running a specific version you choose. Available for Specific Apps policies only. Each app in the policy gets its own pinned version number.

Creating policies


Policies are created from the Policies page.

Add policy

Policy Types

There are two different types of policies.

Specific Apps - Targets specific software packages that you select. For example, you might create a policy for Google Chrome and Mozilla Firefox that keeps them on the latest version. Each ring can have multiple "Specific Apps" policies, but the same app can't appear in more than one policy within the same ring.

Everything Else - Covers all installed software that isn't already managed by a "Specific Apps" policy. This is a catch-all - if a computer has an outdated app and no specific policy covers it, this policy flags it. Only one "Everything Else" policy is allowed per ring.

Require installation


This flag only applies to Specific Apps policies and changes what "non-compliant" means:

Enabled: A computer is non-compliant if the app is missing entirely or if it's installed but outdated. Use this when you want to ensure software is present on every computer in the ring.

Disabled: A computer is only non-compliant if the app is installed but outdated. Computers that don't have the app at all are considered compliant (the policy only manages existing installations). Use this when you don't need the software everywhere, but want to keep it up to date where it exists.

Everything Else policies always use the disabled behavior — they only evaluate software that's already installed.

Auto-install


When auto-install is enabled, the system automatically creates deployments to bring non-compliant computers back into compliance. Here's how it works:

  1. When you create or update a policy with auto-install enabled, an evaluation runs immediately
  2. The system also evaluates policies periodically on a schedule
  3. For each non-compliant computer, a deployment is created to install the correct version
  4. If require installation is on, computers missing the app will get it installed

To avoid repeatedly targeting the same computer, auto-install skips any computer that already had a deployment from this policy in the last 24 hours. When you manually run a policy, this cooldown is bypassed.

Running a policy manually


Click the three-dot menu on a policy card and select Run. This forces an immediate evaluation and creates deployments for all non-compliant computers, regardless of the 24-hour cooldown. This is useful when:

  • You just enabled a policy and want to deploy immediately
  • A previous deployment failed and you want to retry
  • You want to force a re-evaluation after making changes to computers
  • The result shows how many deployments and activities were created

How compliance is determined


Each policy evaluates every computer in its ring:

  • For Specific Apps + Always latest: Compares each computer's installed version against the latest version in the package catalog
  • For Specific Apps + Pinned: Compares each computer's installed version against the pinned version
  • For Everything Else + Always latest: Checks all installed software not covered by other policies, comparing against latest known versions

Duplicate prevention


The system prevents the same app from appearing in multiple policies within the same ring. If you try to add an app that's already covered by another policy, you'll receive an error. This ensures there's no conflicting version requirements for the same software.

Permissions


Access Level Capability
No Access Cannot view the Policies page
View Only Can view policies and policy logs
Full Access Can create, edit, delete, and run policies