Why Device Registration Matters
Compliance frameworks require organizations to track and secure all devices that access company data:| Framework | Device Management Requirements |
|---|---|
| ISO 27001 | A.8.1 (Inventory of assets), A.11.2 (Equipment security) |
| SOC 2 | CC6.1 (Logical access), CC6.8 (Prevention of unauthorized software) |
| HIPAA | 164.310(b) (Workstation use), 164.310(c) (Workstation security) |
| PCI-DSS | 5.1 (Anti-virus on all systems), 9.9 (Protect devices that capture payment data) |
Viewing Your Devices
Open the Devices tab in the Employee Portal to see all devices registered to you:| Field | Description |
|---|---|
| Device name | The name of your device (e.g., “John’s MacBook Pro”) |
| Type | Laptop, desktop, phone, or tablet |
| Operating system | macOS, Windows, Linux, iOS, or Android |
| Compliance status | Compliant, non-compliant, or pending review |
| Last checked | When the device’s compliance was last verified |
Registering a New Device
Enter device details
Provide the required information about your device:
- Device name — A recognizable name (e.g., “Work Laptop”, “Company iPhone”)
- Device type — Laptop, desktop, phone, or tablet
- Operating system — Select the OS and version
- Serial number — Found in your device’s system settings (optional but recommended)
- Model — Device manufacturer and model (e.g., “MacBook Pro 14-inch 2023”)
Device Compliance Status
Each registered device displays a compliance status based on your organization’s security requirements:- Compliant
- Non-Compliant
- Pending Review
The device meets all security requirements. No action needed.Typical requirements for a compliant device:
- Disk encryption is enabled (FileVault, BitLocker, LUKS)
- Operating system is up to date (within the allowed patch window)
- Endpoint protection agent is installed and active
- Screen lock is configured with a reasonable timeout
- Firewall is enabled
Resolving Non-Compliance
If your device is flagged as non-compliant, take the following actions based on the specific issue:Disk encryption not enabled
Disk encryption not enabled
- macOS: Go to System Preferences > Security & Privacy > FileVault and turn it on.
- Windows: Go to Settings > Update & Security > Device Encryption or enable BitLocker in Control Panel.
- Linux: Full disk encryption is typically configured during OS installation. Contact IT for guidance.
Operating system outdated
Operating system outdated
- macOS: Go to System Preferences > Software Update and install available updates.
- Windows: Go to Settings > Update & Security > Windows Update and check for updates.
- Contact IT if updates require approval or if you encounter errors during the update process.
Endpoint protection agent missing
Endpoint protection agent missing
Contact your IT team for instructions on installing the required endpoint protection software (CrowdStrike, SentinelOne, Microsoft Defender, etc.). Do not install security software from unofficial sources.
Screen lock not configured
Screen lock not configured
- macOS: Go to System Preferences > Security & Privacy > General and set “Require password after sleep or screen saver begins” to “immediately” or “5 seconds”.
- Windows: Go to Settings > Accounts > Sign-in options and configure a lock timeout.
MDM-Managed Devices
If your organization uses a Mobile Device Management (MDM) solution (Jamf, Intune, Kandji), your device may already be registered and monitored automatically. In this case:- The device appears in your portal with compliance data from the MDM system
- Compliance checks are performed automatically on every MDM sync cycle
- You do not need to register the device manually
If your device is managed by MDM but does not appear in your Employee Portal, contact your IT team. The MDM integration may need to be configured to sync device-to-user assignments.
Removing a Device
If you are no longer using a device for work (returned, replaced, or decommissioned):- Open the Devices tab and find the device.
- Click Remove or Deregister.
- Confirm the removal.
Privacy
Device registration in LowerPlane collects only the information necessary for compliance:- Device type, model, and operating system version
- Compliance status of security settings (encryption, protection agent, updates)
- Serial number (for asset tracking)