Overview
The devices module provides a centralized inventory of all employee devices (laptops, desktops, mobile phones, and tablets) with real-time compliance monitoring. Track encryption status, antivirus coverage, firewall settings, screen lock configuration, and MDM enrollment to ensure endpoint security controls are met across your compliance frameworks.Device Inventory
The device inventory displays all registered devices in a searchable, filterable table with key compliance indicators visible at a glance.Device Properties
| Field | Description |
|---|---|
| Device Name | Friendly name for the device |
| Device Type | Laptop, Desktop, Mobile, or Tablet |
| Manufacturer | Device manufacturer (Apple, Dell, Lenovo, etc.) |
| Model | Specific model name or number |
| Serial Number | Unique hardware serial number |
| Machine ID | System-assigned machine identifier |
| OS Name | Operating system (macOS, Windows, iOS, Android, Linux) |
| OS Version | Operating system version number |
| Assigned To | The employee this device is assigned to |
| Status | Current device status |
| Compliance Status | Whether the device meets security requirements |
| Last Check-In | Most recent device check-in timestamp |
Device Types
Laptop
Portable computers issued to employees for daily work.
Desktop
Stationary workstations in office environments.
Mobile
Smartphones used for work email, Slack, and corporate apps.
Tablet
Tablets used for presentations, fieldwork, or executive use.
Device Statuses
| Status | Description |
|---|---|
| Assigned | Device is actively assigned to an employee |
| Unassigned | Device is in inventory but not assigned |
| Lost | Device has been reported lost |
| Stolen | Device has been reported stolen |
| Retired | Device has been decommissioned |
| In Repair | Device is being serviced |
| Pending Return | Employee has departed and device is awaiting return |
Compliance Monitoring
Each device is evaluated against a set of security compliance checks:| Check | Description | Why It Matters |
|---|---|---|
| Encryption | Full-disk encryption enabled (FileVault, BitLocker) | Protects data at rest if the device is lost or stolen |
| Antivirus | Antivirus software installed and running | Detects and prevents malware infections |
| Firewall | System firewall enabled | Blocks unauthorized network connections |
| Screen Lock | Automatic screen lock configured | Prevents unauthorized physical access |
| MDM Enrolled | Device enrolled in Mobile Device Management | Enables remote management, configuration, and wipe |
Compliance Status
Based on the compliance checks, each device receives an overall compliance status:| Status | Description |
|---|---|
| Compliant | All security checks pass |
| Non-Compliant | One or more security checks fail |
| Pending | Compliance status has not yet been evaluated |
| Unknown | Device has not checked in recently enough to determine status |
Registering Devices
Enter Device Details
Fill in the device properties:
- Device name, type, manufacturer, and model
- Serial number and machine ID
- Operating system and version
- Assign to an employee (optional)
- Set initial compliance check values
Device Sync
If your organization uses an MDM solution (Jamf, Intune, Kandji, etc.) connected through LowerPlane integrations, device data can be synced automatically.Sync Options
- Sync Individual Device — refresh data for a single device from the MDM provider
- Sync All Devices — bulk refresh all device data from connected integrations
Automatic sync imports device properties, compliance check values, and last check-in timestamps directly from your MDM provider, eliminating manual data entry.
Additional Device Metadata
Beyond compliance checks, the device inventory tracks:| Field | Description |
|---|---|
| MAC Address | Network interface hardware address |
| Last IP Address | Most recent IP address observed |
| Battery Health | Battery health percentage (for portable devices) |
| Compliance Issues | List of specific compliance failures |
| Assigned Date | When the device was assigned to the current employee |
Exporting Device Data
Export the device inventory to CSV for reporting, asset management, or insurance purposes. The export includes all device properties and compliance status fields.Device Lifecycle
Active Use
Devices are monitored for compliance during active use. Check-ins update the compliance status regularly.
Compliance Mapping
Device management supports endpoint security controls:| Framework | Control | Requirement |
|---|---|---|
| ISO 27001 | A.8.1 | Asset inventory and ownership |
| ISO 27001 | A.11.2 | Equipment security |
| SOC 2 | CC6.7 | Restrict transmission and movement of information |
| HIPAA | 164.310(d)(1) | Device and media controls |
| PCI-DSS | 5.1 | Anti-virus software on all systems |
| PCI-DSS | 9.9 | Protect devices that capture payment card data |
Best Practices
- Enroll all devices in MDM to enable remote management, configuration enforcement, and remote wipe capability
- Require full-disk encryption on all devices — this is a baseline control for every compliance framework
- Set auto-lock timers to 5 minutes or less for all devices
- Monitor check-in freshness — devices that have not checked in recently may be lost, stolen, or non-functional
- Run compliance reports monthly and follow up on non-compliant devices within 7 days
- Wipe devices before reassignment to prevent data leakage between employees