Cloud - 1.18.0

New Features

Telemetry Agent

We have developed the Timus Telemetry feature, designed to significantly strengthen your organization's security posture through advanced device posture checks. Enhance network security based on a telemetry data set of each device connected to the network via Timus Connect.

Timus Connect now utilizes a powerful lightweight querying engine, to gather real-time telemetry data from your devices. This data is then used to perform comprehensive device posture checks, ensuring that only compliant devices are granted access to your network.

The Timus Telemetry Agent not only collects data but also integrates with the Device Posture Check feature, allowing administrators to create and enforce security policies based on the collected telemetry data.

  • Data Source Selection: When creating or editing a device posture check, administrators can select "Timus Connect" as the data source and choose from attributes such as antivirus state, disk encryption, firewall status, and more.

  • Identifier-Based Checks: For attributes like running processes, service state, and startup items, administrators can specify identifiers to create precise checks based on the names of processes, services, or startup items.

  • Reporting: Device posture checks created with Timus Connect as the data source are included in the posture reports, providing comprehensive visibility into compliance across the organization.

Timus Connect now enhances the visibility and management of Windows and macOS devices connected to Timus Connect. This feature collects detailed information from connected devices and displays this data in the Manager. Administrators can access comprehensive device data, enabling more informed decision-making and improved security posture.

Benefits:

  • Enhanced Device Visibility: Gain detailed insights into the operating systems, hardware, security configurations, and storage devices of connected endpoints.

  • Improved Security Management: Monitor device security status in real-time, including firewall settings, antivirus status, and encryption details.

  • Comprehensive Data Collection: Collect and display extensive data from devices, such as running processes, network configurations, installed programs, and more.

  • Streamlined Troubleshooting: Quickly diagnose and address issues by accessing detailed device information directly from the Manager.

  • Automated Compliance: Utilize the collected data to enforce compliance with organizational security policies through Device Posture Checks and behaviors.

Example Use Case:

Scenario: An IT administrator needs to verify the security posture of all Windows devices within the organization.

  • Accessing Device Details: The administrator navigates to the Devices table in the Manager and selects a Windows device. By clicking on "View Device Details," a detailed overview of the device's operating system, hardware, security settings, and storage devices is displayed.

  • Monitoring Security: The security section provides real-time information on firewall status, antivirus status, and other critical security settings, enabling the administrator to ensure compliance with security policies.

Single Sign-On with SAML Integration

We have implemented SAML integration for Single Sign-On (SSO), enabling Timus to connect with any SAML-based authentication application using the SAML 2.0 protocol. This integration enhances authentication security and streamlines the user login process.

Benefits:

  • Enhanced Security: Utilize SAML 2.0 SSO to securely authenticate users, mitigating the risk of unauthorized access.

  • Seamless User Experience: Simplify the authentication process by allowing users to log in with their existing corporate credentials, providing a smoother and more intuitive user experience.

  • Centralized Identity Management: Centralize user identity and authentication management through a single identity provider (IdP), increasing administrative efficiency and reducing complexity.

  • Compliance and Control: Enforce SSO to ensure compliance with corporate security policies and regulatory requirements, providing greater control over user access and data protection.

Key Features:

  • SAML Assertions Encryption: Protect sensitive data during authentication by encrypting SAML assertions.

  • Custom Configuration: Easily configure SAML 2.0 settings, including Identifier, SAML 2.0 Service URL, and X.509 Certificate.

  • Integration Guide: Access a detailed integration guide to assist with the setup process.

Resolved Issues

We have implemented several minor issues to improve overall performance and user experience. These fixes address several small issues to ensure smoother and more reliable operation across the platform.

Last updated