Allen
Jones

Ensure Software Supply Chain Security with Hexnode UEM

Allen Jones

Jan 27, 2026

10 min read

Ensure Software Supply Chain Security with Hexnode UEM - Cover Image

In 2021, the Log4j vulnerability (Log4Shell) was disclosed, and every CISO in the world asked the same two questions.

  • “Do we use the Log4j library?”
  • “If yes, exactly which servers, laptops, and kiosks are running the vulnerable version right now?”

While modern DevSecOps tools generate a Software Bill of Materials (SBOM) for the application or software you build, they are blind to what you deploy. They cannot tell you if the 3rd-party Digital Signage Player on your 500 kiosks is actively loading an outdated, vulnerable Java library. In 2026, even though regulations like Executive Order 14028 and EU Cyber Resilience Act are making SBOMs mandatory, a static list of components in a PDF is futile if you cannot map them in real-time.

This guide explains how to use Hexnode UEM as a dynamic, runtime tool can ensure your software supply chain security by finding the needle in the haystack across 50,000 or more servers, endpoints, and kiosks across endpoints.

Ensure Complete Security and Visibility with Hexnode UEM
 

Understanding SBOMs

To close the gap between what your developers intend and what your devices execute, you must first distinguish between the two pillars of visibility: Build-Time and Runtime.

1. Build-Time SBOM (The Developer’s View)

Generated during the CI/CD pipeline, this lists the constituents of the app (like files and packages) before it is compiled. It is theoretical. It assumes that what was built is what was deployed.

2. Runtime SBOM (The Operator’s View)

This is the inventory of software actually executing on your endpoints. It accounts for:

  • Drift: Updates that failed or were rolled back.
  • Shadow IT: Tools installed by users outside the CI/CD pipeline.
  • Bundled Libraries: 3rd-party apps that bundle their own versions of common libraries.

Understanding the difference isn’t just a technicality. A Build-Time SBOM tells you what should be there, but it is blind to the silent risks that enter your fleet post-deployment. Without the Runtime view, a CISO might believe a vulnerability is patched because the latest build is clean, while thousands of physical devices remain compromised due to failed updates or local configuration changes.

3 Strategies to Implement Software Supply Chain Security for Runtime Visibility

A Runtime SBOM isn’t a single document. It’s an operational state. Achieving this software supply chain security requires moving beyond basic inventory lists and transforming your UEM into a proactive security tool.

To secure your fleet in real-time, we have identified three distinct strategies using Hexnode UEM that range from hunting for hidden vulnerabilities deep within the file system to validating the integrity of software before it ever executes on a corporate device.

1. Deep Scan by Finding Hidden Libraries

The challenge with supply chain vulnerabilities (like Log4j) is that they aren’t always listed in the “Add/Remove Programs” menu. They are often hidden inside other applications (e.g., a .jar file nested inside a .exe).

A standard UEM inventory scan would not be able to detect these deep-seated files. However, this is possible with Hexnode by employing scripts. You can deploy a script to crawl the file system and identify specific vulnerable libraries by their filename or hash.

How the Scripts Work

Consider a case where a critical zero-day is discovered in a common compression library used by multiple third-party vendors. Your Build-Time SBOM says your proprietary code is safe, but you suspect your fleet’s Digital Signage apps might be using the vulnerable library under the hood.

Here is the detection-to-collection logic used to find the vulnerable file:

  • Trigger: A new CVE is announced for lib-vulnerable.jar.
  • Script: Deploy a Python script via Hexnode to search for the file signature.
  • Collection: If the endpoint is found to have the above library, it instantly identifies and flags the vulnerability. You can then use Hexnode’s custom attributes feature to store which devices are flagged.
  • Result: You now have the custom attribute holding all the endpoints hosting the vulnerable file, regardless of the application.
  • Targeted Remediation: You can then use the dynamic device groups to remediate these specific devices, ensuring that your response is precise and doesn’t disrupt the rest of your healthy fleet.

Here is a sample Bash script which helps you perform the above:

Turning Scripts into Fleet-Wide Insights with Hexnode

One of Hexnode’s greatest strengths is the simplicity of its deployment engine. You don’t need to be an expert to hunt for vulnerabilities. You just need a script and a target. With Hexnode, you can just:

  • Stage your Script: You can upload your custom scripts or use Hexnode Genie (AI script assistant) to generate code on the fly.
  • Target the Fleet: Select your target devices and execute the custom script using Actions.
  • Configure & Push: Choose the target OS, select your script from the Hexnode Repository and execute.
  • Monitor Results: The script runs remotely in the background and give us the required output as defined in the script.

Supported Scripting Environments

To ensure your supply chain audit covers every corner of your infrastructure, Hexnode supports a wide array of file formats across all major operating systems:

Platform Supported Script Formats
Windows .bat, .cmd, .ps1 (PowerShell)
macOS Bash (.sh), Shell (.sh), Z shell (.zsh), Perl (.pl), Ruby (.rb), Python (.py)
Linux Bash (.sh)
Zebra Link-OS .zpl, .nrd, .txt, .lbl, .zbi

Remediation

Once the script identifies the vulnerable library, you are no longer hunting in the dark. With the definitive file path in hand, you can use Hexnode to take immediate action across your fleet:

  • Update the Package: If the library belongs to a managed app, you can push a mandatory update or a patch script to bring the software to a secure version.
  • Remove the Risk: If the library is part of an unauthorized “Shadow IT” application, you can use a follow-up script to delete the specific .jar file or uninstall the parent application entirely.
  • Isolate the Device: For high-risk servers, you can use Hexnode to move the device into a quarantine group with restricted network access until the vulnerability is confirmed as patched
Building a cybersecurity framework for your enterprise
White paper

Building a cybersecurity framework for your enterprise

Learn about the types of cybersecurity frameworks and the role UEM holds in improving cybersecurity

Get the white paper

Meet Hexnode Genie

 

Disaster Recovery Metrics - RPO and RTO
Using Hexnode Genie to generate a script to check for vulnerable files in endpoints
 

The most significant hurdle in achieving software supply chain security is often the specialized knowledge required to write custom audit scripts. Not every IT administrator is a Bash or PowerShell expert, and in a zero-day crisis like Log4j, time to build scripts are very low.

This is where Hexnode Genie, our AI-driven scripting assistant, transforms the workflow. Instead of searching forums for code snippets, you can describe your security requirement in plain English. For example, you can just type in “Write a Bash script to find and hash all instances of lib-vulnerable.jar” and Genie generates the precise, production-ready code instantly. By removing the technical friction of script creation, Hexnode Genie allows your security team to move from a threat announcement to a fleet-wide scan in minutes, not hours. It turns complex hunting logic into an accessible, click-and-deploy reality for every admin.

2. Integrity Verification before Installation

Downloading image
While the previous workflows focused on auditing what is already running, software supply chain security must also include a gatekeeper phase. Sophisticated attackers often strike before deployment by compromising the installer package itself. If your installer is poisoned at the source, you are essentially deploying a backdoor at scale.

To prevent this, you can move beyond simple deployment and implement hash verification using Hexnode. This ensures that the file sitting on your endpoint is the exact, bit-for-bit match of the version released by the vendor.

The Integrity Check Workflow

Consider a scenario where you are deploying a mission-critical update to 10,000 global endpoints. Instead of trusting that the file arrived untampered, you can use Hexnode to automate a pre-execution sanity check.

  • Preparation: Upload the installer to the Hexnode repository. Additionally, add a pre-installation script.
  • Local Verification: Before the installation logic triggers, the script executes on the endpoint to calculate the SHA-256 hash of the downloaded installer.
  • Decision Logic: The script compares the locally generated hash against the vendor’s officially published hash.
  • Fail-Safe: If the hashes do not match, it indicates a potential attack or a corrupted download and the script aborts the installation immediately.

This zero-trust approach to deployment ensures that compromised code never gains a foothold on your corporate network.

3. Safeguarding Browser Extensions

The web browser can be your fleet’s most active application and also one of the biggest blind spots. Browser extensions are mini apps with deep permissions to read web data and capture session cookies. Since extensions update automatically and ownership often changes, a safe tool can quickly turn into a data-exfiltrating backdoor. Hexnode provides a streamlined way to enforce extension integrity:

  • Mandatory Extension Deployment: You can automatically deploy and hard-lock mission-critical extensions like password managers. Users cannot disable or uninstall them, ensuring security remains permanent.
  • Extension ID Filtering: Use unique Extension IDs to govern the browser. You can Allow-only vetted extensions (blocking the rest of the Web Store) or Restrict specific IDs known to be malicious.

While these controls are natively integrated for Windows and ChromeOS, Hexnode extends this security to macOS and Linux via its scripting engine. You can deploy scripts to programmatically audit local extension directories, identify unvetted IDs, and force-remove unauthorized plugins. This ensures a consistent, zero-trust browser environment across your entire infrastructure.

Visibility is the Foundation of Security

In the modern threat landscape, trust is no longer a viable security strategy. As supply chain attacks become more sophisticated, you cannot assume that your software is safe simply because it was purchased from a reputable vendor or passed a build-time scan.

To achieve true resilience, you need to verify reality at the edge. Hexnode UEM provides the granular, file-level visibility required to audit your endpoints in real-time, effectively bridging the gap between the code and the endpoint. By implementing a Runtime SBOM strategy, you transform your management platform from a simple inventory tool into a proactive security asset. You gain the power to hunt for hidden vulnerabilities, govern the invisible browser supply chain, and verify the integrity before it executes.

Frequently Asked Questions (FAQ)

1. Can MDM help with SBOM (Software Bill of Materials)?

Yes. While MDM does not generate a build-time SBOM (like a compiler tool), it provides the essential capability to perform Runtime SBOM check. Hexnode UEM can scan and list every installed application and version across the fleet, providing the real-world inventory needed to verify if vulnerable software components are actually present on your devices.

2. How can I find vulnerable files (like Log4j) on Linux servers?

You can use Hexnode Custom Scripts. By deploying a shell script to your Linux servers via Hexnode, you can crawl the file system to locate specific vulnerable libraries (like .jar files) that standard inventory scans might miss.

3. What is the difference between Build-Time and Runtime Supply Chain Security?

Build-Time security analyzes code during development (CI/CD) to find risks before software is created. Runtime security (handled by UEM) analyzes the endpoints to find risks in software that is already deployed and running. You need both to fully secure the enterprise supply chain.

Share

Allen Jones