What checks are you using to ensure only healthy devices get access?Solved

Participant
Discussion
1 week ago May 11, 2026

We’ve already set up identity verification in Hexnode, and now we’re focusing more on device compliance. How are you guys making sure only “healthy” devices are allowed access? 

Replies (10)

Marked SolutionPending Review
Participant
1 week ago May 11, 2026
Marked SolutionPending Review

We started with compliance rules. Things like minimum OS version, encryption status, and root/jailbreak detection are all enforced through policy. If a device doesn’t meet any of these conditions, it gets flagged right away as non-compliant. 

Marked SolutionPending Review
Participant
1 week ago May 11, 2026
Marked SolutionPending Review

Rooted or jailbroken devices were a major concern for us. Even if the user is verified, a compromised device shouldn’t be trusted. That’s really where Zero Trust becomes important. 

Marked SolutionPending Review
Participant
1 week ago May 11, 2026
Marked SolutionPending Review

Encryption was a big one for us too. We made FileVault on macOS and BitLocker on Windows mandatory. If encryption is turned off or not configured, the device is automatically marked non-compliant, so it can’t access corporate resources. 

Marked SolutionPending Review
Participant
1 week ago May 12, 2026
Marked SolutionPending Review

Once a device is marked non-compliant, what do you usually do? Do you handle that manually or let Hexnode take care of it? 

Marked SolutionPending Review
Participant
1 week ago May 12, 2026
Marked SolutionPending Review

We’ve automated most of it. Hexnode marks the device as “Non-compliant” and we link that status to access control. So, the moment a device fails a compliance check, access to corporate apps or data is restricted automatically. 

Marked SolutionPending Review
Participant
1 week ago May 12, 2026
Marked SolutionPending Review

We also enabled periodic scanning. Devices are checked at regular intervals, not just during enrollmentSo, if something changes later, like OS downgrade or encryption being turned off, it gets picked up quickly. 

Marked SolutionPending Review
Participant
1 week ago May 12, 2026
Marked SolutionPending Review

That continuous monitoring part really helps. Without it, devices can drift out of compliance over time. With regular checks, device health is validated continuously instead of relying on a one-time check. 

Marked SolutionPending Review
Participant
1 week ago May 12, 2026
Marked SolutionPending Review

Makes sense. So, it’s more like ongoing validation instead of a one-time check during enrollment. 

Marked SolutionPending Review
Participant
1 week ago May 13, 2026
Marked SolutionPending Review

Exactly. Identity alone isn’t enough. In a Zero Trust setup, device health plays an equal role. If either the user identity or the device compliance fails, access shouldn’t be granted. 

Marked SolutionPending Review
Participant
1 week ago May 13, 2026
Marked SolutionPending Review

We also tied compliance status to app access. Only compliant devices can access managed apps or corporate resources, which adds another layer of control on top of the policies. 

Save