Category filter
Hexnode XDR Policy Management: Configuration and Deployment Guide
Hexnode XDR Policies are structured configuration sets that define security controls, agent behaviors, and administrative permissions across managed endpoints. These policies ensure consistent security postures by automating agent updates, defining inactivity triggers, and governing remote troubleshooting capabilities.
1. Policy Lifecycle and Categories
Hexnode XDR organizes policies into categories based on their lifecycle stage. This structure allows technicians to distinguish between active, pending, and historical configurations.
| Category | Description | Primary Actions |
|---|---|---|
| Published | Policies actively enforced on targeted endpoints. | Create New, Edit, Move to Archive. |
| Drafts | Policies in the creation or modification phase; not yet deployed. | Edit, Delete, Publish. |
| Archive | Deactivated policies stored for audit or future restoration. | Restore, View History. |
| Deployment History | A chronological log of all policy deployment attempts and their results. | Reinitiate Failed Deployments. |
2. Policy Creation Workflow: Steps and Logic
Creating a policy follows a linear three-step process: Configurations > Target > Review. This ensures all technical parameters are defined before endpoints are assigned.
Step 1: Configurations (Functional Parameters)
The configurations page defines the “rules of engagement” for the Hexnode XDR agent.
A. Prevention Settings (Microsoft Defender Integration)
- Manage Defender: When enabled, Hexnode XDR takes control of the native Microsoft Defender protection on the endpoint.
- Enforcement Interval: Technicians define how often Defender settings are re-applied (e.g., Daily, Weekly, or at a specific time in IST).
B. General Settings (Inactivity and Agent Removal)
-
Mark Device as Inactive: Defines the duration (Days/Hours) of silence after which a Target Endpoint is flagged as “Inactive” in the portal.
Inactivity Timeout to Remove Agent: A “self-destruct” threshold. If reached, the Hexnode XDR agent is automatically uninstalled from the endpoint and the device record is deleted.
Allow Remote Terminal: A binary toggle. If ON, technicians can initiate a secure terminal session from the Endpoints Tab. If OFF, the option is disabled (greyed out) for all associated devices.
Step 2: Target Selection
Technicians must define the scope of the policy.
- Individual Endpoints: Specific devices selected by Host Name or ID.
- Endpoint Groups: Predefined logical clusters of devices.
- Logic: Multiple targets can be added to a single policy to ensure bulk deployment.
Step 3: Review and Identification
The final step is a summary of all technical selections. Technicians must provide a Policy Name to act as a unique identifier within the database.
3. Save and Approval Logic
Hexnode XDR uses a two-state saving mechanism to prevent accidental or unauthorized deployments.
| Save Option | System Impact |
|---|---|
| Save as Draft | Saves the configuration to the Drafts tab. No changes are sent to the endpoints. |
| Approve & Publish | Validates the policy and immediately pushes the configuration to all Target Endpoints. |
4. Deployment Monitoring and Remediation
The Deployment History tab serves as the audit trail for policy distribution.
Status Indicators: Results are classified as Success, Partial Success, or Failure.
Reinitiate Action: If a deployment fails (e.g., device was offline), technicians can click Reinitiate to retry the push for only the failed endpoints.
Filtering Entities: Search history by Version, Created By, Last Modified By, or Deployment Endpoint Count.
5. Frequently Asked Questions (FAQ)
Q: Can a single endpoint have multiple policies applied to it?
A: Yes. An endpoint can be a member of multiple policy groups. If settings conflict, the most recently published policy (highest version number) takes precedence and overrides previous configurations.
Q: What happens to an Archived policy?
A: The policy is immediately deactivated. It remains in the database for audit purposes but is no longer enforced on any endpoints.
Q: Can a policy be edited after it is live?
A: Yes. Navigate to Published, select Edit, and make changes. However, the update is not pushed until you select Republish.
Q: Does disabling “Tamper Protection” pose a security risk?
A: Yes. If Tamper Protection is disabled (OFF), users with local administrator privileges on the Target Endpoint can manually uninstall or modify the Hexnode XDR agent.
Q: Whose time zone is used for the Defender enforcement schedule?
A: The schedule is currently configured using IST (India Standard Time), regardless of the target endpoint’s local time zone.
Q: How to set which data columns are visible in the policy list?
A: Use the Customize Columns option (located next to the search bar) to select specific entities like Last Modified Time or Created By.