Skip to main content
Assigning Computers to Employees
Fabiola Munguia avatar
Written by Fabiola Munguia
Updated over a week ago

The Secfix Agent is more than just a monitoring tool! It’s a complete solution to help manage your organization’s security compliance.


How to assign a device to an employee

Precondition: Only an admin can perform these actions.

Step 1: Access the Computers Page

  • After installing the agent on a device, go to Monitoring > Computers in Secfix.

  • It may take up to 20 minutes for the device to appear.

Step 2: Select the Device

Locate the device you want to assign.

Step 3: Assign to an Employee

  • Click the three dots on the right side of the device row.

  • Choose Assign and select the correct employee.


Monitoring key security metrics

In the Computers section, you will see five key security checks for each device:

  1. Password Manager installation

  2. Hard Drive encryption

  3. Antivirus installation

  4. Screen lock activation

  5. Last check

These checks are important for meeting security certification requirements and ensuring devices are protected against common threats.

You'll find more information on each check in the following articles:


Monitor agent compliance with automated checks

The Automated Checks page is an essential feature for where you can check gaps in your security compliance.

💡 If an employee belongs to a group that requires the agent's installation but has not done so, the employee will be listed in the check as a resource needing attention.


Monitoring software installation

One of the standout features of the Secfix Agent is its ability to read and monitor the applications installed on devices. This feature is particularly crucial for businesses aiming to comply with ISO 27001:2022 controls, specifically control 8.19 - Installation of software on operational systems. The control mandates that organizations manage software installations on operational systems diligently. This ensures that only approved and licensed software is in use, reducing the risk of unauthorized or malicious software installations that could compromise system integrity and security.

By leveraging the Secfix Agent's capability to read installed applications, businesses can seamlessly monitor and ensure compliance with this control. This not only streamlines the compliance process but also provides an added layer of security by keeping a check on the software ecosystem of the organization's devices.

You can check the list of installed software of each employee by clicking on their name in the Employees section and switching to the Computers tab.

Did this answer your question?