Comply

Evaluate endpoints for security configuration exposures and software vulnerabilities using industry security standards, vulnerability definitions, and custom compliance checks.



Get started quickly with Comply
  • Succeeding with Comply

    Optimize planning, installing, and evaluating endpoints for security configuration exposures and software vulnerabilities

Learn about Comply
  • Overview

    Understand terminology, scanning options, and how Comply integrates with other Tanium products

  • Requirements

    Review the system requirements for clients and servers, required configurations, and user role configurations

Create and work with assessments
  • Creating assessments

    Create configuration compliance assessments and vulnerability assessments

  • Analyzing findings

    Analyze findings to determine security exposures and software vulnerabilities on endpoints

Other resources
  • Release notes

    Get a list of changes for each Comply release

  • Video tutorials

    Watch tutorials about how to use Comply

  • Community

    Read articles written by Tanium subject-matter experts on Comply best practices

  • Product brief

    Learn about the high-level business and use cases for Comply