Monitor Device Security Posture
The Device Compliance Report provides a centralized view of security posture for every registered device managed by Zaperon. It shows the latest compliance status per device against configured device policies and highlights non-compliant devices so security and IT teams can take immediate remediation actions.
This report consolidates device attributes — such as OS, antivirus status, disk encryption, and policy checks — and surfaces devices that fail required controls, enabling rapid incident response and compliance monitoring.
Compliance Monitoring
Continuously track which devices meet your security policies and identify those that require remediation.
Incident Response & Forensics
Find device-level details (OS, IP, last scan time) to aid investigations when a security event involves a specific endpoint.
Operational Actions
Prioritize remediation (patching, policy application, device re-enrollment) and track non-compliant device counts across the organization.
To ensure devices are included and evaluated in this report:
Devices must be registered or enrolled — see Register/Unregister a user device
Relevant device compliance policies must be defined and applied under Manage Zero Trust Access Policies
The device agent or connector must be installed and communicating with Zaperon
Note: The report shows only the latest compliance scan result for each registered device.
1. Go to Reports >Device Compliance. Zaperon is continuously validating the device compliance and only the latest record for each registered device appears in the report along with summary metrics (Total Registered Devices, Non-Compliant Devices).
2. Any non-compliant device will be highlighted in red and it will appear in the Non-Compliant Devices summary on the top.
Note: Use the filter dropdown to view data for the last 24 hours, weekly, or monthly periods. Zaperon retains device compliance data for up to 6 months.
Download device compliance logs for audits, reporting, or offline analysis. Click Export CSV on the Device Compliance page, select a time range or filtered view, and download the report. Exported data can be used for compliance reviews or SIEM ingestion. → Refer to Exporting a Report.
Use the Device Compliance Report to detect and prioritize non-compliant endpoints, support incident response with device-level context, and validate that device posture controls are enforced across your environment. The report helps security and IT teams maintain audit readiness and reduce endpoint risk.