Skip to content
Avert

Avert

Published by Iru, Inc

Configure Avert settings to establish comprehensive malware detection and prevention policies that protect managed endpoints from malicious software, potentially unwanted programs (PUPs), and security threats. This profile enables IT administrators to define organizational threat tolerance levels, create custom allow and block lists for specific applications or file types, and enforce real-time threat response actions. Avert provides layered security by combining signature-based detection with behavioral analysis to identify emerging threats while offering granular control over application execution policies, ensuring endpoints remain secure without impacting legitimate business operations or user productivity.

OS requirements
macOS 10.15+
Related items:
Vulnerability Response
Vulnerability Response

Configure Vulnerability Response settings to automate critical security patch deployment when high-severity or critical CVEs (Common Vulnerabilities and Exposures) are detected in managed applications across your Mac devices. This profile enables IT administrators to establish automated remediation workflows that leverage Kandji Auto Apps to immediately update vulnerable software without requiring manual intervention or user action. Vulnerability Response reduces the window of exposure to actively exploited security flaws by eliminating deployment delays, ensuring compliance with security patch timelines, and protecting endpoints from known threats through intelligent, priority-based update enforcement that responds dynamically to emerging vulnerability disclosures.

Gatekeeper
Gatekeeper

Gatekeeper enforces code signing and notarization requirements to protect Mac devices from malicious software. Configure policies to allow applications from the App Store only, identified developers, or custom trust settings. Manage security assessments for downloaded files, control Gatekeeper bypass permissions, and enforce application execution policies across your Apple devices. Essential for organizations maintaining security compliance while balancing user productivity needs and managing software deployment workflows.

Microsoft Defender
Microsoft Defender

The Microsoft Defender profile enables centralized configuration and enforcement of security settings for Microsoft Defender on Windows endpoints. Administrators can define policies for real-time threat protection, firewall rules, ransomware protection, controlled folder access, and attack surface reduction. The profile ensures continuous enforcement of security configurations, automatically remediating any drift to maintain compliance with organizational standards. By managing Defender settings through Iru's unified platform, organizations strengthen their security posture using native Windows protection capabilities while maintaining centralized visibility and control across their Windows device fleet.