tatersecurity.com Open App

Fleet Management

Track your entire device fleet with compliance scoring, MDE integration, vulnerability analysis, software inventory, CISA KEV enrichment, and smart application discovery.

TATER Devices page showing fleet overview with device list and MDE status

Devices Overview

The Devices page provides a unified view of all endpoints in your organization, combining data from multiple sources:

  • Agent-reported devices: Endpoints running the TATER Agent that report compliance scan results and speed tests
  • MDE-discovered devices: Devices from Microsoft Defender for Endpoint, automatically bridged into the fleet view
  • Intune-managed devices: Devices enrolled in Microsoft Intune with compliance status

Device List

The device list table shows each device with the following columns:

  • Name: Device hostname or display name
  • Type: Workstation, Server, Mobile, or Virtual Machine
  • OS: Operating system and version
  • Last Seen: When the device last reported data
  • Compliance: Pass rate percentage across evaluated controls
  • MDE Status: Defender health status, risk score, or exposure level
  • Vulnerabilities: Count of known CVEs affecting the device

Device Detail View

Click any device to open the detail panel with comprehensive information organized into sections:

Hardware & System Information

  • Computer name, domain, and organizational unit
  • Operating system, version, and build number
  • CPU, RAM, and disk information (when reported by the agent)
  • Network adapters and IP addresses
  • Last boot time and uptime

Speed Test Results

If the device has run a speed test via the TATER Agent, the detail view shows:

  • Download speed in Mbps
  • Upload speed (if available)
  • Latency measurements
  • Historical speed test trend

Defender for Endpoint Status

For devices onboarded to MDE, the detail view includes a dedicated security section:

  • Health Status: Active, Inactive, Imbalanced, or No Sensor Data
  • Risk Score: None, Low, Medium, High (aggregated threat assessment)
  • Exposure Level: None, Low, Medium, High (based on unpatched vulnerabilities)
  • Onboarding Status: Whether the device is fully onboarded to MDE
  • Last Seen: When MDE last received telemetry from the device
  • Tags: MDE device tags for grouping and filtering

Vulnerabilities

The vulnerabilities section shows CVEs affecting the device:

  • CVE counts broken down by severity (Critical, High, Medium, Low)
  • Top 20 Critical and High severity CVEs with NVD links
  • CISA KEV flags indicating actively exploited vulnerabilities
  • EPSS (Exploit Prediction Scoring System) probability scores where available
  • Ransomware campaign associations from CISA KEV data
CISA KEV Priority

Vulnerabilities flagged in the CISA Known Exploited Vulnerabilities catalog are under active exploitation and should be prioritized for immediate remediation regardless of their CVSS score.

Installed Software

The software section lists all software detected by MDE on the device:

  • Software name, vendor, and installed version
  • Weakness count (number of known CVEs for that software version)
  • End-of-Life (EOL) flagging with version lifecycle data from endoflife.date API
  • Sorting by weakness count to prioritize the most vulnerable software

Endpoint Security Dashboard

TATER Endpoint Security dashboard showing vulnerability summary, devices, and CISA KEV data

The Endpoint Security dashboard provides an organization-wide view of endpoint security posture with six tab views:

Summary Cards

  • Total Devices: Count of all devices in the fleet
  • Vulnerabilities: Total CVE count broken down by severity
  • Critical: Number of critical-severity CVEs requiring immediate attention
  • High: Number of high-severity CVEs
  • CISA KEV: Count of actively exploited vulnerabilities across the fleet
  • Software: Total unique software titles tracked

Tab Views

TabContent
DevicesFull device inventory with MDE health, risk score, and vulnerability counts
VulnerabilitiesAll CVEs across the fleet with severity, CVSS score, affected device count, and CISA KEV flags
CISA KEVActively exploited vulnerabilities with due dates, ransomware associations, and affected devices
SoftwareSoftware inventory with version tracking, EOL status, and vulnerability counts
RecommendationsMDE security recommendations with remediation guidance
Intune ComplianceIntune device compliance status and configuration profile results

Endpoint Hardening Plan

The Endpoint Hardening Plan is a compliance checklist covering 1,318 CIS Benchmark controls for Windows endpoints. It is accessible from Security → Endpoint Security → Hardening Plan (or the Endpoint Hardening Plan tab within the Endpoint Security page).

Control Coverage

FamilyControlsScope
Windows 11 Enterprise435Workstations and managed desktops (W11E_* IDs)
Windows Server 2019286Server workloads — DCs, application servers (SRV19_* IDs)
Windows Server 2022287Server workloads — DCs, application servers (SRV22_* IDs)
Windows Server 2025310Next-generation server environments (SRV25_* IDs)

Status Sources

Each control's status in the hardening plan is resolved from the most recent endpoint scan:

  • Pass — control evaluated and compliant in the latest scan
  • Fail — control evaluated and non-compliant; remediation available
  • Manual — control requires human verification; cannot be automated
  • Not Scanned — no scan data exists yet for this control; deploy the TATER Agent to get results

Filters and Bulk Selection

  • Severity filter — show only Critical, High, Medium, or Low controls
  • Status filter — limit the view to Pass, Fail, Manual, or Not Scanned controls
  • Bulk select — check multiple controls and trigger remediation for all of them in one batch

One-Click Remediation

Each control with a corresponding remediation script shows a ⚡ Remediate button. Clicking it triggers the Run-Remediation.ps1 Azure Automation runbook, which:

  1. Downloads the control's PowerShell script from blob storage (Remediations/{family}/REM_{family}_{NNN}_*.ps1)
  2. Downloads the shared helper library (Remediations/REM_WIN_Helpers.ps1)
  3. Executes the script on the target endpoint via the runbook's managed identity
  4. Captures pre/post state and writes a structured JSON run log
  5. Reports success or failure back to the TATER API
Tip

The remediation system must be enabled and a webhook URL configured in Settings → Remediation before the ⚡ Remediate button appears. See the Settings Reference → Remediation for setup details.

Structured Run Logs & AI Analysis

After a batch remediation completes, the hardening plan generates a structured JSON run log capturing the pre/post state of every control that was acted upon. You can:

  • Download the run log from the plan panel's Analysis tab
  • Use the Copy Prompt button to generate a ready-to-paste AI analysis prompt that includes org name, device OS, control list, and expected state
  • Paste the prompt into the TATER AI Analyst (or Claude Desktop via MCP) to identify patterns, confirm changes, and generate a remediation improvement report

MDE Device Bridging

TATER automatically bridges devices discovered through MDE into the fleet management system:

  1. After an endpoint scan completes, bridgeEndpointScanDevices() runs automatically
  2. Existing devices are enriched with MDE data: health status, risk score, exposure level, last seen
  3. New devices not already in the fleet are auto-created with type "workstation" and a note indicating MDE auto-discovery
  4. Global maps are populated: window._mdeVulnMap, window._mdeSoftware, window._mdeKevMap

Archiving Devices

Devices that are decommissioned or no longer in use can be archived:

  • Select one or more devices and click Archive
  • Archived devices are moved out of the active fleet view but retained for historical records
  • Archived devices can be restored at any time from the archive view
  • Compliance scores and reports exclude archived devices by default

Smart App Discovery

TATER automatically discovers trackable software from endpoint scans and creates compliance zones for monitoring:

How Discovery Works

  1. The autoRegisterDiscoveredApps() function runs at initialization after endpoint scan data loads
  2. Software is matched against the _TRACKABLE_SOFTWARE allowlist (80 entries covering common enterprise software)
  3. Applications meeting criteria are auto-registered as compliance zones:
    • Has known vulnerabilities
    • Installed on 5+ devices
    • Is marked as End-of-Life
  4. Discovered zones have IDs prefixed with disc- and are marked with isDiscovered: true

Version Lifecycle Badges

Discovered applications display version lifecycle status badges sourced from the endoflife.date API:

BadgeMeaning
Up to Date (green)Running the latest supported version
Update Available (yellow)Minor update available within the same major version
Major Update (orange)Major version upgrade available
EOL (red)End-of-Life; no longer receiving security updates

Linux Compliance Controls

The TATER Agent for Linux runs 20 bash-based compliance controls covering CIS Linux Benchmark areas. Controls are executed by the agent on each scan cycle and results are uploaded to the TATER API.

Control Coverage

IDControl
LNX_001Firewall enabled (ufw / firewalld / iptables)
LNX_002SSH hardening (PermitRootLogin, PasswordAuthentication, Protocol 2)
LNX_003Disk encryption (LUKS via lsblk / cryptsetup)
LNX_004Automatic security updates (unattended-upgrades / dnf-automatic / yum-cron)
LNX_005Password policy (/etc/login.defs + pam_pwquality)
LNX_006No empty passwords (/etc/shadow audit)
LNX_007NTP time synchronization (timedatectl / chrony / ntpd)
LNX_008Mandatory Access Control enabled (SELinux / AppArmor)
LNX_009auditd running and enabled
LNX_010Kernel hardening (sysctl: ASLR, ip_forward, dmesg_restrict)
LNX_011Core dumps disabled (limits.conf + suid_dumpable)
LNX_012USB storage module blacklisted (modprobe.d)
LNX_013Syslog service running (rsyslog / syslog-ng / journald)
LNX_014Package updates applied within 30 days
LNX_015Failed login monitoring (fail2ban / pam_tally2 / faillock)
LNX_016No unrestricted sudo (NOPASSWD: ALL not present)
LNX_017No world-writable directories outside /tmp
LNX_018/tmp mounted with noexec, nosuid flags
LNX_019Antivirus present (ClamAV / Sophos / other)
LNX_020Guest account disabled

Linux Agent Installation

Download the Linux agent package from Settings > Endpoint Agent and run the install script:

# Download and install (amd64)
wget https://www.tatersecurity.com/Agent/tater-agent-linux-amd64.tar.gz
tar -xzf tater-agent-linux-amd64.tar.gz
sudo TATER_API_BASE="https://api.tatersecurity.com/api" \
     TATER_API_KEY="your-api-key" \
     TATER_TENANT_ID="your-tenant-id" \
     TATER_ORG_ID="your-org-id" \
     bash install.sh

The installer places the binary at /usr/local/bin/tater-agent, creates the data directory at /var/lib/tater, and installs a systemd unit (tater-agent.service) that starts on boot. Controls run from /var/lib/tater/Controls/Linux/.

ARM64 Support

The Linux agent is available for both amd64 (x86-64) and arm64 architectures, supporting Raspberry Pi, AWS Graviton, and Apple Silicon (via Lima/Rosetta). Download the appropriate binary from Settings > Endpoint Agent.

EPSS Scores

The Exploit Prediction Scoring System (EPSS) provides a probability score (0-1.0) estimating the likelihood that a vulnerability will be exploited in the wild within the next 30 days. TATER displays EPSS scores alongside CVSS scores to help prioritize remediation:

  • EPSS scores above 0.5 indicate a high probability of exploitation
  • Combined with CISA KEV flags, EPSS helps identify the most urgent vulnerabilities
  • Sort the vulnerability table by EPSS to focus on the most likely-to-be-exploited CVEs

CISA KEV Integration

The CISA Known Exploited Vulnerabilities catalog is downloaded during each endpoint scan and cross-referenced with MDE CVE data:

  • KEV-flagged vulnerabilities display a red badge in all vulnerability views
  • The CISA KEV tab shows all actively exploited CVEs affecting your fleet
  • Ransomware campaign associations are tracked (e.g., "Known" ransomware use)
  • Due dates from CISA directives are displayed for federal agency compliance
  • An alert banner appears when new KEV entries match vulnerabilities in your fleet