← Back to all integrations
Monitor your managed devices and ensure correct security settings.
Coming SoonComing Soon

Snipe-IT

Integrating with Snipe-IT enables you to keep track of your devices, their security, and take action when there are changes.

Snipe-IT

automatically associates devices to the workforce member that uses it as well as checks that devices have disk encryption and automatic updates enabled.

Automate Asset Inventories

By integrating with Snipe-IT, you'll quickly create an inventory of all your Snipe-IT-managed devices (laptops, phones, etc.). Also, Comply uses the email on the Snipe-IT device to automatically associate it to the workforce member that uses it if they're tracked in your asset inventory.

Automate Procedures for devices change

Use procedures to automatically trigger ticket creation and task assignment when devices are added or removed from Snipe-IT.

Automate Evidence Collection

Device Security Settings

When syncing your devices, we automatically check them for secure settings.

Disk Encryption

Every month, Comply will scan your devices to check them for disk encryption settings.

Automatic Updates

Every month, Comply will scan your devices to check them for automatic updates settings.

Automations

Disk Encryption

Ensures that all boot partitions are encrypted for computers managed in JAMF as part of a Computer Config Scan.

  • A.10.1.1
  • CC6.1
  • CC6.7
  • 164.310(c)
  • 164.312(a)(2)(iv)
  • 164.312(e)(2)(ii)
Assets synced
  • Devices
Domains Automated
  • Mobile Device Management
Frameworks Automated
ISO 27001:2013
SOC 2
HIPAA
Requirements Automated
A.10.1.1
ISO 27001:2013
Policy on the use of cryptographic controls
A policy on the use of cryptographic controls for protection of information shall be developed and implemented.
CC6.1
SOC 2
Logical and Physical Access Controls
The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives.
CC6.7
SOC 2
Logical and Physical Access Controls
The entity restricts the transmission, movement, and removal of information to authorized internal and external users and processes, and protects it during transmission, movement, or removal to meet the entity’s objectives.
164.310(c)
HIPAA
Standard: Workstation Security (R)
Implement physical safeguards for all workstations that access electronic protected health information, to restrict access to authorized users.
164.312(a)(2)(iv)
HIPAA
Encryption and Decryption (A)
Implement a mechanism to encrypt and decrypt electronic protected health information.
164.312(e)(2)(ii)
HIPAA
Encryption (A)
Implement a mechanism to encrypt electronic protected health information whenever deemed appropriate.
Integration scopes
  • Level: Service Account
  • Permissions: Read Only