Asset Management

SecureSlate Evidence Collection Guide for Asset Management

This guide helps asset managers collect and verify evidence for key security compliance requirements. Follow the instructions for your operating system to ensure devices meet organizational security standards.

1. Hard Drive Encryption

Purpose: Protects data at rest by making it unreadable without authentication. Critical for lost or stolen devices.

Windows

Device Encryption:

  1. Go to Start → Settings → Privacy & Security → Device Encryption.

  2. If Device Encryption is On, take a screenshot.

  3. If the option is missing, the device may not support it.
     
    Asset Evidence
    BitLocker (Windows Pro/Enterprise):

  4. Open Control Panel → System and Security → BitLocker Drive Encryption.

  5. Ensure BitLocker is On for your system drive.

  6. Save the recovery key securely.

  7. Take a screenshot showing the status.

Learn more about HD Encryption

macOS

  1. Open Apple menu → System Settings → Privacy & Security → FileVault.
  2. If FileVault is On, take a screenshot.
  3. To enable, click Turn On, follow prompts, and store your recovery option securely (iCloud or recovery key).

Older macOS versions: Go to System Preferences → Security & Privacy → FileVault tab. Verify it shows "FileVault is turned on".

Important Notes: FileVault must be fully enabled and initial encryption complete. Reboot may be required for compliance tools to detect the status.

2. Anti-Virus / Anti-Malware

Purpose: Detects and removes malicious software to protect devices and company data.

Windows

Windows Defender (Built-in):

  1. Start → search Windows Security → open app.
  2. Click Virus & threat protection.
  3. Ensure Real-time protection is On.
  4. Verify updates are current.
     
    Asset Evidence
    Third-party Antivirus: Check Settings → Apps → Installed apps for software like Norton, McAfee, Bitdefender, Trend Micro, Sophos, Avast, AVG, Webroot.

Evidence: Screenshot of Windows Security showing real-time protection; screenshot of antivirus software in installed apps; screenshot showing definitions updated within last 7 days.

macOS

Built-in Protection (XProtect & Gatekeeper): Apple menu → System Settings → Privacy & Security. Ensure "Install system data files and security updates" is enabled. Under Security, verify App Store and identified developers selected.

Third-party Antivirus: Check Applications folder for Norton, McAfee, Bitdefender, Trend Micro, Sophos, Malwarebytes. Use Spotlight search if needed.

Evidence: Screenshot of Security & Privacy settings; screenshot of Applications folder; screenshot from antivirus showing active status and updated definitions.

Important Notes: Antivirus definitions should be updated at least weekly. Software must provide real-time protection.

3. Password Policy

Purpose: Ensures strong passwords to reduce risk of compromise.

Common Requirements: 8–14+ characters (longer recommended); uppercase & lowercase letters; at least one number and one special character; no username or common words; no reuse of recent passwords.

Windows

Active Directory / Local Account: Press Windows + R, type secpol.msc, press Enter. Navigate Account Policies → Password Policy. Check minimum length, complexity, max/min age, history.

Group Policy (Domain): Press Windows + R, type gpmc.msc, press Enter. Navigate Computer Configuration → Policies → Windows Settings → Security Settings → Account Policies → Password Policy.

Evidence: Screenshot of Local Security Policy; document requirements (length, complexity, age). For Group Policy, screenshot Domain Default Policy.
 
Asset Evidence

macOS

Go to System Settings → Users & Groups. Click (i) next to a user account to view password requirements.

MDM Environments: Contact IT for enforced password policies. Export screenshot or profile if possible.

Important Notes: Many organizations enforce policies via Active Directory, Azure AD, Okta, etc. NIST recommends longer passwords over complex short ones.

4. Screen Lock Policy

Purpose: Prevents unauthorized access when devices are unattended.

Compliance Requirement: Lock automatically after ≤15 minutes of inactivity. Require password immediately when unlocking.

Windows

Option 1 – Screen Saver Settings: Start → search screen saver → Change screen saver. Select screen saver (not None). Set Wait ≤15 minutes. Enable "On resume, display logon screen".

Option 2 – Sleep Settings: Settings → System → Power & Sleep. Set sleep timers ≤15 minutes for battery and plugged-in. Accounts → Sign-in options → Require sign-in on wake: Immediately.

Option 3 – Group Policy (if applicable): Use "Interactive logon: Machine inactivity limit" to lock screen 1–15 minutes.

Evidence:

  • Screenshot of screen saver settings;
  • screenshot of power & sleep settings;
  • screenshot of sign-in options.
     
    Asset Evidence

macOS

Option 1 – Lock Screen Settings: Apple menu → System Settings → Lock Screen. Start screen saver ≤15 minutes. Require password: Immediately.

Option 2 – Display & Power Settings: Battery / Energy Saver → Display turn-off ≤15 minutes for both battery and adapter.

Evidence: Screenshots showing screen saver and password timing. Screenshots should include device name and current settings.

Important Notes: Total idle time ≤15 minutes. Both battery and adapter settings must comply.

5. Firewall

Purpose: Monitors and controls network traffic to prevent unauthorized access.

Windows – Windows Defender Firewall

Start → Windows Security → Firewall & network protection. Ensure Domain, Private, Public networks all show "Firewall is on".

Alternative: Press Windows + R, type firewall.cpl, Enter.

Evidence: Screenshot showing firewall enabled for all network types. Include date and time.

Learn more Firewall
 
Asset Evidence

macOS – Application Firewall

Apple menu → System Settings → Network → Firewall. Verify firewall is On.

Older macOS: System Preferences → Security & Privacy → Firewall tab → Firewall: On.

Recommended Options: Allow built-in software and signed downloaded apps. Optional: Enable stealth mode.

Advanced Terminal Check:

/usr/libexec/ApplicationFirewall/socketfilterfw --getglobalstate

Output should show: Firewall is enabled. (State = 1)

Evidence: Screenshot of System Settings toggle. Terminal output showing firewall state.

Important Notes: macOS firewall is off by default; enable for public networks, servers, or non-App Store downloads.


Tips for Asset Management

Screenshots should include: Date & time; Device name; Full window showing setting/status.

Organize evidence by: Device name or asset ID; Date of collection; Control type.

Verification: Check compliance monthly/quarterly; document exceptions or remediation plans; keep evidence in a centralized repository.

Common Issues & Solutions

Issue Solution
Encryption not showing Verify process completed, reboot, check updates
Antivirus out of date Manually update, verify internet connectivity, enable automatic updates
Screen lock not working Check power settings, group policies, user settings
Firewall disabled Re-enable via system settings, verify third-party conflicts, check group policies

For step-by-step instructions on uploading this evidence during onboarding in SecureSlate, see Manual evidence uploads for personnel asset compliance check.

Need Help?

  • Contact IT Security team
  • Consult organization's security policies
  • Reference your compliance framework (SOC 2, ISO 27001, HIPAA, etc.)

Last updated: March 9, 2026