My Security Checks

The My Security Checks module ensures that each user completes essential security actions to maintain compliance and protect their devices. This module guides users through required and optional steps that strengthen security and support organizational compliance standards.

The checklist is designed to be simple and action-driven, showing clear progress indicators and step-by-step tasks.


To access the My Security Checks module:

  1. Log in to Socify.

  2. From the left navigation menu, scroll to the User Management section.

  3. Select My Security Checks.

  4. The Security Checklist screen will appear with your personal required actions.


1. Security Checklist Overview

The Security Checklist screen displays:

  • Progress Bar – Shows the total number of tasks completed out of the total required.

  • Task List – Contains required and optional actions.

  • Status Labels – Each task is marked as Required or Optional.

  • Expandable Sections – Clicking a task expands it to show detailed steps.

The checklist currently includes two main tasks:

  1. Accept Security Policies

  2. Install Device Monitor


TASK 1: Accept Security Policies

1.1 Purpose

This task ensures users acknowledge all organizational security policies before accessing or using the system. Reviewing and accepting policies is mandatory to maintain compliance.

1.2 What You See

The task displays a list of all security and governance policies, including but not limited to:

  • Code of Business Conduct Policy

  • Information Security Policy

  • Asset Management Policy

  • Data Classification Policy … and more.

Each policy is presented as a clickable link for easy review.

1.3 Actions to Complete

  1. Click each policy to review its content.

  2. After reviewing, click the Accept Policies button at the bottom of the list.

  3. The task status will update from Required to Completed.


TASK 2: Install Device Monitor

2.1 Purpose

Installing the monitoring agent ensures your device meets compliance and security standards. It enables secure evidence collection and continuous monitoring where required.

2.2 What You See

The device installation section includes:

  • OS selection options:

    • Windows

    • Mac OS (x64 Intel chip)

    • Mac OS (arm64)

  • A Download button that adjusts based on the selected OS.

  • A Registration Key used during installation.

  • A Notes section providing installation guidance.

  • A status label showing Not Installed Yet or Installed.

2.3 Actions to Complete

  1. Select your operating system from the available options.

  2. Click the download button (e.g., Download for Windows).

  3. Follow the installation instructions:

    • Windows: Run the .msi file and follow prompts.

    • Mac: Open the .dmg file and drag the application into Applications.

  4. Enter the provided Registration Key during setup if prompted.

  5. After installation, the system will automatically detect your agent status and update the task accordingly.

2.4 Notes Provided in the Module

  • Contact IT support if installation issues occur.

  • Follow OS-specific installation steps as displayed.

  • Status updates automatically after successful installation.


2. Task Status Indicators

Each task uses clear labels to indicate progress:

  • Required – Must be completed to meet compliance standards.

  • Optional – Enhances security but not mandatory.

  • Completed – Action finished successfully.

  • Not Installed Yet – Used specifically for device monitoring.


3. Best Practices for Users

  • Review all policies carefully before accepting.

  • Install the monitoring agent on your primary work device only.

  • Ensure the device remains online during installation for proper status syncing.

  • Contact IT support if the installation status does not update automatically.

  • Complete required tasks promptly to avoid compliance gaps.


4. Summary

The My Security Checks module ensures that every user meets core security requirements by reviewing organizational policies and installing essential monitoring tools. Completing these tasks not only enhances personal device security but also contributes to the overall compliance posture of the organization.

This module is straightforward, progress-based, and designed to keep users compliant and protected with minimal effort.

Last updated