My Security Checks
The My Security Checks module ensures that each user completes essential security actions to maintain compliance and protect their devices. This module guides users through required and optional steps that strengthen security and support organizational compliance standards.
The checklist is designed to be simple and action-driven, showing clear progress indicators and step-by-step tasks.
Navigating to My Security Checks

To access the My Security Checks module:
Log in to Socify.
From the left navigation menu, scroll to the User Management section.
Select My Security Checks.
The Security Checklist screen will appear with your personal required actions.
1. Security Checklist Overview
The Security Checklist screen displays:
Progress Bar – Shows the total number of tasks completed out of the total required.
Task List – Contains required and optional actions.
Status Labels – Each task is marked as Required or Optional.
Expandable Sections – Clicking a task expands it to show detailed steps.
The checklist currently includes two main tasks:
Accept Security Policies
Install Device Monitor
TASK 1: Accept Security Policies

1.1 Purpose
This task ensures users acknowledge all organizational security policies before accessing or using the system. Reviewing and accepting policies is mandatory to maintain compliance.
1.2 What You See
The task displays a list of all security and governance policies, including but not limited to:
Code of Business Conduct Policy
Information Security Policy
Asset Management Policy
Data Classification Policy … and more.
Each policy is presented as a clickable link for easy review.
1.3 Actions to Complete
Click each policy to review its content.
After reviewing, click the Accept Policies button at the bottom of the list.
The task status will update from Required to Completed.
TASK 2: Install Device Monitor

2.1 Purpose
Installing the monitoring agent ensures your device meets compliance and security standards. It enables secure evidence collection and continuous monitoring where required.
2.2 What You See
The device installation section includes:
OS selection options:
Windows
Mac OS (x64 Intel chip)
Mac OS (arm64)
A Download button that adjusts based on the selected OS.
A Registration Key used during installation.
A Notes section providing installation guidance.
A status label showing Not Installed Yet or Installed.
2.3 Actions to Complete
Select your operating system from the available options.
Click the download button (e.g., Download for Windows).
Follow the installation instructions:
Windows: Run the .msi file and follow prompts.
Mac: Open the .dmg file and drag the application into Applications.
Enter the provided Registration Key during setup if prompted.
After installation, the system will automatically detect your agent status and update the task accordingly.
2.4 Notes Provided in the Module
Contact IT support if installation issues occur.
Follow OS-specific installation steps as displayed.
Status updates automatically after successful installation.
2. Task Status Indicators
Each task uses clear labels to indicate progress:
Required – Must be completed to meet compliance standards.
Optional – Enhances security but not mandatory.
Completed – Action finished successfully.
Not Installed Yet – Used specifically for device monitoring.
3. Best Practices for Users
Review all policies carefully before accepting.
Install the monitoring agent on your primary work device only.
Ensure the device remains online during installation for proper status syncing.
Contact IT support if the installation status does not update automatically.
Complete required tasks promptly to avoid compliance gaps.
4. Summary
The My Security Checks module ensures that every user meets core security requirements by reviewing organizational policies and installing essential monitoring tools. Completing these tasks not only enhances personal device security but also contributes to the overall compliance posture of the organization.
This module is straightforward, progress-based, and designed to keep users compliant and protected with minimal effort.
Last updated