{"id":6918,"date":"2025-03-27T12:42:14","date_gmt":"2025-03-27T12:42:14","guid":{"rendered":"https:\/\/anakage.com\/blog\/?post_type=lp_course&#038;p=6918"},"modified":"2025-04-16T12:54:36","modified_gmt":"2025-04-16T12:54:36","slug":"device-analytic-training","status":"publish","type":"lp_course","link":"https:\/\/www.anakage.com\/blog\/courses\/device-analytic-training\/","title":{"rendered":"Device Analytic\u200b Training"},"content":{"rendered":"<ul>\n<li data-start=\"98\" data-end=\"186\"><strong data-start=\"98\" data-end=\"117\">Host Compliance<\/strong> \u2013 Ensures the system adheres to security and operational policies.<\/li>\n<li data-start=\"189\" data-end=\"263\"><strong data-start=\"189\" data-end=\"207\">Device Details<\/strong> \u2013 Collects essential hardware and system information.<\/li>\n<li data-start=\"266\" data-end=\"353\"><strong data-start=\"266\" data-end=\"288\">Essential Software<\/strong> \u2013 Verifies that required software is installed and up to date.<\/li>\n<li data-start=\"356\" data-end=\"429\"><strong data-start=\"356\" data-end=\"377\">Essential Service<\/strong> \u2013 Checks if critical system services are running.<\/li>\n<li data-start=\"432\" data-end=\"515\"><strong data-start=\"432\" data-end=\"454\">Blacklist Software<\/strong> \u2013 Detects and reports unauthorized or banned applications.<\/li>\n<li data-start=\"518\" data-end=\"588\"><strong data-start=\"518\" data-end=\"529\">Browser<\/strong> \u2013 Assesses browser settings and security configurations.<\/li>\n<li data-start=\"591\" data-end=\"658\"><strong data-start=\"591\" data-end=\"604\">Hard Disk<\/strong> \u2013 Monitors disk health, usage, and available space.<\/li>\n<li data-start=\"661\" data-end=\"737\"><strong data-start=\"661\" data-end=\"670\">Patch<\/strong> \u2013 Ensures all necessary system and security patches are applied.<\/li>\n<li data-start=\"740\" data-end=\"802\"><strong data-start=\"740\" data-end=\"751\">Battery<\/strong> \u2013 Checks battery health and performance metrics.<\/li>\n<li data-start=\"805\" data-end=\"898\"><strong data-start=\"805\" data-end=\"818\">Antivirus<\/strong> \u2013 Validates antivirus installation, updates, and real-time protection status.<\/li>\n<li data-start=\"901\" data-end=\"985\"><strong data-start=\"901\" data-end=\"916\">Performance<\/strong> \u2013 Analyzes system performance, including CPU, RAM, and disk usage.<\/li>\n<li data-start=\"988\" data-end=\"1071\"><strong data-start=\"988\" data-end=\"1013\">Windows Control Check<\/strong> \u2013 Audits Windows security settings and user privileges.<\/li>\n<li data-start=\"1074\" data-end=\"1154\"><strong data-start=\"1074\" data-end=\"1096\">System Folder Size<\/strong> \u2013 Reviews system directories for excessive storage use.<\/li>\n<li data-start=\"1157\" data-end=\"1233\"><strong data-start=\"1157\" data-end=\"1178\">Application Error<\/strong> \u2013 Identifies and logs critical application failures.<\/li>\n<li data-start=\"1236\" data-end=\"1312\"><strong data-start=\"1236\" data-end=\"1246\">Report<\/strong> \u2013 Summarizes compliance status and generates a detailed report.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Host Compliance \u2013 Ensures the system adheres to security and operational policies. Device Details \u2013 Collects essential hardware and system [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7458,"comment_status":"closed","ping_status":"closed","template":"","course_category":[],"course_tag":[],"coauthors":[88],"class_list":["post-6918","lp_course","type-lp_course","status-publish","has-post-thumbnail","hentry","course"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/lp_course\/6918","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/lp_course"}],"about":[{"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/types\/lp_course"}],"author":[{"embeddable":true,"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/comments?post=6918"}],"version-history":[{"count":0,"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/lp_course\/6918\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/media\/7458"}],"wp:attachment":[{"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/media?parent=6918"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/course_category?post=6918"},{"taxonomy":"course_tag","embeddable":true,"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/course_tag?post=6918"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.anakage.com\/blog\/wp-json\/wp\/v2\/coauthors?post=6918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}