Meta pixel

Endpoint operations

Understand your computers

A device verifying compliance for every endpoint
Pulse check anything

Use a live connection to every endpoint to simplify audit, compliance, and reporting from workstations to data centers.

Ship data to any platform

Ship logs to any platform like Splunk, Snowflake, or any streaming infrastructure like AWS Kinesis and Apache Kafka.

Osquery on easy mode

Use "read-only" mode or enable remote scripting to automate anything on every operating system, including Linux.

an opening quotation mark

“Fleet provides a way to surface device data and telemetry to our other teams and partners.”

Nick Fohs

Nick Fohs

Systems and infrastructure manager

NEW

"This is a terrible time to mess with my computer."

Install updates and force restarts when your users’ computers are actually free.

play buttonWatch the video

Automate anything

Remote-control IT tasks on every kind of computer – even you, Linux.

Write and run scripts remotely, report progress, and replay queued up tasks on computers that went offline.

Integrate Google Calendar to install updates and force restarts when your users’ computers are actually free.

Reduce human error by automating click-tastic tasks directly on the host with Open Interpreter.*

*Coming soon

Ship data to any platform

Pulse check anything

Use a live connection to every endpoint to simplify audit, compliance, and reporting from workstations to data centers.

Software and asset inventory
Live connection

Talk to online devices in real time with Fleet’s live query API. Implement custom workflows like conditional access based on device posture, Identity, and more.

Software and asset inventory
Software and asset inventory

Get visibility into all endpoints across any operating system*, including support for servers and containers in every cloud infrastructure.

See logins for every endpoint
See logins for every endpoint

Identify who logs in to any system, including login history and current sessions. Look up any computer by the email address of the person using it.

CIS benchmarks
CIS benchmarks

Keep all your endpoints* compliant with customizable baselines, or use common benchmarks like CIS.

Get in front of the IdP
Get in front of the IdP

Gate access with common device trust policies from industry peers, or roll out your own device health checks using system data and events.

Verify updates and settings
Verify updates and settings

Track progress towards deadlines for security posture remediation projects, and enforce due dates through automations.

Verify updates and settings
EDR health checks

Verify that your EDR tools are installed and working so you can identify and address configuration issues quickly.

*Currently limited to: macOS, Linux, Windows, Chromebooks, OT, data centers, Amazon Web Services (AWS), Google Cloud (GCP), and the Microsoft Cloud (Azure).

Ship data to any platform

Export anything. Ship data to any platform like Splunk, Snowflake, or any streaming infrastructure like AWS Kinesis and Apache Kafka.

Extract data and correlate it with your log aggregator, SIEM, or data lake.

Ease your logging burden, pull the data you need.

Ship data to any platform
Ship data to any platform

Osquery on easy mode

Accelerate deployment and get more out of osquery. You don’t need to be an osquery expert to get the answers you need from your devices.

Remotely disable/enable agent features, choose plugins, and keep osquery up to date.

Import community queries from other security teams at top brands like Palantir and Fastly.

Implement the Center for Internet Security (CIS) benchmarks (one click, 400+ queries, supported by Fleet). Or customize exactly the queries you need.

Monitor sensitive production environments without enabling remote scripting by building the agent in "read-only" mode.

Open security tooling

Consolidate your security tooling on top of open data standards like YAML, SQL, and JSON.

Incident response (IR)
Incident response (IR)

Contain and recover from breaches using live data, remote commands, and automated workflows.

Detection and response
Detection and response

Ship logs and alerts when unusual behavior is detected. Run scripts on demand or when alerts trigger.

File access monitoring (FIM)
File access monitoring (FIM)

Specify files to monitor for changes or deletions, then log those events to your SIEM or data lake.

Attack surface management
Attack surface management

Discover security misconfigurations and vulnerabilities and prioritize risks that matter to your organization.

Malware detection
Malware detection

Continuously scan host filesystems for indicators of compromise (IOC). Import malware signatures from threat intelligence sources.

Osquery made easy
Osquery made easy

Collect exactly the data you need from your production infrastructure across every cloud and data center*.

*Companies like Fastly and Gusto use Fleet in production with hundreds of thousands of endpoints, including containers, OT, and laptops.

Who else uses Fleet?

Empowering IT and security teams, globally

Endpoint operations

Understand your computers