Skip to content

Management Posture Detection

Management Posture Detection gives visibility into what tools are actively managing an endpoint — MDM, RMM, endpoint security, backup agents, identity providers, and more. The Breeze agent scans each device on a regular schedule and reports back a structured snapshot of every detected management tool along with its operational status.

This feature is useful for auditing management overlap, identifying unmanaged devices, confirming security tooling is active, and conducting onboarding assessments.


What is detected

Tool categories

Breeze detects tools across 11 categories:

CategoryExample tools
MDMMicrosoft Intune, JAMF Pro, Mosyle, Kandji
RMMConnectWise Automate, NinjaOne, Datto RMM, ScreenConnect
Endpoint SecurityCrowdStrike Falcon, SentinelOne, Sophos Endpoint, Bitdefender
Remote AccessTeamViewer, AnyDesk, Splashtop, LogMeIn
Policy EngineSCCM/MECM, Group Policy, Chef, Puppet, Salt
BackupVeeam Agent, Acronis Cyber Protect, Datto BCDR
Identity/MFAOkta Verify, Duo Desktop, JumpCloud
Zero Trust/VPNZscaler, Cloudflare WARP, Tailscale
SIEMSplunk Universal Forwarder, Elastic Agent, Wazuh
DNS FilteringCisco Umbrella, DNSFilter, Netskope
Patch ManagementAutomox, Windows Update

Detection status

Each detected tool is reported with one of three statuses:

StatusMeaning
activeThe tool’s service or process was found running at scan time
installedSupporting files or registry keys are present but the service or process is not currently running
unknownThe tool was detected but its operational state could not be determined

Identity and directory detection

In addition to management tool detection, Breeze reports the device’s directory join status. This data is collected in the same scan and displayed alongside tool results.

FieldDescription
Join typehybrid_azure_ad, azure_ad, on_prem_ad, workplace, or none
Azure AD joinedBoolean — whether the device is Azure AD / Entra ID joined
Domain joinedBoolean — whether the device is joined to an on-premises Active Directory domain
Workplace joinedBoolean — whether the device has a workplace (BYOD) registration
Domain nameThe Active Directory or Entra ID domain the device is joined to
Azure tenant IDThe Azure AD / Entra ID tenant identifier (where applicable)
MDM enrollment URLThe MDM enrollment endpoint reported by the device
SourceDetection method used (e.g., dsregcmd, dsconfigad, unsupported)

On Windows, directory join status is gathered using dsregcmd. On macOS, it is gathered using dsconfigad for Active Directory binding and profiles status -type enrollment for MDM enrollment state.


Platform support

PlatformDetection methods
WindowsService queries (SCM), registry keys, file existence, dsregcmd (Azure AD / Entra ID and on-premises AD join status), GPO enumeration
macOSProcess checks, launch daemon plist file detection, profiles status -type enrollment (MDM enrollment state), dsconfigad (Active Directory binding)
LinuxProcess and file existence checks are supported, but no tool signatures currently target Linux. Linux detection coverage is planned for a future release.

Detection on Windows and macOS is signature-based: the agent evaluates each known tool’s service name, process name, installation paths, and registry keys in order.


Viewing posture in the UI

  1. Navigate to a device’s detail page.

  2. Click the Management tab.

  3. Detected tools are grouped by category. Each tool shows its name, optional version, and a status badge (active or installed).

  4. Identity and directory information appears in a separate Identity & Directory Status card at the top of the tab.

  5. The collection timestamp and scan duration are shown in the footer.

If posture data has not yet been collected for a device, the Management tab displays a placeholder message. Data is collected automatically during the agent’s heartbeat cycle — no manual trigger is required.


Data freshness

  • Posture is collected every 15 minutes as part of the agent heartbeat cycle.
  • The exact collection timestamp and scan duration (in milliseconds) are shown in the UI.
  • If a device goes offline, the Management tab continues to show the last known posture. The timestamp makes the age of the data visible.

API reference

MethodPathDescription
GET/api/v1/devices/:id/management-postureGet the management posture snapshot for a device
PUT/api/v1/agents/:id/management/posture(Agent only) Submit a posture scan result

Response fields — GET /api/v1/devices/:id/management-posture

FieldTypeDescription
deviceIdstringDevice UUID
hostnamestringDevice hostname
collectedbooleanWhether posture data has been collected at least once
postureobject | nullPosture snapshot, or null if not yet collected
posture.collectedAtstring (ISO 8601)Timestamp when the scan ran
posture.scanDurationMsnumberHow long the scan took, in milliseconds
posture.categoriesobjectMap of category key to array of detections
posture.identityobjectDirectory and identity join status
posture.errorsstring[]Any non-fatal errors encountered during the scan

Troubleshooting

Some tools not detected

Detection is signature-based. A tool may not appear if it was installed in a non-standard location or if its executable or service name differs from the expected value. Verify that the agent version is current, as new tool signatures are added in each release.

Most or all tools absent from results

The agent may lack the permissions needed to query services or registry keys. On Windows, the agent service account requires read access to the Service Control Manager (SCM). If the agent is running under a restricted account, elevate its privileges or run it as Local System.

macOS MDM not detected

MDM enrollment detection uses profiles status -type enrollment. This command may require elevated permissions on some macOS versions. If the Breeze agent is not running with administrator privileges, the enrollment state may not be readable and the MDM category may be absent or incomplete.

Posture not updating

Check that the device is online and that the agent service is running. Posture updates every 15 minutes; missed heartbeats delay the update by one cycle. If the device has been offline for an extended period, the Management tab timestamp will reflect the age of the last known state.

Linux shows no results

No tool signatures currently target Linux. While the agent supports process and file checks on Linux, no detection signatures have been defined for the platform yet. Linux detection coverage is planned for a future release.