Remote-access Guide

compass enterprise remote access

by Miracle Watsica Published 2 years ago Updated 2 years ago
image

Why choose compass Enterprise Solutions?

The Compass Enterprise Solutions Team has more than 25 years living and breathing small to mid-sized business accounting software and CRM solutions that can help make your business easier to run and more profitable. Our goal is to always create a rewarding experience for you and our clients.

How do I sign up as a compass agent?

Open the latest Compass iOS app or go to Compass.com and choose "Register/Sign In". Select “Compass Agent”. Type in your Compass email address and hit “Continue”.

How does privileged access fit into enterprise access control?

Privileged access strategy is part of an overall enterprise access control strategy. This enterprise access model shows how privileged access fits into an overall enterprise access model. The primary stores of business value that an organization must protect are in the Data/Workload plane:

How do I authenticate my compass account?

Once open tap the green check mark “Accept” to authenticate. You also have the option to enter in your authentication code manually. Return to the sign in screen to see that the authentication has worked and you are signed in. Open the latest Compass iOS app or go to Compass.com and choose "Register/Sign In".

image

What is Compass Enterprise?

Compass Enterprise allows you to manage your objectives and helps managers to monitor the progress. Employees and manager can add comments through check-in.

How is compass executive compensation measured?

Executives can be measured by different attributes that tie to your organizational priorities and their individual contributions. Compass Executive Compensation helps you align Strategic goals and with Executive targets, results and compensation.

What is enterprise access model?

The enterprise access model supersedes and replaces the legacy tier model that was focused on containing unauthorized escalation of privilege in an on-premises Windows Server Active Directory environment.

Who manages privileged access pathways?

Finally, these systems must be managed and maintained by IT staff, developers, or others in the organizations , creating privileged access pathways. Because of the high level of control they provide over business critical assets in the organization, these pathways must be stringently protected against compromise.

What is an enterprise IT?

The enterprise IT organization manages and supports the workloads and the infrastructure they are hosted on, whether it's on-premises, on Azure, or a third-party cloud provider, creating a management plane. Providing consistent access control to these systems across the enterprise requires a control plane based on centralized enterprise identity system (s), often supplemented by network access control for older systems like operational technology (OT) devices.

How to register on compass?

Open the latest Compass iOS app or go to Compass.com and choose "Register/Sign In".

How to contact Compass?

Please reach out to support@compass.com or 833-426-6727 (833.4.COMPASS) and we will assist you ASAP!

How to update your phone number on Compass?

If you’re a Compass agent, please contact your Agent Experience Manager (AEM) to update your phone number. If you’re a Compass employee, you can edit your phone number in the Settings tab in the iOS app.

What is Topia Compass?

A mobile workforce creates risk. Topia Compass gives you data and tools to take care of your business travelers and your company.

What is instant access report?

Instantly accessible reports provide the data needed for internal auditors or tax authorities.

How to avoid accidental permanent establishment and immigration compliance risk?

Avoid accidental Permanent Establishment and immigration compliance risk by proactively monitoring day counts and driving alerts before you have a problem.

License requirements

The concepts covered in this guide assume you have Microsoft 365 Enterprise E5 or an equivalent SKU. Some of the recommendations in this guide can be implemented with lower SKUs. For more information, see Microsoft 365 Enterprise licensing.

Azure Active Directory configuration

Azure Active Directory (Azure AD) manages users, groups, and devices for your administrator workstations. Enable identity services and features with an administrator account.

Microsoft Intune configuration

In our sample, we recommend that BYOD devices not be permitted. Using Intune BYOD enrollment allows users to enroll devices that are less, or not trusted.

Set rules in the Endpoint Protection Configuration Profile for Microsoft Defender Firewall

Windows Defender Firewall policy settings are included in the Endpoint Protection Configuration Profile. The behavior of the policy applied in described in the table below.

Enable Microsoft Cloud Application Security, URLs restricted list to approved URLs (Allow most)

In our roles deployment it is recommended that for Enterprise, and Specialized deployments, where a strict deny all web browsing is not desirable, that using the capabilities of a cloud access security broker (CASB) such as Microsoft Defender for Cloud Apps be utilized to block access to risky, and questionable web sites.

Manage local applications

The secure workstation moves to a truly hardened state when local applications are removed, including productivity applications. Here, you add Visual Studio Code to allow connection to Azure DevOps for GitHub to manage code repositories.

Validate and test your deployment with your first device

This enrollment assumes that you will use a physical computing device. It is recommended that as part of the procurement process that the OEM, Reseller, distributor, or partner register devices in Windows Autopilot.

image
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9