The Hexnode UEM (Windows) integration enables security and compliance teams to monitor device compliance for Windows endpoints. It connects Drata to Hexnode so your team can verify device security configurations and collect evidence that devices meet compliance requirements.
Key Capabilities
Device compliance monitoring: Verify that Windows security policies are configured and applied
Endpoint policy verification: Confirm that required policies exist and are mapped to enrolled devices
Automated evidence collection: Sync device compliance data into Drata
This integration is used to automate tests related to endpoint security configuration, helping prove compliance with device security and endpoint protection policies.
Prerequisites & Data Access
Admin access to your organization’s Hexnode account
Devices must be enrolled through the Hexnode application
Access to the following values from Hexnode:
Server URL (used as the API URL)
API Key
Required Drata Role with Write access: Admin, Workspace Managers, DevOps Engineer
Access Reviewers (Access Reviewers can only Read the connection page they can’t make changes)
Important limitations:
Only desktop devices are supported. Tablets and mobile devices cannot be imported.
Pre-approved enrolled devices cannot be synced.
Windows OS updates cannot currently be verified through Hexnode policy. Evidence must be uploaded manually for this check.
Hexnode does not support a firewall policy for Windows devices. A Microsoft Defender policy can be used instead.
Accessing BitLocker (disk encryption) and Microsoft Defender (antivirus) policies requires the Hexnode Ultra plan.
Hexnode cannot detect browser extension password managers. Users must install the desktop password manager application so it appears in the device’s Application List.
Drata verifies the following through the Hexnode connection:
The required policy exists
The policy is assigned to the device
The device is compliant with that policy
Permissions & Data Table
Permission/Scope | Why It’s Needed |
Hexnode Admin access | Allows configuration of policies and API access |
API Key | Allows Drata to authenticate and retrieve device compliance data |
Server URL (API URL) | Identifies the Hexnode instance for the connection |
Step-by-Step Setup
Step 1: Configure Required Windows Security Policies in Hexnode
Policies must exist in Hexnode for Drata to validate compliance checks.
Policies are created in Hexnode → Policies → New Policy → New Blank Policy.
Disk Encryption (BitLocker)
Log in to Hexnode Admin.
Navigate to Policies → My Policies → New Policy.
Select New Blank Policy.
Create a policy name and description.
Important:
Include “FileVault” in the policy name so Drata can detect the policy.
Navigate to the Windows section.
Scroll to Security → BitLocker.
Select Configure.
Enable Prompt for device encryption.
Select Policy Targets → Add Device to assign the policy.
Click Save.
Expected outcome: A BitLocker disk encryption policy exists and is assigned to enrolled Windows devices.
Screensaver (Lock Screen)
Navigate to Policies → My Policies → New Policy.
Select New Blank Policy.
Create a policy name including “Screensaver”.
Navigate to the Windows section.
Scroll to Password and select Configure.
Set Auto-lock (in minutes) to a value greater than 0.
Select Policy Targets → Add Device to assign the policy.
Click Save.
Expected outcome: Windows devices automatically lock after inactivity.
Antivirus (Microsoft Defender)
Navigate to Policies → My Policies → New Policy.
Select New Blank Policy.
Create a policy name including “Anti-Virus”.
Navigate to the Windows section.
Select Microsoft Defender → Configure.
Scroll to Windows Defender Security Center and configure recommended options.
Select Policy Targets → Add Device to assign the policy.
Click Save.
Expected outcome: Microsoft Defender antivirus protection is configured on devices.
Step-by-Step Setup (Connection)
Step 2: Retrieve Hexnode API Credentials
Log in to your Hexnode Admin account.
Select Enroll and note the Server URL.
This will be used as the API URL in Drata.Navigate to Admin → API.
Click the lock icon to reveal the API Key.
Copy the API Key.
Expected outcome: You have the Hexnode Server URL and API Key required for authentication.
Step 3: Connect Hexnode in Drata
Log in to Drata.
Navigate to Connections.
Search for Hexnode and start the connection process.
Enter the following values:
API URL (include
https://)API Token (your Hexnode API Key)
Select Save & Test Connection.
Expected outcome:
Hexnode is successfully connected and device compliance data begins syncing to Drata.
Step-by-Step Setup (Enable Device Automation)
Step 4: Enable Hexnode as the Device Compliance Source
In Drata, navigate to Settings → Personnel Compliance → Internal Security.
Enable Automated via Hexnode MDM.
Disable Automated via Drata Agent if you want Hexnode to be the primary compliance source.
Important behavior:
If both Hexnode and the Drata Agent are enabled, the Drata Agent takes precedence. Device compliance data will come from the Agent rather than the connected MDM.
Expected outcome: Device compliance data is collected from Hexnode MDM.
Important Notes
Hexnode data is synced daily after Drata Autopilot runs.
Devices must be enrolled in Hexnode to be monitored.
Only Windows desktop devices are supported.
Policy names must include the expected keywords (FileVault, Screensaver, Anti-Virus) for Drata to detect them correctly.
Browser extension password managers cannot be detected by Hexnode. Users must install the desktop application version for compliance checks to pass.
