Skip to main content

Windows Tracking Policy

Updated over 2 weeks ago

The Windows Tracking Policy in Swif.ai enables organizations to collect important security, compliance, and operational event data from Windows devices. This includes visibility into USB activity, device lock/unlock events, and other telemetry that helps IT and Security teams monitor endpoint behavior across the company.

This policy supports both BYOD and company-owned Windows devices running Windows 10 or later.

This policy works together with Swif.ai’s event tracking system, detailed here.


What This Policy Does

When enabled, the Windows Tracking Policy allows Swif.ai to collect real-time event data from Windows devices, including:

  • USB tracking
    Detects when USB storage devices are connected or disconnected.

  • Device lock/unlock tracking
    Tracks when users lock or unlock their device, providing insight into user session activity.

This information is used for:

  • Security monitoring

  • Compliance reporting and audit evidence

  • Incident investigations

  • Behavior analytics

  • USB risk detection

  • User activity insights for distributed teams


Requirements

  • Windows 10+


Policy Settings

Field Name

Description

Value Options

Minimum OS Requirement

USB Tracking

Controls whether Swif.ai collects USB connection and disconnection events. When enabled, Swif.ai logs USB attachments and removals for compliance, auditing, and security visibility.

True – USB device activity is tracked

False – No USB tracking is performed

Windows 10+

Device Lock Tracking

Controls whether Swif.ai records device lock and unlock events. Useful for session auditing and monitoring user behavior during device access.

True – Lock/unlock events are tracked

False – Lock/unlock activity is not tracked

Windows 10+

Location Tracking

When enabled, the device will request location information during periodic compliance checks throughout the day.

True – location information is requested

Windows 10+


If you need this embedded into the full Windows Tracking Policy article, I can insert it directly.


Use Cases

1. Compliance Reporting (SOC 2, ISO 27001, HIPAA)

Event logs provide audit-ready evidence of device usage, physical access protection, and external media handling.

2. Security Monitoring

  • Alerts on suspicious USB device usage

  • Detect unauthorized USB drives

  • Identify unusual session activity

3. Remote Workforce Visibility

Provides insight into:

  • Device usage patterns

  • Lock/unlock times

  • Remote employee device interactions

4. Incident Investigation

USB logs and session history help reconstruct activity leading up to a security event.

5. Zero-Trust & Access Control

Supports risk scoring and automated enforcement based on device behavior.


How Event Tracking Appears in Swif.ai

When this policy is enabled, events flow into:

  • Device → Activity Timeline

  • Browser & Device Event Logs

  • Security Center (if enabled)

  • Automations/Alerts (optional)

This allows teams to quickly filter and analyze event patterns.


Verification & Troubleshooting

Confirm events are being collected

  1. Go to Reports → Events logs

  2. Look for:

    • USB connection events

    • Lock/unlock events

  3. Ensure the device is online and has the latest Swif agent

If events are missing:

  • Confirm the Windows Tracking Policy is applied to the device

  • Ensure the device has not disabled local auditing settings

  • Check that the Swif agent is running and up to date

  • Restart the device if needed


Best Practices

  • Enable USB Tracking for all company-owned devices for strong security and audit visibility

  • Enable Device Lock Tracking for remote workforce oversight

  • Combine with:

    • Windows Security Policy (encryption)

    • Windows PIN Policy (authentication)

    • Windows Connectivity Policy (peripheral restrictions)

This forms a complete Windows compliance and security baseline.

Did this answer your question?