Skip to main content

Windows Tracking Policy

Updated today

The Windows Tracking Policy in Swif.ai enables organizations to collect important security, compliance, and operational event data from Windows devices. This includes visibility into USB activity, device lock/unlock events, and other telemetry that helps IT and Security teams monitor endpoint behavior across the company.

This policy supports both BYOD and company-owned Windows devices running Windows 10 or later.

This policy works together with Swif.ai’s event tracking system, detailed here.


What This Policy Does

When enabled, the Windows Tracking Policy allows Swif.ai to collect real-time event data from Windows devices, including:

  • USB tracking
    Detects when USB storage devices are connected or disconnected.

  • Device lock/unlock tracking
    Tracks when users lock or unlock their device, providing insight into user session activity.

This information is used for:

  • Security monitoring

  • Compliance reporting and audit evidence

  • Incident investigations

  • Behavior analytics

  • USB risk detection

  • User activity insights for distributed teams


Requirements

  • Windows 10+


Policy Settings

USB Tracking

Controls whether Swif.ai collects USB connection/disconnection events.

Options:

  • True – Enables USB device tracking
    (Swif.ai logs USB attachments and removals for compliance and security visibility)

  • False – No USB activity is tracked

Minimum Requirements: Windows 10+


Device Lock Tracking

Controls whether Swif.ai records device lock and unlock events.

Options:

  • True – Tracks when the user locks or unlocks the device
    Useful for session auditing and user behavior monitoring

  • False – Device lock/unlock activity is not tracked

Minimum Requirements: Windows 10+


Use Cases

1. Compliance Reporting (SOC 2, ISO 27001, HIPAA)

Event logs provide audit-ready evidence of device usage, physical access protection, and external media handling.

2. Security Monitoring

  • Alerts on suspicious USB device usage

  • Detect unauthorized USB drives

  • Identify unusual session activity

3. Remote Workforce Visibility

Provides insight into:

  • Device usage patterns

  • Lock/unlock times

  • Remote employee device interactions

4. Incident Investigation

USB logs and session history help reconstruct activity leading up to a security event.

5. Zero-Trust & Access Control

Supports risk scoring and automated enforcement based on device behavior.


How Event Tracking Appears in Swif.ai

When this policy is enabled, events flow into:

  • Device → Activity Timeline

  • Browser & Device Event Logs

  • Security Center (if enabled)

  • Automations/Alerts (optional)

This allows teams to quickly filter and analyze event patterns.


Verification & Troubleshooting

Confirm events are being collected

  1. Go to Reports → Events logs

  2. Look for:

    • USB connection events

    • Lock/unlock events

  3. Ensure the device is online and has the latest Swif agent

If events are missing:

  • Confirm the Windows Tracking Policy is applied to the device

  • Ensure the device has not disabled local auditing settings

  • Check that the Swif agent is running and up to date

  • Restart the device if needed


Best Practices

  • Enable USB Tracking for all company-owned devices for strong security and audit visibility

  • Enable Device Lock Tracking for remote workforce oversight

  • Combine with:

    • Windows Security Policy (encryption)

    • Windows PIN Policy (authentication)

    • Windows Connectivity Policy (peripheral restrictions)

This forms a complete Windows compliance and security baseline.

Did this answer your question?