DeviceSignals
import type { DeviceSignals } from "https://googleapis.deno.dev/v1/verifiedaccess:v2.ts";
The device signals as reported by Chrome. Unless otherwise specified, signals are available on all platforms.
§Properties
Output only. Value of the AllowScreenLock policy on the device. See https://chromeenterprise.google/policies/?policy=AllowScreenLock for more details. Available on ChromeOS only.
Output only. Current version of the Chrome browser which generated this set of signals. Example value: "107.0.5286.0".
Output only. Whether Chrome's built-in DNS client is used. The OS DNS client is otherwise used. This value may be controlled by an enterprise policy: https://chromeenterprise.google/policies/#BuiltInDnsClientEnabled.
Output only. Whether access to the Chrome Remote Desktop application is blocked via a policy.
Output only. Crowdstrike agent properties installed on the device, if any. Available on Windows and MacOS only.
Output only. Affiliation IDs of the organizations that are affiliated with the organization that is currently managing the device. When the sets of device and profile affiliation IDs overlap, it means that the organizations managing the device and user are affiliated. To learn more about user affiliation, visit https://support.google.com/chrome/a/answer/12801245?ref_topic=9027936.
Output only. Enrollment domain of the customer which is currently managing the device.
Output only. The encryption state of the disk. On ChromeOS, the main disk is always ENCRYPTED.
Output only. The display name of the device, as defined by the user.
Output only. International Mobile Equipment Identity (IMEI) of the device. Available on ChromeOS only.
Output only. Mobile Equipment Identifier (MEID) of the device. Available on ChromeOS only.
Output only. The type of the Operating System currently running on the device.
Output only. The state of the OS level firewall. On ChromeOS, the value will always be ENABLED on regular devices and UNKNOWN on devices in developer mode. Support for MacOS 15 (Sequoia) and later has been introduced in Chrome M131.
Output only. The current version of the Operating System. On Windows and linux, the value will also include the security patch information.
Output only. Whether the Password Protection Warning feature is enabled or
not. Password protection alerts users when they reuse their protected
password on potentially suspicious sites. This setting is controlled by an
enterprise policy:
https://chromeenterprise.google/policies/#PasswordProtectionWarningTrigger.
Note that the policy unset does not have the same effects as having the
policy explicitly set to PASSWORD_PROTECTION_OFF
.
Output only. Affiliation IDs of the organizations that are affiliated with the organization that is currently managing the Chrome Profile’s user or ChromeOS user.
Output only. Enrollment domain of the customer which is currently managing the profile.
Output only. Whether Enterprise-grade (i.e. custom) unsafe URL scanning is enabled or not. This setting may be controlled by an enterprise policy: https://chromeenterprise.google/policies/#EnterpriseRealTimeUrlCheckMode
Output only. Safe Browsing Protection Level. That setting may be controlled by an enterprise policy: https://chromeenterprise.google/policies/#SafeBrowsingProtectionLevel.
Output only. The state of the Screen Lock password protection. On ChromeOS, this value will always be ENABLED as there is not way to disable requiring a password or pin when unlocking the device.
Output only. Whether the device's startup software has its Secure Boot feature enabled. Available on Windows only.
Output only. The serial number of the device. On Windows, this represents the BIOS's serial number. Not available on most Linux distributions.
Output only. Whether the Site Isolation (a.k.a Site Per Process) setting is enabled. That setting may be controlled by an enterprise policy: https://chromeenterprise.google/policies/#SitePerProcess
List of the addesses of all OS level DNS servers configured in the device's network settings.
Output only. Deprecated. The corresponding policy is now deprecated. Whether Chrome is blocking third-party software injection or not. This setting may be controlled by an enterprise policy: https://chromeenterprise.google/policies/?policy=ThirdPartyBlockingEnabled. Available on Windows only.
Output only. The trigger which generated this set of signals.