Ir al contenido principal

Popular Resources

Actualizado hoy

Introducción

The resources below are the most commonly imported items from the Level Resource Library. They cover the workflows most IT teams need first: patching, security monitoring, and a handful of high-frequency operational tasks.

Each entry links directly to its library page where you can preview it and import it into your account.


Popular Automations

These automations handle recurring tasks that most environments need regardless of size or platform.

Patching

  • Windows Patching — Deploys Windows updates on a schedule. Keeps systems current without manual intervention.

  • macOS Patching — Automates macOS system and security updates across your Apple devices.

  • Linux Patching — Runs OS and package updates on Linux devices using the system package manager.

💡 TIP: All 3 patching automations are designed to be imported together and assigned to their respective device groups (tagged Windows, macOS, and Linux). If you haven't set up device tags yet, see Agregar dispositivos, grupos y etiquetas first.

Operations

  • Install Microsoft Office 365 — Deploys Microsoft 365 to Windows devices. Useful for new device setup or bulk deployments.

  • Prompt User to Restart — Sends a restart prompt to the user's screen. Handy after update deployments that require a reboot.

  • Disk Cleanup — Removes temporary files and system clutter to free up disk space.

Security

  • Lost or Stolen Device — Locks and wipes a device remotely when it's reported lost or stolen. Run this manually from a device's context menu or trigger it via automation.

⚠️ WARNING: The Lost or Stolen Device automation is destructive and irreversible. Review it carefully before deploying and confirm your intended trigger conditions before enabling it.

Popular Monitors

These monitor policies provide broad coverage with minimal configuration. Most work out of the box after import and assignment to a group.

Cross-Platform Monitoring

  • Global Monitoring — Monitors CPU, memory, disk usage, and uptime across Windows, macOS, and Linux. Alerts when thresholds are exceeded. A good baseline policy for all devices.

  • Endpoint Standards — Checks whether devices meet minimum hardware benchmarks (CPU, RAM, storage). Useful for identifying aging or underpowered machines.

Security Monitoring

  • Security Monitoring — Watches for anomalies in DNS configuration, firewall state, admin user lists, sudo access, and SSH keys. Works across all 3 platforms.

  • Admin Monitoring — Alerts when a new admin-level user appears on any device. Helps enforce least-privilege compliance.

Windows-Specific

  • Admin Login Monitor — Tracks admin login attempts on Windows devices and flags unauthorized logins.

  • Failed Login Monitor — Alerts on repeated failed login attempts. You can configure it to watch all users or admins only.

  • Exchange Service Monitoring — Monitors Microsoft Exchange services for outages or mail flow failures. Only relevant if you're managing on-premises Exchange.

🖥️ PLATFORM NOTE:

  • Windows: Admin Login Monitor and Exchange Service Monitoring are Windows-only.

  • macOS: Security Monitoring covers sudo user and SSH key anomalies.

  • Linux: Security Monitoring covers SSH key and sudo access changes.


Preguntas frecuentes

  • How do I import one of these resources? Visit the resource's library link, click Import, and it'll appear in your Level account under the relevant section. See About the Library for full import steps.

  • Are these resources maintained by Level or by the community? Both. Level maintains the core set of popular resources listed here. Community-submitted resources are also available in the library and are labeled accordingly.

  • Can I apply multiple monitor policies to the same devices? Yes. Monitor policies are assigned to tags, and a device can have multiple tags — so multiple policies can apply to the same device. The Global Monitoring and Security Monitoring policies are designed to be used together.

¿Ha quedado contestada tu pregunta?