Enable collection of configurable device attributes
Stay organized with collectionsSave and categorize content based on your preferences.
This document shows how administrators can enable Endpoint Verification to collect
granular device attributes calledconfigurable device attributes, such as
metadata attributes of files, folders, and binaries; registry entries; and
properties in a plist.
Administrators can use these configurable device attributes to create access
levels.
In the navigation menu, clickDevices>Mobile & endpoints>Settings>Universal.
Expand theEndpoint Verification configurationtab.
From theOrganizational Unitspane, select your organization unit.
Depending on the type of configurable device attributes you want Endpoint Verification
to collect, configure the settings:
To collect metadata attributes of a file, folder, or binary, do the following:
In theFile or folder configurationsection, clickAdd configuration.
In theAdd configurationdialog, enter the following details:
Name for the configuration.
Operating system of the devices.
Path to the file, folder, or binary.
If you entered the path for a binary, then selectIs executable.
ClickAdd configuration.
To collect registry or plist configuration attributes, do the following:
In theRegistry or plist configurationssection, clickAdd configuration.
In theAdd configurationdialog, enter the following details:
Name for the configuration.
Operating system of the devices.
Path to the registry or plist file.
Key (optional for Windows):
Windows: a subkey of the registry, for example:IsClipboardSignalProducingFeatureAvailable.
If you don't enter a value, then the default value is taken.
macOS: keys in the plist file, which can be a number, string, or a boolean value.
You can also provide nested keys by using.as the delimiter.
For example, if there is a dictionary B inside dictionary A and dictionary B contains a string or number with keykey1, the final key would beA.B.key1.
Arrays are supported in the following manner:A.B.key[0]orA.B.key[1].C. Only hard-coded indexes are supported.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-04 UTC."],[[["\u003cp\u003eEndpoint Verification can be configured to collect detailed device attributes, including metadata of files, folders, binaries, registry entries, and plist properties.\u003c/p\u003e\n"],["\u003cp\u003eAdministrators can leverage these collected device attributes to establish and manage access levels based on specific device configurations.\u003c/p\u003e\n"],["\u003cp\u003eConfiguration involves logging into the Google Admin console and navigating to the Endpoint Verification settings to add specific file, folder, binary, registry, or plist configurations.\u003c/p\u003e\n"],["\u003cp\u003eWhen configuring file, folder, or binary attribute collection, administrators must specify the path and, if applicable, indicate whether the item is executable, and respect the file size limit of 1GB.\u003c/p\u003e\n"],["\u003cp\u003eWhen configuring registry or plist attribute collection, administrators need to specify the path, and for Windows they may optionally input a subkey, while for macOS, nested keys in plists are supported using dot notation.\u003c/p\u003e\n"]]],[],null,["# Enable collection of configurable device attributes\n\nThis document shows how administrators can enable Endpoint Verification to collect\ngranular device attributes called *configurable device attributes*, such as\nmetadata attributes of files, folders, and binaries; registry entries; and\nproperties in a plist.\nAdministrators can use these configurable device attributes to create access\nlevels.\n\nBefore you begin\n----------------\n\n- [Deploy Endpoint Verification](/endpoint-verification/docs/deploying-with-admin-console).\n\n- [Install the Endpoint Verification helper app (version 2.11 or later)](/endpoint-verification/docs/deploying-with-admin-console#install-native-helper).\n\nConfigure the Endpoint Verification settings\n--------------------------------------------\n\nTo enable Endpoint Verification to collect the [device configuration attributes](/endpoint-verification/docs/device-information#configuration-attributes), do\nthe following:\n\n1.\n\n Log in to the **Google Admin console** by using your Google Workspace\n administrator account.\n\n [Log in to Google Admin console](https://admin.google.com/ac/devices/list)\n\n \u003cbr /\u003e\n\n2. In the navigation menu, click **Devices \\\u003e Mobile \\& endpoints \\\u003e Settings \\\u003e Universal**.\n\n3. Expand the **Endpoint Verification configuration** tab.\n\n4. From the **Organizational Units** pane, select your organization unit.\n\n | **Note:** If the organization unit that you selected is a child of a top-level organizational unit, then the settings that you configure will override the settings that were inherited from the top-level organizational unit.\n5. Depending on the type of configurable device attributes you want Endpoint Verification\n to collect, configure the settings:\n\n - **To collect metadata attributes of a file, folder, or binary, do the following:**\n\n 1. In the **File or folder configuration** section, click **Add configuration**.\n 2. In the **Add configuration** dialog, enter the following details:\n\n - Name for the configuration.\n - Operating system of the devices.\n - Path to the file, folder, or binary.\n\n | **Note:** The size of a file or a binary must be less than or equal to 1 GB.\n 3. If you entered the path for a binary, then select\n **Is executable**.\n\n 4. Click **Add configuration**.\n\n - **To collect registry or plist configuration attributes, do the following:**\n\n 1. In the **Registry or plist configurations** section, click **Add configuration**.\n 2. In the **Add configuration** dialog, enter the following details:\n\n - Name for the configuration.\n - Operating system of the devices.\n - Path to the registry or plist file.\n\n | **Note:** The size of a plist file must be less than or equal to 512 MB.\n - Key (optional for Windows):\n\n - Windows: a subkey of the registry, for example: `IsClipboardSignalProducingFeatureAvailable`.\n If you don't enter a value, then the default value is taken.\n\n - macOS: keys in the plist file, which can be a number, string, or a boolean value.\n You can also provide nested keys by using `.` as the delimiter.\n\n For example, if there is a dictionary B inside dictionary A and dictionary B contains a string or number with key `key1`, the final key would be `A.B.key1`.\n Arrays are supported in the following manner: `A.B.key[0]` or `A.B.key[1].C`. Only hard-coded indexes are supported.\n 3. Click **Add configuration**.\n\nWhat's next\n-----------\n\n- [Learn more about the configurable device attributes](/endpoint-verification/docs/device-information#configuration-attributes).\n- [Create device-based access levels](/endpoint-verification/docs/creating-device-access-level)."]]