Skip to content

Introducing endpoint device security

Once the Coro Agent is installed, the endpoint devices used by users in an organization are considered protected. The agent enables seamless communication with the Coro service, allowing device activity to be logged in the workspace. For more information, see Using the Ticket Log and Activity Log.

When an admin user logs into the Coro Console, they will find a dedicated download link for the corresponding Coro Agent specific to that workspace. This ensures that endpoint devices establish secure communication exclusively with the designated workspace, preventing unauthorized access. If an organization is subscribed to multiple Coro workspaces, each workspace provides its own unique agent installer.