Already a NinjaOne customer? Log in to view more guides and the latest updates.

NinjaOne Policies

What are policies in NinjaOne?

In NinjaOne, policies are the core mechanism that determines how endpoints are configured, monitored, secured, managed, and automated. A policy defines the operational and security settings applied to devices—such as monitoring rules, alert thresholds, patching behavior, antivirus settings, and backup configurations—and ensures these settings are consistently enforced across all assigned endpoints.

Policies also enable automations, which are script-based actions that run by schedule or in response to specific conditions detected on the device. For example, if a monitoring condition triggers—such as low disk space, a stopped service, or high CPU usage—the policy can automatically execute a predefined script or remediation workflow. This allows NinjaOne to fix common issues proactively and reduce manual intervention.

Policies are the core of device management in the RMM platform: they push configuration instructions to each device through the NinjaOne agent, and once applied, the endpoint reports telemetry back to the system. This feedback loop allows NinjaOne to monitor health, enforce security-related settings, and run automated remediations, ensuring consistent and reliable endpoint management.

Policies also play a key role in standardizing configurations across the environment, ensuring that every endpoint follows the same operational, security, and monitoring rules. By enforcing consistent settings—such as patching schedules, hardening options, software requirements, backup parameters, or alert thresholds—policies reduce configuration drift and make device behavior predictable. This consistency directly supports compliance and governance, because organizations can demonstrate that all managed endpoints adhere to documented standards, regulatory controls, and internal best practices. With policies defining and enforcing these baselines automatically, IT teams gain better auditability, improved security posture, and greater confidence in the reliability of their managed infrastructure.

Policies also support scalability by letting administrators define configurations once and apply them to any number of endpoints. New devices automatically inherit the correct settings, eliminating repetitive manual work. This consistency reduces errors, accelerates onboarding, and ensures environments stay aligned as they grow. With centralized policy management, small teams can efficiently support large or distributed device fleets.

What kind of policies does NinjaOne have?

NinjaOne provides different types of policies depending on the kind of device being monitored. The following sections explain each policy type and how they are used.

  1. Agent policies.

Designed to monitor a wide range of devices, including Windows servers, desktops, and laptops; macOS servers, desktops, and laptops; and Linux workstations and servers. Each endpoint runs the NinjaOne agent, which applies the assigned policy and communicates with the NinjaOne RMM platform to perform monitoring and report device health.

  1. NMS policies.

These policies are designed to monitor devices using SNMP or ICMP, such as switches, routers, firewalls, access points, and printers. This monitoring focuses on network-level performance rather than OS-level telemetry. Because these devices do not run the NinjaOne agent, NMS policies operate in an agentless manner.

  1. VM policies.

VM policies are used to monitor both virtualization hosts and their guest virtual machines. For guest VMs, NinjaOne installs the agent inside the VM, but the policy is lighter than a standard agent-based policy because it does not monitor physical hardware parameters. For Hyper-V and VMware hosts, NinjaOne applies host-level monitoring to collect platform metrics such as resource usage and VM status. Together, these policies provide visibility into the virtual infrastructure while minimizing overhead on guest VMs.

  1. MDM policies.

MDM policies are designed to manage and monitor mobile devices such as Android, iOS, and iPadOS. These policies are agentless and rely on the native mobile device management frameworks to apply configurations, enforce restrictions, deploy apps, and collect essential device information.

Each policy type is further divided into more specific policies based on the device’s role. For example, agent policies may include variants for Windows servers, Windows workstations, Mac desktops, and Mac laptops, while NMS policies can cover switches, routers, printers, and other network devices. Mobile devices also have dedicated policy variants tailored to their operational needs. These are only examples—the number of policies within each type is not fixed, and additional policies can be created as required. This structure ensures that every device receives the appropriate configuration and monitoring settings for its intended function.

Using NinjaOne’s Predefined Policies and Creating New Ones.

NinjaOne provides a set of predefined policies for each device role. These policies include default settings based on common best practices, and they can be customized as needed. You can also create new policies to match your specific requirements. Predefined policies can be identified by the “Default” label next to their name.

The screenshot below shows the policies page showing some policies with the “Default” label.

Policies page showing some policies with the “Default” label

NinjaOne’s inheritance feature allows you to create a new policy based on an existing one and modify only the settings that need to differ. This approach works much like creating a policy from a template, giving you a starting point with predefined configurations while avoiding the need to maintain separate template files. Inheritance eliminates the need to rebuild policies from scratch and is especially useful when a subset of devices requires slightly different settings than the rest. To create a new policy that inherits from an existing one, select the desired parent policy in the Parent Policy field when creating the new policy.

Parent Policy field

To create a new policy, follow the steps below.

  1. Navigate to Administration > Policies.
  2. In the sidebar, select the policy type of your preference; the policies page appears.
  3. Click Create New Policy; the “Create a policy” modal dialog appears.
  4. Fill out the Name, Description, Role and optionally the Parent policy.
  5. Toggle the Policy enabled switch if needed. This switch prevents the policy from being used until it is ready for deployment (fully configuring a policy may be a lengthy process).
  6. Click Create; The policy editor appears.
  7. Configure the settings; the next topic provides an explanation of each option.
  8. Click Save. You may be prompted to confirm using your MFA.

What sections comprise NinjaOne’s policies?

NinjaOne policies are divided into sections to better organize their functions. The following explanations describe the sections a policy may include. Note that not all sections appear in every policy, as some sections apply only to specific policy types.

Section nameDescriptionUsed on
ConditionsDefines the criteria that, when met, trigger specific actions such as opening tickets or sending alerts, and optionally running automations.Agent policies

NMS policies

VM policies

Compound ConditionsSimilar to “Condition,”, but they allow you to combine multiple criteria that must be met before the action is triggered.Agent policies
Scheduled AutomationsDefine scripts that run automatically at a specified date, time, or recurring schedule.Agent policies
OS patchingThis section is used to configure operating system patching settings such as scan schedules, update schedules, reboot options, and other related behaviors.Agent policies
AntivirusDefines the antivirus integration for the endpoints. Once configured, NinjaOne will attempt to deploy the antivirus to all devices governed by the policy.Agent policies
ActivitiesThis section lists a series of endpoint-related events. For each event, you can configure whether to send alerts, which notification channels to use, the severity level, and the associated ticketing rule.Agent policies
Software patchingThis section is used to configure third-party software patching settings, including scan schedules, update schedules, reboot options, and other related behaviors. These rules apply only to the software you select in this section.Agent policies
BackupThis section is used to define backup plans, including the backup destination, items to back up, exclusions, filters, power options, and any pre- or post-backup automations.Agent policies
MDMThis section allows you to configure a wide range of Mac-specific settings and controls, enabling granular management of macOS devices. You can enforce security requirements, apply configuration settings, install software, and automate device behaviors to ensure consistent management across all assigned Macs.Agent policies

MDM policies

(Mac-only)

Network PerformanceConfigure the protocols used to monitor network performance, as well as the specific ports and metrics you want to track.NMS policies
Configuration BackupUsed to configure and manage device configuration backups of HP or Cisco network devices.NMS policies
SyslogHere you can choose different monitoring facilities and severities within the syslog on the device. The system will not consider any facilities and severities you uncheck in the conditions.NMS policies
NetFlow/sFlow/JFlow CollectorThese settings govern the type of NetFlow traffic you’d like to monitor, any IP addresses from which you’d like to discard data, and the flow noise configuration.NMS policies
SNMP MonitoringThese settings allow you to monitor basic SNMP data, like CPU, memory, Disk, or Network Adapter.MDM policies
PasscodeUsed to allow mobile devices configuration for password values, lock after failed attempts, passcode criteria and update requirements, and auto-lock settings.MDM policies
RestrictionsThese are settings that limit or control what a user or device is allowed to do. They enforce security, prevent unwanted behavior, and ensure that the device complies with organizational requirements.MDM policies
ApplicationsThese settings control which applications are allowed or blocked and provide a managed method for installing approved applications.MDM policies
Personal usageDefine application policies for the personal profile of devices with a work profile.MDM policies
NetworkManage device network settings, like proxy settings and Wi-Fi networks.MDM policies
SecurityAllows system administrators to encrypt the device, manage developer settings, define how data is moved for work, and more.MDM policies
Policy enforcementAllows you to set rules that define the behavior when a policy cannot be applied to a device.MDM policies
Location trackingEnables NinjaOne to collect and report the geographical location of the device.MDM policies
OS updatesManage how users can install software updates and define enforced OS versions.MDM policies
Custom payloadAllow administrators to deploy advanced or platform-specific configuration settings that are not exposed through the standard MDM interfaceMDM policies

How are devices assigned to policies?

There are several ways to assign devices to policies, they can be assigned:

  1. At the organization level.
  2. At the location level.
  3. At the device level.

How to assign devices to policies at the organization level?

Follow the steps below to complete this kind of assignment.

  1. Go to the Organization Editor.
  2. In the sidebar, select Policies.
  3. On the right side, you will see all policy assignments. At the top of the page, choose the policy type you want to configure.
  4. The device roles will appear showing the default policy assignment. Adjust as necessary, making sure your devices are attached to the policy of your preference. Once done, save and close.

Assign devices to policies at the organization level

How to assign devices to policies at the location level?

Follow the steps below to complete this kind of assignment.

  1. Go to the Organization Editor.
  2. In the sidebar, select Locations.
  3. On the right side, you will see the existing locations.
  4. Hover over the location you want to modify; the Edit button will appear. Click it.
  5. In the “Edit Location” modal, select Policies from the left sidebar.

Policies at the location level

  1. Toggle the Policy location overrides button.
  2. Choose the policy type you want to configure.
  3. The device roles will appear showing the default policy assignment. Adjust as necessary, making sure your devices are attached to the policy of your preference. Once done, save and close.

This location-level assignment overrides any assignments made at the organization level.

How to assign a device to a policy individually?

Follow the steps below to complete this kind of assignment.

  1. From the device dashboard of the endpoint you want to modify, select Settings.
  2. In the sidebar, select Policies.
  3. On the right side, you will see all assigned policy; click Change.

Assign a device to a policy individually

  1. In the dialog modal, select the policy you want to assign.

Edit assigned policy

  1. Click Update.

This device-level assignment overrides any assignments made at the organization or location levels.

FAQ

A policy in NinjaOne is a reusable set of configurations that defines how managed devices should behave. Policies control areas such as OS patching, third-party application updates, backup, antivirus, automations, and alerting. Instead of configuring each device individually, you attach devices to policies so they inherit consistent, standardized settings aligned with your organization’s requirements.

No. Dynamic groups cannot be assigned to policies. Instead, you can create a new location and move those devices into it, then apply the policy assignment at the location level.

Note: While group membership is dynamic, location membership is static.

Organization-level assignments define the default policies for all devices in the organization. Location-level assignments override those defaults for devices in a specific site or office. Device-level assignments are the most granular and override both organization and location assignments for that individual endpoint. This layered model lets you define a global baseline, adjust it per location, and still fine-tune settings for special-case devices when needed.

No, A device cannot be assigned to multiple policies at the same time. NinjaOne assigns policies based on a simple hierarchy: device-level assignments override location-level assignments, which override organization-level defaults. A device always ends up with one effective policy, determined by the most specific assignment available.

Yes. You can use policies to deploy software consistently across all required endpoints, ensuring every device receives the same installation in a controlled and repeatable way.

Yes. You can use policies to detect unauthorized software, and you can also configure them to automatically send alerts, open tickets, and uninstall it if it is found.