Changelog

Follow new updates and improvements to Trio.

March 17th, 2026

We’ve launched the new Trio Support Center to make it easier for you to get help, track issues, and stay connected with our support team — all in one place.


🎫 Create and manage tickets

You can now create support tickets directly inside Trio and track their progress in real time.

  • Submit support requests, bug reports, and feature requests

  • View ticket status and updates

  • Keep all communication in one place


📊 Track your requests

A new Tickets view lets you:

  • See all your requests in one list

  • Track status (Submitted, In Progress, Waiting on Customer, Resolved)

  • Open and follow up on any ticket


💬 Better communication

Stay connected with the support team through a unified experience:

  • Reply directly inside tickets

  • Provide additional details when needed

  • Get updates without leaving the platform


📎 Add attachments

You can now attach files to your tickets:

  • Upload screenshots or videos

  • Share up to 5 files per ticket

  • Help us resolve issues faster


⚡ Quick access to support tools

From the Support Center, you can also:

  • Access the Knowledge Base

  • View product updates (Changelog)

  • Check the roadmap

  • Share feedback

  • Check system status


🚀 Why this matters

The new Trio Support Center helps you:

  • Resolve issues faster

  • Reduce back-and-forth communication

  • Keep everything in one place

  • Get a smoother support experience

March 11th, 2026

MDM & Device Management

Improved Apple MDM Infrastructure for Upcoming DDM Compatibility

  • Optimized Apple MDM support to ensure future compatibility with Device Deployment Management (DDM), making device onboarding and management smoother

Remote Software Installation Improvement on macOS, Windows, iOS

  • Faster and more reliable remote software deployment across all supported devices.

Remote Command Execution Improvement

  • Enhanced stability and performance when sending commands to managed devices, ensuring actions execute reliably.

Trio Agent Updater (New Version) for Desktop Platforms

  • The updated agent automatically keeps desktop devices up to date, improving security and feature availability.

Standard User Creation During Enrollment

  • Automatically creates standard (non-admin) accounts during device enrollment to reduce security risks and maintain best practices.


Security & Authentication

Improved Authentication and Authorization System on Trio IdP

  • Strengthened authentication protocols and user permissions to make logins and access control more secure.

Providing Device Login with SSO Module Based on Trio IdP

  • Devices can now use Single Sign-On (SSO) for simplified, secure login using your Trio IdP credentials.

Improved Zero Trust Conditional Access Compatible with Trio IdP (Beta)

  • Enhanced conditional access policies based on Zero Trust principles, ensuring only verified devices and users can access resources (Beta).


Platform & User Experience

Trio App Catalog New Version (Public Repo for All Companies)

  • Updated app catalog, now available as a public repository, making it easier to find and deploy applications for all organizations.

Bring Custom SMTP Configuration for Self-host and On-Prem Customers

  • Self-hosted and on-prem customers can now configure their own SMTP settings, giving more control over email delivery.

MSP Portal Available (Beta)

  • New portal designed for Managed Service Providers to manage multiple clients efficiently, now available in Beta.


Billing & Payments

New Billing and Payment System

  • Streamlined subscription management with improved payment flows, invoices, and billing history for a smoother experience.

January 4th, 2026

Improved

Trio has introduced improvements to policy and policy group management, enhancing how policies are created, organized, and applied across managed devices.

While policy management capabilities were already available, this update improves structure, consistency, and administrative control, making it easier to manage policies at scale and reduce configuration overhead.

What’s improved

  • More consistent handling of policy groups and assignments

  • Improved clarity in policy-to-device and policy-to-group relationships

  • Better support for managing policies across larger and more complex environments

Technical overview

Policies in Trio define configuration and security requirements enforced on managed devices. Policy groups act as a logical layer to organize multiple policies and apply them collectively to device scopes or organizational units.

With these improvements:

  • Policy group behavior is more predictable during assignment and updates

  • Policy changes propagate more reliably across associated devices

  • Administrative actions around grouping and management are more structured

Policy enforcement state is derived from backend configuration data and device synchronization cycles. Runtime behavior, user interaction, and immediate enforcement timing are dependent on platform and device conditions.

Why policy group management matters

As environments scale, managing policies individually becomes inefficient and error-prone. Policy groups help:

  • Reduce duplication in policy configuration

  • Maintain consistency across device categories or organizational units

  • Simplify updates by centralizing changes

Improved policy group management reduces operational risk and improves maintainability.

How Trio applies these improvements

With this update, Trio enables administrators to:

  • Organize policies more effectively using improved grouping logic

  • Apply and manage policies at scale with greater confidence

  • Maintain alignment between intended configuration and deployed state

These improvements strengthen Trio’s policy framework by making policy and policy group management more scalable, predictable, and manageable.


January 4th, 2026

New

Trio has introduced a new File Management module, expanding administrative control and visibility over files on managed devices.

This module is designed to support operational workflows that require structured access to device-level file operations, while maintaining alignment with security and governance requirements.

What the File Management module provides

  • Centralized visibility into files and directories on managed devices

  • Controlled interaction with device file systems through the management platform

  • A structured foundation for file-related administrative actions and workflows

Technical overview

The File Management module interfaces with device agents and platform services to surface file system information from managed endpoints. File data and availability are derived from agent-reported metadata and backend synchronization processes.

The module focuses on management-level access and visibility, not continuous file activity monitoring. File contents, user interaction behavior, and real-time file change tracking depend on platform support and are not universally inspected.

Why file management matters

For IT and security teams, controlled file access is important for:

  • Supporting operational and troubleshooting tasks

  • Managing device-level data in distributed environments

  • Enforcing organizational governance around file handling

Without a centralized mechanism, file-related administrative actions often rely on manual or ad-hoc processes.

How Trio applies file management

With the introduction of this module, Trio enables administrators to:

  • Interact with device file systems in a structured and auditable way

  • Reduce reliance on direct user involvement for file-related tasks

  • Maintain consistency across managed environments

The File Management module extends Trio’s management capabilities by adding structured file-level visibility and control, while remaining aligned with platform constraints and security boundaries.

January 4th, 2026

Trio has introduced a new Asset Management feature, expanding visibility and control over managed devices across the environment.

This feature provides a centralized view of organizational assets, enabling administrators to track device ownership, state, and key attributes more effectively. It is designed to support operational oversight, security workflows, and compliance requirements by establishing a clearer system of record for managed assets.

What the new Asset Management feature provides

  • Centralized visibility into managed devices and assets

  • Structured representation of asset metadata, such as ownership and status

  • Improved alignment between device inventory and management policies

Technical overview

The Asset Management feature aggregates device information from enrollment records, agents, and backend system metadata. Asset state is derived from synchronized data sources and reflects the most recent reported configuration and association.

The feature focuses on inventory representation and governance, rather than real-time device behavior. Telemetry freshness, discovery accuracy, and reconciliation logic depend on platform reporting and synchronization cycles.

Why asset management matters

Accurate asset visibility is foundational for:

  • Security and access control enforcement

  • Lifecycle management (enrollment, reassignment, decommissioning)

  • Audit readiness and compliance reporting

Without a structured asset inventory, enforcing policies and responding to incidents becomes inconsistent and error-prone.

How Trio applies asset management

With this new feature, Trio enables administrators to:

  • Maintain a reliable inventory of managed devices

  • Associate assets with users or organizational context

  • Use asset data as a foundation for policy enforcement and operational decisions

This introduction strengthens Trio’s core device management capabilities by making asset visibility more structured, centralized, and actionable.

January 4th, 2026

Improved

Trio has introduced enhancements to geolocation tracking and location-based policies, improving how device location data is collected, visualized, and used within policy enforcement workflows.

Geolocation capabilities were already available, but this update strengthens accuracy, consistency, and policy alignment, making location data more actionable for operational and security use cases.

What’s improved

  • More reliable device location reporting across supported platforms

  • Improved handling of location updates and state changes

  • Clearer linkage between geolocation data and location-based policy logic

Technical overview

Geolocation tracking in Trio relies on platform-level location services and device telemetry to determine the approximate geographic position of managed endpoints. Location data is processed and presented in a way that supports:

  • Device visibility across distributed environments

  • Location-aware operational decisions

  • Enforcement of policies based on geographic context

Location information is derived from system services and agent telemetry. Environmental factors such as network conditions, platform permissions, and hardware capabilities can affect accuracy. Real-time movement, indoor positioning, and user behavior are not continuously inspected.

Why location-based controls matter

For organizations managing geographically distributed devices, geolocation data helps:

  • Track device presence across offices, regions, or countries

  • Apply different policies based on physical location

  • Detect unexpected device movement or out-of-region activity

Location-based policies add contextual awareness to device management, complementing traditional identity- and configuration-based controls.

How Trio applies geolocation policies

With these enhancements, Trio enables administrators to:

  • View and manage device locations more clearly within the platform

  • Apply location-aware policies using improved geolocation data

  • Maintain better alignment between physical device context and security enforcement

Location tracking and policy evaluation are dependent on platform support and granted permissions. Precision boundaries, real-time tracking, and continuous movement monitoring are not guaranteed.

These enhancements make geolocation tracking and policy enforcement more consistent, informative, and usable within Trio.

January 4th, 2026

Improved

Trio has introduced improvements to BitLocker management for Windows devices, enhancing how full-disk encryption is enforced and managed across enrolled endpoints.

BitLocker support already existed within Trio, but this update refines the way encryption requirements are configured, applied, and maintained through centralized policies, resulting in more consistent behavior and clearer enforcement across Windows environments.

What’s improved

  • More reliable BitLocker enforcement through policy-driven configuration

  • Clearer separation between encryption enablement and device assignment

  • Improved consistency across managed Windows devices, especially during enrollment and policy refresh cycles

What BitLocker does (technical overview)

BitLocker is Windows’ native full-disk encryption technology. It encrypts the entire operating system volume using AES-based encryption, protecting data stored on the device when it is powered off or accessed outside the operating system.

When BitLocker is enabled:

  • All data on the system drive is encrypted at rest

  • Disk contents remain inaccessible without proper authentication

  • Data is protected against offline access, disk removal, and unauthorized boot attempts

BitLocker typically integrates with TPM (Trusted Platform Module) hardware to securely store encryption keys and validate system integrity during startup.

Why BitLocker is required on Windows devices

Windows devices are frequently used in mobile, hybrid, and remote work environments. Without full-disk encryption:

  • Lost or stolen devices can expose sensitive organizational data

  • Offline access to disks can bypass operating system controls

  • Compliance with security and regulatory requirements may be compromised

BitLocker mitigates these risks by enforcing encryption at the storage layer, independent of user actions.

How Trio applies BitLocker

With this improvement, Trio enables administrators to:

  • Enforce BitLocker through centralized Windows security policies

  • Apply encryption requirements consistently across device groups

  • Maintain alignment with organizational security baselines for data-at-rest protection

Encryption state is derived from system configuration and device reporting. Key escrow handling, encryption progress, and cryptographic validation depend on Windows platform capabilities and are not actively inspected by Trio.

These improvements strengthen Windows endpoint protection by making BitLocker enforcement more consistent, predictable, and policy-driven within Trio.

January 4th, 2026

Improved

Trio’s FileVault support for macOS has been improved to provide more consistent, policy-driven enforcement of full-disk encryption across managed devices.

While FileVault enforcement was previously available, this update refines how FileVault settings are configured and applied through dedicated macOS security profiles, improving reliability, visibility, and administrative control.

What’s improved

  • More structured FileVault configuration via macOS profiles

  • Clearer separation between encryption policy definition and device assignment

  • More predictable enforcement behavior across enrolled Mac devices

What FileVault does (technical overview)
FileVault is macOS’s native full-disk encryption technology. It encrypts the entire system volume using XTS-AES-128 encryption with a 256-bit key, ensuring that data stored on the device remains protected when the system is powered off or compromised.

Once enabled:

  • User data, system files, and application data are encrypted at rest

  • Access to disk contents requires authenticated user credentials

  • Data remains unreadable if the device is lost, stolen, or accessed outside the operating system

Why FileVault is essential on macOS
macOS devices are commonly used in mobile and remote work environments. Without full-disk encryption:

  • Data can be accessed by removing the disk or booting into external environments

  • Lost or stolen devices pose a direct data exposure risk

  • Compliance with security and data protection standards may not be met

FileVault addresses these risks by enforcing encryption at the storage layer, independent of user behavior.

How Trio applies FileVault
With this improvement, Trio enables administrators to:

  • Enforce FileVault through centralized macOS profiles

  • Assign encryption requirements consistently across device groups

  • Maintain alignment with organizational security baselines for data-at-rest protection

Encryption state is derived from system configuration and device reporting. Encryption progress, key escrow workflows, and cryptographic validation depend on macOS platform behavior and are not actively inspected by Trio.

This update strengthens macOS data protection by making FileVault enforcement more consistent, manageable, and policy-driven within Trio.

December 23rd, 2025

Improved

Trio has enhanced the Agent SSO enrollment experience to deliver a faster, more deterministic, and more reliable setup flow across supported platforms. This improvement reduces enrollment friction while ensuring that SSO configuration remains tightly coupled with device trust and identity validation.

What’s New

The Agent SSO enrollment flow has been reworked to eliminate unnecessary steps, reduce failure points, and provide clearer state handling during setup. Enrollment is now optimized to ensure that identity binding, agent registration, and SSO readiness occur in a predictable sequence.

This results in fewer enrollment retries, faster time-to-ready states, and improved consistency across platforms.

How It Works (Technical Overview)

The improved enrollment process introduces a structured, state-aware workflow:

1) Pre-enrollment validation

  • Verifies device compatibility, platform prerequisites, and agent readiness

  • Confirms network reachability to required identity and enrollment services

2) Identity and agent binding

  • Authenticates the user via the configured IdP

  • Securely binds the agent instance to the user and device identity

  • Establishes the trust relationship required for SSO and Zero Trust evaluation

3) Enrollment finalization

  • Completes agent registration and policy assignment

  • Validates SSO capability before marking the device as enrollment-complete

  • Surfaces deterministic success or failure states instead of partial enrollment

If any step fails, the process exits cleanly with actionable failure handling rather than leaving the device in an indeterminate state.

Why It Matters

SSO reliability depends heavily on enrollment correctness. Inconsistent or partial agent enrollment can lead to authentication failures, policy mismatches, or degraded user experience.

By restructuring the enrollment flow, Trio ensures:

  • Reduced SSO setup errors across platforms

  • Faster onboarding for new devices and users

  • Stronger alignment between agent state and access enforcement

  • Lower operational overhead for IT teams

Platform Impact

  • Improves success rates for Device SSO, Conditional Access, and Device Login

  • Reduces support cases related to incomplete or failed enrollments

  • Provides a more consistent enrollment experience across supported operating systems

  • Strengthens auditability by ensuring SSO is enabled only on fully enrolled devices

Who Should Use This

  • Organizations onboarding devices at scale

  • Teams enforcing SSO and Zero Trust across multiple platforms

  • IT administrators seeking predictable, low-touch device enrollment

  • Environments where enrollment reliability directly impacts access availability

December 23rd, 2025

Improved

Trio’s Conditional Access module introduces policy-driven, context-aware access control that evaluates both device posture and real-time location trust before allowing authentication or session continuation. This enables Zero Trust decisions that are not static or identity-only, but continuously validated against device and environmental context.

What’s New

Conditional Access in Trio adds a dedicated enforcement layer where access is granted only when a request satisfies multiple signals, including:

  • Device-based access: whether the requesting endpoint is enrolled, trusted, and compliant

  • Geolocation trust: whether the request originates from an approved geographic context, as defined by policy

This module enables “allow/deny/step-up” behavior at the moment of access—based on the device’s current state and the user’s location context.

How It Works (Technical Overview)

When a user or device attempts to access a protected resource, Trio evaluates an access policy using a set of conditional inputs:

1) Device posture evaluation

  • Enrollment status (managed vs unmanaged)

  • Compliance state against assigned policies (e.g., encryption enabled, screen lock, OS requirements)

  • Device trust state (e.g., approved device identity, risk posture derived from agent telemetry where applicable)

2) Real-time location evaluation

  • Location is assessed against policy-defined trust criteria (e.g., permitted regions, office locations, or geofenced zones)

  • If location trust is required, access is allowed only if the device location matches the expected context at request time

3) Decision and enforcement

  • Trio returns an access decision:

    • Allow if all conditions pass

    • Deny if any mandatory condition fails

    • Conditional/step-up (where supported) if policy requires additional verification when risk is elevated (e.g., location mismatch or partial compliance)

Critically, this model supports dynamic enforcement: if device compliance changes or location context shifts, access can be re-evaluated based on policy.

Why It Matters

Identity-based access alone cannot prevent access from:

  • A valid user signing in from an unmanaged device

  • A trusted device operating outside approved geographic context

  • A device that was compliant yesterday but is non-compliant now

Conditional Access addresses these gaps by enforcing contextual authorization at runtime. The result is stronger resistance to credential theft, unauthorized access, and policy drift.

Platform Impact

  • Acts as a primary enforcement layer for Zero Trust access decisions

  • Integrates with IdP, Device SSO, and Device Login by adding context-based gating

  • Improves auditability by linking access outcomes to:

    • device identity

    • device compliance state

    • location context at time of request

  • Reduces manual incident response by preventing risky access paths by default

Who Should Use This

  • Organizations implementing Zero Trust across distributed teams

  • IT/security teams that need to restrict access by trusted device + trusted location

  • Environments with sensitive data requiring deterministic access controls and audit trails

  • Teams that need policy-driven enforcement rather than manual approvals