March 17th, 2026

We’ve launched the new Trio Support Center to make it easier for you to get help, track issues, and stay connected with our support team — all in one place.
You can now create support tickets directly inside Trio and track their progress in real time.
Submit support requests, bug reports, and feature requests
View ticket status and updates
Keep all communication in one place
A new Tickets view lets you:
See all your requests in one list
Track status (Submitted, In Progress, Waiting on Customer, Resolved)
Open and follow up on any ticket
Stay connected with the support team through a unified experience:
Reply directly inside tickets
Provide additional details when needed
Get updates without leaving the platform
You can now attach files to your tickets:
Upload screenshots or videos
Share up to 5 files per ticket
Help us resolve issues faster
From the Support Center, you can also:
Access the Knowledge Base
View product updates (Changelog)
Check the roadmap
Share feedback
Check system status
The new Trio Support Center helps you:
Resolve issues faster
Reduce back-and-forth communication
Keep everything in one place
Get a smoother support experience
March 11th, 2026

Improved Apple MDM Infrastructure for Upcoming DDM Compatibility
Optimized Apple MDM support to ensure future compatibility with Device Deployment Management (DDM), making device onboarding and management smoother
Remote Software Installation Improvement on macOS, Windows, iOS
Faster and more reliable remote software deployment across all supported devices.
Remote Command Execution Improvement
Enhanced stability and performance when sending commands to managed devices, ensuring actions execute reliably.
Trio Agent Updater (New Version) for Desktop Platforms
The updated agent automatically keeps desktop devices up to date, improving security and feature availability.
Standard User Creation During Enrollment
Automatically creates standard (non-admin) accounts during device enrollment to reduce security risks and maintain best practices.
Improved Authentication and Authorization System on Trio IdP
Strengthened authentication protocols and user permissions to make logins and access control more secure.
Providing Device Login with SSO Module Based on Trio IdP
Devices can now use Single Sign-On (SSO) for simplified, secure login using your Trio IdP credentials.
Improved Zero Trust Conditional Access Compatible with Trio IdP (Beta)
Enhanced conditional access policies based on Zero Trust principles, ensuring only verified devices and users can access resources (Beta).
Trio App Catalog New Version (Public Repo for All Companies)
Updated app catalog, now available as a public repository, making it easier to find and deploy applications for all organizations.
Bring Custom SMTP Configuration for Self-host and On-Prem Customers
Self-hosted and on-prem customers can now configure their own SMTP settings, giving more control over email delivery.
MSP Portal Available (Beta)
New portal designed for Managed Service Providers to manage multiple clients efficiently, now available in Beta.
New Billing and Payment System
Streamlined subscription management with improved payment flows, invoices, and billing history for a smoother experience.
January 4th, 2026
Improved

Trio has introduced improvements to policy and policy group management, enhancing how policies are created, organized, and applied across managed devices.
While policy management capabilities were already available, this update improves structure, consistency, and administrative control, making it easier to manage policies at scale and reduce configuration overhead.
More consistent handling of policy groups and assignments
Improved clarity in policy-to-device and policy-to-group relationships
Better support for managing policies across larger and more complex environments
Policies in Trio define configuration and security requirements enforced on managed devices. Policy groups act as a logical layer to organize multiple policies and apply them collectively to device scopes or organizational units.
With these improvements:
Policy group behavior is more predictable during assignment and updates
Policy changes propagate more reliably across associated devices
Administrative actions around grouping and management are more structured
Policy enforcement state is derived from backend configuration data and device synchronization cycles. Runtime behavior, user interaction, and immediate enforcement timing are dependent on platform and device conditions.
As environments scale, managing policies individually becomes inefficient and error-prone. Policy groups help:
Reduce duplication in policy configuration
Maintain consistency across device categories or organizational units
Simplify updates by centralizing changes
Improved policy group management reduces operational risk and improves maintainability.
With this update, Trio enables administrators to:
Organize policies more effectively using improved grouping logic
Apply and manage policies at scale with greater confidence
Maintain alignment between intended configuration and deployed state
These improvements strengthen Trio’s policy framework by making policy and policy group management more scalable, predictable, and manageable.
January 4th, 2026
New

Trio has introduced a new File Management module, expanding administrative control and visibility over files on managed devices.
This module is designed to support operational workflows that require structured access to device-level file operations, while maintaining alignment with security and governance requirements.
Centralized visibility into files and directories on managed devices
Controlled interaction with device file systems through the management platform
A structured foundation for file-related administrative actions and workflows
The File Management module interfaces with device agents and platform services to surface file system information from managed endpoints. File data and availability are derived from agent-reported metadata and backend synchronization processes.
The module focuses on management-level access and visibility, not continuous file activity monitoring. File contents, user interaction behavior, and real-time file change tracking depend on platform support and are not universally inspected.
For IT and security teams, controlled file access is important for:
Supporting operational and troubleshooting tasks
Managing device-level data in distributed environments
Enforcing organizational governance around file handling
Without a centralized mechanism, file-related administrative actions often rely on manual or ad-hoc processes.
With the introduction of this module, Trio enables administrators to:
Interact with device file systems in a structured and auditable way
Reduce reliance on direct user involvement for file-related tasks
Maintain consistency across managed environments
The File Management module extends Trio’s management capabilities by adding structured file-level visibility and control, while remaining aligned with platform constraints and security boundaries.
January 4th, 2026

Trio has introduced a new Asset Management feature, expanding visibility and control over managed devices across the environment.
This feature provides a centralized view of organizational assets, enabling administrators to track device ownership, state, and key attributes more effectively. It is designed to support operational oversight, security workflows, and compliance requirements by establishing a clearer system of record for managed assets.
Centralized visibility into managed devices and assets
Structured representation of asset metadata, such as ownership and status
Improved alignment between device inventory and management policies
The Asset Management feature aggregates device information from enrollment records, agents, and backend system metadata. Asset state is derived from synchronized data sources and reflects the most recent reported configuration and association.
The feature focuses on inventory representation and governance, rather than real-time device behavior. Telemetry freshness, discovery accuracy, and reconciliation logic depend on platform reporting and synchronization cycles.
Accurate asset visibility is foundational for:
Security and access control enforcement
Lifecycle management (enrollment, reassignment, decommissioning)
Audit readiness and compliance reporting
Without a structured asset inventory, enforcing policies and responding to incidents becomes inconsistent and error-prone.
With this new feature, Trio enables administrators to:
Maintain a reliable inventory of managed devices
Associate assets with users or organizational context
Use asset data as a foundation for policy enforcement and operational decisions
This introduction strengthens Trio’s core device management capabilities by making asset visibility more structured, centralized, and actionable.
January 4th, 2026
Improved

Trio has introduced enhancements to geolocation tracking and location-based policies, improving how device location data is collected, visualized, and used within policy enforcement workflows.
Geolocation capabilities were already available, but this update strengthens accuracy, consistency, and policy alignment, making location data more actionable for operational and security use cases.
More reliable device location reporting across supported platforms
Improved handling of location updates and state changes
Clearer linkage between geolocation data and location-based policy logic
Geolocation tracking in Trio relies on platform-level location services and device telemetry to determine the approximate geographic position of managed endpoints. Location data is processed and presented in a way that supports:
Device visibility across distributed environments
Location-aware operational decisions
Enforcement of policies based on geographic context
Location information is derived from system services and agent telemetry. Environmental factors such as network conditions, platform permissions, and hardware capabilities can affect accuracy. Real-time movement, indoor positioning, and user behavior are not continuously inspected.
For organizations managing geographically distributed devices, geolocation data helps:
Track device presence across offices, regions, or countries
Apply different policies based on physical location
Detect unexpected device movement or out-of-region activity
Location-based policies add contextual awareness to device management, complementing traditional identity- and configuration-based controls.
With these enhancements, Trio enables administrators to:
View and manage device locations more clearly within the platform
Apply location-aware policies using improved geolocation data
Maintain better alignment between physical device context and security enforcement
Location tracking and policy evaluation are dependent on platform support and granted permissions. Precision boundaries, real-time tracking, and continuous movement monitoring are not guaranteed.
These enhancements make geolocation tracking and policy enforcement more consistent, informative, and usable within Trio.
January 4th, 2026
Improved

Trio has introduced improvements to BitLocker management for Windows devices, enhancing how full-disk encryption is enforced and managed across enrolled endpoints.
BitLocker support already existed within Trio, but this update refines the way encryption requirements are configured, applied, and maintained through centralized policies, resulting in more consistent behavior and clearer enforcement across Windows environments.
More reliable BitLocker enforcement through policy-driven configuration
Clearer separation between encryption enablement and device assignment
Improved consistency across managed Windows devices, especially during enrollment and policy refresh cycles
BitLocker is Windows’ native full-disk encryption technology. It encrypts the entire operating system volume using AES-based encryption, protecting data stored on the device when it is powered off or accessed outside the operating system.
When BitLocker is enabled:
All data on the system drive is encrypted at rest
Disk contents remain inaccessible without proper authentication
Data is protected against offline access, disk removal, and unauthorized boot attempts
BitLocker typically integrates with TPM (Trusted Platform Module) hardware to securely store encryption keys and validate system integrity during startup.
Windows devices are frequently used in mobile, hybrid, and remote work environments. Without full-disk encryption:
Lost or stolen devices can expose sensitive organizational data
Offline access to disks can bypass operating system controls
Compliance with security and regulatory requirements may be compromised
BitLocker mitigates these risks by enforcing encryption at the storage layer, independent of user actions.
With this improvement, Trio enables administrators to:
Enforce BitLocker through centralized Windows security policies
Apply encryption requirements consistently across device groups
Maintain alignment with organizational security baselines for data-at-rest protection
Encryption state is derived from system configuration and device reporting. Key escrow handling, encryption progress, and cryptographic validation depend on Windows platform capabilities and are not actively inspected by Trio.
These improvements strengthen Windows endpoint protection by making BitLocker enforcement more consistent, predictable, and policy-driven within Trio.
January 4th, 2026
Improved

Trio’s FileVault support for macOS has been improved to provide more consistent, policy-driven enforcement of full-disk encryption across managed devices.
While FileVault enforcement was previously available, this update refines how FileVault settings are configured and applied through dedicated macOS security profiles, improving reliability, visibility, and administrative control.
What’s improved
More structured FileVault configuration via macOS profiles
Clearer separation between encryption policy definition and device assignment
More predictable enforcement behavior across enrolled Mac devices
What FileVault does (technical overview)
FileVault is macOS’s native full-disk encryption technology. It encrypts the entire system volume using XTS-AES-128 encryption with a 256-bit key, ensuring that data stored on the device remains protected when the system is powered off or compromised.
Once enabled:
User data, system files, and application data are encrypted at rest
Access to disk contents requires authenticated user credentials
Data remains unreadable if the device is lost, stolen, or accessed outside the operating system
Why FileVault is essential on macOS
macOS devices are commonly used in mobile and remote work environments. Without full-disk encryption:
Data can be accessed by removing the disk or booting into external environments
Lost or stolen devices pose a direct data exposure risk
Compliance with security and data protection standards may not be met
FileVault addresses these risks by enforcing encryption at the storage layer, independent of user behavior.
How Trio applies FileVault
With this improvement, Trio enables administrators to:
Enforce FileVault through centralized macOS profiles
Assign encryption requirements consistently across device groups
Maintain alignment with organizational security baselines for data-at-rest protection
Encryption state is derived from system configuration and device reporting. Encryption progress, key escrow workflows, and cryptographic validation depend on macOS platform behavior and are not actively inspected by Trio.
This update strengthens macOS data protection by making FileVault enforcement more consistent, manageable, and policy-driven within Trio.
December 23rd, 2025
Improved

Trio has enhanced the Agent SSO enrollment experience to deliver a faster, more deterministic, and more reliable setup flow across supported platforms. This improvement reduces enrollment friction while ensuring that SSO configuration remains tightly coupled with device trust and identity validation.
The Agent SSO enrollment flow has been reworked to eliminate unnecessary steps, reduce failure points, and provide clearer state handling during setup. Enrollment is now optimized to ensure that identity binding, agent registration, and SSO readiness occur in a predictable sequence.
This results in fewer enrollment retries, faster time-to-ready states, and improved consistency across platforms.
The improved enrollment process introduces a structured, state-aware workflow:
1) Pre-enrollment validation
Verifies device compatibility, platform prerequisites, and agent readiness
Confirms network reachability to required identity and enrollment services
2) Identity and agent binding
Authenticates the user via the configured IdP
Securely binds the agent instance to the user and device identity
Establishes the trust relationship required for SSO and Zero Trust evaluation
3) Enrollment finalization
Completes agent registration and policy assignment
Validates SSO capability before marking the device as enrollment-complete
Surfaces deterministic success or failure states instead of partial enrollment
If any step fails, the process exits cleanly with actionable failure handling rather than leaving the device in an indeterminate state.
SSO reliability depends heavily on enrollment correctness. Inconsistent or partial agent enrollment can lead to authentication failures, policy mismatches, or degraded user experience.
By restructuring the enrollment flow, Trio ensures:
Reduced SSO setup errors across platforms
Faster onboarding for new devices and users
Stronger alignment between agent state and access enforcement
Lower operational overhead for IT teams
Improves success rates for Device SSO, Conditional Access, and Device Login
Reduces support cases related to incomplete or failed enrollments
Provides a more consistent enrollment experience across supported operating systems
Strengthens auditability by ensuring SSO is enabled only on fully enrolled devices
Organizations onboarding devices at scale
Teams enforcing SSO and Zero Trust across multiple platforms
IT administrators seeking predictable, low-touch device enrollment
Environments where enrollment reliability directly impacts access availability
December 23rd, 2025
Improved

Trio’s Conditional Access module introduces policy-driven, context-aware access control that evaluates both device posture and real-time location trust before allowing authentication or session continuation. This enables Zero Trust decisions that are not static or identity-only, but continuously validated against device and environmental context.
Conditional Access in Trio adds a dedicated enforcement layer where access is granted only when a request satisfies multiple signals, including:
Device-based access: whether the requesting endpoint is enrolled, trusted, and compliant
Geolocation trust: whether the request originates from an approved geographic context, as defined by policy
This module enables “allow/deny/step-up” behavior at the moment of access—based on the device’s current state and the user’s location context.
When a user or device attempts to access a protected resource, Trio evaluates an access policy using a set of conditional inputs:
1) Device posture evaluation
Enrollment status (managed vs unmanaged)
Compliance state against assigned policies (e.g., encryption enabled, screen lock, OS requirements)
Device trust state (e.g., approved device identity, risk posture derived from agent telemetry where applicable)
2) Real-time location evaluation
Location is assessed against policy-defined trust criteria (e.g., permitted regions, office locations, or geofenced zones)
If location trust is required, access is allowed only if the device location matches the expected context at request time
3) Decision and enforcement
Trio returns an access decision:
Allow if all conditions pass
Deny if any mandatory condition fails
Conditional/step-up (where supported) if policy requires additional verification when risk is elevated (e.g., location mismatch or partial compliance)
Critically, this model supports dynamic enforcement: if device compliance changes or location context shifts, access can be re-evaluated based on policy.
Identity-based access alone cannot prevent access from:
A valid user signing in from an unmanaged device
A trusted device operating outside approved geographic context
A device that was compliant yesterday but is non-compliant now
Conditional Access addresses these gaps by enforcing contextual authorization at runtime. The result is stronger resistance to credential theft, unauthorized access, and policy drift.
Acts as a primary enforcement layer for Zero Trust access decisions
Integrates with IdP, Device SSO, and Device Login by adding context-based gating
Improves auditability by linking access outcomes to:
device identity
device compliance state
location context at time of request
Reduces manual incident response by preventing risky access paths by default
Organizations implementing Zero Trust across distributed teams
IT/security teams that need to restrict access by trusted device + trusted location
Environments with sensitive data requiring deterministic access controls and audit trails
Teams that need policy-driven enforcement rather than manual approvals