Home Absolute Persistance
Post
Cancel

Absolute Persistance

In enterprise security, one of the biggest challenges is maintaining visibility and control over endpoints—especially when threats involve OS reinstalls, hard drive replacements, or rogue devices. Enter Absolute Persistence, a patented firmware-embedded technology that creates an unbreakable digital tether between devices and security infrastructure, surviving even the most aggressive evasion attempts.

What is Absolute Persistence?

Absolute Persistence is a factory-embedded security module from Absolute Software, pre-installed in the BIOS/UEFI firmware of over 600 million devices from nearly 30 OEMs including Dell, HP, Lenovo, ASUS, Microsoft Surface, and Panasonic.Unlike traditional software agents that can be uninstalled or bypassed, Persistence operates at the firmware level—making it virtually indestructible and independent of the operating system.

The technology establishes a secure, always-on connection to Absolute’s cloud platform, enabling persistent endpoint visibility, control, and automated remediation even when devices are off-network, reimaged, or physically compromised.

Technical Architecture: How It Works

Firmware-Level Embedding

The Persistence module resides in a non-flashable region of the device’s BIOS/UEFI firmware, embedded during manufacturing. This location ensures it cannot be removed through:

  • OS reinstallation or reimaging
  • Hard drive/SSD replacement
  • Firmware updates or flashing
  • System recovery operations
  • User-level or even admin-level uninstalls.

Activation and Self-Healing Mechanism

The technology operates through a sophisticated self-healing loop:

  1. Dormant State: Persistence remains inactive until the Absolute agent software is installed on the device
  2. Initial Handshake: Agent performs first check-in to Absolute cloud, activating the firmware module
  3. Boot-Time Verification: At every system boot, the firmware module checks for agent presence and integrity
  4. Auto-Remediation: If agent is missing, corrupted, or tampered with, the firmware automatically reinstalls it from the cloud
  5. Bidirectional Communication: Encrypted telemetry flows continuously, with FIPS 140-2 compliance options for government/defense sectors.

The agent footprint remains under 200KB, operating as a hidden, tamper-resistant service with minimal performance impact.

Core Capabilities

Absolute offers tiered capabilities built on the Persistence foundation:

Visibility Tier

  • Hardware & Software Inventory: Real-time tracking of all installed applications, patches, and hardware components
  • Geolocation & Usage Analytics: GPS/WiFi-based location tracking, user activity monitoring
  • Security Posture Assessment: Continuous evaluation of firewall status, encryption state, AV/EDR health
  • Sensitive Data Discovery: Regex and SHA-256 hash-based scans for PII, PCI, HIPAA-regulated data across endpoints

Control Tier

  • Remote Device Freeze/Wipe: Immediate lockdown or data sanitization for stolen/compromised devices
  • Geofencing Alerts: Automated notifications when devices leave authorized geographic boundaries
  • Absolute Reach: Remote script execution for forensic evidence collection, policy enforcement, or custom remediation
  • BIOS Password Management: Retrieval and reset capabilities on supported models (Dell, HP, Lenovo)

Resilience Tier

  • Application Resilience: Auto-healing for critical security applications:
    • EDR/XDR platforms (CrowdStrike, SentinelOne, Microsoft Defender)
    • DLP solutions (Forcepoint, Digital Guardian)
    • VPN clients (Cisco AnyConnect, Palo Alto GlobalProtect)
    • Encryption tools (BitLocker, FileVault)
  • Rehydrate: Full OS and application stack restoration post-breach
  • Vulnerability Remediation: Automated patching and configuration management
  • Ransomware Response: Isolation, scripted cleanup, and system restoration

Digital Forensics Significance in Corporate Environments

The SSD Swap Scenario

Consider this common insider threat or APT scenario:

  1. Attacker compromises device: Malicious insider or external threat actor gains physical access
  2. Evasion attempt: Attacker swaps SSD with a clean drive and boots a rogue OS (e.g., Linux live USB or fresh Windows install) to avoid detection
  3. Persistence activates: On next boot, firmware detects missing Absolute agent
  4. Auto-remediation cascade:
    • Firmware reinstalls Absolute agent
    • Agent checks in to cloud console
    • Application Resilience deploys CrowdStrike Falcon sensor
    • DLP agent installs and enforces data policies
    • Full security stack restored within minutes—without IT intervention

Forensic Investigator’s Dream

For digital forensics teams, Absolute Persistence provides unprecedented capabilities:

Forensic ValueTechnical Benefit
Pre/Post-Incident VisibilityHistorical telemetry shows application removals, unusual geolocation changes, or encryption status modifications before breach discovery
Chain of CustodyTimestamped logs of all device activities, user sessions, and remote actions maintain audit trails for legal proceedings
Remote Evidence CollectionAbsolute Reach scripts can capture memory dumps, event logs, file system artifacts without physical access
Data Exfiltration PreventionReal-time monitoring detects sensitive file transfers; remote freeze prevents further leakage during investigation
Compliance EnforcementAuto-wipe ensures GDPR/HIPAA/PCI compliance for lost/stolen devices, with cryptographic proof of sanitization

Mean Time to Response (MTTR) Reduction

Traditional incident response might take hours or days to reimage and reconfigure a compromised device. With Persistence:

  • Device identification: Immediate (always-on telemetry)
  • Security stack restoration: 5-15 minutes (automated)
  • Forensic data collection: Minutes vs. hours/days
  • Device quarantine: Seconds (remote freeze)

Real-World Use Cases

Case 1: Stolen Executive Laptop

CFO’s laptop stolen at airport. Within minutes, IT:

  1. Geolocates device to specific address via Absolute console
  2. Remotely freezes device to prevent data access
  3. Initiates crypto-wipe after confirming theft
  4. Provides law enforcement with location data

Case 2: Insider Threat Investigation

Security analyst notices abnormal data access patterns. Absolute Reach deployed to:

  1. Capture user’s browser history, clipboard, and running processes
  2. Extract registry keys and event logs
  3. Freeze device to preserve volatile memory
  4. Generate forensic report for legal team—all remotely, without alerting the suspect

Case 3: Ransomware Outbreak

Ransomware hits 50 endpoints. Absolute:

  1. Auto-detects missing/corrupted EDR agents
  2. Reinstalls CrowdStrike sensors on all affected devices
  3. Executes cleanup scripts via Absolute Reach
  4. Restores critical apps through Rehydrate
  5. Reduces remediation time from days to hours

Supported Systems and OEM Integration

Pre-Installed by Default In:

  • Dell: Latitude, Precision, OptiPlex, XPS, Alienware series
  • HP: EliteBook, ProBook, ZBook, Elite desktops
  • Lenovo: ThinkPad, ThinkCentre, ThinkStation (all modern models)
  • ASUS: Intel 12th-gen (Alder Lake) and newer platforms
  • Microsoft: Surface Pro, Surface Laptop, Surface Book
  • Panasonic: Toughbook series
  • 25+ additional OEMs: Full list at absolute.com/oems

Checking Firmware Presence

Dell Systems:

  1. Boot into BIOS (F2 during startup)
  2. Navigate to Security → Computrace
  3. Check status: “Disabled”, “Inactive”, or “Active”

Lenovo ThinkPad:

  1. Enter BIOS (F1 at startup)
  2. Go to Security → Absolute Persistence Module
  3. Options: “Disabled”, “Enabled (Inactive)”, “Enabled (Active)”

ASUS:

  1. Access UEFI (F2/Del during boot)
  2. Navigate to Advanced → Absolute Persistence
  3. View status: Inactive or Active

Security Considerations

Privacy and Ethical Use

  • Data Collection: Agent collects device telemetry, application usage, geolocation—ensure compliance with employee monitoring laws (GDPR Article 88, CCPA)
  • Administrator Accountability: Remote wipe/freeze capabilities require strict access controls and audit logging
  • Personal Devices: Not recommended for BYOD without explicit consent and data handling agreements

Limitations

  • Physical Security: Persistence cannot prevent physical hardware attacks (chip-level extraction)
  • Advanced Threats: Nation-state actors with firmware exploit capabilities could theoretically compromise the module (no public exploits known)
  • Network Dependency: Initial activation and cloud check-ins require internet connectivity

Future of Firmware-Based Security

Absolute Persistence represents the evolution toward hardware root of trust security models, where protection begins at the silicon level rather than the OS. As threats increasingly target bootloaders and firmware (e.g., LoJax, MosaicRegressor), having a factory-embedded, vendor-independent security layer becomes critical for zero-trust architectures.

Have you implemented Absolute Persistence in your environment? Share your experiences in the comments below!

This post is licensed under CC BY 4.0 by the author.

Inside The Registry

-