NetIQ Secure Configuration Manager User Guide

  NetIQ Secure Configuration Manager User Guide
    Introduction
      Understanding Secure Configuration Manager Components
      Auditing and Evaluation Process Workflow
      Understanding Asset Auditing Tools
      Understanding Compliance Evaluation Tools
      Listing Reports, Actions, and Security Checks
    Organizing Computers in Your Asset Map
      Understanding IT Assets
      Building and Managing Your Asset Map
      Working with Managed Groups
      Working with Agents
      Working with Endpoints
    Setting Security on the Secure Configuration Manager Console
      Console Security Checklist
      Understanding Console Security
      Managing User Authentication
      Managing Password Policy
      Managing Roles
      Managing Permissions
      Managing Console Users
    Auditing Your IT Assets
      Understanding Security Checks
      Understanding Policy Templates
      Running Security Checks and Policy Templates
      Enabling Report Distribution
      Viewing Report Results
      Exporting Reports
    Evaluating Audit Results
      Understanding Report Results
      Excluding Data from Report Results
      Comparing Report Results
      Using the Asset Compliance View for Evaluation
      Using the Secure Configuration Manager Dashboard for Evaluation
      Using the Security Checkup Results Viewer for Evaluation
      Configuring Evaluation Settings
      Automating Compliance Notification
    Customizing Security Checks and Policy Templates
      Namespaces, Objects, and Attributes
      Understanding Security Check Components
      Understanding Risk Scoring
      Working with Security Checks
      Custom Check Examples
      Working with Policy Templates
    Working with Baselines
      Understanding Baselines
      Understanding Baseline Permissions
      Creating and Managing Baselines
    Maintaining Your Security Knowledge
      Understanding the AutoSync Components
      Configuring a Standalone AutoSync Client
      Connecting to the AutoSync Server through Proxy
      Manually Checking for New Security Knowledge
      Scheduling Checks for New Security Knowledge
      Applying AutoSync Updates
      Updating Agent Content
      Understanding AutoSync Archive
    Maintaining the Secure Configuration Manager Database
      Database Maintenance Checklist
      Required Database Permissions and Settings
      How the Secure Configuration Manager Database Works
      Developing a Database Maintenance Strategy
    Customizing Secure Configuration Manager
      Creating Custom Tasks and Reports
      Customizing the Job Queues
      Customizing the Console
      Customizing Core Services
      Enabling FIPS Communication
      Enabling Event Logging
      Enabling Interim Local Storage of Microsoft Excel Reports
    Integrating Secure Configuration Manager with Sentinel
      Configuring the Integration
      Viewing Assessment Events in Sentinel
      Configuring Sending Events in FIPS Mode
    Working With Network Device Endpoint Importer Utility
      Adding Network Device Endpoints
      Importing Network Device Endpoints to Secure Configuration Manager
    Using the Lightweight UNIX Solution
      Lightweight UNIX Solution Checklist
      Running the Data Collection Script
      Transferring the Data Files
      Installing the Data Files
      Running Security Checks for Lightweight UNIX
    Disaster Preparation and Recovery
      Disaster Preparation
      Disaster Recovery
    Evaluating the Product in a Trial Environment
      Evaluation Checklist
      Getting Started
      Adding Assets to the Asset Map
      Auditing IT Assets
      Evaluating IT Assets
      Maintaining Environment Configuration Standards
      Applying Product Licenses
    Checklists
    Legal Notice