NetIQ Secure Configuration Manager User Guide
- NetIQ Secure Configuration Manager User Guide
- Introduction
- Understanding Secure Configuration Manager Components
- Auditing and Evaluation Process Workflow
- Understanding Asset Auditing Tools
- Understanding Compliance Evaluation Tools
- Listing Reports, Actions, and Security Checks
- Organizing Computers in Your Asset Map
- Understanding IT Assets
- Building and Managing Your Asset Map
- Working with Managed Groups
- Working with Agents
- Working with Endpoints
- Setting Security on the Secure Configuration Manager Console
- Console Security Checklist
- Understanding Console Security
- Managing User Authentication
- Managing Password Policy
- Managing Roles
- Managing Permissions
- Managing Console Users
- Auditing Your IT Assets
- Understanding Security Checks
- Understanding Policy Templates
- Running Security Checks and Policy Templates
- Enabling Report Distribution
- Viewing Report Results
- Exporting Reports
- Evaluating Audit Results
- Understanding Report Results
- Excluding Data from Report Results
- Comparing Report Results
- Using the Asset Compliance View for Evaluation
- Using the Secure Configuration Manager Dashboard for Evaluation
- Using the Security Checkup Results Viewer for Evaluation
- Configuring Evaluation Settings
- Automating Compliance Notification
- Customizing Security Checks and Policy Templates
- Namespaces, Objects, and Attributes
- Understanding Security Check Components
- Understanding Risk Scoring
- Working with Security Checks
- Custom Check Examples
- Working with Policy Templates
- Working with Baselines
- Understanding Baselines
- Understanding Baseline Permissions
- Creating and Managing Baselines
- Maintaining Your Security Knowledge
- Understanding the AutoSync Components
- Configuring a Standalone AutoSync Client
- Connecting to the AutoSync Server through Proxy
- Manually Checking for New Security Knowledge
- Scheduling Checks for New Security Knowledge
- Applying AutoSync Updates
- Updating Agent Content
- Understanding AutoSync Archive
- Maintaining the Secure Configuration Manager Database
- Database Maintenance Checklist
- Required Database Permissions and Settings
- How the Secure Configuration Manager Database Works
- Developing a Database Maintenance Strategy
- Customizing Secure Configuration Manager
- Creating Custom Tasks and Reports
- Customizing the Job Queues
- Customizing the Console
- Customizing Core Services
- Enabling FIPS Communication
- Enabling Event Logging
- Enabling Interim Local Storage of Microsoft Excel Reports
- Integrating Secure Configuration Manager with Sentinel
- Configuring the Integration
- Viewing Assessment Events in Sentinel
- Configuring Sending Events in FIPS Mode
- Working With Network Device Endpoint Importer Utility
- Adding Network Device Endpoints
- Importing Network Device Endpoints to Secure Configuration Manager
- Using the Lightweight UNIX Solution
- Lightweight UNIX Solution Checklist
- Running the Data Collection Script
- Transferring the Data Files
- Installing the Data Files
- Running Security Checks for Lightweight UNIX
- Disaster Preparation and Recovery
- Disaster Preparation
- Disaster Recovery
- Evaluating the Product in a Trial Environment
- Evaluation Checklist
- Getting Started
- Adding Assets to the Asset Map
- Auditing IT Assets
- Evaluating IT Assets
- Maintaining Environment Configuration Standards
- Applying Product Licenses
- Checklists
- Legal Notice