The following checklist provides an overview of how to obtain data and run a security check for a Lightweight UNIX computer.
|
Checklist Items |
---|---|
|
|
|
|
|
|
|
|
|
After setting up the endpoint, you can repeat the first three steps in the checklist to provide current data for reports. You can collect, transfer, and install data as often as you want, as long as you install the data files to the same UNIX agent computer each time. If you change the UNIX agent computer where you install the data files, you must set up a new Lightweight UNIX endpoint in Secure Configuration Manager. For more information about setting up an endpoint, see Managing Your Endpoints.