This section provides links to checklists that can guide you through the complex processes associated with assessing and maintaining asset configuration security. These checklists help you identify and review the related concepts and considerations.
If you want to... |
Review this check list |
---|---|
Review the workflow for the audit and evaluation process |
|
Organize your asset map of groups, systems, agents, and endpoints |
|
Define and manage security controls on the console |
|
Edit existing or create new security checks |
|
Review the workflow or maintaining your Secure Configuration Manager database |
|
Review the process for run a security check for a Lightweight UNIX computer |
|
Review the steps for disaster preparation |
|
Review the steps for disaster recovery |
|
|
|