When you run a policy template or security check, the wizard enables you to specify whether you want to notify a person or change management system when an endpoint is out of compliance. You can also specify the timing of the assessment and whether you want it to run on a regular basis.
For more information about running a policy template or security check, see Running a Policy Template and Running a Security Check.
For more information about this software product, see the NetIQ Secure Configuration Manager documentation.
Secure Configuration Manager can send notifications about the results of an assessment to individual email accounts and to a change management system. For example, you might want to notify the server manager when the results of a policy template indicate that the SQL Server endpoint on the server is out of compliance.
Secure Configuration Manager sends an email notification to specified users when an endpoint’s results are out of compliance. By default, Secure Configuration Manager uses the email addresses listed in the Contact Email field of the endpoint’s properties.
For more information, see Automating Out-of-Compliance Notifications
in the Secure Configuration Manager User Guide.
Every organization has complex workflows and change management processes that require adherence. Secure Configuration Manager can send the results of the assessment report to a server, such as your change management system. For more information, see Integrating with a SIEM Solution
in the Secure Configuration Manager User Guide.
Secure Configuration Manager provides the following options for running the selected policy template:
Runs the policy template immediately, and runs the policy template once only.
Starts the run at the specified time, and runs the policy template once only.
Runs on a periodic schedule, based on the specified settings. For more information, see Create a Recurring Schedule for Policy Templates.
To run a policy template on a recurring schedule, use the following settings:
Specifies whether you want the schedule to run daily, weekly, monthly, or continuously
Applies only when you specify a daily or weekly occurrence pattern
Specifies how often the schedule reoccurs. For example, every two weeks.
(Conditional) For a Weekly occurrence, you must also specify the days of the week on which the run occurs.
Specifies when in the specified Occurrence pattern that the run occurs. For example, the time of day for a daily occurrence.
Specifies how often you want to run the policy template on the scheduled day. For example, every six hours.
You must also specify the time of day during which the runs occur. For example, starting at 08:00 and ending at 15:30.
Applies only when you specify a monthly occurrence pattern
Specifies how often the schedule reoccurs during the month. For example, every 11 days.
You must also specify how often the schedule repeats on a monthly basis. For example, every two months.
Applies only when you specify a monthly occurrence pattern
Specifies the days of the week on which the schedule occurs, as well as which week of the month. For example, on the first and third Monday and Thursday of the month.
You must also specify how often the schedule repeats on a monthly basis. For example, every two months.
Specifies the beginning and ending dates of the schedule. To run the schedule perpetually, specify a start date, then select Repeat forever.
Security checks let you score each asset to determine vulnerabilities. The severity range specifies the level of risk that the security check might pose to your environment. In the report, Secure Configuration Manager displays a pie chart showing the distribution of endpoints in each risk score range. You can modify the default values for the severity range if they do not suit your environment.
For trademark and copyright information, see Legal Notice.