Select Manage > Endpoints
Endpoints are the operating systems, devices, and applications that agents help Secure Configuration Manager to assess for vulnerabilities. You can organize your endpoints into groups so that Secure Configuration Manager knows what assets to manage and where to find them.
For more information about this software product, see the NetIQ Secure Configuration Manager documentation.
You can initiate an assessment of one or more endpoints.
In the Endpoints tab, select the managed group that contains the endpoints that you want to assess.
To run a policy template or security check against endpoints in more than one group, you must be in the Groups tab. For more information, see Audit Groups of Endpoints.
Select one or more endpoints in the chosen group.
Select Run Policy Template or Run Security Check, then complete the run process.
For more information, see Assessing Your Managed Assets.
NOTE:Secure Configuration Manager cannot communicate with agents that are not registered. If an unregistered agent manages any of the selected endpoints, Secure Configuration Manager will not collect data from those specific endpoints.
Groups contain collections of endpoints and other groups. By default, Secure Configuration Manager organizes your endpoints by the computer’s operating system. However, you can create customized groups. For more information, see Organize Endpoints in Groups.
You can create and add tags to an endpoint to improve identification and understanding of that endpoint. You can search your assets according to these tags.
For example, you might have standard tags such as UNIX and SQL that apply to several endpoints. Then you might add more specific identifiers for particular endpoints, such as Web server to indicate the endpoint’s purpose or HIPAA to denote that the endpoint must meet the particular security policy.
For more information about adding tags to endpoints, see Create and Apply Tags.
A heartbeat is a periodic pulse from the endpoint that contains information related to the endpoint’s viability and status. Checking the heartbeat of an endpoint is crucial in determining whether the selected endpoint is online and can be assessed. If a endpoint is offline, you might need to re-register the endpoint.
Select the endpoints that you want to check.
To ensure peak product performance, you can select a maximum of 50 endpoints at a time.
Click ... > Check heartbeat.
Refresh the page to view the results.
NOTE:It might take a while for Core Services to complete the heartbeat check.
When Secure Configuration Manager registers an endpoint, it gathers information such as major and minor versions of the operating system or application that the endpoint represents. If an endpoint appears offline but is running, you might need to re-register it with Secure Configuration Manager.
Select the endpoints that you want to re-register.
To ensure peak product performance, you can select a maximum of 50 endpoints at a time.
Click ... > Re-register.
The Web console lists basic information about each endpoint to help you chose the appropriate policy templates to run against it and to determine whether the endpoint is communicating with Core Services.
To view the details about an endpoint, such as recent policy template runs, select the endpoint. For more information, see Understanding Endpoint Properties.
You can search for endpoints or filter the list of endpoints, based on a wide variety of criteria including user-defined tags. For more information, see Search Query Criteria.
You can create a dynamic report for the selected endpoints. For more information, see Generating a Dynamic Report.
For trademark and copyright information, see Legal Notice.