C.2 Getting Started

Before delving into an evaluation, you should review information about the primary components and terminology in Secure Configuration Manager.

For more information about the...

See...

Purpose of and interaction among the database, console, Core Services, and agent

Understanding Secure Configuration Manager Components

Application of systems, agents, endpoints, and groups

Understanding Asset Categories

Tools that enable you to audit your IT assets

Understanding the Tools for Auditing Assets

Tools that enable you to evaluate your IT assets

Understanding Compliance Evaluation Tools

C.2.1 Installing Secure Configuration Manager

The Secure Configuration Manager Installation Guide provides detailed requirements and steps for installing Secure Configuration Manager. When determining the setup for your evaluation environment, consider how that setup might affect a smooth upgrade to a production environment:

  • If your production environment contains fewer than 50 computers, you can install the database, console, and Core Services on one server.

  • If your production environment contains fewer than 50 computers and you want to audit resource-heavy data, such as entitlements for files and shares for all users, install the database and Core Services on separate computers. In a data-rich environment, the database requires more disk space.

  • If your production environment contains more than 50 computers, install the database and Core Services on separate computers. In an environment supporting a large number of endpoints and agents, the database requires more disk space and server resources.

NOTE:

  • For optimal Core Services performance, you must install a console on the Core Services computer. You do not need to use that console for any operational work.

  • You can install a console on more than one computer so multiple console users can audit and evaluate separate groups of managed systems.

  • You do not need to install a Windows agent at this time. The setup program always installs a Windows agent on the Core Services computer. This tour walks you through deploying the agent to other computers.

  • Use the NetIQ UNIX Agent Manager to deploy additional UNIX agents in your trial environment. You can add the UNIX systems manually or enable Secure Configuration Manager to discover them. For more information, see Managing (Discovered) UNIX and Linux Systems.

C.2.2 Introducing the Console

Secure Configuration ManagerWhen you complete the installation process, you can begin exploring the console. To start the console, you must know the administrator user name and password you provided during installation.

When you start the Secure Configuration Manager console, you can select from a list of common tasks, as well as click one of the navigation buttons. The following definitions describe the window items and their associated content in the console:

IT Assets

Allows you to view and manage security agents, endpoints, and systems. Displays the built-in managed groups of endpoints as well as My Groups, a container where you can group endpoints to match your organizational needs. For more information, see Section 2.0, Building Your Asset Map.

Security Knowledge

Displays containers that enable you to view, define, and run policy templates, security checks, and tasks. For ease of use, policy templates are organized in logical groups, such as Best Practices, Bulletins, and Regulations. Security checks are organized according to agent and endpoint types, such as UNIX, Windows, and SQL Server. The Task Suites and Custom Tasks containers enable you to create and run sets of reports and actions. For more information, see Section 6.0, Configuring Assessment Options and Creating Custom Tasks.

Discovered Systems

Lists the systems discovered on your network as well as the unmanaged endpoints on your currently managed systems, depending on the settings for discovery. For ease of use, systems and endpoints are organized by the type of asset, such as SQL Server or UNIX computers. For more information, see Discovering Unmanaged Assets in Your Environment and Discovering Endpoints on Managed Assets.

Job Queues

Displays report status and lets you view reports. Select a report in the Completed folder to display details or the current status of the report. You can organize completed reports into custom containers under My Reports. For more information, see Viewing Assessment Results and Customizing the Job Queues.

Alerts

Allows you to view and manage alerts that are generated when a Secure Configuration Manager or an agent detects certain events or conditions on a managed endpoint. For example, upon installation, an alert announces that Secure Configuration Manager has discovered a new Windows domain. For more information, see the Help.

Audit History

Allows you to view and export a log of the tasks performed by console users and administrators in Secure Configuration Manager, such as logging on and off, adding exceptions, and modifying checks and policy templates. For more information, see Section 14.0, Setting Security on the Secure Configuration Manager Console.

Baselines

Displays the containers for computer baseline management. Baselines allow you to identify and track changes to your computers. The Criteria and Collection containers are a list of defined baseline sets and a list of defined baseline collections. The Management container is a list of the pre-defined checks for managing baselines. For more information, see Section B.0, Working with Baselines.

Exception Management

Displays the containers for exception management. Exceptions are temporary waivers you can create to prevent unnecessary security check report violations. The Exceptions container is a list of exceptions. The Saved Lists container is the list of values that can be used as a filter or exclusion list when running a security check or policy template. For more information, see Excluding Data from Report Results.

Console Permissions

Secure Configuration ManagerProvides administrators access to Console Users, Console Roles, and Authentication Sources. Enables you to set the password policy for console accounts. For more information, see Section 14.0, Setting Security on the Secure Configuration Manager Console.

C.2.3 Understanding Console Permissions

When you install Secure Configuration Manager, the setup program creates an administrator account that can access all product functionality. However, if several individuals in your organization want to participate in this evaluation, you might want to assign an account to each person. In this way, you control who can access Secure Configuration Manager and which activities each user can perform. For example, you can specify whether a console role can deploy agents or run a delta report. You can use the built-in roles or create new ones, and then assign console users to the appropriate roles. Once you create console accounts, you can configure a password policy to protect the accounts against security attacks. You can also instruct Secure Configuration Manager to check user credentials against an external authentication source.

For more information about...

See...

Creating console user accounts

Managing Console Users

Creating or assigning console roles

Managing Roles

Using external authentication to validate console users

Managing User Authentication

Configuring the password policy settings

Managing Password Policy