User’s Guide for NetIQ Secure Configuration Manager
- User’s Guide for NetIQ Secure Configuration Manager
- Introduction
- Understanding Secure Configuration Manager Components
- Understanding Asset Categories
- Auditing and Evaluation Process Workflow
- Understanding the Tools for Auditing Assets
- Understanding Compliance Evaluation Tools
- Listing Reports, Actions, and Security Checks
- Discovering and Managing Your IT Assets
- Building Your Asset Map
- Checklist for Building Your Asset Map
- Understanding Managed and Unmanaged Assets
- Adding Known, Unmanaged Assets
- Discovering Unmanaged Assets in Your Environment
- Deploying Windows Agents to the Managed Assets
- Registering Managed Assets
- Adding Endpoints to Managed Assets
- Managing Your Assets
- Managing Asset Properties
- Managing Your Agents
- Managing Your Endpoints
- Organizing Endpoints into Groups
- Removing Managed Assets
- Reporting Asset Map Information
- Auditing Your Managed Assets
- Using Security Checks to Assess Assets
- Understanding Security Checks
- Understanding How Agents Identify Data to Collect
- Understanding Security Check Components
- Understanding Risk Scoring
- Modifying or Creating Custom Security Checks
- Custom Security Check Examples
- Running Security Checks
- Using Policy Templates to Assess Assets
- Understanding Policy Templates
- Modifying and Creating Policy Templates
- Running Policy Templates
- Configuring Assessment Options
- Automating Out-of-Compliance Notifications
- Running Assessments on a Schedule
- Enabling Report Distribution
- Identifying Security Risks in Your Environment
- Reviewing Results of Individual Runs
- Viewing Assessment Results
- Using the Web Console for Evaluation
- Using the Asset Compliance View for Evaluation
- Using the Secure Configuration Manager Dashboard for Evaluation
- Using Dynamic Reports to Evaluate Endpoints
- Checklist for Using Dynamic Reports to Evaluate Assets
- Building Dynamic Reports
- Evaluating Endpoints with a Dynamic Report
- Excluding Data from Runs and Reports
- Excluding Values from a Run
- Excluding Data from Report Results
- Comparing Results of Assessments
- Using a Dynamic Report to Compare Endpoints
- Running Reports from the Database
- Comparing Security Check Results for Two Endpoints
- Comparing Policy Template Results
- Filtering a Delta Report
- Scheduling a Delta Report
- Distributing Delta Reports to a File Share or Folder
- Distributing Delta Reports to an Email Recipient
- Exporting a Delta Report
- Predicting Vulnerability and Compliance Problems
- Customizing Secure Configuration Manager
- Customizing Secure Configuration Manager
- Creating and Applying Tags
- Creating Custom Tasks and Reports
- Customizing the Job Queues
- Customizing Core Services
- Enabling FIPS Communication
- Configuring the Consoles and Dashboard
- Modifying the Session Timeout Settings
- Configuring the Web Console
- Configuring the Windows Console
- Configuring the Web-based and Asset Compliance Content
- Setting up the Dashboard for Your Users
- Setting Security on the Secure Configuration Manager Console
- Console Security Checklist
- Understanding Console Security
- Managing User Authentication
- Managing Password Policy
- Managing Roles
- Managing Permissions
- Managing Console Users
- Integrating with a SIEM Solution
- Secure Configuration ManagerPreparing for Integration
- Understanding Integration with a SIEM Solution
- Secure Configuration ManagerConfiguring for SIEM Integration
- Secure Configuration ManagerIntegrating with ArcSight
- Configuring ArcSight
- Secure Configuration ManagerViewing Raw Events in ArcSight
- Viewing the ArcSight Dashboard
- Secure Configuration ManagerGenerating Alerts on Events
- Integrating Secure Configuration Manager with Sentinel
- Sending Events in FIPS Mode
- Viewing Assessment Events in Sentinel
- Integrating Secure Configuration Manager with Splunk
- Configuring Splunk for Integration
- Secure Configuration ManagerViewing Raw Events in Splunk
- Viewing the Splunk Dashboard
- Secure Configuration ManagerGenerating Alerts on Events
- Maintaining Secure Configuration Manager
- Maintaining Your Security Knowledge
- Understanding the AutoSync Components
- Configuring a Standalone AutoSync Client
- Connecting to the AutoSync Server through Proxy
- Manually Checking for New Security Knowledge
- Scheduling Checks for New Security Knowledge
- Applying AutoSync Updates
- Updating Agent Content
- Understanding AutoSync Archive
- Maintaining the Secure Configuration Manager Database
- Database Maintenance Checklist
- Required Database Permissions and Settings
- How the Secure Configuration Manager Database Works
- Developing a Database Maintenance Strategy
- Disaster Preparation and Recovery
- Disaster Preparation
- Disaster Recovery
- Appendices
- Using the Lightweight UNIX Solution
- Lightweight UNIX Solution Checklist
- Running the Data Collection Script
- Transferring the Data Files
- Installing the Data Files
- Running Security Checks for Lightweight UNIX
- Working with Baselines
- Understanding Baselines
- Understanding Baseline Permissions
- Creating and Managing Baselines
- Evaluating the Product in a Trial Environment
- Evaluation Checklist
- Getting Started
- Adding Assets to the Asset Map
- Auditing IT Assets
- Evaluating IT Assets
- Maintaining Environment Configuration Standards
- Applying Product Licenses
- Checklists
- Legal Notice