User’s Guide for NetIQ Secure Configuration Manager

  User’s Guide for NetIQ Secure Configuration Manager
    Introduction
      Understanding Secure Configuration Manager Components
      Understanding Asset Categories
      Auditing and Evaluation Process Workflow
      Understanding the Tools for Auditing Assets
      Understanding Compliance Evaluation Tools
      Listing Reports, Actions, and Security Checks
    Discovering and Managing Your IT Assets
      Building Your Asset Map
        Checklist for Building Your Asset Map
        Understanding Managed and Unmanaged Assets
        Adding Known, Unmanaged Assets
        Discovering Unmanaged Assets in Your Environment
        Deploying Windows Agents to the Managed Assets
        Registering Managed Assets
        Adding Endpoints to Managed Assets
      Managing Your Assets
        Managing Asset Properties
        Managing Your Agents
        Managing Your Endpoints
        Organizing Endpoints into Groups
        Removing Managed Assets
        Reporting Asset Map Information
    Auditing Your Managed Assets
      Using Security Checks to Assess Assets
        Understanding Security Checks
        Understanding How Agents Identify Data to Collect
        Understanding Security Check Components
        Understanding Risk Scoring
        Modifying or Creating Custom Security Checks
        Custom Security Check Examples
        Running Security Checks
      Using Policy Templates to Assess Assets
        Understanding Policy Templates
        Modifying and Creating Policy Templates
        Running Policy Templates
      Configuring Assessment Options
        Automating Out-of-Compliance Notifications
        Running Assessments on a Schedule
        Enabling Report Distribution
    Identifying Security Risks in Your Environment
      Reviewing Results of Individual Runs
        Viewing Assessment Results
        Using the Web Console for Evaluation
        Using the Asset Compliance View for Evaluation
        Using the Secure Configuration Manager Dashboard for Evaluation
      Using Dynamic Reports to Evaluate Endpoints
        Checklist for Using Dynamic Reports to Evaluate Assets
        Building Dynamic Reports
        Evaluating Endpoints with a Dynamic Report
      Excluding Data from Runs and Reports
        Excluding Values from a Run
        Excluding Data from Report Results
      Comparing Results of Assessments
        Using a Dynamic Report to Compare Endpoints
        Running Reports from the Database
        Comparing Security Check Results for Two Endpoints
        Comparing Policy Template Results
        Filtering a Delta Report
        Scheduling a Delta Report
        Distributing Delta Reports to a File Share or Folder
        Distributing Delta Reports to an Email Recipient
        Exporting a Delta Report
      Predicting Vulnerability and Compliance Problems
    Customizing Secure Configuration Manager
      Customizing Secure Configuration Manager
        Creating and Applying Tags
        Creating Custom Tasks and Reports
        Customizing the Job Queues
        Customizing Core Services
        Enabling FIPS Communication
      Configuring the Consoles and Dashboard
        Modifying the Session Timeout Settings
        Configuring the Web Console
        Configuring the Windows Console
        Configuring the Web-based and Asset Compliance Content
        Setting up the Dashboard for Your Users
      Setting Security on the Secure Configuration Manager Console
        Console Security Checklist
        Understanding Console Security
        Managing User Authentication
        Managing Password Policy
        Managing Roles
        Managing Permissions
        Managing Console Users
    Integrating with a SIEM Solution
      Secure Configuration ManagerPreparing for Integration
        Understanding Integration with a SIEM Solution
        Secure Configuration ManagerConfiguring for SIEM Integration
      Secure Configuration ManagerIntegrating with ArcSight
        Configuring ArcSight
        Secure Configuration ManagerViewing Raw Events in ArcSight
        Viewing the ArcSight Dashboard
        Secure Configuration ManagerGenerating Alerts on Events
      Integrating Secure Configuration Manager with Sentinel
        Sending Events in FIPS Mode
        Viewing Assessment Events in Sentinel
      Integrating Secure Configuration Manager with Splunk
        Configuring Splunk for Integration
        Secure Configuration ManagerViewing Raw Events in Splunk
        Viewing the Splunk Dashboard
        Secure Configuration ManagerGenerating Alerts on Events
    Maintaining Secure Configuration Manager
      Maintaining Your Security Knowledge
        Understanding the AutoSync Components
        Configuring a Standalone AutoSync Client
        Connecting to the AutoSync Server through Proxy
        Manually Checking for New Security Knowledge
        Scheduling Checks for New Security Knowledge
        Applying AutoSync Updates
        Updating Agent Content
        Understanding AutoSync Archive
      Maintaining the Secure Configuration Manager Database
        Database Maintenance Checklist
        Required Database Permissions and Settings
        How the Secure Configuration Manager Database Works
        Developing a Database Maintenance Strategy
      Disaster Preparation and Recovery
        Disaster Preparation
        Disaster Recovery
    Appendices
      Using the Lightweight UNIX Solution
        Lightweight UNIX Solution Checklist
        Running the Data Collection Script
        Transferring the Data Files
        Installing the Data Files
        Running Security Checks for Lightweight UNIX
      Working with Baselines
        Understanding Baselines
        Understanding Baseline Permissions
        Creating and Managing Baselines
      Evaluating the Product in a Trial Environment
        Evaluation Checklist
        Getting Started
        Adding Assets to the Asset Map
        Auditing IT Assets
        Evaluating IT Assets
        Maintaining Environment Configuration Standards
        Applying Product Licenses
      Checklists
    Legal Notice