Depending on the policy template, you can view results based on the security checks in the policy template, common vulnerabilities and exposures (CVEs), or requirements associated with a security standard.
You can quickly determine the overall number of security checks with failed and successful results. Then you can delve into a detailed view any particular security check to determine which endpoints failed and how.
It is possible that an endpoint might temporarily be causing a problem or some results returned might not be relevant for your security policies and standards. To remove this information from the assessment report, see Simplify the Data in a Report.
In the report view, click Endpoints & Groups.
To quickly find endpoints that might pose a security risk, you can select Endpoints at Risk. You can also sort the table by Failed Security Checks or Compliance.
Select an endpoint to view its compliance per security check. Then review the Expected Value and Actual Value columns to identify why the endpoint failed the security check.
The completed assessment for the NetIQ Password Strength policy template indicates that endpoint ABCTest failed two security checks. You select the endpoint to identify where the risks occurred. You observe the following results:
Security Check |
Compliance Status |
Expected Value |
Actual Value |
Check Result |
---|---|---|---|---|
Accounts with passwords that never expire |
Failed |
0 |
1 |
Description: Built-in account for guest access to the computer/domain Status: Disabled Last login date: Never logged on |
Minimum number of passwords remembered |
Failed |
greater than or equal to 24 |
0 |
Status: 0 |
The endpoint has one account with a password that never expires, which might pose a security risk if malicious users know about this built-in account. The security check expects to find no such accounts. Moreover, another security check discovered that the server fails to store previously used passwords, which is a safeguard to prevent the re-use of old passwords.
For more information about resolving these failures, see Resolve the Discovered Security Risks.
In the report view, click Security Checks.
You can identify the security settings that resulted in the most failures among your endpoints. From there, you can determine which endpoints might pose the greatest risk to your environment.
Select the value below Failed. You can clear this filter as needed.
Select a security check from the Failed list, then click Endpoints.
You can also view the Properties of a security check.