12.3 Identify Areas that Cause Security Risks

Depending on the policy template, you can view results based on the security checks in the policy template, common vulnerabilities and exposures (CVEs), or requirements associated with a security standard.

You can quickly determine the overall number of security checks with failed and successful results. Then you can delve into a detailed view any particular security check to determine which endpoints failed and how.

It is possible that an endpoint might temporarily be causing a problem or some results returned might not be relevant for your security policies and standards. To remove this information from the assessment report, see Simplify the Data in a Report.

12.3.1 Endpoints that Pose a Security Risk

In the report view, click Endpoints & Groups.

To quickly find endpoints that might pose a security risk, you can select Endpoints at Risk. You can also sort the table by Failed Security Checks or Compliance.

Select an endpoint to view its compliance per security check. Then review the Expected Value and Actual Value columns to identify why the endpoint failed the security check.

Example

The completed assessment for the NetIQ Password Strength policy template indicates that endpoint ABCTest failed two security checks. You select the endpoint to identify where the risks occurred. You observe the following results:

Security Check

Compliance Status

Expected Value

Actual Value

Check Result

Accounts with passwords that never expire

Failed

0

1

Description: Built-in account for guest access to the computer/domain

Status: Disabled

Last login date: Never logged on

Minimum number of passwords remembered

Failed

greater than or equal to 24

0

Status: 0

The endpoint has one account with a password that never expires, which might pose a security risk if malicious users know about this built-in account. The security check expects to find no such accounts. Moreover, another security check discovered that the server fails to store previously used passwords, which is a safeguard to prevent the re-use of old passwords.

For more information about resolving these failures, see Resolve the Discovered Security Risks.

12.3.2 Security Checks that Result in the Most Failures

In the report view, click Security Checks.

You can identify the security settings that resulted in the most failures among your endpoints. From there, you can determine which endpoints might pose the greatest risk to your environment.

Identify the security checks that one or more endpoints failed

Select the value below Failed. You can clear this filter as needed.

Determine which endpoints are at risk

Select a security check from the Failed list, then click Endpoints.

You can also view the Properties of a security check.