23.4 Scheduled

Jobs that are scheduled to run in the future, such as a policy template that runs every month.

You can enable, disable, and delete scheduled jobs. When you disable a scheduled job, it remains in the queue but does not run. If the user account that created the scheduled job is disabled or deleted, Secure Configuration Manager no longer runs the scheduled job.

NOTE:Any previously run versions of a scheduled job will be in the other job queues, depending on the job’s state.

Secure Configuration Manager automatically includes the following scheduled jobs:

Asset details and discovery

Enabled by default.

Allows you to gather information about currently managed UNIX and Windows endpoints and their security agents.

If you enable Application Endpoint Discovery in the Core Services Configuration Utility, this job also scans UNIX and Windows endpoints for additional unmanaged applications, such as Internet Information Services (IIS), Microsoft SQL Server, and Oracle.

This job runs continuously by querying 50 systems each run until all systems in your asset map have been checked. When the last managed asset has been scanned, Core Services restarts the process with the first managed asset.

Automatic system discovery

Disabled by default.

Enables you to regularly scan your environment for unmanaged assets, based on the settings for discovery in the Core Services Configuration Utility.

To view discovered systems, use the Windows console.

CyberScope Data Feed

includes aggregated data on all SCAP-enabled endpoints.

When you run this job, Secure Configuration Manager gathers from the database the results of the most recent SCAP policy template runs, including offline assessments imported to the database. Secure Configuration Manager compiles this data into an .xml file.

You can specify whether the .xml file is exported to a specific folder or email address.

Secure Configuration Manager gathers only for the endpoints and the benchmark IDs that you specify in the SCAP tab in the Core Services Configuration Utility. To meet CyberScope reporting standards, you must also provide information about your reporting department.

Benchmark IDs correlate to specific SCAP policy templates. SCAP policy templates are available only if you have the SCAP Module for Secure Configuration Manager installed.