Evaluating your Environment for Compliance with a Basic Rule
The following paragraphs lead you through a first evaluation example of your environment. We will create a rule that checks if a device has a firewall installed and if it is active.
Evaluating a group of devices for their compliance consists of the following steps:
- Collect the different types of inventory on the target devices. Generating inventories is not part of this section, see the BMC Client Management - Inventory section on how to generate the Security inventory for this example.
- Create the compliance rule with its criteria and relation.
- Assign the rule to the target for compliance evaluation.
- Evaluate the compliance results.
Comments
Log in or register to comment.