Unsupported content

 

This version of the product is in limited support. However, the documentation is available for your convenience. You will not be able to leave comments.

Evaluating your Environment for Compliance with a Basic Rule

The following paragraphs lead you through a first evaluation example of your environment. We will create a rule that checks if a device has a firewall installed and if it is active.

Evaluating a group of devices for their compliance consists of the following steps:

  • Collect the different types of inventory on the target devices. Generating inventories is not part of this section, see the BMC Client Management - Inventory section on how to generate the Security inventory for this example.
  • Create the compliance rule with its criteria and relation.
  • Assign the rule to the target for compliance evaluation.
  • Evaluate the compliance results.

Related topics

This version of the documentation is no longer supported. However, the documentation is available for your convenience. You will not be able to leave comments.

Comments