Evaluating your Environment for Compliance with a Basic Rule

The following paragraphs lead you through a first evaluation example of your environment. We will create a rule that checks if a device has a firewall installed and if it is active.

Evaluating a group of devices for their compliance consists of the following steps:

  • Collect the different types of inventory on the target devices. Generating inventories is not part of this section, see the BMC Client Management - Inventory section on how to generate the Security inventory for this example.
  • Create the compliance rule with its criteria and relation.
  • Assign the rule to the target for compliance evaluation.
  • Evaluate the compliance results.

Related topics

Was this page helpful? Yes No Submitting... Thank you

Comments