Environment evaluation for compliance with a basic rule
The following paragraphs lead you through a first evaluation example of your environment. We will create a rule that checks if a device has a firewall installed and if it is active.
Evaluating a group of devices for their compliance consists of the following steps:
- Collect the different types of inventory on the target devices. Generating inventories is not part of this section, see the BMC Client Management - Inventory section on how to generate the Security inventory for this example.
- Create the compliance rule with its criteria and relation.
- Assign the rule to the target for compliance evaluation.
- Evaluate the compliance results.
Related topics
Was this page helpful? Yes No
Submitting...
Thank you
Comments
Log in or register to comment.