Space banner This version of the product has reached end of support. The documentation is available for your convenience. However, you must be logged in to access it. You will not be able to leave comments.

Evaluating your Environment for Compliance with a Basic Rule


The following paragraphs lead you through a first evaluation example of your environment. We will create a rule that checks if a device has a firewall installed and if it is active.

Evaluating a group of devices for their compliance consists of the following steps:

  • Collect the different types of inventory on the target devices. Generating inventories is not part of this section, see the BMC Client Management - Inventory section on how to generate the Security inventory for this example.
  • Create the compliance rule with its criteria and relation.
  • Assign the rule to the target for compliance evaluation.
  • Evaluate the compliance results.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*