Space bannerThis version of the product is in limited support. However, the documentation is available for your convenience. You will not be able to leave comments.
Security objects
The BCM agent can also compile a security inventory of any remote client (with the exception of Mac devices) for inspection by the administrator. This is based on the execution of operational rule steps.
The Security Settings Inventory list is an .xml file which is compiled by the steps and then is uploaded to the master. The update and upload of the security inventory file is based on a number of parameters which are set in its configuration file, SecurityInventory.ini.
The Security Settings Inventory node of the console displays a list of all security objects which are verified and collected through the operational rule steps on the remote device. Contrary to the hardware and software inventory the security inventory is generated via operational rule steps and their schedule. Any available inventory data is uploaded to the master once a day by default if not specified differently by a rule step. As with the other inventory information, all entries are stored in the database to be available even if the actual device is off-line. By default the security inventory is empty.