Minor changes are by default collapsed in the page history.
No changes
The page does not exist yet.
Failed to load changes
Version by on
Leave Collaboration
Are you sure you want to leave the realtime collaboration and continue editing alone? The changes you save while editing alone will lead to merge conflicts with the changes auto-saved by the realtime editing session.
Security objects
The BCM agent can also compile a security inventory of any remote client (with the exception of Mac devices) for inspection by the administrator. This is based on the execution of operational rule steps.
The Security Settings Inventory list is an .xml file which is compiled by the steps and then is uploaded to the master. The update and upload of the security inventory file is based on a number of parameters which are set in its configuration file, SecurityInventory.ini.
The Security Settings Inventory node of the console displays a list of all security objects which are verified and collected through the operational rule steps on the remote device. Contrary to the hardware and software inventory the security inventory is generated via operational rule steps and their schedule. Any available inventory data is uploaded to the master once a day by default if not specified differently by a rule step. As with the other inventory information, all entries are stored in the database to be available even if the actual device is off-line. By default the security inventory is empty.