Evaluating your Environment for Compliance with a Basic Rule


The following paragraphs lead you through a first evaluation example of your environment. We will create a rule that checks if a device has a firewall installed and if it is active.

Evaluating a group of devices for their compliance consists of the following steps:

  • Collect the different types of inventory on the target devices. Generating inventories is not part of this section, see the BMC Client Management - Inventory section on how to generate the Security inventory for this example.
  • Create the compliance rule with its criteria and relation.
  • Assign the rule to the target for compliance evaluation.
  • Evaluate the compliance results.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*