Viewing a Compliance Summary report


The Compliance Summary report displays the pass/fail compliance status for one or more devices for selected or assigned rules sets or rules. You can fix compliance violations directly from the report using the Remediate option.

To generate a Compliance Summary report

  1. Open the Compliance Summary Report page by navigating to Reports > Priority Reports > Compliance Summary.

    CompSummaryRepInputs.png
  2. Enter information in the displayed fields, and click Next.

  3. Select one of the following options to include the rule sets or rules in the report, and click Next.

    ComplianceSummaryRepByRule.png
    • All Rule Sets: Include all rule sets in the report.
    • Selected Rule Sets: Includes the selected rule sets in the report. Use the Add and Remove buttons to transfer rule sets between the list of available rule sets and the list of selected rule sets.
    • Selected Rules: Includes the selected rules in the report. Click the Add button to display the Select Rule dialog box. Optionally, filter the rules. Then, select the desired rules and click OK.

      RuleSelectionList.png
      Note: The Applicable OS Images column is available only for version 8.9.01 and later.

  4. On the next page, select additional report parameters.

    CompSummaryRepCategories.png

  5. Select Next to display the Compliance Summary report.

    CompSummaryRepResult.png
    Note: The View Security Vulnerability link is available only for version 8.9.01 and later.

Back to top

To view the report and remediate compliance violations

  1. Perform one of the following tasks by using the menu options that are available on the Compliance Summary Report page:

    Menu option

    Description

    Back

    Return to the wizard to change report parameters.

    Print View

    Print a copy of the report.

    Export

    Export the report to one of the following formats:

    • CSV
      Note: The Include All Details option is not available for this format.
    • HTML
    • PDF
    • RTF

    Email

    Email the report to one or more recipients in one of the export formats.

    Help

    Display Help.

  2. Review the following fields and take necessary actions:

    • Rule: Select a rule to view the rule grammar and other details about the rule.

      RuleView.png

    • Result: If the Result column contains the Failed hyperlink, click the hyperlink to display the compliance violations for the selected rule. The right side of the report shows the compliant configuration (where the corrections applicable to the rule have been applied) and the left side shows the current non-compliant configuration. The hyperlink is available only if the rule grammar is correctable by adding or removing lines in the configuration.

      ResultDiffDetailsReport.png
    • Actions: Click hyperlinks in the Actions column to view further details. 
      • View Trace: The following figure shows the Device Compliance Trace report that is displayed when you click View Trace:

        ViewTraceCompSummary.png

        As you scroll down through the trace, you will see where the system found a compliance violation. The yellow background and D sidebar designator indicate a domain line. In this case the domain is selected blocks; note the domain borders are in darker yellow. The trace indicates excess subject lines in red (D-) and matched set of subject lines in blue (D+).
        CompliancyTrace_BlockBorders.PNG

        To interpret other foreground and background colors used in the trace see the following key, located at the very bottom of the trace:
        Legend.png

        If a rule uses a trigger and the trigger is not found, no trace is shown.

         As you scroll further down the trace, details are provided for how Remediate corrects the configuration to enforce the rule.

        Corrections.png
      • (Applicable for version 8.9.01 and later) View Security Vulnerability: Click this hyperlink to view the details, such as title, CVE IDs, vendor link, and description of a security vulnerability. The vendor link contains complete information about the security vulnerability provided by the originator. The View Security Vulnerability hyperlink appears only when the rule has any associated security vulnerability. The following figure shows the details of a security vulnerabilty affecting a Cisco device.
        SecVulDetails.png   
      • Remediate: Launch the Remediate, Deploy to Active, or Deploy to Stored job edit page to make the device compliant to a rule according to the corrective action. The Remediate action appears when:
        • the evaluated configuration is a current configuration
        • the trail associated with the selected configuration is applicable to the rule
        • the rule has a corrective action for the trail
        • the result is Failed
        • the device is actively violating the rule for the trail (when the corrective action is not a Deploy to Active or Deploy to Stored)
        • the device supports the particular type of corrective action
        • the logged-in user is allowed to perform the action on the device
        • when the corrective action deploys a configuration Complying With This Rule, the domain and subject of the rule are correctable. That is, the system must be able to generate the compliant configuration by adding or removing lines. For example, a domain of OS Image Name is not correctable or a subject of Pattern without a correction is not correctable. Note that a Failed result is clickable only when the rule is correctable.

Back to top

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*