Viewing the rule sets listing


The referenced document [xwiki:Automation-DevSecOps.Network-Automation.TrueSight-Network-Automation.tsna251.TrueSight Network Automation 25\.1._Inclusion-Library._Common-terminology.WebHome] was not found. is shipped with factory-installed rule sets, based on industry standards, regulatory standards, and vendor recommendations, or best practices. You can customize the factory-installed rules and rule sets to create customer-specific sets. Rule sets are simply containers for the rules which are assigned to one or more groups and enabled for “Continual Compliance” checking. This topic contains the following sections:

Viewing the list of rule sets

  1. Go to Network > Scripts > Rule Sets. By default, rule sets are ordered by Name. To sort by any other column, click the column header. To view the details of a rule set, click the rule set name.

    RuleSet.png

  2. (Optional) Perform one of the following tasks by using the menu options that are available on the Rule Sets page:

    Menu option

    Description

    Views

    Display rule sets matching a favorite view. See About-lists-and-views and Managing-and-sharing-views.

    Filter

    Filter the rule sets list based on selected criteria

    Add

    Add a rule set. See Adding-a-rule-set.

    Manage Rights

    Manage access rights for rule sets. See Managing-rule-set-access-rights.

    Refresh

    Refresh the list with any recent updates

  3. (Optional) Perform one of the following actions by clicking an icon in the Actions column on the Rule Sets page:

    Action

    Description

    View

    Display details about the rule set

    Edit

    Edit the rule set. See Adding-a-rule-set

    Copy

    Copy the rule set
    Note: When you copy a rule set, the member rules are also copied. However, any association between a rule and a security vulnerability is not copied.

    Delete

    Delete the rule set

    Enable

    Disable

    Disable the rule set

1. When a rule set is enabled, compliance checking is performed by the configuration snapshot and Network > Refresh Device Status actions. You should enable the rule set only after you have created, tested, and assigned the associated rules.

To perform compliance checks for enabled rule sets as part of the configuration snapshot operation, you must turn on the Check Compliance Violations after Snapshot system parameter. Compliance violations are logged and shown on the Dashboard. Logged violations could trigger a policy to perform one or more actions (for example, send notification or remediate).

Back to top

To define a filter for the rule sets listing

  1. Select Network > Scripts > Rule Sets.
  2. Click the Filter menu option above the list of rule sets.
  3. Specify or select any of the following optional attributes:
    • Name of the rule set
    • Whether the rule set is enabled
  4. Click Submit.

Back to top

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*