Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

...

Install Security Analysis Solution

For instructions on how to install Security Analysis Solution (SAS), go to Install Arellia Products.

 

Import SCAP Content

Import Security Content Automation Protocol (SCAP) content into the Arellia Management Server:

...

 

Tip
titleNote

Importing SCAP profiles can be time consuming, taking anywhere from five to ninety minutes depending on the server load and the number of profiles selected. For evaluation or demonstration purposes, we recommend you initially select only one or two profiles.

 

Next Steps
Once the

Run CPE Analysis Policy

After you import SCAP content, and after new profiles have been initially imported

, the Common

or whenever any new computers come in to be managed, run the Common Platform Enumeration (CPE) Analysis

Policymust be run on

Policy on the managed computers to determine which computers meet the requirements for the

profiles

imported SCAP content.

By

 By default, this task is run on the Daily schedule (nightly at 2:00 AM)

. If you would like to hurry this process along, visit the Common Platform Enumeration (CPE) Analysis Policy on the Policies tab under the Security Analysis folder and alter the schedule to suit your needs. This only needs to run once new profiles have been initially imported and whenever any new computers come in to be managed. For more information, see 

, but you can change the schedule to suit your needs by opening the CPE Analysis Policy in the Security Manager Console. 

For details on how to identify computers and correlate profiles that are applicable to them, go to Targeting Managed Computers.

After the CPE

analysis policy

Analysis Policy has completed and determined which computers fit the requirements of the profiles, then you will

then

create a Security Analysis and Remediation Policy, where you will select the profile, verify the targets and set the schedule for performing an assessment and possibly remediation. For more information on this process, see [EDITING] Create a Security Analysis Policy.