Targeting Managed Computers
Requirements
- All computers to be analyzed must have the Security Analysis Agent installed before they will be able to be identified properly.
- Profiles must be imported prior to the Common Platform Enumeration (CPE) Analysis Policy being run on the computers.
How This Works
The process of performing security analysis and remediation on computers involves multiple steps to properly identify computers and correlate profiles that are applicable to them. Once After the profiles are imported, a policy will run on the managed computers to determine which profiles are applicable as defined within the profile. By default, this policy runs during the Daily schedule (by default, runs daily at 2:00 AM).
Panel |
---|
Note: If you want to hurry this process along, and once the profiles have finished importing, visit the Policies tab and locate the Default Common Platform Enumeration (CPE) Analysis Policy under the Security Analysis folder and adjust the schedule. |
...
Verifying CPE Filter Membership
Once
Verify CPE Filter Membership
After this policy run completes, the computers will be dynamically added to the appropriate CPE filter used within the analysis and remediation policies. You may visit the Resources tab to the
To verify the Filter membership updates. Click on , do the following steps:
- In the Security Manager Console, go to the Resources tab.
- In the file library in the left pane, click the Resource Filters expanding section
...
- .
- Navigate to Security Analysis > Common Platforms Enumeration Filters.
Next Steps
...