Targeting Managed Computers
Requirements
- All computers to be analyzed must have the Security Analysis Agent installed before they will be able to be identified properly.
- Profiles must be imported prior to the Common Platform Enumeration (CPE) Analysis Policy being run on the computers.
How This Works
The process of performing security analysis and remediation on computers involves multiple steps to properly identify computers and correlate profiles that are applicable to them. Once the profiles are imported, a task policy will run on the managed computers to determine which profiles are applicable as defined within the profile. By default, this task policy runs during the Daily schedule (by default, runs daily at 2:00 AM).
Panel |
---|
Note: If you want to hurry this process along, and once the profiles have finished importing, visit the |
...
Policies tab and locate the Default Common Platform Enumeration (CPE) Analysis |
...
...
Policy under the Security Analysis folder and adjust the schedule. |
Anchor | ||||
---|---|---|---|---|
|
Verifying CPE Filter Membership
Once this policy run completes, the computers will be dynamically added to the appropriate CPE filter used within the analysis and remediation policies. You may visit the Resources tab to verify the Filter membership updates. Click on the Resource Filters expanding section on the lower left corner and navigate to the Security Analysis folder.