Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Approving Remediation

After the analysis is complete, the server will build a job for each client to perform remediation to non-conforming settings. Before this job is delivered to the computers, it must be approved. You may view the job that has been created by clicking the View link to the left of each computer in the list. Once approved, the computers are delivered the job and will perform another analysis afterwards.

Image RemovedA Security Analysis remediation policy requires approval for each computer before running the task to fix non-conforming settings. The selected approval process, configured in the policy's selected approval type, determines how you approve remediation.

To create a Security Analysis remediation policy, do the following steps:

  1. In the Security Management Console, click Policies.
  2. In the file library in the left panel, navigate to Policies > Thycotic Solutions > Security Analysis > Policies.
  3. Right-click Policies and click New > Security Analysis Remediation Policy.
    Image Added
  4. In the Create Item dialog box, name the new remediation policy.
  5. Click OK.

    Image Added

  6. In the right pane, click the Off button to turn the policy on.
    Image Added
  7. In the General tab, click the Select profile link and choose United States Government Configuration Baseline.
  8. Select the Remediate after analysis check box.
    Image Added
  9. Click Save.

Remediation approval

For the manual approval process, use the remediation approvals section in the policy to view, approve, or deny requests, and view associated tasks. You must approve remediation for processes controlled by external systems (such as Microsoft SharePoint or LANDESK Service Desk) via the associated application.

To view, approve, or deny requests, and view associated tasks, do the following steps:

  1. In the Policy tabs at the top of the right pane, click Remediation Approvals.
  2. Select the check-box for the request you want to access.
  3. Click the View Detail button to see the commands that will be run to remediate the computer.
    Image Added
  4. Select a command and click Edit to view additional details.
     

    Image Added

  5. After you have reviewed a request then select it and click Approve to allow the remediation to run or Deny to reject it.