Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. In the Security Management Console, click Policies.
  2. In the file library in the left panel, navigate to Policies > Thycotic Solutions > Security Analysis > Policies.
  3. Right-click Policies and click New > Security Analysis Remediation Policy.
  4. In the Create Item dialog box, name the new remediation policy.
  5. Click OK.



  6. In the right pane, click the Off button to turn the policy on.
  7. In the General tab, click the Select profile link and choose United States Government Configuration Baseline.
  8. Select the Remediate after analysis check box.
  9. Click Save.

Remediation approval

For the manual approval process, use the remediation approvals section in the policy to view, approve, or deny requests, and view associated tasks. You must approve remediation for processes controlled by external systems (such as Microsoft SharePoint or LANDESK Service Desk) via the associated application.

...

  1. In the Policy tabs at the top of the right pane, click Remediation Approvals.
  2. Select the check-box for the request you want to access.
  3. Click the View Detail button to see the commands that will be run to remediate the computer.
  4. Select a command and click Edit to view additional details. |The View Detail button in the above header is missing (assume Kevin is still adding these?) so I can't get the below updated screenshots.|
     



  5. After you have reviewed a request then select it and click Approve to allow the remediation to run or Deny to reject it.

...