Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Migrated to Confluence 5.3

...

The Getting Started tasks guide you through the basic setup, configuration, and use of Security Analysis Solution.

Prerequisites for Getting Started Tasks
Launch the Console
Section
Column
width60%

Option 1: Launch the Arellia Security Manager (from the server)

  • Start Menu > Arellia > Arellia Security Manager

Option 2: Browse to Arellia Security Manager (from a desktop)

Column
width40%
Info
titleNote

You may be prompted to install the Microsoft Silverlight 4 plug-in. This is required for Arellia products.

Home page and First-Time Setup

...

Section
Column
width60%

You will see a list of recommendations appear in the First-Time Setup panel when you first launch the Security Manager console.

  1. Check the box next to the configuration recommendations you would like to apply to the system, depending on the environment choice on the left. These recommendations help remind you of the necessary steps required to ensure the product components are configured.
  2. Click Perform Selected Actions
  3. Click Skip this Step once you are finished with the First-Time Setup section.
Column
width40%
Info
title
NOTE
Note:
  

You must enable the Security Analysis Agent Install policy to perform computer assessment tasks. We also recommend enabling the Local Security Agent which is used to perform many remediation tasks.

...

Importing SCAP Content

...

Section
Column
width60%
  1. Click on the Profiles tab at the top (below the title).
  2. Click Download Profiles... in the Actions section on lower left.
  3. Locate the system profiles and check the box to select them for import.
  4. Click the Import Profiles button to start the import process.
Note
titleCompletion Expectations

The importing of the SCAP profiles is a time-consuming process and could take anywhere from 5 to 90 minutes, depending on the load on the server and the number of profiles selected. For evaluation or demonstration purposes, we recommend you initially select only one or two profiles.

Column
width40%
Info
title
NOTE
Note:
  

Some profiles have multiple versions listed, depending on which version of the OVAL specification you're interested in analyzing. If unsure, just select the newest version (typically, you don't need more than one version of each profile).

This process could take anywhere from 5 to 90 minutes, depending on the load on the server and the number of profiles selected. For evaluation or demonstration purposes, we recommend you initially select only one or two profiles.

  • Click the Import Profiles button to start the import process.
Getting Started Tasks

Next Steps
  • Once the profiles have been imported, the Common Platform Enumeration (CPE) Analysis Policy must be run on the managed computers to determine which computers meet the requirements for the profiles imported. By default, this task is run on the Daily schedule (nightly at 2:00 AM). If you would like to hurry this process along, visit the Common Platform Enumeration (CPE) Analysis Policy on the Policies tab under the Security Analysis folder and alter the schedule to suit your needs. This only needs to run once new profiles have been initially imported and whenever any new computers come in to be managed. For more information, see Targeting Managed Computers
  • For information on how to create a policy, see Creating a Policy.
  • For information on how to asses and score targeted computers, see Assessments and Scoring.
  • To learn how to approve a remediation job on non-conforming settings, see Approving Remediation.
  • After the CPE analysis policy has completed and determined which computers fit the requirements of the profiles, you will then create a Security Analysis and Remediation Policy, where you will select the profile, verify the targets and set the schedule for performing an assessment and possibly remediation. For more information on this process, see Creating a Policy.