Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

A Security Analysis Remediation remediation policy requires approval for each computer before running the task to fix non-conforming settings.   The selected approval process, configured in the policy's selected approval type, determines how you approve remediation.

To create a Security Analysis remediation policy, do the following steps:

  1. In the Security Management Console, click Policies.
  2. In the file library in the left panel, navigate to Policies > Thycotic Solutions > Security Analysis > Policies.
  3. Right-click Policies and click New > Security Analysis Remediation Policy.
    Image Added
  4. In the Create Item dialog box, name the new remediation

...

Image Removed

 

Image Removed

...

  1. policy.
  2. Click OK.

    Image Added

  3. In the right pane, click the Off button to turn the policy on.
    Image Added
  4. In the General tab, click the Select profile link and choose United States Government Configuration Baseline.
  5. Select the Remediate after analysis check box.
    Image Added
  6. Click Save.

Remediation approval

For the manual approval process, use the remediation approvals section in the policy to view, approve, or deny requests, and view associated tasks. You must approve remediation for processes controlled by external systems (such as Microsoft SharePoint or  or LANDESK Service Desk) you'll need to go to via the associated application to approve.  For the Manual Approval Process you can use the Remediation Approvals section in the policy to view requests, the associated tasks, and approve or deny the requests.

Image Removed

Select a request and click the "View Detail" button .

To view, approve, or deny requests, and view associated tasks, do the following steps:

  1. In the Policy tabs at the top of the right pane, click Remediation Approvals.
  2. Select the check-box for the request you want to access.
  3. Click the View Detail button to see the commands that will be run to remediate the computer.

...


  1. Image Added
  2. Select a command and click

...

  1. Edit

...

  1. to view additional details.
     

...

  1. Image Added

  2. After you have reviewed a request then select it and

...

  1. click Approve to allow the remediation to run or Deny to reject it.