Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 7 Next »

Security analysis policies define the context for a security analysis, such as the following parameters:

  • the profile (SCAP content) used
  • the targets (computers) to run it on
  • the schedule of when it will be run
  • acceptable levels for scoring
  • completion timeouts
  • remediation

You must create at least one policy to perform an analysis which can also be used for remediation. We suggest creating multiple policies whenever any of the values above may differ between sets of computers, scheduling differences, or scoring parameters.

Next Steps

  • No labels