Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 8 Next »

** smg 08/03/2015 - If it were me I'd add a single Remediation page and step the user through both the configuration and approval of remediation. **

 A Security Analysis Remediation policy requires approval for each computer before running the task to fix non-conforming settings.  The selected approval process, configured in the policy's selected approval type, determines how you approve remediation.

 

For processes controlled by external systems (such as Microsoft SharePoint or LANDesk Service Desk) you'll need to go to the associated application to approve.  For the Manual Approval Process you can use the Remediation Approvals section in the policy to view requests, the associated tasks, and approve or deny the requests.

Select a request and click the "View Detail" button to see the commands that will be run to remediate the computer.  Select a command and click "Edit" to view additional details.

After you have reviewed a request then select it and choose Approve to allow the remediation to run or Deny to reject it.

 

  • No labels