Approving remediation
A Security Analysis remediation policy requires approval for each computer before running the task to fix non-conforming settings. The selected approval process, configured in the policy's selected approval type, determines how you approve remediation.
To create a Security Analysis remediation policy, do the following steps:
- In the Security Management Console, click Policies.
- In the file library in the left panel, navigate to Policies > Thycotic Solutions > Security Analysis > Policies.
- Right-click Policies and click New > Security Analysis Remediation Policy.
- In the Create Item dialog box, name the new remediation policy.
- Click OK.
- In the right pane, click the Off button to turn the policy on.
- In the General tab, click the Select profile link and choose United States Government Configuration Baseline.
- Select the Remediate after analysis check box.
- Click Save.
Remediation approval
For the manual approval process, use the remediation approvals section in the policy to view, approve, or deny requests, and view associated tasks. You must approve remediation for processes controlled by external systems (such as Microsoft SharePoint or LANDESK Service Desk) via the associated application.
To view, approve, or deny requests, and view associated tasks, do the following steps:
- In the Policy tabs at the top of the right pane, click Remediation Approvals.
- Select the check-box for the request you want to access.
- Click the View Detail button to see the commands that will be run to remediate the computer.
- Select a command and click Edit to view additional details.
 - After you have reviewed a request then select it and click Approve to allow the remediation to run or Deny to reject it.
Â