Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

Install Security Analysis Solution

For instructions on how to install Security Analysis Solution (SAS), go to Install Arellia Products.

 

Import SCAP Content

 

  1. Click on the Profiles tab at the top (below the title).
  2. Click Download Profiles... in the Actions section on lower left.
  3. Locate the system profiles and check the box to select them for import.
  4. Click the Import Profiles button to start the import process.

 

Completion Expectations

Icon

The importing of the SCAP profiles is a time-consuming process and could take anywhere from 5 to 90 minutes, depending on the load on the server and the number of profiles selected. For evaluation or demonstration purposes, we recommend you initially select only one or two profiles.

 

Note:

Icon

Some profiles have multiple versions listed, depending on which version of the OVAL specification you're interested in analyzing. If unsure, just select the newest version (typically, you don't need more than one version of each profile).

Next Steps
  • Once the profiles have been imported, the Common Platform Enumeration (CPE) Analysis Policymust be run on the managed computers to determine which computers meet the requirements for the profiles imported. By default, this task is run on the Daily schedule (nightly at 2:00 AM). If you would like to hurry this process along, visit the Common Platform Enumeration (CPE) Analysis Policy on the Policies tab under the Security Analysis folder and alter the schedule to suit your needs. This only needs to run once new profiles have been initially imported and whenever any new computers come in to be managed. For more information, see Targeting Managed Computers.
  • After the CPE analysis policy has completed and determined which computers fit the requirements of the profiles, you will then create a Security Analysis and Remediation Policy, where you will select the profile, verify the targets and set the schedule for performing an assessment and possibly remediation. For more information on this process, see [EDITING] Create a Security Analysis Policy.
  • No labels