Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

Targeting Managed Computers

Requirements
  • All computers to be analyzed must have the Security Analysis Agent installed before they will be able to be identified properly.
  • Profiles must be imported prior to the Common Platform Enumeration (CPE) Analysis Policy being run on the computers.
How This Works

The process of performing security analysis and remediation on computers involves multiple steps to properly identify computers and correlate profiles that are applicable to them. Once the profiles are imported, a policy will run on the managed computers to determine which profiles are applicable as defined within the profile. By default, this policy runs during the Daily schedule (by default, runs daily at 2:00 AM).

Note: If you want to hurry this process along, and once the profiles have finished importing, visit the Policies tab and locate the Default Common Platform Enumeration (CPE) Analysis Policy under the Security Analysis folder and adjust the schedule.

Verifying CPE Filter Membership

Once this policy run completes, the computers will be dynamically added to the appropriate CPE filter used within the analysis and remediation policies. You may visit the Resources tab to verify the Filter membership updates. Click on the Resource Filters expanding section on the lower left corner and navigate to the Security Analysis folder.

Next Steps
  • No labels