Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
Scroll ignore | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||
You can configure Endpoint Profile to perform security checks for a Customer, set of IP Addresses, Locations, or Systems.
To create an Endpoint Profile:
- Select Asset > Configuration > Endpoint > Profile. The PROFILE page is displayed.
Figure: PROFILE page On the ACTIONS panel, click ADDNEW. The PROFILE page is displayed.
Figure: PROFILE page- On the PROFILE page:
- Select the Tenant type.
- Type the Profile Name and Description.
- Select the Active check box if you want to make the Endpoint profile active.
- Under the Static and Dynamic tabs, select the required security check options.
For more information about fields on the PROFILE page, see Field Description.
- Click SUBMIT at the top-right corner to configure the Endpoint profile.
Field Description
The following table describes the fields on the PROFILE page:
Field | Description | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
DETAILS | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Profile Name | Type the name for the Endpoint Profile. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | Type a brief description about the Endpoint Profile. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Active | Indicates the status of the Endpoint Profile.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Static | Under the Static tab, the administrators can choose from 170 pre-defined parameters and create the Endpoint Profiles. You can search for a particular security check using the Search For Security Check search box.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Dynamic | Under the Dynamic tab, the Administrators can create additional custom parameters based on the availability of the registry entry, value of a registry key, value of a WMI class, VB scripts, Powershell, using batch Commands, and availability of a file/directory. You can search for a particular security check using the Search For Security Check search box.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Color Codes | The color codes displayed for the check mark:
|
ACTIONS
This section explains all the icons displayed on the ACTIONS panel of the PROFILE page:
SHOW LIST
Click SHOW LIST to display the LIST table showing all the Profiles configured in the SUMMIT application. For more information, see Viewing Profile List.
DYNAMIC CONFIGURATION
Click DYNAMIC CONFIGURATION to create the security checks for the dynamic fields of the Endpoint Profile under the Dynamic tab. For more information, see Configuring Dynamic Endpoint.
Scroll ignore | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||
Release Notes | Installation Guide | Other Documents |