Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Updated the panel macro with the following parameter(s): [bgColor]


Scroll ignore
scroll-pdftrue
scroll-officetrue
scroll-chmtrue
scroll-docbooktrue
scroll-eclipsehelptrue
scroll-epubtrue
scroll-htmltrue


#72B0DE#72B0DE#F0F0F0


SummitAI Asset Management


Concepts


Analysts

Variance

Import

Approvals

Contract Management

Software Delivery



Administrators

Asset Masters


Software

Depreciation

Mapping


Endpoint Dashboard

Others

Approval Matrix

Deactivation Approval Matrix


Reports




Scroll export button
scopecurrent
template-id4fda9400-a7df-4ede-a95f-e4ae5fcf4796
captionDownload this Page
add-onScroll PDF Exporter

What is Endpoint Compliance?

Description

Endpoint Compliance sub-system is a plug-in of SUMMIT Asset Management module. The Endpoint Compliance sub-system can be used to monitor the security compliance of the computing devices in an organization’s network based on the security policies configured. The Endpoint Compliance has over 170+ out-of-the-box security compliance monitoring capabilities. In addition, the security administrator can create additional security compliance parameter checks. These customized additional security compliance parameters can be configured based on registry entries, value of WMI class, VB scripts, PowerShell, Batch Command, and so on.

The Dashboard that is available in Endpoint compliance sub-system gives a real-time bird-eye view of various compliance checks and can be used as a single window for accessing the overall compliance of the computing systems in the organization's network. The dashboard can be configured to give summary  of compliance based on location, Tenant, policies, owners and so on, which makes the endpoint management easy.

Advantages

  • The Endpoint Compliance feature allows the Administrators to create security policies that are right for the organization.
  • Administrators can select from 170 pre-defined parameters and create the Endpoint profiles.
  • Administrators can create additional custom parameters based on the availability of the registry entry, value of a registry key, VBScripts, PowerShell, using Batch Commands, value of a WMI class and availability of a file/directory.
  • It can identify the non-compliant Endpoints and Assets, their owner, owner's location and their non-compliance with the security policy of the organization.

Accessing the Feature

In the SUMMIT application, you can view/create Endpoint Profiles, Dynamic Endpoints, and map Endpoint Profiles on the PROFILE LIST page (Asset > Configuration> Endpoint > Profile List), see Viewing Profile List, Viewing Dynamic Endpoint List, Configuring Endpoint Profile, Configuring Dynamic Endpoint, Mapping Endpoint Profile.

Scroll ignore
scroll-pdftrue
scroll-officetrue
scroll-chmtrue
scroll-docbooktrue
scroll-eclipsehelptrue
scroll-epubtrue
scroll-htmltrue


1

Release Notes | Installation Guide | Other Documents