- Created by Chilukuri Srinivasa Reddy, last modified by Shilpa K on Apr 22, 2024
You are viewing an old version of this page. View the current version.
Compare with Current View Page History
« Previous Version 6 Current »
Variance
Import
Importing and Allocating Assets in Bulk
Activating or Deactivating and Moving Assets in Bulk
Approvals
Verifying Asset Reconciliation
Approving Physically Verified Assets
Approving Store Wise Reconciled Assets
Approving Asset Using Maker-checker
Contract Management
Adding Contract or Agreement Details
Software Delivery
Configuring Software Delivery Schedule
Viewing Software Delivery Status
Viewing Software Uninstallation Report
Configuring Asset Management Module
Configuring Asset Category Using Form Builder
Configuring My Asset List Page
Asset Masters
Configuring Location And Store
Configuring Notifications and Templates
Configuring Allocation Form Template
Configuring Field Display Order on Fixed Asset List Page
Software
Configuring Software Baseline Profiles
Software Baseline Profile Mapping
Depreciation
Configuring Depreciation Formula
Configuring Depreciation Field Mapping
Configuring Custom Depreciation Formula
Mapping
Configuring Custom Hardware Variance
Configuring Application Control Messages
Configure Software and Executable Execution Type
Endpoint Automation Profile Mapping
Others
Configuring Asset Application Settings
Configuring Asset Scan Domain List
Configuring Local Password Management
Configuring E-mail Notifications
Configuring Asset Integration Details
Configuring Additional Discovery
Scheduling Asset Physical Verification
Adding Software Deployment Profile
Approval Matrix
Deactivation Approval Matrix
Configuring Deactivation Approval Matrix
What is Endpoint Compliance?
Description
Endpoint Compliance sub-system is a plug-in of SUMMIT Asset Management module. The Endpoint Compliance sub-system can be used to monitor the security compliance of the computing devices in an organization’s network based on the security policies configured. The Endpoint Compliance has over 170+ out-of-the-box security compliance monitoring capabilities. In addition, the security administrator can create additional security compliance parameter checks. These customized additional security compliance parameters can be configured based on registry entries, value of WMI class, VB scripts, PowerShell, Batch Command, and so on.
The Dashboard that is available in Endpoint compliance sub-system gives a real-time bird-eye view of various compliance checks and can be used as a single window for accessing the overall compliance of the computing systems in the organization's network. The dashboard can be configured to give summary of compliance based on location, Tenant, policies, owners and so on, which makes the endpoint management easy.
Advantages
- The Endpoint Compliance feature allows the Administrators to create security policies that are right for the organization.
- Administrators can select from 170 pre-defined parameters and create the Endpoint profiles.
- Administrators can create additional custom parameters based on the availability of the registry entry, value of a registry key, VBScripts, PowerShell, using Batch Commands, value of a WMI class and availability of a file/directory.
- It can identify the non-compliant Endpoints and Assets, their owner, owner's location and their non-compliance with the security policy of the organization.
Accessing the Feature
In the SUMMIT application, you can view/create Endpoint Profiles, Dynamic Endpoints, and map Endpoint Profiles on the PROFILE LIST page (Asset > Configuration> Endpoint > Profile List), see Viewing Profile List, Viewing Dynamic Endpoint List, Configuring Endpoint Profile, Configuring Dynamic Endpoint, Mapping Endpoint Profile.
- No labels