Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Current »

SummitAI Asset Management Help

 SummitAI Asset Management
 Administrators

Administrators

Configuring Asset Management Module

Configuring Asset Category Using Form Builder

Configuring My Asset List Page

Custom Scheduler Jobs

Asset Masters

Configuring Location And Store

Configuring Asset Purpose

Configuring Action Attribute

Configuring Fault Type

Configuring Solution Type

Configuring Notifications and Templates

Configuring Allocation Form Template

Configuring Key Field Mapping

Configuring Data Templates

Configuring Field Display Order on Fixed Asset List Page

Software

Software Request Mapping Form

Adding/ Updating Software

License Mapping

Blacklisting Software

Configuring Software Baseline Profiles

Software Baseline Profile Mapping

Configuring Software License

License Key Mapping

Depreciation

Configuring Depreciation Formula

Configuring GAAP Depreciation

Configuring Depreciation Field Mapping

Configuring Custom Depreciation Formula

Mapping

Discovery Mapping

Configuring CMDB Mapping

Procurement Mapping

Account Mapping

Configuring Custom Hardware Variance

Mapping ServiceNow Category

Application Control

Creating and Updating Profile

Mapping Profiles

Configuring Application Control Messages

Configure Software and Executable Execution Type

Viewing Software Process List

Endpoint Compliance

Endpoint Dashboard

Viewing Endpoint Profile List

Configuring Endpoint Profile

Viewing Dynamic Endpoint

Configuring Dynamic Endpoint

Mapping Endpoint Profile

Patch Management

Viewing Patch List

Creating Asset Groups

Configuring Patches

Others

Configuring Asset Application Settings

Configuring Asset Movement

Configuring Asset Alerts

Configuring Store Threshold

Configuring Asset Scan Domain List

Configuring Local Password Management

Configuring E-mail Notifications

Configuring Asset Integration Details

Configuring Additional Discovery

Scheduling Asset Physical Verification

Configuring Product Price

Adding Software Deployment Profile

Approval Matrix

Configuring Approval Matrix

Configuring Approver Role

Mapping Approver

Deactivation Approval Matrix

Configuring Deactivation Approval Matrix

Configuring Approver

Configuring Location-Wise Approvers

SUMMIT Software Center

Description

With the number of devices in an organization are growing, the system-administrators have to create various policies for endpoint devices based on various parameters like location, user-profile and so on. It is very difficult for the system administrators to check various security compliances for each device and manage the policies effectively.

Endpoint Compliance sub-system is a plug-in of SUMMIT Asset Management module. It can be used to check the policy compliance of the computing devices in an organization network. Other than the predefined policies, the organizations can define new policies for their specific requirements. These policies can be defined based on registry entries, value of WMI class, VB scripts, PowerShell, Batch Command and so on.

The Dashboard that is available in Endpoint compliance sub-system gives a real-time bird-eye view of various compliance checks and can be used as a single window for accessing the overall compliance of the computing systems in the organization's network. The dashboard can be configured to give summary  of compliance based on location, Tenant, policies, owners and so on, which makes the endpoint management easy. 

Advantages

  • The Endpoint Compliance feature allows the Administrators to create security policies that are right for the organization.
  • Administrators can select from 170 pre-defined parameters and create the Endpoint profiles.
  • Administrators can create additional custom parameters based on the availability of the registry entry, value of a registry key, VBScripts, PowerShell, using Batch Commands, value of a WMI class and availability of a file/directory.
  • It can identify the non-compliant Endpoints and Assets, their owner, owner's location and their non-compliance with the security policy of the organization.
Accessing the Feature

In the SUMMIT application, you can view/create Endpoint Profiles, Dynamic Endpoints, and map Endpoint Profiles on the PROFILE LIST page (Asset > Configuration> Endpoint > Profile List), see Viewing Endpoint Profile List, Viewing Dynamic Endpoint,Configuring Endpoint Profile, Configuring Dynamic EndpointMapping Endpoint Profile

  • No labels