Endpoint Compliance
- Former user (Deleted)
- Shilpa K (Deactivated)
- Chilukuri Srinivasa Reddy (Unlicensed)
- Mayuresh Balaji Kamble (Unlicensed)
SummitAI Asset Management Help
Variance
Import
Importing and Allocating Assets in Bulk
Activating or Deactivating and Moving Assets in Bulk
Approvals
Verifying Asset Reconciliation
Approving Physically Verified Assets
Approving Store Wise Reconciled Assets
Approving Asset Using Maker-checker
Contract Management
Adding Contract or Agreement Details
Software Delivery
Configuring Software Delivery Schedule
Viewing Software Delivery Status
Viewing Software Uninstallation Report
Configuring Asset Management Module
Configuring Asset Category Using Form Builder
Configuring My Asset List Page
Asset Masters
Configuring Location And Store
Configuring Notifications and Templates
Configuring Allocation Form Template
Configuring Field Display Order on Fixed Asset List Page
Software
Configuring Software Baseline Profiles
Software Baseline Profile Mapping
Depreciation
Configuring Depreciation Formula
Configuring Depreciation Field Mapping
Configuring Custom Depreciation Formula
Mapping
Configuring Custom Hardware Variance
Configuring Application Control Messages
Configure Software and Executable Execution Type
Others
Configuring Asset Application Settings
Configuring Asset Scan Domain List
Configuring Local Password Management
Configuring E-mail Notifications
Configuring Asset Integration Details
Configuring Additional Discovery
Scheduling Asset Physical Verification
Adding Software Deployment Profile
Approval Matrix
Deactivation Approval Matrix
Configuring Deactivation Approval Matrix
Description
With the number of devices in an organization are growing, the system-administrators have to create various policies for endpoint devices based on various parameters like location, user-profile and so on. It is very difficult for the system administrators to check various security compliances for each device and manage the policies effectively.
Endpoint Compliance sub-system is a plug-in of SUMMIT Asset Management module. It can be used to check the policy compliance of the computing devices in an organization network. Other than the predefined policies, the organizations can define new policies for their specific requirements. These policies can be defined based on registry entries, value of WMI class, VB scripts, PowerShell, Batch Command and so on.
The Dashboard that is available in Endpoint compliance sub-system gives a real-time bird-eye view of various compliance checks and can be used as a single window for accessing the overall compliance of the computing systems in the organization's network. The dashboard can be configured to give summary of compliance based on location, Tenant, policies, owners and so on, which makes the endpoint management easy.
Advantages
- The Endpoint Compliance feature allows the Administrators to create security policies that are right for the organization.
- Administrators can select from 170 pre-defined parameters and create the Endpoint profiles.
- Administrators can create additional custom parameters based on the availability of the registry entry, value of a registry key, VBScripts, PowerShell, using Batch Commands, value of a WMI class and availability of a file/directory.
- It can identify the non-compliant Endpoints and Assets, their owner, owner's location and their non-compliance with the security policy of the organization.
Accessing the Feature
In the SUMMIT application, you can view/create Endpoint Profiles, Dynamic Endpoints, and map Endpoint Profiles on the PROFILE LIST page (Asset > Configuration> Endpoint > Profile List), see Viewing Endpoint Profile List, Viewing Dynamic Endpoint,Configuring Endpoint Profile, Configuring Dynamic Endpoint, Mapping Endpoint Profile
Confluence Cloud Migration Alert: Please refer to known issues you may encounter in Confluence Cloud: https://eitdocs.atlassian.net/wiki/x/wDGwAQ