Configuring Endpoint Profile

Configuring Endpoint Profile

You can configure Endpoint Profile to perform security checks for a Customer, set of IP Addresses, Locations, or Systems.

To create an Endpoint Profile:

  1. Select Asset > Configuration > Endpoint > Profile. The PROFILE page is displayed.


    Figure: PROFILE page


  2. On the ACTIONS panel, click ADDNEW. The PROFILE page is displayed.


    Figure: PROFILE page


  3. On the PROFILE page:

    • Select the Tenant type.

    • Type the Profile Name and Description.

    • Select the Active check box if you want to make the Endpoint profile active.

    • Under the Static and Dynamic tabs, select the required security check options.

    For more information about fields on the PROFILE page, see Field Description.


  4. Click SUBMIT at the top-right corner to configure the Endpoint profile.
     

Field Description

The following table describes the fields on the PROFILE page:

Field

Description

Field

Description

DETAILS

Profile Name

Type the name for the Endpoint Profile.

Description

Type a brief description about the Endpoint Profile.

Active

Indicates the status of the Endpoint Profile.

  • If you select the check box, the Endpoint Profile will be in Active status.

  • If you do not select the check box, the Endpoint Profile will be in Inactive status. The inactive Endpoint Profiles are not displayed in the Endpoint Profile list.

Static

Under the Static tab, the administrators can choose from 170 pre-defined parameters and create the Endpoint Profiles. You can search for a particular security check using the Search For Security Check search box.


Displays the security checks related to Antivirus installed on the Assets.

 


Figure: Static tab: ANTIVIRUS security check

 

Click the

 icon to display all the security checks related to antivirus.


Figure: ANTIVIRUS security check

 

The following table describes the fields for the ANTIVIRUS security check:

 Displays the security checks related to Audit Policy. Click the  

 icon to display all the security checks related to antivirus.


Figure: Static tab: AUDIT POLICY security check

 

The following table describes the fields for the ANTIVIRUS security check:

 Displays the security checks related to Auto Update. Click the

  icon to display all the security checks related to Auto Update.


Figure: Static tab: AUTO UPDATE security check

 

The following table describes the fields for the Auto Update security check:

 Displays the security checks related to Custom Checks. Click the  

 icon to display all the security checks related to Custom Checks.


Figure: Static tab: CUSTOM CHECKS security check

 

The following table describes the fields for the Custom Check security check:

 Displays the security checks related to Event log Scan. Click the

 icon to display all the security checks related to Event log Scan.


Figure: Static tab: EVENTLOG SCAN

 

The following table describes the fields for the EVENTLOG SCAN:

 Displays the security checks related to Firewall Policies. Click the

 icon to display all the security checks related to Firewall Policies.


Figure: Static tab: FIREWALL POLICIES security check

 

The following table describes the fields for the Firewall Policies security check:

 Displays the security checks related to Informational Checks. Click the

 icon to display all the security checks related to Informational Checks.


Figure: Static tab: INFORMATIONAL CHECKS security check

 

The following table describes the fields for the Informational Checks security check:

 Displays the security checks related to Miscellaneous Hardening. Click the

 icon to display all the security checks related to Miscellaneous Hardening.


Figure: Static tab: MISCELLANEOUS HARDENING security check

 

The following table describes the fields for the Miscellaneous Hardening security check:

 Displays the security checks related to Password Policy. Click the 

 icon to display all the security checks related to Password Policy.


Figure: Static tab: PASSWORD POLICY security check

 

The following table describes the fields for the Password Policy security check:

 Displays the security checks related to Screensaver. Click the

 icon to display all the security checks related to Screensaver.


Figure: Static tab: SCREENSAVER security check

 

The following table describes the fields for the Screensaver security check:

 Displays the security checks related to Security Options. Click the

 icon to display all the security checks related to Security Options.

 


Figure: Static tab: SECURITY OPTIONS security check

 

The following table describes the fields for the Security Options security check:

 Displays the security checks related to USB Devices. Click the

 icon to display all the security checks related to USB Devices.


Figure: Static tab: USB DEVICES security check

 

The following table describes the fields for the USB Devices security check:

 Displays the security checks related to User Accounts. Click the  

 icon to display all the security checks related to User Accounts.


Figure: Static tab: USER ACCOUNTS security check

 

The following table describes the fields for the User Accounts security check:

 Displays the security checks related to User Rights Assignment. Click the

 icon to display all the security checks related to User Rights Assignment.


Figure: Static tab: USER RIGHTS ASSIGNMENT security check

 

The following table describes the fields for the User Rights Assignment security check:

Dynamic

Under the Dynamic tab, the Administrators can create additional custom parameters based on the availability of the registry entry, value of a registry key, value of a WMI class, VB scripts, Powershell, using batch Commands, and availability of a file/directory. You can search for a particular security check using the Search For Security Check search box.


 Displays the security checks for Registry settings. Select the check box for the REGISTRY to select all the security checks related to Registry settings. To select a particular security check, select the check box for that security check. Click the

 icon to display all the security checks related to REGISTRY.


Figure: Static tab: REGISTRY security check

 

The following table describes the fields for the REGISTRY security check:

 Displays the security checks related to WMI. Select the check box for the WMI to select all the security checks related to Registry settings. To select a particular security check, select the check box for that security check. Click the

 icon to display all the security checks related to WMI.


Figure: Dynamic tab: WMI security Checks

Displays the security checks related to CMD. Select the check box for the CMD to select all the security checks related to Registry settings. To select a particular security check, select the check box for that security check. Click the

 icon to display all the security checks related to CMD.


Figure: Dynamic tab: CMD security checks

Displays the security checks related to POWERSHELL. Select the check box for the POWERSHELL to select all the security checks related to POWERSHELL. To select a particular security check, select the check box for that security check. Click the

  icon to display all the security checks related to POWERSHELL.


Figure: Static tab: POWERSHELL security checks

Displays the security checks related to VBSCRIPT. Select the check box for the VBSCRIPT to select all the security checks related to VBSCRIPT. To select a particular security check, select the check box for that security check. Click the

  icon to display all the security checks related to VBSCRIPT.


Figure: Static tab: VBSCRIPT security checks

Displays the security checks related to FILE. Select the check box for the FILE to select all the security checks related to FILE. To select a particular security check, select the check box for that security check. Click the

 icon to display all the security checks related to FILE.


Figure: Dynamic tab: FILE security checks

Color Codes

The color codes displayed for the check mark:

  • Grey: Indicates that the Tenant is disabled for the module.

  • Green: Indicates that all the associated components of the module is configured.

  • Yellow: Indicates that the associated components of the module is not configured.

ACTIONS

This section explains all the icons displayed on the ACTIONS panel of the PROFILE page:

 SHOW LIST

 Click SHOW LIST to display the LIST table showing all the Profiles configured in the SUMMIT application. For more information, see Viewing Profile List.

 DYNAMIC CONFIGURATION

 Click DYNAMIC CONFIGURATION to create the security checks for the dynamic fields of the Endpoint Profile under the Dynamic tab. For more information, see Configuring Dynamic Endpoint.