Configuring Endpoint Profile
- Chilukuri Srinivasa Reddy (Unlicensed)
- Mayuresh Balaji Kamble (Unlicensed)
- Shilpa K (Deactivated)
Variance
Import
Importing and Allocating Assets in Bulk
Activating or Deactivating and Moving Assets in Bulk
Approvals
Verifying Asset Reconciliation
Approving Physically Verified Assets
Approving Store Wise Reconciled Assets
Approving Asset Using Maker-checker
Contract Management
Adding Contract or Agreement Details
Software Delivery
Configuring Software Delivery Schedule
Viewing Software Delivery Status
Viewing Software Uninstallation Report
Configuring Asset Management Module
Configuring Asset Category Using Form Builder
Configuring My Asset List Page
Asset Masters
Configuring Location And Store
Configuring Notifications and Templates
Configuring Allocation Form Template
Configuring Field Display Order on Fixed Asset List Page
Software
Configuring Software Baseline Profiles
Software Baseline Profile Mapping
Depreciation
Configuring Depreciation Formula
Configuring Depreciation Field Mapping
Configuring Custom Depreciation Formula
Mapping
Configuring Custom Hardware Variance
Configuring Application Control Messages
Configure Software and Executable Execution Type
Endpoint Automation Profile Mapping
Others
Configuring Asset Application Settings
Configuring Asset Scan Domain List
Configuring Local Password Management
Configuring E-mail Notifications
Configuring Asset Integration Details
Configuring Additional Discovery
Scheduling Asset Physical Verification
Adding Software Deployment Profile
Approval Matrix
Deactivation Approval Matrix
Configuring Deactivation Approval Matrix
You can configure Endpoint Profile to perform security checks for a Customer, set of IP Addresses, Locations, or Systems.
To create an Endpoint Profile:
- Select Asset > Configuration > Endpoint > Profile. The PROFILE page is displayed.
Figure: PROFILE page On the ACTIONS panel, click ADDNEW. The PROFILE page is displayed.
Figure: PROFILE page- On the PROFILE page:
- Select the Tenant type.
- Type the Profile Name and Description.
- Select the Active check box if you want to make the Endpoint profile active.
- Under the Static and Dynamic tabs, select the required security check options.
For more information about fields on the PROFILE page, see Field Description.
- Click SUBMIT at the top-right corner to configure the Endpoint profile.
Field Description
The following table describes the fields on the PROFILE page:
Field | Description | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
DETAILS | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Profile Name | Type the name for the Endpoint Profile. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | Type a brief description about the Endpoint Profile. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Active | Indicates the status of the Endpoint Profile.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Static | Under the Static tab, the administrators can choose from 170 pre-defined parameters and create the Endpoint Profiles. You can search for a particular security check using the Search For Security Check search box. ANTIVIRUS Displays the security checks related to Antivirus installed on the Assets. Click the icon to display all the security checks related to antivirus.
The following table describes the fields for the ANTIVIRUS security check:
AUDIT POLICY Displays the security checks related to Audit Policy. Click the icon to display all the security checks related to antivirus.
The following table describes the fields for the ANTIVIRUS security check:
AUTO UPDATE Displays the security checks related to Auto Update. Click the icon to display all the security checks related to Auto Update.
The following table describes the fields for the Auto Update security check:
CUSTOM CHECKS Displays the security checks related to Custom Checks. Click the icon to display all the security checks related to Custom Checks.
The following table describes the fields for the Custom Check security check:
EVENTLOG SCAN Displays the security checks related to Event log Scan. Click the icon to display all the security checks related to Event log Scan.
The following table describes the fields for the EVENTLOG SCAN:
FIREWALL POLICIES Displays the security checks related to Firewall Policies. Click the icon to display all the security checks related to Firewall Policies.
The following table describes the fields for the Firewall Policies security check:
INFORMATIONAL CHECKS Displays the security checks related to Informational Checks. Click the icon to display all the security checks related to Informational Checks.
The following table describes the fields for the Informational Checks security check:
MISCELLANEOUS HARDENING Displays the security checks related to Miscellaneous Hardening. Click the icon to display all the security checks related to Miscellaneous Hardening.
The following table describes the fields for the Miscellaneous Hardening security check:
PASSWORD POLICY Displays the security checks related to Password Policy. Click the icon to display all the security checks related to Password Policy.
The following table describes the fields for the Password Policy security check:
SCREENSAVER Displays the security checks related to Screensaver. Click the icon to display all the security checks related to Screensaver.
The following table describes the fields for the Screensaver security check:
SECURITY OPTIONS Displays the security checks related to Security Options. Click the icon to display all the security checks related to Security Options. The following table describes the fields for the Security Options security check:
USB DEVICES Displays the security checks related to USB Devices. Click the icon to display all the security checks related to USB Devices.
The following table describes the fields for the USB Devices security check:
USER ACCOUNTS Displays the security checks related to User Accounts. Click the icon to display all the security checks related to User Accounts.
The following table describes the fields for the User Accounts security check:
USER RIGHTS ASSIGNMENT Displays the security checks related to User Rights Assignment. Click the icon to display all the security checks related to User Rights Assignment.
The following table describes the fields for the User Rights Assignment security check:
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Dynamic | Under the Dynamic tab, the Administrators can create additional custom parameters based on the availability of the registry entry, value of a registry key, value of a WMI class, VB scripts, Powershell, using batch Commands, and availability of a file/directory. You can search for a particular security check using the Search For Security Check search box. REGISTRY Displays the security checks for Registry settings. Select the check box for the REGISTRY to select all the security checks related to Registry settings. To select a particular security check, select the check box for that security check. Click the icon to display all the security checks related to REGISTRY.
The following table describes the fields for the REGISTRY security check:
WMI Displays the security checks related to WMI. Select the check box for the WMI to select all the security checks related to Registry settings. To select a particular security check, select the check box for that security check. Click the icon to display all the security checks related to WMI.
CMD Displays the security checks related to CMD. Select the check box for the CMD to select all the security checks related to Registry settings. To select a particular security check, select the check box for that security check. Click the icon to display all the security checks related to CMD.
POWERSHELL Displays the security checks related to POWERSHELL. Select the check box for the POWERSHELL to select all the security checks related to POWERSHELL. To select a particular security check, select the check box for that security check. Click the icon to display all the security checks related to POWERSHELL.
VBSCRIPT Displays the security checks related to VBSCRIPT. Select the check box for the VBSCRIPT to select all the security checks related to VBSCRIPT. To select a particular security check, select the check box for that security check. Click the icon to display all the security checks related to VBSCRIPT.
FILE Displays the security checks related to FILE. Select the check box for the FILE to select all the security checks related to FILE. To select a particular security check, select the check box for that security check. Click the icon to display all the security checks related to FILE.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Color Codes | The color codes displayed for the check mark:
|
ACTIONS
This section explains all the icons displayed on the ACTIONS panel of the PROFILE page:
SHOW LIST
Click SHOW LIST to display the LIST table showing all the Profiles configured in the SUMMIT application. For more information, see Viewing Profile List.
DYNAMIC CONFIGURATION
Click DYNAMIC CONFIGURATION to create the security checks for the dynamic fields of the Endpoint Profile under the Dynamic tab. For more information, see Configuring Dynamic Endpoint.
Confluence Cloud Migration Alert: Please refer to known issues you may encounter in Confluence Cloud: https://eitdocs.atlassian.net/wiki/x/wDGwAQ