Configuring Endpoint Profile
- sivani.sahu (Unlicensed)
- Shilpa K (Deactivated)
- Mayuresh Balaji Kamble (Unlicensed)
You can configure Endpoint Profile to perform security checks for a Customer, set of IP Addresses, Locations, or Systems.
To create an Endpoint Profile:
- Select Asset > Configuration > Endpoint > Profile. The PROFILE page is displayed.
Figure: PROFILE page On the ACTIONS panel, click ADDNEW. The PROFILE page is displayed.
Figure: PROFILE page- On the PROFILE page:
- Select the Tenant type.
- Type the Profile Name and Description.
- Select the Active check box if you want to make the Endpoint profile active.
- Under the Static and Dynamic tabs, select the required security check options.
For more information about fields on the PROFILE page, see Field Description.
- Click SUBMIT at the top-right corner to configure the Endpoint profile.
Field Description
The following table describes the fields on the PROFILE page:
Field | Description | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
DETAILS | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Profile Name | Type the name for the Endpoint Profile. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description | Type a brief description about the Endpoint Profile. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Active | Indicates the status of the Endpoint Profile.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Static | Under the Static tab, the administrators can choose from 170 pre-defined parameters and create the Endpoint Profiles. You can search for a particular security check using the Search For Security Check search box. ANTIVIRUS Displays the security checks related to Antivirus installed on the Assets. Click the icon to display all the security checks related to antivirus.
The following table describes the fields for the ANTIVIRUS security check:
AUDIT POLICY Displays the security checks related to Audit Policy. Click the icon to display all the security checks related to antivirus.
The following table describes the fields for the ANTIVIRUS security check:
AUTO UPDATE Displays the security checks related to Auto Update. Click the icon to display all the security checks related to Auto Update.
The following table describes the fields for the Auto Update security check:
CUSTOM CHECKS Displays the security checks related to Custom Checks. Click the icon to display all the security checks related to Custom Checks.
The following table describes the fields for the Custom Check security check:
EVENTLOG SCAN Displays the security checks related to Event log Scan. Click the icon to display all the security checks related to Event log Scan.
The following table describes the fields for the EVENTLOG SCAN:
FIREWALL POLICIES Displays the security checks related to Firewall Policies. Click the icon to display all the security checks related to Firewall Policies.
The following table describes the fields for the Firewall Policies security check:
INFORMATIONAL CHECKS Displays the security checks related to Informational Checks. Click the icon to display all the security checks related to Informational Checks.
The following table describes the fields for the Informational Checks security check:
MISCELLANEOUS HARDENING Displays the security checks related to Miscellaneous Hardening. Click the icon to display all the security checks related to Miscellaneous Hardening.
The following table describes the fields for the Miscellaneous Hardening security check:
PASSWORD POLICY Displays the security checks related to Password Policy. Click the icon to display all the security checks related to Password Policy.
The following table describes the fields for the Password Policy security check:
SCREENSAVER Displays the security checks related to Screensaver. Click the icon to display all the security checks related to Screensaver.
The following table describes the fields for the Screensaver security check:
SECURITY OPTIONS Displays the security checks related to Security Options. Click the icon to display all the security checks related to Security Options. The following table describes the fields for the Security Options security check:
USB DEVICES Displays the security checks related to USB Devices. Click the icon to display all the security checks related to USB Devices.
The following table describes the fields for the USB Devices security check:
USER ACCOUNTS Displays the security checks related to User Accounts. Click the icon to display all the security checks related to User Accounts.
The following table describes the fields for the User Accounts security check:
USER RIGHTS ASSIGNMENT Displays the security checks related to User Rights Assignment. Click the icon to display all the security checks related to User Rights Assignment.
The following table describes the fields for the User Rights Assignment security check:
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Dynamic | Under the Dynamic tab, the Administrators can create additional custom parameters based on the availability of the registry entry, value of a registry key, value of a WMI class, VB scripts, Powershell, using batch Commands, and availability of a file/directory. You can search for a particular security check using the Search For Security Check search box. REGISTRY Displays the security checks for Registry settings. Select the check box for the REGISTRY to select all the security checks related to Registry settings. To select a particular security check, select the check box for that security check. Click the icon to display all the security checks related to REGISTRY.
The following table describes the fields for the REGISTRY security check:
WMI Displays the security checks related to WMI. Select the check box for the WMI to select all the security checks related to Registry settings. To select a particular security check, select the check box for that security check. Click the icon to display all the security checks related to WMI.
CMD Displays the security checks related to CMD. Select the check box for the CMD to select all the security checks related to Registry settings. To select a particular security check, select the check box for that security check. Click the icon to display all the security checks related to CMD.
POWERSHELL Displays the security checks related to POWERSHELL. Select the check box for the POWERSHELL to select all the security checks related to POWERSHELL. To select a particular security check, select the check box for that security check. Click the icon to display all the security checks related to POWERSHELL.
VBSCRIPT Displays the security checks related to VBSCRIPT. Select the check box for the VBSCRIPT to select all the security checks related to VBSCRIPT. To select a particular security check, select the check box for that security check. Click the icon to display all the security checks related to VBSCRIPT.
FILE Displays the security checks related to FILE. Select the check box for the FILE to select all the security checks related to FILE. To select a particular security check, select the check box for that security check. Click the icon to display all the security checks related to FILE.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Color Codes | The color codes displayed for the check mark:
|
ACTIONS
This section explains all the icons displayed on the ACTIONS panel of the PROFILE page:
SHOW LIST
Click SHOW LIST to display the LIST table showing all the Profiles configured in the SUMMIT application. For more information, see Viewing Profile List.
DYNAMIC CONFIGURATION
Click DYNAMIC CONFIGURATION to create the security checks for the dynamic fields of the Endpoint Profile under the Dynamic tab. For more information, see Configuring Dynamic Endpoint.
Confluence Cloud Migration Alert: Please refer to known issues you may encounter in Confluence Cloud: https://eitdocs.atlassian.net/wiki/x/wDGwAQ