The most recent content from our members.
I'm trying to use a Dynamic Query in Compliance, and the Dynamic Query isn't pulling everything that it should. I've tested by Creating a Group with the same Dynamic Query, and it WILL populate everything. The dynamic query is really simple, just Vendor is Cisco.
What I am looking to do is write a rule that checks three interfaces and looks for the shutdown command on those interfaces. I wrote it like this initially Must contain find string Interface GigabitEthernet2/43 Shutdown That actually did work on a few, because there was no garbage in between. but most of them have stuff in…
With the continuous increase in the number of security breaches every year, it would we critical for you to take a closer look at the few things that you can do from an IT security standpoint, to minimize the risks. One of the key steps towards this complying with industry specific regulations like SOX and HIPAA/HITECH and…
Information security is important to every organization, but when it comes to government agencies, security can be considered the priority. A breach or loss of information held by federal agencies can lead to major consequences that can even affect the national and economic security of the nation. The Defense Information…
All, I'm a long time user of SolarWinds products and a huge fan, always have been! But the way the compliance and reporting pieces are configured is painful. I know this would require a redesign of NCM, somewhat...but would it be worth the time to look at mirroring SAM Application templates for this process? NCM Rules…
I need a report that will show the number of violations each device has. I need to inventory the various profiles currently configured on nearly 700 devices. (All devices are from the same vendor, and the majority as the same, or very similar models... if it were to matter...) Currently, I have only been able to find a…
Patch management has become so critical in the IT landscape that it’s now a must-have security solution in enterprises. When you utilize effective patch management, you’ll be able to eliminate application vulnerabilities and the security threats that arise from them. Today, IT admins are looking for ways to make software…
Every other day, the Internet is flooded with reports of card holder information theft, financial data loss due to misconfigured ‘secure network environment’, identity theft and so on. If you are in the financial services industry, how do you create a secure environment that is compliant with the Payment Card Industry Data…
This is the RED Part: This is the section that specifically reflects the query provided by cnorborg. This query allows me to list all devices that are in violation of a specific policy rule, and then counts the number of times each of those devices violated the rule. In our environment, a single device has the potential of…
Been playing quite a bit with Policy Compliance and remediation scripts and one thing I've noticed is that after the script is run on a node, RTCD is very slow at processing the nodes for updating. The last lines in my remediation script are "write mem", so I can see it triggering RTCD in the Trap Viewer on the server. I…
It looks like you're new here. Sign in or register to get started.