Security Analyst Dashboard
The Security Analyst dashboard checks whether the devices and servers in the system are compliant to prescribed security standards. The dashboard uses custom metadata tags to support device and server security status tracking.
Security features such as protocol compliance, local password requirements, and networking limitations are configured using the Streamline NX device configuration templates and then applied to devices via configuration tasks. Security Analyst references the template names and task data from the Streamline NX Management Console and provides an easy tool to tag particular templates as ‘security policies.
Refer to Security Analyst Terminologies for the terminologies used in Security Analyst.
Topics | Description |
---|---|
An example on how the Security Analyst works. |
|
Describes the roles and privilege required to access the Security Analyst dashboard |
|
Describe the information displayed in the overview dashboard. |
|
Allows you to view the different types of device compliance dashboard. |
|
Create a security policy in a Security Analyst Workflow |
For the best practice when using the security tags, refer to Security Analyst Best Practices. This topic includes instructions to Add Tags to a Template. |
Helps you identify tags and templates that are associate with devices that are out of policy. |
|
Set the threshold and data refresh rates System settings are available to determine both an unresponsive threshold level and refresh data rates with Security Analyst. |
|
View the list of settings that can make your Core server more secure. This checklist indicates current compliance with the suggested Streamline NX configuration best practices. |