Endpoint Security Assessment
EAD provides endpoint security assessment based on the endpoint security check function.
Endpoint security assessment calculates a security score for each endpoint based on the results
and weights of the security check items of that endpoint. A risk level is also assigned to each
endpoint to give the endpoint user an intuitive sense of the endpoint's security status. The
security scoring and risk level rating also give administrators a quick at-a-glance assessment
of the risk levels of individual endpoints on the network.
Each endpoint has a security score on a 0 to 100 scale. For each failed security check item
detected on an endpoint, the corresponding points are deducted from the initial full score of
100 for that endpoint. You can assign a weight level to each security check item to specify
the weight of the item in security score calculation.
Basic configuration
- Perform Security Assessment: Select Yes or No from the list to enable or disable endpoint
security assessment.
- Assessment Result Retention Period (days): Set the number of days an endpoint security
assessment result entry is kept in the system before being deleted. The default is 30 days.
The value range for this parameter is 1 to 30 if Support Megascale Users is set to Yes on the
User Access Policy > Service Parameters > System Settings > System Parameters page, or is 1
to 365 if Support Megascale Users is set to No.
Integration with IAM
- Integration with IAM: Select Yes to synchronize the security assessment results to IAM during the next endpoint security assessment. Select No to stop the synchronization function.
- Access Address: Specify the address for accessing the IAM system.
- Max Retries: Set the maximum number of resynchronization times upon failure to synchronize security assessment results. If you do not specify this parameter, the system will not perform resynchronization upon a synchronization failure by default.
- Login Auth Interface: Specify the authorized interface for logging in to the IAM system.
- Score Reception Interface: Specify the score reception interface for the IAM system.
- Username: Specify the username for logging in to the IAM system.
- Password: Specify the password for logging in to the IAM system.
- Login ID: Specify the login ID for the IAM system.
- Secret Key: Specify the secret key for the IAM system.
Assign weights to security assessment items
- The security assessment items are grouped into different categories. Currently, the system
supports only the Security Check/Real-Time Monitor Items category. The assessment items in this
category essentially correspond to the check items in EAD security policies.
- Use the slider next to each assessment item to assign a weight level (low, medium, high,
or very high) to the item. The higher the weight level, the higher the weight of the item in
security assessment score calculation.
- Options for the Custom User Risk Levels field include Low Risk, Middle Risk, and High Risk. Make sure the settings for the three risk levels are contiguous and do not overlap with one another.
Precautions
- After you click <OK> on the Endpoint Security Assessment page, the system
will notify the policy server so the server can update the configurations in its database
accordingly. If the notification fails for exceptions such as network connection errors,
you must manually validate the configurations by clicking <Validate> menu. Alternatively, you
can wait until the exception is recovered and then click <OK> on the Endpoint Security
Assessment page again.
Related topics