Compliance Check
The compliance check associates the compliance policies with the devices to be checked, and promptly checks the violating devices. The check results are displayed in various formats. At the same time, the compliance check function provides the fixing function to promptly fix the configuration and security problems in the network. With the compliance check function, you can easily determine whether the intranet complies with the policies of the company, and keep the intranet secure and stable for a long time.
The compliance check operates in the following process:
- The network administrator selects system-defined compliance policies or adds user-defined compliance policies as needed, and associates the compliancy policies with the devices to be checked to create a check task;
- After the check task is automatically or manually executed, the network administrator can view the check task history report and analyze the check results;
- The network administrator uses the fixing function to fix the configurations of the violating devices. If you want to check the command execution results, you must manually enter commands or select commands from the display command when you create a rule for compliance policy.
The compliance check delivers the following benefits:
- Diversified check types—The compliance check provides the check for a single device and configuration segment contents, and the consistency and uniqueness check for links or multiple devices. Additionally, you can add individual compliance policy rules and extend the check rules of each component of the system as needed, and implement customization on demand.
- Rich report contents—You can determine whether the device configurations in the network are compliant based on the rich contents in the report.
- Fixing function—The fixing function can quickly make the violating devices compliant with the policy.
Functions