Compliance Check
This section describes the compliance check feature, including the definition, benefits, functions, principles, and key indicators of the feature.
Definition
Through compliance check, you can quickly check whether device configurations are correct or changed.
Benefits
To ensure stable running of services on the live network, you need to periodically check whether device configurations are correct or changed. If devices are manually checked one by one, manpower investment is high and the check personnel must have high skills. In addition, each device needs to be checked in a different way, which is difficult. Through compliance check, professional personnel formulate check rules based on live network services in advance. You can configure specific rules for different devices. After the check rules are imported to eSight, eSight can check devices on the live network in batches.
Functions
Compliance check can detect noncompliance of devices according to the compliance rules. You can perform compliance check to determine whether an enterprise network meets the security requirements and keep the network running in a secure and stable environment.
Compliance check process: The network administrator formulates compliance rules for each device based on the security configuration requirements and imports the rules when creating a compliance check task. After the task is executed manually or automatically, the network administrator can view and analyze the result and rectify configuration to ensure that the device conforms to the compliance rules.
Task Management
All the compliance rules are managed in the compliance check task, which specifies the configurations and devices to be checked.
Compliance check task management provides the following functions:
- Creating, deleting, modifying, and querying tasks as well as enabling and disabling periodic tasksFigure 3-101 Compliance check task managementFigure 3-102 Creating a check task
- Immediately auditing tasks and rules
- Viewing task details and identifying devices that do not conform to the compliance rules
Principle
1. The compliance check uses Telnet/STelnet to deliver audit commands to devices. The audit commands are customized by users in the audit template.
2. During task execution, the system checks the obtained device configurations based on audit rules to obtain the configurations that comply with the audit rules. Audit rules are customized by users in the audit template.
3. After the task is executed, the task execution result is displayed in the task list, and the audit details are displayed in the task details.