Retina CS

Configuration Compliance Reporting Module

Simplify your audit and report activities for common industry configuration guidelines and best practices.

Automated Configuration Compliance Auditing & Reporting

Even with the smartest users, fully patched systems, and the latest and greatest in firewall and antivirus technology, it is still possible for attackers to breach your network. Therefore, in addition to patching and remediation, configuration management is a necessary practice for securing enterprise networks. When leveraged as part of the Retina CS Enterprise Vulnerability Management solution, the Configuration Compliance Module streamlines auditing and reporting against industry configuration guidelines and best practices.

  • Integrated templates for operating systems and applications from FDCC, NIST, STIGS, USGCB, CIS, and Microsoft
  • Audit configurations against internal policies, industry regulations, or recommended best practices
  • Centralize reporting for simple monitoring and streamlined regulatory compliance
  • Integrated data warehouse technology for long term-trending, analytics and reporting
Simple and Flexible Configuration Compliance

Simple and Flexible Configuration Compliance

The Configuration Compliance Module includes templates for Windows, Linux, and Unix, plus applications assessments from FDCC, NIST, STIGS, USGCB, CIS, and Microsoft. Robust auditing and reporting capabilities help keep your network running, available, and accessible using industry-standard best practices.

Unify Configuration Compliance with Security Intelligence

Unify Configuration Compliance with Security Intelligence

Use in conjunction with BeyondInsight’s reporting engine, which delivers analytics and trending across the threat lifecycle for multi-dimensional reports on assets, vulnerabilities, attacks and remediation.

Support for Your Entire IT Infrastructure

Support for Your Entire IT Infrastructure

BeyondTrust continues to be the only security solution provider to support configuration compliance reporting for network, virtual and cloud assets.

Integrated with Retina Vulnerability Management

Integrated with Retina Vulnerability Management

A centralized management, reporting and analytics console enables security, IT and compliance teams to easily manage Configuration Compliance in concert with Retina CS Enterprise Vulnerability Management.

KEY CAPABILITIES

Configuration assessment: Validate audit settings, security settings, user rights, logging configuration, and more.

Built-in templates: Includes templates for Windows operating systems and applications from FDCC, NIST, STIGS, USGCB, CIS, and Microsoft.

Customizable: Includes a benchmark importer for customizing configuration benchmarks to your specific requirements. Allows you to import and synchronize new and updated benchmarks directly from BeyondTrust‘s Research Team.

Streamlined reporting: Demonstrate compliance with government and corporate standards via built-in vulnerability reporting and integration with BeyondInsight for deltas, trends and drilldowns.

Centralized management console: Manage and report on configuration compliance in conjunction with vulnerability management, patch management, and regulatory compliance via a unified console.

OVAL SCAP-certified scan engine and interpreter with report export capabilities to ARF, NIST, XCCDF, and other government formats.