Configuration Compliance Reporting Module
Simplify your audit and report activities for common industry configuration guidelines and best practices.
Automated Configuration Compliance Auditing & Reporting
Even with the smartest users, fully patched systems, and the latest and greatest in firewall and antivirus technology, it is still possible for attackers to breach your network. Therefore, in addition to patching and remediation, configuration management is a necessary practice for securing enterprise networks. When leveraged as part of the Retina CS Enterprise Vulnerability Management solution, the Configuration Compliance Module streamlines auditing and reporting against industry configuration guidelines and best practices.
- Integrated templates for operating systems and applications from FDCC, NIST, STIGS, USGCB, CIS, and Microsoft
- Audit configurations against internal policies, industry regulations, or recommended best practices
- Centralize reporting for simple monitoring and streamlined regulatory compliance
- Integrated data warehouse technology for long term-trending, analytics and reporting
Simple and Flexible Configuration Compliance
The Configuration Compliance Module includes templates for Windows, Linux, and Unix, plus applications assessments from FDCC, NIST, STIGS, USGCB, CIS, and Microsoft. Robust auditing and reporting capabilities help keep your network running, available, and accessible using industry-standard best practices.
Unify Configuration Compliance with Security Intelligence
Use in conjunction with BeyondInsight’s reporting engine, which delivers analytics and trending across the threat lifecycle for multi-dimensional reports on assets, vulnerabilities, attacks and remediation.
Support for Your Entire IT Infrastructure
BeyondTrust continues to be the only security solution provider to support configuration compliance reporting for network, virtual and cloud assets.
Integrated with Retina Vulnerability Management
A centralized management, reporting and analytics console enables security, IT and compliance teams to easily manage Configuration Compliance in concert with Retina CS Enterprise Vulnerability Management.
Configuration assessment: Validate audit settings, security settings, user rights, logging configuration, and more.
Built-in templates: Includes templates for Windows operating systems and applications from FDCC, NIST, STIGS, USGCB, CIS, and Microsoft.
Customizable: Includes a benchmark importer for customizing configuration benchmarks to your specific requirements. Allows you to import and synchronize new and updated benchmarks directly from BeyondTrust‘s Research Team.
Streamlined reporting: Demonstrate compliance with government and corporate standards via built-in vulnerability reporting and integration with BeyondInsight for deltas, trends and drilldowns.
OVAL SCAP-certified scan engine and interpreter with report export capabilities to ARF, NIST, XCCDF, and other government formats.