Chapter 4 Quick Start Configuration
Configure a Policy
4-18
Installing Management Center for Cisco Security Agents 5.2
78-17916-01
Configure a Policy
Generally, when you configure a policy, you are combining multipl e rule modules
under a common name. That policy name is then attached to a group of hosts and
it uses the rules that comprise the policy to control the actions that are allowed
and denied on those hosts. You can have several different types of rules in a rule
module and consequently within one policy.
The policy level is the common ground by which host groups acquire the rules that
make up their security policy. You can attach rule modules of differing
architectures to the same policy. This way, you can configure a task-specific,
self-contained, inclusive policies across all supported architectures (Windows,
Solaris, Linux) for software that is supported on all platforms.
Note Management Center for Cisco Security Agents ships with preconfigured policies
you can use if they meet your initial needs. If you use a preconfigured policy, you
do not have to create your own policy as detailed in the following pages.
To configure a policy, do the following.
Step 1 Move the mouse over Configuration in the menu bar of CSA MC and select
Policies from the drop-down menu that appears. The policy list view appears.
Step 2 Click the New button to create a new policy entry. This takes you to the policy
configuration page.
Step 3 In the available policy configuration fields, enter the following information:
Name—This is a unique name for this policy grouping of rule modules.
Names are case insensitive, must start with an alphabetic character, can
be up to 64 characters long and can include alphanumeric characters,
spaces, and underscores. For this exercise, enter the name Quarantined
Applications.
Description—This is an optional line of text that is displayed in the list
view and helps you to identify this particular policy.
Step 4 Click the Save button.