Symantec Security Expressions Server manual Scopes Table, Column Description

Models: Security Expressions Server

1 97
Download 97 pages 26.04 Kb
Page 44
Image 44

SecurityExpressions Server User Guide

notifications

Windows Group access

Credential Precedence: If your organization uses the console application and someone delegated one or more database machine lists to the server application, and if one of the systems identified in this scope is also listed in one of those database machine lists, the server uses the database machine list's credentials to access the system rather than the scope credentials you enter here.

3.Click Update to store the new Scope configuration in the database.

Scopes Table

The Scopes table identifies each scope. The columns include:

Column

Description

 

 

Edit

Make changes to this policy entry in the table.

Delete

Remove this entry from the table.

Order

Numeric order in which the scopes should be checked

 

when a computer connects to the network.

Name

Name of the scope.

Type

You may define scopes of the following types:

 

IP Range

 

Windows Domain This scope only works if you are using

 

the Active Directory connection monitor.

 

Org Unit

 

DNS Domain Name

 

Device Type

 

Machine List

 

Expression

 

Detection Method

Value

The values that determine which target systems belong to

 

the scope. The values entered are determined valid or

 

invalid depending on the scope type selected.

 

All scope types except Expression can accept as many

 

values as you want to enter, listing one value per line.

 

Scope type Expression only accepts one expression.

Link Speed

Indicate whether the network-connection speed of the

 

systems in this scope is Unspecified, Slow or Fast. If all

 

systems in the scope use a fast connection, for example,

 

indicating this in the scope's definition prevents the need

 

to check each system's speed during audits. Select

 

Unspecified if you are unsure of network-connection

 

speed or the scope contains a mix of slow and fast

 

connections.

Username

User name of the credentials to use when auditing

 

computers in this scope.

Policies

Names of the policies to use when auditing computers in

 

this scope.

Device Connect Notifications

Notifications to run when a computer in this scope is

 

detected, regardless of audit posture. This value may be

36

Page 44
Image 44
Symantec Security Expressions Server manual Scopes Table, Column Description