Tactical Advice

Compliance Management with NetIQ Secure Configuration Manager

Continuous monitoring with NetIQ's management console eases compliance headaches.
This story appears in the September 2009 issue of BizTech Magazine.

Whether you need to comply with federal regulations, such as Sarbanes-Oxley, or your company’s internal policies, once your infrastructure moves beyond a handful of servers, managing compliance can be a challenge.

Out-of-the-box reporting in Microsoft Windows is limited to scripted output from Windows Management Instrumentation queries, parsing event logs at the command line, and Group Policy Resultant Set of Policy or Windows Server Update Services reports.

NetIQ Secure Configuration Manager (SCM) aims to simplify the process of gathering configuration and security-related data from systems and applications on your network, and compares the results with baseline settings, best practices, built-in policy templates or your own custom templates.

By generating a variety of reports, NetIQ’s management console can help you monitor changes in configuration and ensure that your systems remain compliant. SCM lets you report on user access rights and monitor security best practices, not only in Windows but also on Linux, Unix and IBM iSeries platforms.

Installing SCM

SCM can be installed on Windows 2000 Server or Windows Server 2003, and requires Microsoft SQL Server 2005 Standard or Express edition and the .NET Framework. The install process is a little archaic, similar to loading some Microsoft server products from a bygone era, but nevertheless, it is relatively quick and painless.

Once the management console is loaded for the first time, you’re presented with a list of common tasks to get you started (see Figure 1). Though the console resembles older versions, SCM is a mature product, and the intuitive interface is easy to navigate, once you understand the basic concepts.


Figure 1

Deploying Agents

The Deployment Wizard scans Active Directory to help you locate endpoints, which can be server operating systems or application servers, such as Internet Information Services, Oracle, Microsoft SQL and Sybase ASE. You can also add endpoints manually. The wizard ensures that all the required information, such as credentials to connect to remote machines, is present before deployment begins (see Figure 2). While primarily intended for servers, agents can be deployed to workstations in organizations where regulations such as Federal Desktop Core Configuration are in effect.


Figure 2

Once agents have been deployed, endpoints are automatically added to the SCM console and can be grouped together for management purposes. Different kinds of checks against endpoints include:

  • Security checks: Search for common configuration vulnerabilities, such as weak permissions or unnecessary admin accounts.
  • Policy templates: Check whether an endpoint is compliant with a predefined policy such as Sarbanes-Oxley or a vendor best practice (see Figure 3).
  • Baseline checks: Simplify change management using snapshots of endpoint configuration based on predefined criteria.
  • Task suites: Run a collection of tasks, which are combinations of reports and actions that can identify and remediate common configuration errors.


Figure 3

Reporting and Risk

SCM uses a risk-scoring system that calculates the likelihood of an endpoint interrupting critical business operations based on the number of vulnerabilities discovered and the importance of the system as determined by the security team:

Risk Score = Total Exposure + Importance Factor

After checks have been completed on designated endpoint systems, systems administrators can view detailed reports from the SCM’s report viewer (see Figure 4). Optionally, reports can be distributed to key personnel in a PDF format. Sysadmins can customize and schedule reports to run on a regular basis. Reports are either performed live by collecting data from endpoints or run against data stored in the database.

The most vulnerable systems are highlighted based on risk score, enabling sysadmins or executives to quickly pinpoint which systems need remedial action most urgently. Delta reports provide information about changes that have occurred since the last check, which is useful for change management. SCM also allows sysadmins to define exceptions, so if a system is out of compliance for a known reason (because of maintenance, for example), it can be excluded from reports.


Figure 4

Built-in Security Knowledge

SCM includes an extensive list of templates that provide security knowledge for all the major regulations currently in force, best practices, latest patch information from manufacturers and CVE (common vulnerabilities and exposures) security alerts. A wizard is used to update the built-in templates; once updated at the SCM console, the changes must be pushed to agents (see Figure 5).


Figure 5

Remediation

Task Sequences let sysadmins run reports and basic actions that can be used to remediate security issues across multiple endpoints. Although the included task actions are relatively basic, you can perform simple functions: add or remove users from security groups, stop or start system services and assign user rights (see Figure 6). If a vulnerability is identified in a common system service, a task action could be used to stop the service until a patch is available.


Figure 6

IT Takeaway

SCM provides a comprehensive, multiplatform solution that simplifies the compliance process and offers a system whereby IT departments can prove to auditors that there is a documented, automated and repeatable process in place. This may be accepted as proof that all systems are compliant based on satisfactory results from just one endpoint, resulting in considerable savings when external auditors check compliance across your network, a process that is billed per endpoint.

Even if compliance isn’t your main goal, SCM can help ensure that your infrastructure remains secure, improving uptime and availability for critical applications. You can also delegate privileges to the SCM console so that junior sysadmins have access only to features appropriate to their jobs. Although the Tasks feature in SCM is useful, for comprehensive process automation you should look to complement it with an additional tool.

Russell Smith is an independent consultant based in the United Kingdom who specializes in Microsoft systems management.
Sign up for our e-newsletter

Security

Three Ways to Integrate Fire... |
Follow these tips to align the devices with log management and incident tracking systems.
Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...

Storage

The New Backup Utility Proce... |
Just getting used to the Windows 8 workflow? Prepare for a change.
How to Perform Traditional W... |
With previous versions going unused, Microsoft radically reimagined the backup utility in...
5 Easy Ways to Build a Bette... |
While large enterprises have the resources of an entire IT department behind them, these...

Infrastructure Optimization

Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Ensure Uptime Is in Your Dat... |
Power and cooling solutions support disaster recovery and create cost savings and...
The Value of Converged Infra... |
Improvements in security, management and efficiency are just a few of the benefits CI can...

Networking

Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
How to Maximize WAN Bandwidt... |
Understand six common problems that plague wide area networks — and how to address them.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Mobile & Wireless

Now that Office for iPad Is... |
After waiting awhile for Microsoft’s productivity suite to arrive, professionals who use...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Hardware & Software

New Challenges in Software M... |
IT trends such as cloud, virtualization and BYOD pose serious hurdles for software...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.
The Tools That Power Busines... |
Ever-evolving analytic software can greatly improve financial institutions’ decision-...