0
6.0.8
Yokohama, Xanadu, Washington DC, Vancouver
Import security data from service graph connectors so that you can audit your enterprise assets based on policies for security gaps. IT and security teams can view imported data on dashboards in the Security Posture Control Workspace and perform the following tasks:
- Automatically prioritize and assign the security gaps you discover to IT and security teams for remediation with the workflow in the Configuration Compliance application.
- Search for assets that match conditions you set with the asset search feature.
- Build policies that suit your requirements using a policy builder that supports filters for asset types, connections, and properties.
- View data and configure security findings in the Security Posture Control workspace.
- Build on an existing policy as a base so you automatically inherit its conditions in your new policy.
- Ignore the results of certain policy conditions with the policy exclusion feature if you're using more than one policy for queries.
- Activate use cases and policies included with the application to get you started quickly.
- Build your own custom insights based on policies.
- Fixed
- An issue with tool gap queries for ESX virtual machine (vm) server policies that caused policies to return inaccurate results.
-
- Duplicate records in the asset cache for cloud vm server mappings that caused incorrect results for policies.
- Dependencies
- Configuration Compliance