Compliance process

During run time execution, all compliance entities work together to validate network resources against compliance policies. All results across all validations are available for review by the user until they are removed through housekeeping.

During run time execution, all Compliance Entities which have been defined as part of Compliance Administration are required to work together to validate network resources against Compliance Policies. Run time execution covers various aspects such as process and policy execution, search scenarios and scheduling.

The Compliance Management application will run the validation of devices against policies and generate the validation results. All results across all validations will be stored in the Compliance Management database, and are available for review by the user until they are removed through house keeping.

The user may only view those Processes/Devices/Actions for which they have security permissions for. This is controlled through both Netcool Configuration Manager - Base and Admin > User Security Options.

The Results screens are flexible and easy to use, the user has the abilities to:
  • Sort the results based on column headers
  • Increase and decrease column width to better view the data
  • Hide and unhide rows and columns
  • Access Summary and detailed information by allowing the user to drill down on specific devices to view configuration level detail
  • Use customizable Paging feature for easy navigation through results
  • Export Policies in the Validations screen