ENGINSIGHT
WebsiteLoginKostenloser Testzugang
English
English
  • Overview
  • Features
  • Operation
    • Platform overview
    • Start Guide
    • Platform
      • Dashboard
        • Vulnerability Management
        • Operation Centers
        • My Dashboards
        • Configurations
      • Issues
      • Hosts (Pulsar Agent)
        • Pulsar Agent
        • Host details
        • Policy Manager
        • Software Inventory
        • Intrusion Detection System
        • File Integrity Monitoring
        • System events
        • Update Manager
        • Plugins
        • Machine Learning
      • Host (Pulsar-Agent) BETA
        • Pulsar Agent
        • Hostdetails
        • Softwareinventar
        • Plugins
        • Policies
        • Globale Tags
        • Tag Manager
        • System Events
        • Vulnerability Manager
        • Compliance
        • Intrusion Detection System
        • File Integrity Monitoring
        • Advanced Persistent Threats
      • Endpoints (Observer)
        • Endpoint details
        • Domains
        • Certificate Manager
        • Observer
      • Observations
      • Shield
      • Penetration Testing (Hacktor)
        • Run pentest
        • Audits
        • Audit Definitions
        • Target Groups
        • Auth-Providers
        • Hacktor
        • Custom Scripts
      • Discoveries
      • SIEM
        • Data Lake
        • Cockpits
        • Obfuscators
        • Workflows
        • Incidents
        • Extractors
        • Collectors
        • Loggernaut
        • Advanced Settings
        • Models
      • Alerts
      • Settings
      • Organisations
      • Tags
      • Searchbar
  • On-Premises
    • Requirements
    • Installation
      • Automatic Installation
      • Manual Installation
      • Load Balancing
      • SIEM
      • Deinstallation
    • Update
    • Configuration
      • HTTPS and Certificates
      • Licences and Organisations
      • Mail Server
      • 2-Factor Authentication
      • SSO via Office 365
      • Storage Times
      • White Label
      • NGINX Extractor
      • Field Level Encryption
      • Loggernaut-Configurations
  • Technical Details
    • System Requirements
      • Pulsar: Operating Systems
    • Current version numbers
    • Pentest Vectors
    • API
  • Partner section
    • Licenses and organizations
Powered by GitBook
On this page
  • Configurations
  • Guidelines
  • Lists

Was this helpful?

  1. Operation
  2. Platform
  3. Dashboard

Configurations

PreviousMy DashboardsNextIssues

Last updated 1 year ago

Was this helpful?

Configurations

Incorrectly set configurations can be a gateway for hackers. Checking and correcting them should therefore be a central part of any IT-Security-Strategy.

Enginsight already provides configuration guidelines for the following operating systems:

  • Microsoft Windows Server 2008, 2012, 2016, 2019

  • Microsoft Windows 10

  • Chanonical Ubuntu 16

  • Red Hat Enterprise Linux 6, 7

  • SUSE Linux Enterprise Server 12

Guidelines

Our policies provide you with concrete instructions or directly provide you with an autofix to correct security-critical configurations quickly and easily. In the cross-system management-view, you can use the search bar to search through the policies and filter them according to specific criteria.

Create your own Policy

To add your own policy, click on 'Create a new policy'. First assign 'General Information' (title, description). Under 'Guideline' you specify what should be checked (Check Text) and how the configuration should be corrected if necessary (Fix Text). In the 'Other Settings' you assign the 'Severity' and the 'Control Correlation Identifier' (CCI).

Lists

Guidelines can be assigned to lists. The guidelines already provided by Enginsight are summarized to lists of the respective operating system. In addition, you can create your own lists of relevant policies.

Create Lists and Assign References

To create your own list, click on 'Create a new list'. First assign 'General Information' (title, description). Now you must assign the list to the 'Assigned references'. First, under "BelongsTo", specify which reference it belongs to (e.g. host or endpoint). Use 'Tags' to assign the lists to the desired references.

Fill Lists with Guidlines

To add policies to the appropriate list, filter the policy-overview by the desired policies. Select the required policies by placing a check-mark in the checkbox and click 'Apply to List'. Choose the list and assign the policy to the list.