5.8

Table Of Contents
Schedule Machine Group Compliance Template Runs
You can schedule a regular run of your machine group compliance templates to ensure that the collected
data is regularly assessed for adherence to the defined compliance rules.
Compliance templates are run against collected data, so you should also schedule collections for the data
types and machine groups that you are assessing.
Prerequisites
n Schedule a regular collection of the data types for the machine groups against which you are running
the machine group compliance templates. For example, see "Configure Scheduled Linux, UNIX, and
Mac OS X Collections" on page 135.
n Create machine group compliance templates. See "Create and Run Machine Group Compliance
Templates" on page 202.
n Create machine group compliance alerts. See "Create Machine Group Compliance Alert Rules" on page
212.
Procedure
1. Click Administration.
2. Select Job Manager > Scheduled.
3. Click Add.
4. Select Compliance and click Next.
5. Type a name and description in the text boxes and click Next.
6. Select the machine group template and click Next.
7. Select the machine groups against which to run the template assessment and click Next.
8. Configure frequency, time of day, and duration for the job and click Finish.
9. To test whether the job is producing the expected results, click Run Now on the data grid toolbar.
Otherwise, the job runs at the scheduled time.
What to do next
If you configured a machine compliance alert for this template, and noncompliant rules were found, you
can review any alerts in the Alerts node in the Console.
Getting Started with SCAP Compliance
Security Content Automation Protocol (SCAP) is a suite of standards that enable automated vulnerability
management, measurement, and policy compliance evaluation. The VCM SCAP implementation employs
or references six open standards that SCAP uses to enumerate, evaluate, and measure the impact of
software problems and to report results.
n Common Configuration Enumeration (CCE). A standard of unique identifiers for common system
configuration issues
n Common Vulnerabilities and Exposures (CVE). A dictionary of standard identifiers for security
vulnerabilities related to software flaws
n Open Vulnerability and Assessment Language (OVAL). An XML standard for security testing
procedures and reporting
vRealize Configuration Manager Administration Guide
214
VMware, Inc.