Symantec Security Expressions Server Server User Manual


 
11
Configure Servers
About Server Configuration
Before you can audit systems using the server application, you must configure server settings.
From fundamental settings such as database connection and policy-file-library synchronization to
specific settings that drive scheduled and Audit-on-Connect, the Settings tab provides a central
location for configuring the server.
To access the Settings tab, click Configure Servers on
the application's home page. Use the links at the top of
the tab to open the various settings pages.
Local Server Settings
Local Settings include parameters of individual audit
servers. Most settings are global to all servers in the system, but the Local Settings apply only to
one named audit server. The heading, such as Local Settings are for Server:
ENTERPRISEHOST indicates that the displayed settings are for the server named
ENTERPRISEHOST. The database server and database name also appear.
About User Roles
If the tasks involved in auditing computers for security compliance are divided among different
people in your organization, we recommend establishing
user roles
to control who can use
different features in this application. Several key pages contain settings that let only members of
specified Windows User Groups access certain pages and their features. This allows each user to
focus on their tasks while preventing unauthorized users from performing restricted operations.
For example, administrators of the product need access to all pages including configuration
pages, but auditors only need access to pages used for setting up audits and viewing results.
Tip: Create Windows User Groups based on the access level you plan to grant different users of
the application. Then assign these groups to the corresponding pages.
Pages with Role Settings
You establish user roles by entering Windows Group Access settings on the following pages in the
application. You may restrict access to the pages or features themselves, plus the reports and
audit results based on the restricted machine lists, policies, scopes, and scheduled tasks.
Page Access
Machine List Access
Policies
Scopes
My Machine Lists
Scheduled Tasks