Jump to main content
HCL Logo Product Documentation
Customer Support Software Academy Community Forums
BigFix Compliance
  • BigFix Documentation Homepage
  • BigFix 10 Compliance Documentation
  • Compliance Overview
  • Compliance Guides in PDF format
  • Compliance Setup Guide and User Guide
  • Configuration Management (SCM)
  • Payment Card Industry (PCI) Add-on User Guide
  • Client Manager for Endpoint Protection
  • BigFix and QRadar User Guide
  • BigFix Client Compliance
  • BigFix and Carbon Black integration
  • CVE Search dashboard
  • CyberFOCUS Analytics
  • Extended third-party Windows Application
  • Known Exploited Vulnerabilities Content Pack (Add-on)
  • Linux and Windows applications - middleware
  1. Home
  2. Compliance Setup Guide and User Guide

    BigFix Compliance Analytics is a web-based application designed to help you manage security, vulnerability, and risk assessment. The application archives security and vulnerability compliance check results to identify configuration issues and report levels of compliance toward security configuration goals.

  3. BigFix Compliance Analytics User Guide

    BigFix Compliance Analytics is a component of BigFix Compliance, that includes technical controls and tools that are based on industry practices and standards for endpoint and server security configuration.

  4. Management Tasks

    The following management tasks can be performed if you have appropriate permissions.

  • Compliance Setup Guide and User Guide

    BigFix Compliance Analytics is a web-based application designed to help you manage security, vulnerability, and risk assessment. The application archives security and vulnerability compliance check results to identify configuration issues and report levels of compliance toward security configuration goals.

    • BigFix Compliance Analytics Setup Guide
    • BigFix Compliance Analytics User Guide

      BigFix Compliance Analytics is a component of BigFix Compliance, that includes technical controls and tools that are based on industry practices and standards for endpoint and server security configuration.

      • Introduction

      • General Usage Concepts

      • Management Tasks

        The following management tasks can be performed if you have appropriate permissions.

        • Computer Groups

        • Configuring multiple computer groups
        • Computer Properties

        • Data Sources

        • Domain Settings

        • Data Imports

        • Mail Settings

        • Notifications

          You can create email notifications using this section.

        • Roles

        • Server Settings

        • Directory Servers
        • Adding a directory server

          To use LDAP, you must first configure a connection to your directory server.

        • Session Settings

          You can change your session settings to specify the session time for a logged in user who is inactive for a certain period and to custom the message on the login page using Markdown text.

        • Single Sign-On Settings
        • System Options

          Use System Options too add WebUI URL in Compliance's report.

        • Users

        • User Provisioning
        • Account Preferences

      • Security Configuration Reporting
      • Patch Domain
      • Vulnerability Domain

Management Tasks

The following management tasks can be performed if you have appropriate permissions.

  • Computer Groups
  • Computer Properties
  • Data Sources
  • Directory Servers
  • Domain Settings
  • Data Imports
  • Mail Settings
  • Notifications
  • Roles
  • Server Settings
  • Single Sign-On Settings
  • Session Settings
  • Users
  • System Options
  • User Provisioning

Rate this topic


  • Share: Email
  • Twitter
  • Disclaimer
  • Privacy
  • Terms of use
  • Cookie Preferences