Creating and Managing Custom Checklists

The ability to customize Configuration Management parameters and exclude specific computers from an analysis gives you control over your security status. However, you can also use custom checklists to fine-tune the settings monitored in your deployment. Custom checklists target specific sets of computers with tailored content using the subscription mechanism. This allows statistics to be gathered with finer granularity. To create your own checklist with custom sites, perform the following steps.

  • Step 1: Create a custom checklist from an existing external checklist
  • Step 2: Customize Fixlets using built-in parameterization
  • Step 3: Subscribe the proper computers to the custom checklist