Documentation forNetwork Configuration Manager
Managing network configurations is a key capability of Hybrid Cloud Observability Advanced and is also available in a standalone module, Network Configuration Manager (NCM). Hybrid Cloud Observability Advanced and NCM are built on the self-hosted SolarWinds Platform.

Select an NCM policy report

A policy report shows the current compliance status of nodes in terms of the specific policy rules with which they comply or which they currently violate.

Use the Compliance Policy Reports resource (My Dashboards > Network Configuration > Compliance) to review policies and rules contained within a specific policy report.

Here is a summary of the policy reports available by default in NCM.

Cisco reports

  • Cisco Policy Report

    Reports violations of your Cisco device policies.

  • Cisco Security Audit

    Reports violations of Cisco Security Auditor policies.

CISP reports

  • CISP Reports

    Reports violations of policies related to the Visa Cardholder Information Security Program.

DISA STIG reports

  • DISA STIG V8R18

    Security Technical Information Guide Version 18.

Brocade

  • Access List
  • IPV6
  • Loopback Service
  • Manual Verfiication
  • Multicast
  • NTP
  • OOB Network
  • Port Security
  • QoS
  • Routing
  • Services
  • SNMP
  • SSH
  • Switchport Interfaces
  • Tunneling
  • User Access
  • VPN

Del

  • Manual Verification
  • NTP
  • OOB Network
  • Port Security
  • Services
  • SNMP
  • SSH
  • Switchport Interfaces
  • User Access

Juniper

  • Part 1/3
  • Part 2/3
  • Part 3/3

Palo Alto

  • Logs and Alerts
  • Access List
  • External Facing Interfaces
  • Loopback Services
  • NTP
  • OOB Network
  • PANOS
  • Routing
  • Manual Verification
  • Services
  • SNMP
  • Tunneling
  • User Access
  • VPN

Cisco

  • AAA
  • Accounts
  • Inactive Ports
  • Logging
  • Misc Services
  • NTP
  • OOB Network
  • SNMP
  • SSH
  • VLAN 1
  • VTY and Console

Foundry Reports

  • Foundry Policy Report

    Reports violations of your Foundry device policies.

HIPAA reports

  • HIPAA Security Report

    Reports violations based on policies that enforce regulations related to US healthcare information.

Juniper reports

  • Juniper Policy Report

    Reports violations of your Juniper device policies

NISA FISMA reports

  • Access Lists
  • Management
  • Remote Access
  • Services

PCI reports

  • PCI 3-0 Requirement 1-12
  • Firewall
  • Vendor Defaults
  • Data Storage
  • Secure Transmission
  • Security Applications
  • Secured Systems
  • Monitoring Network
  • Security Systems
  • Information Security Policy

SOX reports

  • SOX Security Report

    Reports violations based on policies that enforce Sarbanes-Oxley regulations related to company financial data.