Select an NCM policy report
A policy report shows the current compliance status of nodes in terms of the specific policy rules with which they comply or which they currently violate.
Use the Compliance Policy Reports resource (My Dashboards > Network Configuration > Compliance) to review policies and rules contained within a specific policy report.
Here is a summary of the policy reports available by default in NCM.
Cisco reports
-
Cisco Policy Report
Reports violations of your Cisco device policies.
-
Cisco Security Audit
Reports violations of Cisco Security Auditor policies.
CISP reports
-
CISP Reports
Reports violations of policies related to the Visa Cardholder Information Security Program.
DISA STIG reports
-
DISA STIG V8R18
Security Technical Information Guide Version 18.
Brocade
- Access List
- IPV6
- Loopback Service
- Manual Verfiication
- Multicast
- NTP
- OOB Network
- Port Security
- QoS
- Routing
- Services
- SNMP
- SSH
- Switchport Interfaces
- Tunneling
- User Access
- VPN
Del
- Manual Verification
- NTP
- OOB Network
- Port Security
- Services
- SNMP
- SSH
- Switchport Interfaces
- User Access
Juniper
- Part 1/3
- Part 2/3
- Part 3/3
Palo Alto
- Logs and Alerts
- Access List
- External Facing Interfaces
- Loopback Services
- NTP
- OOB Network
- PANOS
- Routing
- Manual Verification
- Services
- SNMP
- Tunneling
- User Access
- VPN
Cisco
- AAA
- Accounts
- Inactive Ports
- Logging
- Misc Services
- NTP
- OOB Network
- SNMP
- SSH
- VLAN 1
- VTY and Console
Foundry Reports
-
Foundry Policy Report
Reports violations of your Foundry device policies.
HIPAA reports
-
HIPAA Security Report
Reports violations based on policies that enforce regulations related to US healthcare information.
Juniper reports
-
Juniper Policy Report
Reports violations of your Juniper device policies
NISA FISMA reports
- Access Lists
- Management
- Remote Access
- Services
PCI reports
- PCI 3-0 Requirement 1-12
- Firewall
- Vendor Defaults
- Data Storage
- Secure Transmission
- Security Applications
- Secured Systems
- Monitoring Network
- Security Systems
- Information Security Policy
SOX reports
-
SOX Security Report
Reports violations based on policies that enforce Sarbanes-Oxley regulations related to company financial data.