Device Compliance

Device Compliance provides detection of device configuration changes by remote users.

There are two modes of device compliance configurations monitored:

  • Standard Configuration, or the configuration provisioned by Cisco MSX—Standard configuration monitors only a certain elements on the device. Standard configuration is a subset of values across all devices. You can ensure a set of devices have the same values irrespective of device type and model. These are considered global values such as NTP servers, DNS servers, SNMP trap targets, and so on.

  • Full Device Configuration—The full device compliance monitors the entire configuration for any remote changes. Once a remote change is detected the device will be marked out of compliance. Youc can then choose to revert the changes or accept the changes.


Note

Only devices onboarded through Managed Devices can be monitored for device compliance.


This chapter contains the following topics:

Standard Configuration

The Standard Configuration is the set of values that must be compliant across devices added to compliance monitoring. Devices added to Compliance monitoring will have their configuration validated against the Standard Configuration. Any deviations from the Standard Configuration gets reported immediately in the system, and users are alerted. Devices are also monitored in real-time for any remote changes that may deviate from the Standard Configuration. The values in the Standard Configuration will be applied to all configured device types.

Editing Standard Configuration

The Standard Configuration is the set of values that must be compliant across devices added to compliance monitoring. Devices that are added to Compliance monitoring will have their configuration validated against the Standard Configuration. Any deviations from the Standard Configuration will be reported immediately in the system and users are alerted. Devices are also monitored in real-time for any remote changes that may deviate from the Standard Configuration. The values in the Standard Configuration will be applied to all configured device types.

Standard Configuration involves two parts. The first part is defining the Standard Configuration by creating a set of categories, which is described in Adding Standard Configuration Category. After you create the Standard Configuration categories, the second part is providing any dynamic values required, which is described below.

To edit standard configuration values:

Procedure


Step 1

Log in to the Cisco MSX portal.

Step 2

From the left pane, choose Tenant Workspace > Service Controls > Edit Standard Configuration Values.

The Edit Standard Configuration Values window is displayed with the compliance categories.

Figure 1. Edit Standard Configuration Values
Step 3

From the list, click a category you want to edit. You can also search for a category using the search box.

The category parameters are displayed.

Step 4

Edit the parameter values.

Step 5

Click Save.

The parameter values are saved to the Standard Configuration.


Adding Standard Configuration Category

A category is a set of configurations, per device type specified, which is to be compliant across all the configured device types. A category consists of templates that specify the device configuration (per device type) and optional parameters to provide values through the UI as opposed to hard-coded in the template. A combination of both is supported, as well as all template hard-coded values. The template configuration will be compared with the device types under compliance.

A category may have one or many device types supported. Only device types under compliance with a specified template configuration will be tested for compliance. It is possible to have different compliance checks per device type, by supplying different templates in a category. A category can also have just one template for a device type, and multiple categories can be defined, one per device type and compliance configuration.

To add a new category to Standard Configuration:


Note

You need the following permissions to modify the Standard Configuration:

  • Standard Configuration Manage

  • Device Templates Manage


Procedure


Step 1

Log in to the Cisco MSX portal.

Step 2

From the left pane, choose Tenant Workspace > Settings > Define Standard Configuration.

The Define Standard Configuration window is displayed.

Figure 2. Define Standard Configuration Settings
Step 3

Click New Category.

Step 4

In the Category Name field, enter a category name.

Step 5

To create a template, click COMPLIANCE TEMPLATE tab.

Step 6

From the NED ID drop-down list, choose a NED ID. The NED represents the device type you want the device template configuration to apply. You can specify multiple NEDs, each with their own specific device template or just a single NED and template.

Step 7

Enter the configuration in the textbox provided.

Step 8

Click Generate Parameters to generate parameters from the configuration you entered in the template textbox. Parameters that are not already included in the Parameters tab only will be generated.

Step 9

You can add more than one template to a category. To add another template, click the plus (+) icon. Similarly, to delete a template, click the minus (-) icon.

Note 

To see the template that you already added, scroll down to the bottom of the screen.

Step 10

To add parameters, click PARAMETERS tab and then click Add Parameter.

The fields to enter parameter details are displayed.

Step 11

Enter the Parameter Name, Parameter Description, and Parameter Label in the fields displayed.

Step 12

From the Parameter Type drop-down list, choose a parameter type.

Step 13

Check the Read Only option if the parameter is read-only and enter the default parameter value. This value will be displayed as a read-only value when you access the standard configuration. If the option is unchecked, then you are specifying a read or write parameter.

Step 14

You can add more than one parameter to a category. To add another parameter, click the plus (+) icon. Similarly, to delete a parameter, click the minus (-) icon.

Note 

To see the parameter that you already added, scroll down to the bottom of the screen.

Step 15

Click Save Category.

The new category you added will be displayed at the left pane.

Note 

You can specify only one template per NED type for a category.


Deleting Standard Configuration Category

You can delete a category from the Standard Configuration.

To delete a category:

Procedure

Step 1

Log in to the Cisco MSX portal.

Step 2

From the left pane, choose Tenant Workspace > Settings > Define Standard Configuration.

The Define Standard Configuration window is displayed.

Figure 3. Define Standard Configuration Settings
Step 3

Click a category from the left pane.

The category information is displayed.

Step 4

Click Delete Category.

The Category Deletion dialog box is displayed.

Step 5

Click Delete.

A message 'Standard Configuration Category Deleted Successfully' is displayed.


Creating a ServiceNow Account

You can create a ServiceNow account for generating incident tickets for compliance drift and remediation actions.

For more information on integrating incident tracking system with Cisco MSX, see Integrating Incident Tracking System with Cisco MSX.

To create a ServiceNow account:


Note

You need the following permission to update ServiceNow settings:

  • Incidents Manage


Procedure


Step 1

Log in to the Cisco MSX portal.

Step 2

From the left pane, choose Tenant Workspace > Settings > ServiceNow Settings.

The ServiceNow window is displayed.

Figure 4. ServiceNow Settings
Step 3

In the Domain field, enter the FQDN of your ServiceNow instance.

Step 4

In the Client Id field, enter the client ID provided by ServiceNow.

Step 5

In the Client Secret field, enter the client secret provided by ServiceNow.

Step 6

In the User Name field, enter the username to log in to the ServiceNow instance.

Step 7

In the Password field, enter the accompanying password for logging into the ServiceNow instance.

Step 8

In the Caller field, enter the caller name. The Caller is the person contacting the Service Desk to get an incident registered. We recommend creating a ServiceNow user called 'Cisco MSX' (in ServiceNow) and providing 'Cisco MSX' as the Caller in the ServiceNow settings.

Step 9

(Optional) In the Proxy field, enter a proxy URL.

Step 10

Click Save.

A message 'ServiceNow Configuration Saved Successfully' is displayed.

Note 

You can delete the configuration by clicking the Clear Credentials button. Once you delete a ServiceNow account, Cisco MSX will clear the credentials from the system and disconnect access to ServiceNow. You will not be able to send incident tickets, receive service notifications, or any services from ServiceNow across your organization.


Adding a Device to Compliance Monitoring

Compliance monitoring for devices ensures any deviation from the defined set of compliant values (the Standard Configuration) is detected and reported immediately to system administrators. The deviations can be auto-remediated or invoked by user interaction. A full audit log is available to view activities related to compliance deviation and remediations.

To add a device to compliance monitoring:

Procedure


Step 1

Log in to the Cisco MSX portal.

Step 2

From the left pane, choose Tenant Workspace > Devices.

The Devices tile is displayed with the list of devices.

Step 3

Choose a device or devices from the list.

Step 4

If you choose a single device, click the ellipsis (...) that is located far right on the same row and then choose Add to Compliance Monitoring. If you choose multiple devices, click the ellipsis (...) that is located far right on the column header, and then choose Add to Compliance Monitoring.

The Add Devices to Compliance Monitoring dialog box is displayed. The dialog box provides information about how many devices are already monitored and how many will be added for monitoring.

Step 5

Click Add to Monitoring.

A confirmation message is displayed.

Note 

If you choose a device that is not eligible for compliance, you cannot add that device for compliance monitoring. Remove the unsupported devices from your selection and try again.

Step 6

Click Close.


Removing a Device from Compliance Monitoring

You can remove a device or devices from compliance monitoring. After you remove a device from compliance monitoring, it will not be monitored for any changes that deviate from the Standard Configuration.

To remove a device from compliance monitoring:

Procedure


Step 1

Log in to the Cisco MSX portal.

Step 2

From the left pane, choose Tenant Workspace > Devices.

The Devices tile is displayed with the list of devices.

Step 3

Choose a device or devices from the list.

Step 4

If you choose a single device, click the ellipsis (...) that is located far right on the same row and then choose Remove from Compliance Monitoring. If you choose multiple devices, click the ellipsis (...) that is located far right above all devices, and then choose Remove from Compliance Monitoring.

The Remove Device from Compliance Monitoring dialog box is displayed. The dialog box provides information about how many devices will be removed from monitoring.

Step 5

Click Remove from Monitoring.

A confirmation message is displayed.

Step 6

Click Close.


Configuring the Compliance for Devices

You can configure the compliance remediation settings of devices. You can either choose automatic remediation or user initiated remediation.

To configure compliance settings:

Procedure


Step 1

Log in to the Cisco MSX portal.

Step 2

From the left pane, choose Tenant Workspace > Settings > Compliance and Change Management.

The Compliance and Change Management window is displayed.

Figure 5. Compliance and Change Management
Step 3

In the REMEDIATION SETTINGS section, click the Remediation is Initiated by User radio button if user initiation is required for remediation. If you choose this option, the values will not be reverted to standard values until you initiate it from your side.

  1. Click Save.

    A message 'Compliance Settings were Saved Successfully' is displayed.

Step 4

Click the Revert Non-compliance Values When Detected radio button if you want automatic remediation. If you choose this option, devices are automatically reverted to standard configuration values when non-compliant values are detected. You will be notified of the changes.

  1. Click Save.

    A message 'Compliance Settings were Saved Successfully' is displayed.


Remediating Non-compliant Values on a Device

Deviations on a device from the Standard Configuration can be remediated in two ways. The first option is to revert the changes on the device to the Standard Configuration values. The second option is to accept the non- complaint values on the device. This action will track the exception for this device and not warn again if the device is checked again for deviation drift. Changing the Standard Configuration value will negate any exceptions stored for a device against the changed Standard Configuration value.

To remediate non-compliance values:

Procedure


Step 1

Log in to the Cisco MSX portal.

Step 2

From the left pane, choose Tenant Workspace > Devices.

The Devices tile is displayed with the list of devices.

Step 3

From the list, click a device.

The device metric page lists the device information.

Step 4

From the Compliance section, click Remediate.

The Remediate Non-Compliant Values window is displayed. From the remediation options, you can either choose Revert to Standard Configuration Values or Accept Non-compliant Values.

Step 5

Click Revert to Standard Configuration Values if you want to revert the values to standard configuration.

  1. Click Next.

    The Scheduling Options window is displayed. You can remediate now or schedule the remediation for a later date.

  2. Click Remediate Now to remediate the values immediately. Click Next.

    Review the remediation details and click Next. The remediation process initiates and a message 'Remediation Initiated' is displayed.

  3. Click Schedule Remediation to schedule the remediation for a later date.

  4. If you click Schedule Remediation, you can either schedule a new job or add to an existing job.

  5. To schedule a new job, click the New Schedule Job radio button.

    In the Schedule Job Name field, enter a name for the schedule job.

    In the Date and Time field, choose a date and time.

  6. To add to an existing job, click the Add to Existing Scheduled Job radio button.

    From the Schedule Job drop-down list, choose an existing schedule job.

  7. Click Next.

    The Review Remediation window is displayed.

  8. Review the remediation details and click Next.

    The remediation process initiates and a message 'Remediation Initiated' is displayed.

  9. Click Done.

Step 6

Click Accept Non-compliant Values if you want to accept the values as compliant despite their differences with the standard configurations.

  1. Click Next.

    The Review Remediation window is displayed.

  2. Review the remediation details and click Next.

    The remediation process initiates and a message 'Remediation Initiated' is displayed.

  3. Click Done.


Configuring Change Management Approvals

The Cisco MSX platform provides an approval process for configuration change requests made by a user. When the approval feature is enabled on Cisco MSX, change request for device configuration changes on Cisco MSX will be subjected to approval. If there is a change request on Cisco MSX, the request is forwarded to ServiceNow through the Change Request service. The changes will take effect once the user approves the request through the ServiceNow portal.

For more information on configuring change management approvals, see 'Configuring Change Management Approvals' in Cisco MSX Administration.

Updating Monitored Devices with Standard Configuration

You can update all the monitored devices with standard configuration.

To push standard configuration to monitored devices:

Procedure


Step 1

Log in to the Cisco MSX portal.

Step 2

From the left pane, choose Tenant Workspace > Service Controls > Edit Standard Configuration Values.

The Edit Standard Configuration Values window is displayed.

Figure 6. Edit Standard Configuration Values
Step 3

Click Update Monitored Devices.

The Push Standard Config to Monitored Devices window is displayed.

Step 4

Click Update Devices.

A message 'Standard Configuration Saved Successfully' is displayed.


Viewing Device Vulnerabilities

The Cisco MSX platform now detects and reports the software compliance vulnerabilities for both the Cisco devices and third-party software devices. You can see the vulnerability details in the Device Metric page.

For more information on how vulnerabilities are detected, see Managing the Device Compliance Vulnerability Using API.

To view the device vulnerabilities:

Procedure


Step 1

Log in to the Cisco MSX portal.

Step 2

From the left pane, choose Tenant Workspace > Devices.

The Devices tile is displayed with the list of devices.

Step 3

From the list, click a device.

The device metric page lists the device information. Go to Vulnerabilities tile to see the device vulnerabilities.


Viewing Monitored Devices

You can view the devices under compliance monitoring. The device listing page allows you to filter the devices based on device compliance. The following filtering options are available:

  • All: Displays all the devices.

  • Non-complaint: Displays all non-compliant devices.

  • Monitored: Displays all devices that are monitored for compliance.

  • Eligible: Displays all the devices that are eligible for compliance.

To view all the devices under compliance monitoring:

Procedure


Step 1

Log in to the Cisco MSX portal.

Step 2

From the left pane, choose Tenant Workspace > Devices.

The Devices tile is displayed with the list of devices.

Figure 7. Viewing Monitored Devices
Step 3

To filter the devices based on a compliance criteria, choose a filtering option from the Compliance drop-down list.

The list of devices under compliance monitor is displayed.


Converting Device Configuration to Device Template

The Cisco MSX platform allows you to convert both Cisco and non-Cisco native device configuration formats to device template formats. You can import these converted templates into the centralized template service, and any services like MD can use those templates. This feature also allows you to copy or download the converted configuration.

To convert device configuration to device template:

Procedure


Step 1

Log in to the Cisco MSX portal.

Step 2

From the left pane, choose Settings > Template Management > Device Templates.

The Templates window is displayed.

Step 3

In the Select A Configurational Template section, click the ellipsis (…) and choose CLI to Template from the menu.

The Convert Device Configuration to Template window is displayed.

Figure 8. Convert to Template
Step 4

From the NED IDs drop-down list, choose a NED ID.

Step 5

In the Native Device Format pane, enter the native device configuration.

Step 6

Click Convert.

The Device Template pane displays the converted configuration in XML format.

Step 7

Click the Copy icon to copy the configuration to clipboard.

Step 8

Click the Download icon to download the configuration file.

Step 9

Click Close.


Full Device Configuration

Device-level compliance in terms of the MSX implementation is monitoring for any remote changes on a device. Cisco MSX can monitor the device now for any changes made on the device remotely. It is a setting that you can enable for compliance. If there are any changes made on the device remotely, Cisco MSX will flag it as an out of compliance scenario with remediation options. Then you can choose to accept or revert the change. This mode of device monitoring is referred to as device-level compliance.

Enabling Device Level Compliance for Monitoring Remote Changes

By default, this feature is disabled in Cisco MSX.

To enable the device level compliance:

Procedure


Step 1

Log in to the Cisco MSX portal.

Step 2

From the left pane, choose Tenant Workspace > Settings > Compliance and Change Management.

The Compliance and Change Management window is displayed.

Step 3

In the Compliance section, under DEVICE COMPLIANCE MONITORING, click:

  1. Monitor Devices for Any Change Preview radio button to enable the full device configuration.

  2. Monitor Devices for Changes Against Standard Configuration Values Only radio button to enable the standard configuration.

Step 4

Click Save.


Viewing Compliance Difference and Reverting Changes

As a tenant, you can view the compliance difference and revert to the changes between standard configuration and full device configuration. The device listing page allows you to filter the devices based on device compliance.

To view the compliance difference and revert the cahnges between standard configuration and full device configuration:

Procedure


Step 1

Log in to the Cisco MSX portal.

Step 2

From the left pane, choose Tenant Workspace > Devices.

The Devices tile is displayed with the list of devices.

Step 3

Select a device from the list under a tenant.

The status of the selected device and other metrics are displayed.

Step 4

Click Device Details.

Step 5

Under the Compliance section, select a remote user which does not have any category.

Note 

Under the Compliance section, if you see the category vacant or missing, it is a full device configuration.

Step 6

Click Details of any remote user of the full device configuration.

The Remediation Details window is displayed. You can view the remediation details that got generated in the previous configuration. Here, you can view the logs or status of the remediation if they are Scheduled, In-progress or Completed. Apart from the previous configuration, you can also view the remote changes

Step 7

Click Close.

Step 8

Click Retry to remediate.

The Remediate Non-Compliant Values window is displayed which shows two columns-Previous Configurations and Remote Changes. This window is similar to the Remediation Details window.

Step 9

Click Revert All Changes to revert all the previous configuration to the remediations, else click > if you do not want to make any changes.

When you click > if you do not want to make any changes, Accept All Remote Changes? window appears. Click Continue.

Step 10

Click Reset Modified Configuration if you want to revert back the old changes.

Step 11

Click on the arrow for the blue lines in case you want to revert the changes, or click Revert All Changes if you want the whole changes to come back.

Note 

You can also add or edit any changes on the Remediate Non-Compliant Values window.

Step 12

Click >.

The Review Remediation window is displayed with three columns—Previous Configurations, Remote Changes and Final Configuration.

Note 

The changes reflect in three colors depending on the change in each iteration.

  • Blue—Previous Configurations

  • Yellow—Remote Changes

  • Green—Final Configurations

Step 13

Click Remediate or Cancel.