Information Technology Reference
In-Depth Information
Control activity scope exceptions This type of exception allows you to exclude
specific control activities when checking compliance.
IT GRC program exceptions This type of exception allows you to exclude a specific
computer from an IT GRC program.
IT GRC policy exceptions This type of exception allows you to exclude control ac-
tivities that are not applicable to your organization.
EXAM TIP
Remember the different exception types that you can create when implementing a compli-
ance program.
Understanding compliance settings
Compliance settings, which in previous versions of System Center Configuration Manager
was termed Desired Configuration Management, allows you to monitor and remediate the
configuration of computers.
Configuration Manager's compliance settings functionality uses configuration items and
configuration baselines. A configuration item includes one or more settings that you want
to assess to determine the compliance state of a computer. The configuration item includes
compliance rules to evaluate the settings, as well as providing severity ratings for noncompli-
ance. Some configuration items can be configured for remediation, which allows you to alter
a non-compliant setting so that it is compliant. Configuration baselines are collections of
software updates, configuration items, and other configuration baselines.
MORE INFO INTRODUCTION TO COMPLIANCE SETTINGS
You can learn more about compliance settings in Configuration Manager at http://technet.
microsoft.com/en-au/library/gg681958.aspx .
Configuration items
Configuration Manager supports the following types of configuration items for assessing the
compliance of computers:
Application configuration item Use this type of configuration item to determine
application compliance, including whether the application is installed and whether it is
configured in a specific manner.
Operating system configuration item Allows you to determine operating system
configuration compliance, such as whether particular roles or features are installed and
particular registry keys are configured.
 
 
 
Search WWH ::




Custom Search