Oracle® Enterprise Manager Application Configuration Console PCI Compliance Release 5.3.2 Part Number E14654-02 |
|
|
PDF · Mobi · ePub |
After installing the PCI Compliance Automation Module, you are ready to load your PCI assets.
Before adding Windows PCI assets, you should create a container tree in the Navigator view that represents the systems you want to validate for compliance.
To add PCI assets for a Windows platform:
Right-click the container you set up in the Navigator view and select Add > Asset in the popup menu.
Type a name for the asset you are adding. (If you don't enter a name, it defaults to the resource specification you select, which may be an appropriate naming convention to use).
Click the Use Resource Specification radio button if necessary, then select the PCI Windows specification that applies.
Select a Host/Endpoint and Authentication Pack from the respective drop-down lists. These are the values you have defined for the machine that hosts the proxy service.
In the Windows Resource Adapter Settings tab, identify the Target Machine, that is, the host from which to extract the security settings.
Ignore the rest of the selections in this dialog.
Click OK.
A progress indicator appears, after which you should see a confirmation message of success. Close the message and look for the asset under the selected container in the Navigator view.
Repeat the process for each type of PCI asset you want to add.
Before adding Linux PCI assets, you should create a container tree in the Navigator view that represents the systems you want to validate for compliance.
To add PCI assets for a Linux platform:
Right-click the container you set up in the Navigator view and select Add > Asset in the popup menu.
Type a name for the asset you are adding. (If you don't enter a name, it defaults to the resource specification you select, which may be a suitable naming convention to use).
Click the Use Resource Specification radio button if necessary, then select the PCI Linux resource specification that applies.
Select the Host/Endpoint from which you want to extract the security settings.
Select the Authentication Pack that has the appropriate credentials to access the selected host.
Ignore the rest of the selections in this dialog.
Click OK.
A progress indicator appears, after which you should see a confirmation message of success. Close the message and look for the asset under the selected container in the Navigator view.
Repeat the process for each type of PCI asset you want to add.
Before adding Solaris PCI assets, you should create a container tree in the Navigator view that represents the systems you want to validate for compliance.
To add PCI assets for a Solaris platform:
Right-click the container you set up in the Navigator view and select Add > Asset in the popup menu.
Type a name for the asset you are adding. (If you don't enter a name, it defaults to the resource specification you select, which may be a suitable naming convention to use).
Click the Use Resource Specification radio button if necessary, then select the PCI Solaris resource specification.
Select the Host/Endpoint from which you want to extract the security settings.
Select the Authentication Pack that has the appropriate credentials to access the selected host.
Ignore the rest of the selections in this dialog.
Click OK.
A progress indicator appears, after which you should see a confirmation message of success. Close the message and look for the asset under the selected container in the Navigator view.
Repeat the process for each type of PCI asset you want to add.