{"id":1243,"date":"2019-10-27T17:17:14","date_gmt":"2019-10-27T16:17:14","guid":{"rendered":"http:\/\/siff.io\/?page_id=1243"},"modified":"2021-02-12T11:47:37","modified_gmt":"2021-02-12T19:47:37","slug":"features","status":"publish","type":"page","link":"https:\/\/webdev.siff.io\/features\/","title":{"rendered":"Features"},"content":{"rendered":"\t\t
Features<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Collect & Monitor Config Changes Across Your Entire Infrastructure<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
Collect & Monitor<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Full Visibility to Changes Across IT Infrastructure Collect & Monitor Any Configuration Type Change Summary DIFF View Full Configuration DIFF View Full Configuration Download Automatically discovery and collect configuration Add your own network commands to monitor \u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t Monitor server configuration changes Add your own files and server commands to monitor Monitor network security configuration changes Monitor server security configuration changes Monitor cloud security configuration changes \u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t Configuration Security Policy & Compliance<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t Analyze all config changes to ensure policy compliance\u00a0 Integration with SIEM, Fault Mgmt or ITSM systems Search config change activity that violates Policy Rules Generate Audit and Compliance Reports Review Planned vs Unplanned Changes<\/b>
Change Activity Bar
<\/strong>Activity Bar chart indicating volume of new and updated configs over time<\/span><\/p>
<\/strong>Visibility to config changes across all domains and functional groups – applications, servers, networks, storage, VMs, cloud, containers, etc<\/span><\/p>
<\/strong>Collect config files, command line outputs, MS Windows registry, database entries, APIs responses, AWS configs
<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\tChange Detail & DIFF Views<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
<\/strong>Highlight actual changes and save time to identify what has changed in the configuration<\/span><\/p>
<\/strong>View entire configuration output and compare against configuration history and other similar systems<\/span><\/p>
<\/span>View and download entire configuration at any point-in-time in case your existing backup does not have you covered.
<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\tNetwork Config Changes<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Monitor network configuration changes
<\/strong>Capture full configuration details and quickly identify additions \/ deletions to help you quickly identify problems<\/p>
<\/strong>Supports common vendors such as Cisco, Brocade, Zhone and we’ll seamlessly add new ones if you’re not covered<\/span><\/p>
<\/strong>Any device commands can be captured and monitored for changes<\/span><\/p>Server Config Changes<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
<\/strong>Out-of-the-box Service Definitions to monitor server configs, services, file systems, security, kernel module, etc<\/span><\/p>
<\/strong>Define your own service definitions to discovery and monitor for files, commands and registry configuration and changes<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\tSecurity Config Changes<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
<\/strong>Detect firewall config and policy changes<\/p>
<\/strong>Detect firewall config changes, kernel settings, etc<\/p>
<\/strong>Detect resource security and security group policy changes<\/span><\/p>Configuration Policy Monitor<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
<\/strong>Continuously examine all configuration changes against defined policy rules to alert or take action upon policy violations.<\/p>
<\/strong>Integrate with your management systems to take action on policy violations. Includes the actual change details and highlights what was changed.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\tSearch and Report on Policy Violation Changes<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
<\/strong>Easily search change activity to find configuration changes that violates Policy Rules.\u00a0\u00a0\u00a0<\/strong><\/p>
<\/b>Generate reports for audit and compliance reviews.<\/p>
Review planned and unplanned changes to identify gaps in Policy Rules coverage.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t