Show TOC

Object documentationSecurity List App


The Security List app displays a list of individual systems and shows whether they are compliant with the software, configuration, and user settings defined in the target system.

This app is designed to use the target system template 0SEC_NEW, which contains the relevant configuration stores and values for validating these categories.


The Security List app provides detailed compliance information for each system.

The information in the app is as follows:

  • Table column System: Comparison systems being queried.

  • Table columns Software, Configuration, User: Compliance evaluation with categories compliant, noncompliant, and undefined. For more information on the validation categories, see Dashboard for Security.

  • Table column Earliest timestamp: Timestamp of the configuration store with the oldest data. (The timestamp of a configuration store indicates when it was last collected.) If no data is displayed, it means that at least one configuration store did not deliver such a timestamp, or that a configuration store was empty. For more information about configuration stores, see Configuration and Change Database (CCDB).

  • Target: Target system being evaluated.

  • Total # systems: Number of comparison systems.

Note Note

From the Security List app, you can drill down to configuration validation reporting by clicking on a system.

End of the note.

More Information

Configuring Security Apps