On this page
Device Configuration Compliance and Audit
Overview
Maintain configuration consistency and compliance through automated audits across firewalls, routers, and other network devices.
Device Configuration Compliance and Audit guides you through using SecureTrack Reporting Essentials (STRE) to generate audit-ready reports that assess device configurations against vendor benchmarks and best practices.
Why this matters
-
Verify that device configurations align with defined security baselines.
-
Maintain audit-ready visibility and evidence for regulatory and industry compliance requirements.
-
Identify configuration deviations early to correct them in a timely manner.
Who this is for
-
System administrators responsible for configuring device credentials and generating reports.
-
Compliance analysts responsible for reviewing audit findings, and validating compliance results.
-
Platform owner responsible for overseeing data collection and reporting accuracy.
Key capabilities
Device Configuration Compliance and Audit uses:
-
STRE to generate reports for devices.
Prerequisites
-
SecureTrack Reporting Essentials installed and configured to generate required predefined or custom reports.
-
Report Repository configured to store generated reports.
-
Successful completion of Centralized Security Policy Visibility.
Step 1: Generate STRE Device Audit report
The Device Audit report identifies configuration violations that require remediation, ensuring that your devices are consistently audited to maintain security and compliance across your network.
Go to SecureTrack > Reports > Reporting Essentials .
Supported devices
The report can be run for both live and offline devices.
For live devices, compliance testing is supported for:
-
Palo Alto Panorama devices
-
Cisco IOS routers
-
Cisco ASA firewall devices
-
Check Point devices
-
Fortinet Manager devices
See:
Configure and create reports per vendor
Configure the report settings as required. To get the maximum benefits, create Device Audit reports tailored to each device vendor you support based on your environment.
You can generate the report manually on demand, or schedule the report to run at the predefined time and frequency.
See Create Device Audit report.
Review compliance metrics
Review the compliance metrics for the devices selected during report configuration to understand and identify deviations.
-
Overall compliance posture across devices
Use the Total Compliance Result to quickly assess whether your environment meets baseline compliance requirements and to identify systemic risk.
-
Device-level compliance gaps and severity
Use the Device Information section to pinpoint specific devices with low compliance scores or high-severity findings, and prioritize remediation based on risk and benchmark alignment.
Was this helpful?
Thank you!
We’d love your feedback
We really appreciate your feedback
Send this page to a colleague