Webinar
Responding to Unauthorized Configuration Changes Using OpConfig And OpEvents
Join Mark Henry as he explains how easy it is to set up proactive event and configuration management for your organization. Watch this webinar for ideas to better shape your network.
It happens all the time, an engineer shifts a setting for troubleshooting and forgets to put it back when he’s done. Another configures a device from memory, rather than the checklist, and a device gets deployed with a default password still in effect. Across town, an employee brings a wireless router into work and plugs it into his cubical port so he can have access around the office. Join us for this 30-minute session while we learn:
- How to configure opConfig to collect device configurations and raise alerts to NMIS
- How and when to take action on reported configurations changes
- How to leverage opConfig’s setting push capability in response to an event
Useful Links:
- Follow along with the Slides
- opConfig Product Page
- opConfig Wiki
- opEvents Wiki
- Community Questions Board
- Support
- Sales
- UC Berkley Secure Device Configuration Guideline
- Center for Internet Security