Getting started

  1. Install Comply. For more information, see Installing Comply.
  2. Import scan engines. For more information see Importing scan engines.
  3. Create computer groups. For more information, see Creating computer groups.
  4. Create deployments. For more information, see Creating deployments.
  5. Work with compliance benchmarks and vulnerability sources. For more information, see Working with configuration compliance benchmarks and vulnerability sources.
  6. Create reports. For more information, see Creating reports.
  7. View, edit, or delete reports. For more information, see Working with reports.

Last updated: 11/6/2018 4:20 PM | Feedback