Working with standards and vulnerability sources
You must have the Comply Report Content Administrator role to read and write configuration compliance standards and vulnerability sources. For more information about Comply roles, see User role requirements.
If you want to use other standards or scan engines, you must import them. See Download and import the CIS engine and Download and import the SCC scan engine for instructions on how to import or upgrade standards in bulk.
You can import standards in Comply that have the following file formats:
- Split XCCDF format: XCCDF file, OVAL file, CPE, and CPE-dictionary
- Single SCAP 1.2 datastream single file
- Multiple ZIP files containing split XCCDF files
Use categories and labels to group the standards. You can filter the list of standards on the Standards > Compliance page by category and label.
- On the Standards page, in the Compliance tab, click the Import button to import configuration compliance standards.
- Provide a Description for the standard.
- (Optional) Enter custom labels in the Labels field to describe the standard.
- Click Select Files and select the standard files.
- Click Import.
You can filter standards by category on the Standards page, in the Compliance tab by selecting a category from the Filter arrow and choosing from the Label drop-down list.
Change a Standards label
- On the Standards page Compliance tab, hover over a standard to show the Edit icon. Click this icon.
- In the Standard Metadata window, edit the Labels for the standard.
- Click Save.
Create a standard
- From the Comply Setup page, click Compliance.
- Click Create Custom Profile.
- In the Custom Profile window, enter a title and a description.
- Select a standard and click Create.
Delete a Standard
- From the Comply Setup menu, click Compliance.
- On the Custom Profiles tab, click Deletenext to the standard you want to delete.
- Click OK.
You cannot delete a compliance standard that is used in an assessment. You must delete the assessment first, and then you can delete the compliance standard.
Use the Label Filter field at the top right of the Standards page, in the Compliance tab to filter the standards. Begin entering text to see a list of available labels or click the X next to an existing label to remove it from the list of filters.
Comply includes several Tanium Certified standards. These standards have a Tanium Certified icon. You can use these standards only with the Tanium Scan Engine (powered by JovalCM).
Standards with a Verified label were tested and confirmed to work with Comply. Only verified standards display by default. Standards with an Unverified label were not tested with Comply. This label does not mean that the standard does not work with Comply. Standards with an Unsupported label do not work with Comply.
Viewing configuration compliance standard profiles and creating assessments
- On the Standards page, in the Compliance tab , click Expand to see the details of a configuration compliance standard.
- In the Profiles section, hover over a profile and click the Create Assessment button next to a standard profile to create an assessment for that profile.
Click the Create Assessment button at the top to create an assessment for the first profile listed.
The Create Configuration Compliance Assessment page opens. For the steps to create a configuration compliance report, see Create a configuration compliance assessment.
In the Comply menu, click Standards and select the Vulnerability tab to open the Vulnerability Standards page.
Expand Tanium Vulnerability Library to see the three vulnerability sources provided by Comply:
- Tanium Vulnerability Library for Unix
- Tanium Vulnerability Library for macOS
- Tanium Vulnerability Library for Windows
Expand default vulnerability sources to view details, create a report, update them, or edit them. Click on the number of CVEs to see the full list of CVEs included in a standard. You can search the CVE list by using Filter by Name field.
Tanium maintains the Tanium Vulnerability Library daily.
Keep the default schedule that updates the Tanium Vulnerability Library daily.
Comply checks approximately every 60 minutes to compare scheduled vulnerability reports against the most recent version of the Tanium Vulnerability Library. The report rebuilds if new definitions are available for any of the specified Vulnerability Content (Range of CVEs, CVSS Score, or Individual CVEs) and a report is scheduled to run.
Search for CVEs
Enter one or more CVEs in the Search all sources for CVEs field at the top of the Vulnerability page and click Search for CVEs. You can use a search to scan all vulnerability sources to identify which sources contain the specified CVEs.
If you are working in an air-gapped environment, you must configure that setting in Comply and then upload the air gap ZIP file. For the steps to configure Comply for an air-gapped environment, see Configure Comply for an air-gapped environment.
- After you specify that you are working in an air-gapped environment in the Settings > General page, click the Vulnerability tab on the Standards page to open the Vulnerability Standards page.
- Click Upload Airgap Zip.
- Download the air gap ZIP file from the link indicated in the Upload TVL Airgap Zip window (https://content.tanium.com/files/published/tvl/Comply-Standards-Airgap-v1.zip) using a machine that can connect to the internet and save it on the air-gapped machine.
- Click Select File, select the Comply-TVL-Airgap-pkg.zip file from the location where you saved it on the air-gapped machine, and click Open.
- Click Upload.
- After your upload is complete, click Close on the Upload TVL Airgap Zip window. Allow approximately five minutes for Comply to update the vulnerability standards. If you expand a vulnerability source, you will see the Type indicated as Local as well as a completed count of CVEs after the standards are successfully updated from the uploaded air gap ZIP file.
- From the Comply menu, click Standards.
- On the Vulnerability tab click the Create Source button.
- In the Details section, provide a Name, Vendor, and Description.
- To schedule automatic updates, check Enable recurring updates.
- In the OVAL Definitions section, choose
either Remote orImport for the Definition Type.
Enter the path for the Remote orSelect file for Import as appropriate.
- Click Create.
Remote sources are best suited when OVAL content is updated periodically. Uploaded sources are best suited to air-gapped environments or when you would like to manually download and provide the source feed.
This OVAL definition file from CIS provides access to all vulnerability definitions in their repository: https://oval.cisecurity.org/repository/download/5.11.1/all/oval.xml
Edit or delete a vulnerability source
On the Vulnerability Standards page, click Edit to edit a vulnerability source or Delete to delete a vulnerability source.
Perform a vulnerability scan and create an assessment
- Click Expand to see the details of a vulnerability standard and view information about the associated XML file and operating systems. Click Create to create a new vulnerability assessment.
- For more information, see Create a vulnerability assessment .
- Click Create & Deploy to run the vulnerability scan.
Last updated: 9/20/2021 11:06 AM | Feedback