The benefits of "New Policy"

The machine upgrade is a complicated job when the old data have to be backed up from the old machines and recovered to new ones. There will be more problematic issues once the new machines are in place due to user habits, and this is just a small part of IT administrator jobs, let alone other major tasks in hands.

The ever increasing routine jobs pose heavier workload on IT administrators who often spend work overtime solving the problems, the issue of getting off work in time becomes a distant goal. Let me explain the correlation of this phenomenon to the real topic.

It is believed that every IT administrator keeps his own set of tools to facilitate daily works, and DragonSoft Vulnerability Management is one of the tools. The vulnerability detection is a proactive way to outside threats before it happens, of course, there are numerous useful hints to its users.

Whenever new machines are introduced to replace old ones, most users adopt “Complete” policy audit to identify potential vulnerability from the network service system and communication ports in the system. The question remains whether or not to apply identical practice on currently in use PCs and to-be-discarded PCs if the IT administrator is responsible for hundreds of machines, vulnerability assessment become a hefty job.

Taking 2009 procurement as an example, one can select “New Policy” function to sub-divide all machines into 3 policies: “2009 Procured”, “PC in use” and “Old machine”.

The “2009 Procured” is created based on “Complete” policy.
The second “PC in use” is created based
on “2009 Procured” policy criteria.
The “2009 Procured” is created based on
Complete” policy.

The third “Old machine” policy will be based on “PC in use” policy with basic setting and only to keep a desirable target PC list.

This is just an example to share the pressure of audit jobs, there will be different applications by your network configuration to maximize work performance.

Author: Gavin Wu