Users Guide

Parameter Action/Description
If the audit server already has the posture token and attributes associated with this
client in its cache, it returns the token and the attributes to Policy Manager.
l Trigger RADIUS CoA action: This option sends a RADIUS CoA command to the
network device.
Table 180: Add Services > Audit Dialog Parameters (Continued)
Modifying Default Audit Servers
To reconfigure default Policy Manager audit servers:
1. Navigate to Configuration > Posture > Audit Servers.
Figure 337: Audit Servers Page
2. Select an audit server from the list of available servers.
The Edit Audit Servers page opens.
3. Modify the profile, plugins, and/or preferences.
l In the Audit tab, you can modify the In-Progress Posture Status and Default Posture Status.
l If you selected a Nessus Server, the Primary Server and Backup Server tabs allow you to specify a
scan profile. In addition, when you add a new scan profile, you can select plugins and preferences for the
profile. Refer to Nessus Scan Profiles on page 363 for more information.
The default Policy Manager Nessus audit server ships with approximately 1,000 of the most commonly
used Nessus plugins.
Rules Tab
In the Rules tab, you can create post-audit rules for determining roles based on identity attributes discovered
by the audit. For more information on creating post-audit rules, see Post-Audit Rules on page 368.
Custom Audit Servers
This section provides the following information:
n Adding a Nessus Audit Server on page 360
n Required Configuration Updates for External Nessus Servers
n Adding an Nmap Audit Server on page 366
For enterprises with existing audit server infrastructure or preferring custom audit servers, Policy Manager
supports Nessus (v2.x through v6.x) and Nmap scans using the NMAP plug-in on external Nessus servers.
Dell Networking W-ClearPass Policy Manager 6.6 | User Guide Posture | 359