HP Intelligent Management Center v5.2 Branch Intelligent Management System Administrator Guide

3. Select a severity level for the rule. When CPEs violate this rule, the system marks a severity
level information accordingly.
4. Select a check type as CPE, Interface, or Configuration Segment.
If you select Interface or Configuration Segment, set identifiers as follows:
Start Identifier—Specifies where and which commands BIMS will check. For example, if
you enter interface*, BIMS checks all command lines that begin with interface.
End Identifier—Specifies where the check will stop. Both the ending symbols # and ! are
legal.
5. Select a configuration file from the list as the Check Target. The two options are: Latest backup
running configuration and Latest backup startup configuration. For more information about
these two configuration file, see “Querying and viewing CPE configuration list.
6. Select a supported vendor from the list.
7. Select one or more CPE classes by clicking Select Class.
8. Describe the rule in the Description text box.
9. Click Yes if you want to enable the Recover function. Also specify the command lines in the
Recover Commands text box. This can be anything you want to recover when the check target
violates the rule. If you enabled the recover function, the contents you enter here can be loaded
in the Fixing commands text box automatically.
98 Compliance Center