<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Configuration Change Control in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/configuration-change-control/m-p/3839554#M925737</link>
    <description>&lt;P&gt;I'm setting up some 2110 devices using FMC for an organization that has a specific change control policy that I don't know how to address with FirePower. The policy is to set the initial configuration as a baseline, and periodically audit the active configuration against the baseline configuration to detect unauthorized changes. Does anyone know if this is supported?&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 17:02:53 GMT</pubDate>
    <dc:creator>Cory Anderson</dc:creator>
    <dc:date>2020-02-21T17:02:53Z</dc:date>
    <item>
      <title>Configuration Change Control</title>
      <link>https://community.cisco.com/t5/network-security/configuration-change-control/m-p/3839554#M925737</link>
      <description>&lt;P&gt;I'm setting up some 2110 devices using FMC for an organization that has a specific change control policy that I don't know how to address with FirePower. The policy is to set the initial configuration as a baseline, and periodically audit the active configuration against the baseline configuration to detect unauthorized changes. Does anyone know if this is supported?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:02:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-change-control/m-p/3839554#M925737</guid>
      <dc:creator>Cory Anderson</dc:creator>
      <dc:date>2020-02-21T17:02:53Z</dc:date>
    </item>
    <item>
      <title>Re: Configuration Change Control</title>
      <link>https://community.cisco.com/t5/network-security/configuration-change-control/m-p/3840272#M925738</link>
      <description>So you can definitely monitor/audit configuration changes using FMC. This can be accomplished in FMC under System-&amp;gt;Monitoring-&amp;gt;Audit. From here you can also generate reports. As for detecting against the baseline I am not 100% sure if you can accomplish this. Worst case you can schedule reports. However, my question to the customer would be why would individuals that should not be allowed to make config changes have full rights. You also can look into rbacl by giving different individuals different roles for managing your device. For example, Security Analyst (read-only). HTH!</description>
      <pubDate>Wed, 17 Apr 2019 12:50:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-change-control/m-p/3840272#M925738</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-04-17T12:50:56Z</dc:date>
    </item>
    <item>
      <title>Re: Configuration Change Control</title>
      <link>https://community.cisco.com/t5/network-security/configuration-change-control/m-p/3840505#M925739</link>
      <description>&lt;P&gt;You can export the config once the baseline is setup then do manual exports when you need to audit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FPMC, Heath Monitor, Advanced Troubleshooting, Threat Defense CLI, Show Run.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Copy config output to a text file then later you can use a program like ExamDiff to compare the changes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its not automated but its quick enough to do in a few minutes.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2019 16:37:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-change-control/m-p/3840505#M925739</guid>
      <dc:creator>kurttcot</dc:creator>
      <dc:date>2019-04-17T16:37:59Z</dc:date>
    </item>
  </channel>
</rss>

