We use NSO to collect device inventory and configuration (using show commands). Policies are then executed on the device CLI config and violations are generated along with device CLI commands to remediate the violations. Currently we execute these CL...