Change-based Retrieval
One of the key capabilities of Security Manager is its change monitoring. Security Manager actively monitors your network and security devices so that when a configuration change occurs, Security Manager immediately detects it and retrieves it. The record of the change appears in the list of revisions in Security Manager on the Revisions page, where you can open and analyze it for compliance or reports.
- For Check Point devices, configuration retrieval is change-based, and optionally, manual.
- For all devices except Check Point, change-based retrieval is enabled as a default setting. It is not recommended that you disable this setting.
- Security Manager begins monitoring for change as soon as you set up monitoring for each device.
- All retrieved configurations appear in Security Manager on the Changes page, and indicates the type of change that triggered the retrieval is indicated.
- You can verify that change-based retrieval is enabled for a device in the Change Monitoring section of the device properties.