Change Policy - VMware Carbon Black App Control
- 22 Sep 2024
- 1 Minute to read
- Print
- DarkLight
- PDF
Change Policy - VMware Carbon Black App Control
- Updated on 22 Sep 2024
- 1 Minute to read
- Print
- DarkLight
- PDF
Article summary
Did you find this summary helpful?
Thank you for your feedback
Change Policy - VMware Carbon Black App Control changes the VMware Carbon Black Cloud (Carbon Black CB Defense) policy assigned to each entity that is the result of the saved query supplied as a trigger (or assets selected in the asset table).
NOTE
To use the Change Policy - VMware Carbon Black App Control action, you must successfully configure a VMware Carbon Black Cloud adapter connection.
See Creating Enforcement Sets to learn more about adding Enforcement Actions to Enforcement Sets.
Note:
- Not all asset categories are supported for all Enforcement Actions.
- See Actions supported for Activity Logs, Adapters Fetch History, and Asset Investigation modules.
- See Actions supported for Vulnerabilities.
- See Actions supported for Software.
General Settings
- Action name - The name of this Enforcement Action. The system sets a default name. You can change the name.
- Configure Dynamic Values - Toggle on to enter a Dynamic Value statement. See Creating Enforcement Action Dynamic Value Statements to learn more about Dynamic Value statement syntax.
Required Fields
These fields are required to run the Enforcement Set.
- Policy name - Specify the policy name to be assigned to the endpoint.
Compute Node - The Axonius node to use when connecting to the specified host. For more details, see Connecting Additional Axonius Nodes.
Additional Fields
These fields are optional.
- VMware Carbon Black App Control Domain – The hostname or IP address of the VMware Carbon Black App Control server.
- API Key - Specify an API Key for a user account that has the Required Permissions to perform this action.
- Verify SSL (optional) - Select whether to verify the SSL certificate of the server against the CA database inside of Axonius. For more details, see SSL Trust & CA Settings.
- HTTPS Proxy (optional) - Connect the adapter to a proxy instead of directly connecting it to the domain.
For more details about other Enforcement Actions available, see Action Library.
Was this article helpful?