About Host Integrity requirements

When you create a new Host Integrity policy, decide which type of requirements to add.
Each requirement specifies the following items:
  • What conditions to check
    For example, a requirement would check whether the latest set of virus definitions is installed on the client computer.
  • What remediation actions the client takes if the client fails to pass the condition's requirements
    For example, the remediation action can include a URL where the client can download and install the missing virus definitions.
The following table lists the types of requirements you can use.
Requirement types for Host Integrity policies
Type
Description
Predefined requirements
Use a predefined requirement to check that a specific application or file is installed and runs on the client. A predefined requirement checks for the status of any of the following types of applications: antivirus software, antispyware software, a firewall, a patch, or a service pack. For example, a patch requirement checks that the client computers run a specific operating system patch.
If the predefined requirement does not have enough detail, add a custom requirement and write a script. See:
Custom requirements from templates
Templates are predefined custom requirements that Symantec wrote for commonly performed tasks. For example, the client can check that a password has been changed in the last 42 days. You can also use the templates as a basis for writing a custom requirement script.
Template requirements are available through the Host Integrity policy LiveUpdate service. You must first set up LiveUpdate to download the Host Integrity templates to the management server. See:
Custom requirements
Use a custom requirement if neither a predefined requirement nor the templates provide the kind of check that you need. Custom requirements include the same fields as predefined requirements, but provide more flexibility. For example, you can include an antispyware application that is not included in the predefined list of antispyware applications.
You can simplify the management of required applications by including similar applications in one custom requirement. For example, you can include Internet browsers such as Internet Explorer and Mozilla Firefox in one requirement. See:
More information