Setting Up the Asset for ICS Integrity Features - PAS ICS Integrity - 7.3 - Installation & Upgrade - Intergraph

ICS Integrity Installation Guide

Language
English
Product
PAS ICS Integrity
Subproduct
ICS
Search by Category
Installation & Upgrade
PAS Version
7.3

If you are installing and configuring ICS Integrity, you need to import the PAS Cyber Integrity asset model and create an asset using this model. Then, you can configure the specific ICS Integrity features you want to use. This section describes this initial ICS Integrity set up.

To import the PAS Cyber Integrity asset model and create the asset:

  1. On the Admin Utility Welcome window, click the Asset Models link.

  2. Click the Browse button to locate the model files provided by PAS, typically, C:\Program Files (x86)\PAS\Integrity\DataCollector\Asset Models.

    The Data Collector cannot access files on mapped drives. Use only Universal Naming Convention (UNC) paths.

  3. From the Available asset model(s) list, click PAS ICS Integrity and then click the [>] button to move the asset model to the Asset model(s) to be imported list.

    The Version column indicates the availability of the asset model. If the model is listed as Not Available, you cannot add it to the Asset models to be imported list.

  4. Click the Import button to import the files into Integrity.

    After importing an asset model, you can check the MOC section in the Windows Event Viewer to verify that no errors occurred during the import. When using multiple database mode, the Import button imports the model into all projects.

  5. Add an asset for the PAS Cyber Integrity asset model by completing the following steps:

    1. On the Admin Utility window, click the Asset Configuration link.

    2. Click Add at the bottom of the list of assets.

    3. In the Asset Name field, type CyberIntegrity.

    4. In the Asset model field, select PAS Cyber Integrity, and then click OK.

Now that the PAS Cyber Integrity asset exists, you can configure ICS Integrity features you want to use. First, continue with the remaining sections of this guide to complete your Integrity installation and configuration. Then, you can add the ICS Integrity features you want:

  • Recon to include Windows computer assets.

  • Vulnerability Management and Patch Management for your assets.

  • Workflows to use cases for change management and the integration with other features.

  • Baselines to identify deviations from standard configurations.

  • Policies to audit object properties against a desired standard.

  • Inventory to search and browse inventory items for computers, network devices, and industrial control systems.

  • Event Analytics to monitor critical Windows systems.

  • Topology to provide Risk Analytics visualizations.

For more information about configuring these features, see the Integrity Administration Guide.