Unauthorized configuration changes often wreak havoc to the business continuity and hence detecting changes is a crucial task. Detection should be real-time to have effective control. Network Configuration Manager offers real-time configuration change detection.
Most of the devices generate syslog messages whenever their configuration undergoes a change. By listening to these messages, it is possible to detect any configuration change in the device. Network Configuration Manager leverages this change notification feature of devices to provide real-time change detection and tracking.
Real-time tracking comes in handy for administrators to keep track of the changes being made and to detect any unauthorized changes. By enabling this, administrators can
- Capture configuration as and when changes happen
- Get real-time notifications on change detection
- Find information on who carried out the change and from where (the IP address)
- Detect unauthorized changes on real-time