Your browser does not allow storing cookies. We recommend enabling them.


Chapter 8 Managing Host Data

Tectia Manager collects all relevant information from the managed hosts, for example on the hardware, operating system, IP address, installed Secure Shell software and their configurations. The information is collected from all hosts where a Management Agent has been installed, and the Management Agents send the data over to the Management Server for storing into the Management Database.


The management operations are only performed on the supported Tectia and OpenSSH software, eventhough Tectia Manager can also detect legacy and other third-party Secure Shell software on the managed hosts.

Since the number of hosts can be large, the hosts can be arranged into groups according to their characteristics (for example the operating system, managed SSH software or location). This makes it easier to manage the different types of hosts.

The administrators can create different views into the host data to highlight different aspects of the host details. The host views and host groups are typically defined during the deployment of the Management Server and maintained by the Tectia Manager superuser.

The basis for all host management operations are the Host Views. The administrator can create more host views according to criteria relevant in host grouping (for example: Operating System), and then create a dedicated host group for each criteria item (for example: Linux, Unix, Windows). The host grouping is also used as the basis for the administrator access rights.

The workflow of managing host data

Figure 8.1. The workflow of managing host data

Once the actual hosts have been assigned to the groups, the setup is ready for management of the SSH software on the hosts.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now