Instance Security Hardening Settings
-
- UpdatedFeb 1, 2024
- 3 minutes to read
- Washington DC
- Platform Security
The Instance Security Hardening Settings content contains detailed descriptions and compliance values for the security-related system properties and plugins in the Now Platform. You can set most of these properties in the Hardening Compliance Configuration page in the Instance Security Center.
Instance Security Center (ISC) has reached the end of sales as of September 2024, and is no longer supported or available for new activation.
ServiceNow Security Center (SSC) is the recommended solution going forward. For more information, see Instance Security Center to ServiceNow Security Center migration.Overview and purpose
The Instance Security Center calculates a Daily Compliance Score, expressed as a percentage. It is based on how compliant your current instance security settings are with the compliance values in Instance Security Hardening Settings.
Consult the Instance Security Hardening Settings whenever you set or update security-related properties, even if some of the compliance values may not be suitable for your instance. When you are updating these properties, ensure that the instance continues to behave as expected. Consult with the appropriate internal personnel who have the expertise to determine the security impacts.
Other resources
Instance security hardening tables
- Security configurations table
Records in the Security Configurations [isc_security_configurations] table contain the details of a security configuration. Within a record you can find the description of a configuration, its compliance state and other important details.
Use the security configurations record to see all the properties and dependencies you need to configure to make your configuration compliant in one place.
Within the security configurations record you can see the related security dependency and dependency groups records associated with this configuration.
- Security dependencies table
- Records on the security dependencies [isc_security_dependencies] table define the inbound criteria and outbound criteria, as well as a recommended type. This type defines how the dependency displays in the instance security center.
- Dependency groups table
- Use records on the dependency groups [isc_dependency_groups] table to group multiple dependencies together. All the dependencies in a group must be compliant in order for the group to be considered compliant.
Related Content
- Instance Security Center to ServiceNow Security Center migration
Learn the key differences when migrating from Instance Security Center (ISC) to ServiceNow Security Center (SSC).
- Monitor security events
Analyze the event metrics in your instance so that you can identify and prevent potential security events.
- Check the daily compliance score and configure security property settings
Review the Daily Compliance Score metric and security configuration properties to see if your instance complies with the suggested security requirements. You can affect the daily compliance score by updating non-compliant security properties in the Hardening Compliance Configurations page.
- Scan for incorrect security definitions
Run the Auditor to scan your instance and find incorrect security definitions. It provides findings you can correct to help improve the security posture of your instance.
- Monitor instance metrics
Monitor user, export, authentication, email, and antivirus metrics for your instance. For example, you can monitor your email security by checking metrics for spam, external emails, and inbound emails from untrusted and trusted domains for your instance. Analyze these metrics to look for anomalous security behaviors that are related to activities that take place in your instance.
- Activate the ISC Virtual Agent interface
If you have the admin role, you can activate the ISC Virtual Agent Conversations plugin (com.glide.isc_virtualagent). Activating this plugin installs the Virtual Agent and Natural Language Understanding (NLU) content packs, providing Virtual Agent access from the Instance Security Center.
- Other settings and security resources
This section contains security properties you set outside of the Instance Security Center, and also contains other security-related resources.