Updated on 2022-12-05 GMT+08:00

Verifying the CBH System configurations

After the instance specifications are changed, log in the CBH system as system administrator admin to verify system configuration consistence for each module in the navigation pane of the CBH system.

You need to verify system configurations in the department, user, resource, policy, ticket, audit, operation, and system modules. For more details, see Table 1

Table 1 System configuration verification

Level 1 Module

Level 2/3 Module

Verification Item



Department level, department name, number of users, and number of hosts.



Number of users and basic information about each user, such as the login name, user name, status, role, and department.

User Group

Number of user groups, user group names, and group members.


Role configuration.



Number of managed hosts and basic information about each managed host, including the host name, host address, port number, protocol type, OS type, and number of accounts.

Application Publish

  • Number of applications, names, addresses, associated hosts, and department of each application.
  • Number of application servers, names, addresses, types, and department of each application server.


  • Number of accounts and basic information about each account, including the account name, related resources, host or application address, port number, and department.
  • Whether accounts can be used. You can select accounts in batches and click Verify to check whether the selected accounts can be used to log in to the system.

Account Group

Number of account groups, account group names, members in an account group, and number of members in an account group.


Host label

Number of labels of managed hosts, such as the number of labels, names, and labeled hosts.

Application Label

Verify the configuration information about the number of tags, names, and tagged application resources released by the application.


ACL Rules

Number of ACL rules and basic information about each ACL rule, such as rule name, status, associated users, and associated accounts.

Cmd Rules

  • Number of policies, policy names, actions, and associated command sets.
  • Number of command sets, names, commands, and parameters.

Chpwd Rules

Number of policies and basic information about each policy, such as policy names, status, execution modes, and password change mode.


System Report

Auto Send configuration

Ops Report

Auto Send configuration


ACL Ticket

Basic information about the authorization ticket, including ticket number, status, and application time



System login security configuration, including user locking, policy password, web login, and SSH client login.


Email and SMS gateway configuration.


AD domain, RADIUS, and LDAP authentication configurations.


Basic settings and approval process of tickets.


Alarm channel and alarm level (severity)

Storage Mgmt

Auto deletion.

Log Backup

Remote backup to the Syslog server and remote backup to the FTP/SFTP server.


Automatic configuration backups.