Submit a ticketCall us

Get a crash course on Network Monitoring delivered right to your inbox
This free 7-day email course provides a primer to the philosophy, theory, and fundamental concepts involved in IT monitoring. Lessons will explain not only how to perform various monitoring tasks, but why and when you should use them. Sign up now.

Home > Success Center > Network Topology Mapper (NTM) > Network Topology Mapper (NTM) Documentation > NTM Administrator Guide > Use NTM for an ad hoc compliance report

Use NTM for an ad hoc compliance report

Table of contents
No headers

Updated: April 10, 2017

You may need to produce a report for specific compliance audits. In such cases, you could schedule a scan of your network for the audit date, providing you with a current snapshot.

For example, to demonstrate for auditors that your network complies with PCI DSS, you would schedule a scan and then, based on the results, print an inventory report (Reports > New Report > Inventory Report).

Last modified
06:35, 10 Apr 2017

Tags

Classifications

Public