Policy Compliance Results
Policy Compliance Results: Understanding and Acting on Network Configuration Validation
Section titled “Policy Compliance Results: Understanding and Acting on Network Configuration Validation”Policy Compliance Results provide comprehensive visibility into how well your network devices conform to organizational standards and regulatory requirements. The compliance reporting interface displays pass/fail status for each policy assignment, drill-down capability to per-device results, and detailed rule-level information enabling targeted remediation of non-compliant configurations.
Understanding how to read compliance reports, interpret results, and act on compliance failures is essential for maintaining configuration standards across your network infrastructure. This guide covers accessing compliance results, interpreting various result formats, analyzing failures, and establishing effective remediation workflows.
Understanding Compliance Results
Section titled “Understanding Compliance Results”What Compliance Results Provide
Section titled “What Compliance Results Provide”Assignment-level overview: High-level compliance status for each policy assignment showing overall pass/fail rates, affected device counts, and last execution timestamps.
Device-level detail: Per-device compliance status identifying exactly which devices pass or fail each policy assignment, enabling targeted remediation efforts.
Rule-level granularity: Individual policy rule results showing which specific rules passed or failed, providing precise information about non-compliant configuration elements.
JSON output: Complete evaluation results in structured JSON format, displaying policy methods, configuration strings evaluated, and pass/fail status for troubleshooting and auditing.
Historical tracking: Compliance trend data over time showing improvement or degradation in configuration adherence across device populations.
Export capabilities: Compliance data exportable for external reporting, audit documentation, and integration with other management systems.
How Compliance Results are Generated
Section titled “How Compliance Results are Generated”Compliance results are produced when compliance jobs execute:
- Job initiation: Scheduled task or manual trigger starts compliance job
- Device identification: Job retrieves all devices in policy assignment scope
- Configuration retrieval: Latest configuration file loaded for each device (specified command)
- Policy evaluation: Each rule in policy definition evaluated against configuration
- Result recording: Pass/fail status recorded for each rule and overall evaluation
- Report generation: Results compiled into compliance report accessible via UI
Results are stored in database with timestamps, enabling historical analysis and trend identification.
Accessing Compliance Results
Section titled “Accessing Compliance Results”Navigate to Compliance → Policy Compliance to access the compliance results interface.
Policy Compliance Main View
Compliance Main View
Section titled “Compliance Main View”The main view provides high-level compliance statistics for all policy assignments.
Main View Components
Section titled “Main View Components”Summary statistics:
- Total number of policy assignments configured
- Overall compliance percentage across all assignments
- Total devices evaluated
- Last update timestamp
Assignment list: Each row represents one policy assignment showing:
- Assignment name
- Policy definition name
- Scope (device, category, or tag)
- Device count in scope
- Pass count and percentage
- Fail count and percentage
- Last execution timestamp
- Expand/collapse control for detailed view
Policy Compliance Assignment Summary
Expanding Assignment Details
Section titled “Expanding Assignment Details”Click the expand icon next to any assignment to view detailed information:
Expanded view displays:
- Complete assignment configuration (scope, command, policy definition)
- Device-by-device compliance status
- Quick action buttons:
- View Details: Navigate to detailed results page
- View Definition Code: Display policy definition content
- Edit Assignment: Modify assignment configuration
Expanded Assignment View
Detailed Compliance Results
Section titled “Detailed Compliance Results”Click View Details on any assignment to access the detailed results page.
Results Page Layout
Section titled “Results Page Layout”Header section:
- Assignment name and description
- Policy definition name
- Scope information
- Last evaluation timestamp
- Summary statistics (total devices, pass/fail counts, percentage)
Device results table:
- Device name and IP address
- Overall status (PASS/FAIL/NOT EVALUATED)
- Last evaluation timestamp
- Expand control for rule-level details
- Action button to show result output
Detailed Compliance Results Page
Device-Level Results
Section titled “Device-Level Results”Each device in the results table displays overall compliance status:
PASS (Green indicator):
- All policy rules passed validation for this device
- Device configuration meets compliance requirements
- No action needed
FAIL (Red indicator):
- One or more policy rules failed validation
- Device configuration violates compliance requirements
- Remediation required
NOT EVALUATED - CONFIG NOT FOUND (Gray indicator):
- Configuration file for specified command doesn’t exist
- Device backup may have failed or command not executed
- Investigate backup status before remediation
Rule-Level Results
Section titled “Rule-Level Results”Expand any device to view individual rule results:
Rule information displayed:
- Policy method used (e.g.,
must_match_single_string) - Comment/description from policy definition
- Configuration string or pattern evaluated
- Result status (pass/fail)
- Raw result (true/false)
- Configuration ID reference
Result interpretation:
- pass/true: This specific rule passed validation
- fail/false: This specific rule failed validation
- Review failed rules to identify specific non-compliant configuration elements
Per-Device Rule Results
Understanding Result Output
Section titled “Understanding Result Output”Show Result Output
Section titled “Show Result Output”Click Show Result Output button for any device to view complete JSON evaluation results.
Result Output JSON
The result output is a JSON representation of the policy evaluation, containing:
- Each policy rule with its method, comment, and configuration string
- Individual rule results (pass/fail, true/false)
- Configuration ID indicating which config file was evaluated
- Overall evaluation result and reason
Successful Compliance Output
Section titled “Successful Compliance Output”Example of device passing all policy rules:
{ "0": { "policyMethod": "must_match_single_string", "comment": "Description: must_match_single_string SNMP Policy", "policyString": "snmp-server host 1.1.1.1 TESTCOMMUNITY", "result": "pass", "resultRaw": true, "configId": 9 }, "eval_result": "PASS", "eval_result_raw": true, "eval_result_reason": "All policy methods passed"}Key elements:
"0": Rule index (first rule in policy definition)policyMethod: Validation method usedcomment: Description from policy definitionpolicyString: Configuration string evaluatedresult: “pass” indicates this rule passedresultRaw: true indicates boolean passconfigId: Database reference for configuration fileeval_result: “PASS” indicates overall complianceeval_result_reason: Human-readable result explanation
Interpretation: This device has the required SNMP configuration. All policy rules passed. Device is compliant.
Failed Compliance Output
Section titled “Failed Compliance Output”Example of device failing one or more policy rules:
{ "0": { "policyMethod": "must_match_single_string", "comment": "Description: must_match_single_string SNMP Policy", "policyString": "snmp-server host 1.1.1.1 TESTCOMMUNITY", "result": "pass", "resultRaw": true, "configId": 9 }, "1": { "policyMethod": "must_match_single_string", "comment": "Description: must_match_single_string SNMP Policy", "policyString": "snmp-server host 1.1.1.1 NOTCOMMUNITY", "result": "fail", "resultRaw": false, "configId": 9 }, "eval_result": "FAIL", "eval_result_raw": false, "eval_result_reason": "1 policy methods failed"}Key elements:
- Rule “0” passed (result: “pass”, resultRaw: true)
- Rule “1” failed (result: “fail”, resultRaw: false)
eval_result: “FAIL” indicates overall non-complianceeval_result_reason: “1 policy methods failed” identifies failure count
Interpretation: This device has first SNMP configuration but is missing second required configuration. Rule 1 failed because snmp-server host 1.1.1.1 NOTCOMMUNITY doesn’t exist in device configuration. Device requires remediation.
Missing Configuration Output
Section titled “Missing Configuration Output”Example when configuration file not found:
{ "result": "NOT EVALUATED - CONFIG NOT FOUND"}Interpretation: Configuration file for specified command doesn’t exist for this device. This isn’t a policy failure—it’s a data availability issue.
Common causes:
- Device backup failed or hasn’t completed
- Command specified in assignment doesn’t match command in device command group
- Command not enabled or not executing during backups
- Configuration file was deleted or purged
Resolution: Verify device is backing up successfully and command is executing before investigating policy compliance.
Interpreting Compliance Results
Section titled “Interpreting Compliance Results”Overall Compliance Percentage
Section titled “Overall Compliance Percentage”Calculation: (Devices passing / Total devices) × 100
Example: Assignment with 100 devices where 85 pass:
- Compliance rate: 85%
- 15 devices require remediation
Good compliance: >95% indicates strong configuration management and limited drift.
Moderate compliance: 80-95% suggests some configuration drift requiring attention.
Poor compliance: < 80% indicates significant issues requiring immediate remediation and root cause analysis.
Result Trends
Section titled “Result Trends”Monitor compliance percentages over time to identify:
Improving trends: Percentage increasing indicates successful remediation efforts and reduced configuration drift.
Declining trends: Percentage decreasing suggests:
- New devices added without proper configuration
- Configuration changes violating policies
- Policy definition not matching current standards
- Backup or evaluation issues
Stable low compliance: Persistent low compliance may indicate:
- Policy definition issues (too strict, doesn’t match reality)
- Systematic configuration problems requiring large-scale remediation
- Devices don’t support configurations policy requires
Analyzing Failure Patterns
Section titled “Analyzing Failure Patterns”Systematic failures: All or most devices failing same rule indicates:
- Policy definition error (rule doesn’t match actual config format)
- Legitimate widespread non-compliance requiring remediation campaign
- Command output format changed (vendor firmware update)
Isolated failures: Few devices failing while most pass indicates:
- Legitimate configuration drift on specific devices
- Devices with unique requirements outside policy scope
- Recent configuration changes not yet compliant
Alternating failures: Devices passing/failing different rules suggests:
- Multiple configuration variations across device population
- Need for more flexible policy (wildcards, regex)
- Legacy vs. modern configuration standards
Remediation Workflow
Section titled “Remediation Workflow”Step 1: Identify Non-Compliant Devices
Section titled “Step 1: Identify Non-Compliant Devices”From compliance results, identify devices showing FAIL status.
Prioritization criteria:
- Critical devices (core routers, firewalls) remediate first
- Security-related failures take precedence over operational ones
- Devices with multiple failures vs. single failures
- Production vs. lab devices
Export failure list: Document devices requiring remediation for tracking and assignment.
Step 2: Analyze Failure Reasons
Section titled “Step 2: Analyze Failure Reasons”For each failed device, review rule-level results and JSON output to determine:
What failed: Which specific policy rules didn’t pass Why it failed: Configuration missing, incorrect, or in wrong format Impact: Security vs. operational vs. cosmetic non-compliance Scope: Single device issue vs. systematic problem
Example analysis:
Device: Router-Core-01 Status: FAIL Failed rule: “snmp-server host 192.168.1.10 public” Reason: SNMP community string is “public” instead of required secure community Impact: Security vulnerability (weak SNMP community) Scope: Isolated to this device (other routers pass) Action: Change SNMP community string to secure value
Step 3: Determine Root Cause
Section titled “Step 3: Determine Root Cause”Investigate why non-compliance exists:
Configuration never set: Device built without proper standards application Configuration changed: Device was compliant but configuration modified Configuration drift: Gradual changes over time moved device out of compliance Policy mismatch: Policy doesn’t reflect actual operational requirements Device limitation: Device doesn’t support required configuration
Root cause determines remediation approach:
- Never set → Apply configuration
- Changed → Restore previous configuration or apply correct configuration
- Drift → Re-apply standards and investigate change control process
- Policy mismatch → Update policy definition, not device
- Device limitation → Exception documentation, policy scope adjustment
Step 4: Plan Remediation
Section titled “Step 4: Plan Remediation”Individual device remediation:
- Log into device
- Apply required configuration changes
- Verify changes don’t disrupt operations
- Save configuration
Bulk remediation (multiple devices, same issue):
- Create configuration snippet in rConfig
- Test snippet on single device
- Deploy snippet to affected devices via Snippet Deployment
- Monitor for issues
Automated remediation (future state):
- Script configuration corrections
- Integrate with change management workflow
- Schedule during maintenance windows
- Validate post-change
Step 5: Execute Remediation
Section titled “Step 5: Execute Remediation”Apply configuration changes to bring devices into compliance.
Best practices:
- Test on lab or non-critical device first
- Schedule changes during maintenance windows for critical devices
- Have rollback plan ready
- Document changes in change management system
- Notify relevant teams before changes
Configuration application methods:
- Manual CLI configuration
- rConfig Snippet Deployment
- Configuration management tools (Ansible, Puppet)
- Vendor-specific management platforms
Step 6: Verify Remediation
Section titled “Step 6: Verify Remediation”After applying changes, verify compliance:
- Trigger device backup: Ensure new configuration captured in rConfig
- Run compliance check manually: Re-evaluate device against policy
- Review results: Verify device now shows PASS status
- Check rule details: Confirm previously failed rules now pass
- Document resolution: Record what was changed and why
If still failing after remediation:
- Review configuration was actually applied and saved
- Verify configuration syntax matches policy definition exactly
- Check for case sensitivity or whitespace issues
- Confirm backup captured new configuration
- Re-run backup if necessary before re-checking compliance
Step 7: Document and Track
Section titled “Step 7: Document and Track”Remediation documentation should include:
- Devices remediated
- Configuration changes applied
- Date and time of changes
- Administrator who performed remediation
- Verification that compliance restored
- Any exceptions or special considerations
Tracking metrics:
- Time to remediate per device
- Compliance improvement percentage
- Recurring failures (same devices/rules failing repeatedly)
- Root cause patterns
Reporting and Exporting
Section titled “Reporting and Exporting”Compliance Dashboard
Section titled “Compliance Dashboard”Main view provides at-a-glance dashboard of compliance posture:
Key metrics displayed:
- Total assignments
- Overall compliance percentage
- Devices evaluated
- Assignments with failures
Visual indicators: Color-coded status (green/red/gray) enables quick identification of problem areas.
Exporting Compliance Data
Section titled “Exporting Compliance Data”Export compliance results for:
- External reporting to management
- Audit documentation
- Integration with CMDB or ticketing systems
- Historical analysis in BI tools
- Compliance trend tracking
Export methods:
- CSV export from compliance results page
- API access to compliance data
- Database queries for custom reports
- Scheduled report generation
Scheduled Compliance Reports
Section titled “Scheduled Compliance Reports”Automate compliance reporting:
Weekly summary reports: Email to operations team with compliance percentages and failure counts.
Monthly management reports: Executive summary of compliance trends, improvement areas, persistent issues.
Audit reports: Comprehensive compliance documentation for regulatory audits with historical trend data.
Alert-based reports: Immediate notification when compliance drops below threshold or critical devices fail.
Best Practices
Section titled “Best Practices”Regular Review Cadence
Section titled “Regular Review Cadence”Daily: Review failed devices from automated compliance checks, address critical failures promptly.
Weekly: Analyze compliance trends, identify patterns in failures, prioritize remediation efforts.
Monthly: Generate management reports, review policy effectiveness, update policies as needed.
Quarterly: Comprehensive compliance audit, policy definition review, remediation workflow optimization.
Proactive Monitoring
Section titled “Proactive Monitoring”Set compliance thresholds: Define acceptable compliance percentages (e.g., >95% for production).
Alert on threshold violations: Automated alerts when compliance drops below acceptable levels.
Monitor compliance trends: Identify declining compliance before it becomes critical.
Track remediation velocity: Measure how quickly failures are resolved.
Policy Maintenance
Section titled “Policy Maintenance”Review policy effectiveness: Are policies catching actual non-compliance or generating false positives?
Update policies as standards evolve: Ensure policies reflect current organizational requirements.
Remove obsolete policies: Clean up policies no longer relevant to compliance needs.
Test policy changes: Validate policy updates before broad application to avoid widespread false failures.
Remediation Workflow
Section titled “Remediation Workflow”Establish clear ownership: Who is responsible for remediating different device types or failure types?
Define SLAs: Maximum time to remediate failures based on severity (critical vs. informational).
Track remediation: Maintain visibility into remediation progress and blockers.
Prevent recurrence: Identify why failures occurred and implement preventive measures.
Documentation
Section titled “Documentation”Document exceptions: Some devices may legitimately deviate from policies—document why.
Maintain remediation history: Track what was changed, when, and by whom.
Record policy decisions: Why specific policies exist, what compliance they enforce.
Create runbooks: Step-by-step remediation procedures for common failures.
Troubleshooting Compliance Results
Section titled “Troubleshooting Compliance Results”All Devices Failing Same Rule
Section titled “All Devices Failing Same Rule”Symptom: Every device in assignment fails identical policy rule.
Possible causes:
- Policy definition syntax error or incorrect string
- Case sensitivity issue
- Extra/missing whitespace in policy string
- Command output format different than policy expects
Resolution:
- Review policy definition carefully
- Compare policy string to actual device configuration
- Test policy against known-good device manually
- Adjust policy definition if needed
- Re-run compliance check after policy update
Inconsistent Results Between Runs
Section titled “Inconsistent Results Between Runs”Symptom: Same device passes one run, fails next run without configuration changes.
Possible causes:
- Policy definition was modified between runs
- Dynamic content in configuration (timestamps, uptime)
- Backup timing issues (evaluating partial backup)
- Database/file system issues
Resolution:
- Check policy definition change history
- Review device configuration history for changes
- Verify policy doesn’t evaluate dynamic content
- Ensure backups complete before compliance checks run
- Check database and file system integrity
”NOT EVALUATED” for Some Devices
Section titled “”NOT EVALUATED” for Some Devices”Symptom: Some devices show “NOT EVALUATED - CONFIG NOT FOUND” while others in same assignment evaluate normally.
Cause: Configuration files missing for affected devices.
Resolution:
- Verify affected devices backing up successfully
- Check backup logs for errors on those devices
- Confirm command exists in device command groups
- Ensure command enabled and executing
- Run manual backup for affected devices
- Re-run compliance check after successful backups
Compliance Job Not Running
Section titled “Compliance Job Not Running”Symptom: No compliance results appear, last execution timestamp not updating.
Possible causes:
- Scheduled task not configured or disabled
- Horizon queue not processing jobs
- Assignment disabled
- Compliance job failing silently
Resolution:
- Verify scheduled task exists and is enabled
- Check Horizon is running and processing jobs
- Confirm assignment enabled status
- Review Horizon failed jobs for compliance job failures
- Check application logs for errors
- Run manual compliance check to validate functionality
Unexpected PASS Results
Section titled “Unexpected PASS Results”Symptom: Devices show PASS status but manual review indicates non-compliance.
Possible causes:
- Policy definition too lenient (wildcards matching too broadly)
- Wrong command selected (evaluating wrong configuration)
- Policy method doesn’t match intent
- Cached results (viewing old results)
Resolution:
- Review policy definition for correctness
- Verify command selection matches policy requirements
- Confirm policy method appropriate for validation
- Force new compliance check to eliminate caching
- Test policy against known non-compliant device
Related Documentation
Section titled “Related Documentation”- Compliance Overview - Understanding the compliance system
- Policy Definitions - Creating compliance rules
- Policy Assignments - Linking policies to devices
- Scheduled Tasks - Automating compliance checks
- Configuration Snippets - Bulk remediation tool
Quick Reference
Section titled “Quick Reference”Result Status Meanings
Section titled “Result Status Meanings”| Status | Meaning | Action Required |
|---|---|---|
| PASS | All rules passed | None - device compliant |
| FAIL | One or more rules failed | Investigate and remediate |
| NOT EVALUATED | Config file not found | Fix backup/command issues |
JSON Result Fields
Section titled “JSON Result Fields”| Field | Description |
|---|---|
| policyMethod | Validation method used |
| comment | Description from policy definition |
| policyString | Configuration string evaluated |
| result | ”pass” or “fail” |
| resultRaw | true (pass) or false (fail) |
| configId | Configuration file reference |
| eval_result | Overall result (“PASS” or “FAIL”) |
| eval_result_reason | Human-readable result explanation |
Remediation Workflow Checklist
Section titled “Remediation Workflow Checklist”Review Cadence
Section titled “Review Cadence”- Daily: Address critical failures
- Weekly: Analyze trends, prioritize remediation
- Monthly: Management reporting
- Quarterly: Comprehensive audit, policy review
Summary
Section titled “Summary”Policy Compliance Results provide comprehensive visibility into network device configuration compliance, enabling organizations to identify non-compliant devices, understand specific configuration violations, and systematically remediate issues to maintain configuration standards across the infrastructure.
Key Takeaways
Section titled “Key Takeaways”Multi-level visibility: Compliance reporting spans from high-level assignment summaries through device-level status to granular rule-level results, providing appropriate detail at each organizational level.
Actionable information: JSON result output shows exactly which configurations passed or failed, eliminating guesswork and enabling targeted remediation efforts.
Three result states: PASS (compliant), FAIL (non-compliant), and NOT EVALUATED (data issue) clearly distinguish compliance status from data availability problems.
Remediation workflow: Systematic approach from identifying failures through verifying fixes ensures consistent, documented compliance restoration.
Continuous monitoring: Regular review of compliance results identifies trends, patterns, and recurring issues enabling proactive configuration management rather than reactive troubleshooting.
With comprehensive compliance reporting and systematic remediation workflows, rConfig enables organizations to maintain consistent configuration standards across networks of any size, supporting regulatory compliance, security baselines, and operational excellence.