New Configuration Compliance reporting in Unimus 2.8.0
With Unimus 2.8, we are expanding the platform with one of our most significant recent additions: Compliance reporting. The new module gives network and security teams a practical way to validate configurations and live runtime state against internal policies, golden standards, and compliance requirements, while improving visibility, governance, and operational stability.
Unimus 2.8 is a major release focused on helping organisations strengthen security, governance, and operational resilience. At the centre of the release is the new Compliance module, which enables automated validation of both device configurations and runtime state. This helps teams detect configuration drift, identify policy violations, and maintain continuous oversight of network infrastructure before issues turn into security gaps or operational problems.
The new Compliance capability allows users to define golden configuration baselines, internal policies, and industry-aligned rules, then automatically check devices against them at scale. Compliance logic can range from simple text-based checks to more advanced multi-condition rules using regular expressions and logical operators. Unimus can validate the latest configuration backups as well as live device output collected through Mass Config Push / Pull workflows, giving teams a clearer view of both intended configuration and actual runtime state.
Alongside the new Compliance module, Unimus 2.8 also delivers UI and workflow improvements, bug fixes, and broader device support, making the platform even more capable for diverse multi-vendor environments. Together, these enhancements make Unimus 2.8 an important step forward for organisations looking to improve network control, audit readiness, and cyber resilience.
.png)







