Network Config Policy
Overview
NCCM (network configuration and compliance management) Policies allow you to define proactive rules that monitor configuration changes or enforce network actions on your managed network devices. These policies help in detecting unauthorized config changes, enforcing security standards, and triggering automated responses like email/SMS alerts or remediation scripts.
Once you configure your NCCM devices(newlink), you can create a policy to track changes, compare versions, or trigger alerts/actions based on set conditions.
Navigation
Go to Menu and select Settings . After that, go to Policy Settings
. Then, select Network Config Policy.

Create NCCM Policy
Click on Create Policy to launch the configuration page.

Fill in the fields as described below:
| Field | Description |
|---|---|
| Policy Name | Provide a name that clearly defines the purpose of the policy. |
| Tag | Add tags to categorize and filter policies more efficiently. |
| Evaluate On | Choose between Config Conflict or Failed Action. |
If Evaluate On is set to Config Conflict, you'll be able to choose from available comparison types in the Conflict Detection For dropdown (e.g., BAseline-Running Conflict, Startup-Running Conflict, Running Conflict, Startup Conflict). If set to Failed Action, you will configure the type of Action monitored on the NCCM device.
Set Conditions
| Field | Description |
|---|---|
| Conflict Detection For / Action Type | Depending on your selection in Evaluate On, you will either select change types or NCCM actions like Backup, Upload, Execute Script, etc. |
| Source Filter | Choose source filter from the drop-down list. You can filter by Network Config Device, Group or Tag. |
| Source | Populated based on your Source Filter. |
| Severity | Choose alert severity: Critical, Major, or Warning. |
Set Alert Message
| Field | Description |
|---|---|
| Subject | Modify the subject-line for the alert message. |
| Message | Modify the alert message from here. |
For a list of default supported Macros to modify the default set message, Please visit: Alert Macros
Notification
Configure how alerts from this policy are sent to your team.
| Field | Description |
|---|---|
| Notify | There are multiple ways you can populate this field: @ to mention a registered username, email address, or Microsoft Teams handle.# to select a user profile for alert notification.! to select a Syslog Forwarder or SNMP Trap Forwarder integration profile and forward the alert to the configured external destination. |
| Play Sound | Activate this toggle to enable sound notifications when an alert is triggered. |
Take Action
Motadata ObserveOps allows you to execute scripts or commands automatically as a response to policy violations. You can select actions from the drop-down menu.
Declare Incident
| Field | Description |
|---|---|
| Select Integration Profile to Trigger | Choose an Integration profile to be executed from the dropdown when the chosen alert severity is triggered. |
| Create Integration Profile | Select this button to start creating a new Integration profile that you might want to assign to the policy you are creating. |
Once all fields are configured, click Create Policy to apply the policy.