Network configuration software is used to manage the devices and components of a networked computer system. It includes functions for device discovery, configuration, inventory maintenance, backup of configuration details, ensuring compliance for changes, configuration changes, logging user activity and performing automated network functions.

Discovering devices on the network is the first step in defining the network and applying configuration management functions. The software automatically identifies connected devices and their hardware properties.

Configuration of network devices can be performed remotely by configuration software. A backup of previous configuration settings is made automatically whenever changes are made. If there is an outage due to misconfiguration the software can roll back to the previous good settings seamlessly to ensure network operation.

Configuration change management is the process of recording all changes made to the network and any possible dependencies such changes have with other devices. Where errors occur configuration backups are used to restore the previous settings.

An essential part of network configuration software is the ability to implement and manage complex changes to the network structure; often these changes are automated so that dependent devices are also automatically re-configured when a parent device changes. In addition, change templates can be used for repetetive configuration changes that must be made on many devices at once.

One of the most important tasks that network configuration software supports is the ability to ensure compliance to industry and regulatory standards. These compliance requirements are particularly important to ensure that data security is being managed correctly in the event of a breach or other data loss.

Below is a list of functions that typical configuration software provides:

• Maintains details of multiple vendors’ device configurations
• Performs automated backups of device configuration details
• Encrypts these configuration details to ensure security
• Changes and records configuration changes in real time
• Tracks historical configuration changes for devices
• Ability to use automated functions to recover from network failures
• Supports network security by denying unauthorized configuration changes
• Reduces misconfiguration of network devices by ensuring they meet configuration rules and policies
• Uses change management functions to make configuration changes and ensures dependent devices are configured
• Automates a variety of common network operation functions
• Ensures device configuration is aligned with industry and manufacturer standards
• Produces comprehensive reports of the network’s devices and their configuration status including change history, compliance assurance and other network parameters