The video introduces you to a powerful feature of Compliance on Cisco Prime Infrastructure 3.1. We will show you how to keep you device configuration within your compliance policies by detecting and removing unauthorized changes, and replacing with desired configuration. We will begin with a very simple 'enable password' check and progress to analyzing sections of configuration with regular expression.