Cybersecurity Tools: Validating Configuration