Malicious codes and worms comprise the largest portion of the loss caused the security problem in the Internet. Small worms such as the “Blaster” spread quickly through the enormous network. It causes the network to lock down within an hour or so[1]. The situation worsens before it can be monitored and notified by the supervisor. Since the network is not available, it becomes hard to serve a node with an order. It is difficult for most large networks to introduce a consistent monitoring tool and reporting system. It is also more difficult to manage the configuration of network nodes with the matter of policy. We repbstract language that supports various functions. Functions are in grouping, event, compliance and intermediate forms. This high-level abstracts the control behavior of the network nodes that have various setting-up methodologies. We will describe the features of the language and give examples of the preliminary implementation on the test-bed.