IBM Partner Pavilion Proventia Network Enterprise Scanner 2.3 Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Manuels des logiciels IBM Partner Pavilion Proventia Network Enterprise Scanner 2.3. IBM Partner Pavilion Proventia Network Enterprise Scanner 2.3 User's Manual Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 187
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs

Résumé du contenu

Page 1 - Version 2.3

IBM Pro ventia Network Enterprise ScannerUser GuideVersion 2.3

Page 2

2 Enterprise Scanner: User Guide

Page 3 - Trademarks and Disclaimer

Viewing your scan jobsUse the Command Jobs window on the SiteProtector Console to view the status ofa job, watch its progress, and view its final resu

Page 4

Viewing assessment job resultsYou can open a scanning job in the Command Jobs window as the job runs to seeadditional information it. Some information

Page 5 - Contents

94 Enterprise Scanner: User Guide

Page 6

Chapter 7. Managing scans in SiteProtectorThis chapter explains different ways to stop and restart scans. It also describesexpected scanning behaviors

Page 7 - About this book

Stopping and restarting scan jobsYou can stop a scan job by pausing or canceling the job. You can also rerun a scanjob. These actions apply to current

Page 8 - Technical support contacts

Suspending and enabling all background scansYou can suspend and enable all scanning for the groups controlled by a ScanControl policy. This applies to

Page 9

Minimum scanning requirementsThis topic provides a brief review and summary of the minimum requirements forinitiating different types of scans.Registr

Page 10

Scanning behaviors for ad hoc scansDifferent aspects of scanning behaviors are discussed in detail in different parts ofthis guide. This topic answers

Page 11

A: You did not define at least one IP address for a discovery scan.A: If you set up the scan to run during scan windows, but you have not definedScan

Page 12

v If the agent to run the background scan is available, the scan job appears in theCommand Jobs window at midnight on the day of a new refresh cycle.v

Page 13

Chapter 1. Ad hoc scanning in the Proventia ManagerThis chapter explains how to use perspective and the high-level processes behindad hoc scanning fro

Page 14

If you set up the Scan Control policy sothat the assessment scan... Then, the assessment scan...Does not wait for the discovery scan tofinish before t

Page 15

Chapter 8. Interpreting scan results in SiteProtectorThis chapter explains how to use OS identification and the views in SiteProtectorto analyze the r

Page 16

OS identification (OSID) certaintyEnterprise Scanner determines whether to run a check against a host based on thecertainty of the OS information in S

Page 17

How OSID is updated in Enterprise ScannerEnterprise Scanner uses OSID information or reassesses the OSID during anassessment scan, and it explains whe

Page 18

Setting up a Summary view for vulnerability managementUse the Summary view in the SiteProtector Console to dynamically displayinformation about scanni

Page 19

Table 25. Vulnerability management options (continued)Portal DescriptionVulnerability History by Day Displays a bar graph that illustrates thefollowin

Page 20

Viewing vulnerabilities in the SiteProtector Console using EnterpriseScannerUse the Analysis view in the SiteProtector Console to view event data coll

Page 21 - Fingerprinting section:

Field descriptionsThe following table describes the fields and descriptions for this vulnerabilityview:Table 26. Vulnerability view by assetField Desc

Page 22 - Control section:

Table 26. Vulnerability view by asset (continued)Field DescriptionTag Count Use to filter events according to the TagCount column in the analysis view

Page 23

Viewing vulnerabilities by detail in Enterprise ScannerUse this view to examine event details that might be related to an attack or thatyou consider u

Page 24

Section A: Network configurationThis section explains how to define the network interfaces for the management andscanning ports, how to assign perspec

Page 25

Table 27. Vulnerability view by detail (continued)Field DescriptionObject Type Use this filter to analyze a specific type ofobject that you suspect is

Page 26

Viewing vulnerabilities by object in Enterprise ScannerUse this view to examine objects on your network or desktop computers that are asource of vulne

Page 27

Table 28. Vulnerability view by object (continued)Field DescriptionTag Count Use to filter events according to the TagCount column in the analysis vie

Page 28

Table 29. Vulnerability view by target operating system (continued)Field DescriptionStatus Use the Status filter differently for eventsand vulnerabili

Page 29

Table 30. Vulnerability view by vulnerability name (continued)Field DescriptionStatus You use the Status filter differently forevents and vulnerabilit

Page 30 - Running an ad hoc scan

Running reports in the SiteProtector ConsoleUse the Report view in the SiteProtector Console to schedule Enterprise Scannerreports.Procedure1. In the

Page 31

Table 31. Assessment reports descriptions (continued)Report DescriptionTop Vulnerabilities A list of the top vulnerabilities, by frequency,for a speci

Page 32

Viewing an Enterprise Scanner report in the SiteProtector ConsoleUse the Report view in the SiteProtector Console to open an Enterprise Scannerreport

Page 33

120 Enterprise Scanner: User Guide

Page 34

Chapter 9. Logs and alertsThis chapter explains how to generate log files and to set up alert notifications forthe appliance.Topics“Log files and aler

Page 35 - Chapters

Configuring the scanning network interfaceUse the Scan Interface tab on the Network Interface Configuration page on theappliance to configure the scan

Page 36

Log files and alert notificationEnterprise Scanner maintains log files on the appliance to use for diagnosingproblems with the agent. The log files co

Page 37

System logsUse the System Event Log page in the Proventia Manager to examine entries in thesystem logs.System log descriptionsThe following table desc

Page 38 - Inheritance indicators

Getting log status informationUse the Log Status page in the Proventia Manager to view usage information foralert event log statistics.Navigation: To

Page 39

Table 37. Enterprise Scanner (ES) log descriptions (continued)Log name (file_name) DescriptionInterface Log (crm-esm.log) Details communications betwe

Page 40 - SiteProtector

Downloading Enterprise Scanner (ES) log filesUse the Log File Management page in the Proventia Manager to download anEnterprise Scanner (ES) log file

Page 41

Alerts logUse the Alert Event Log page in the Proventia Manager to view and managesecurity and system-related alerts.Navigation: You can access this p

Page 42

Downloading and saving an Alerts logUse the Alerts page in the Proventia Manager to save an alert log file to use forforensic purposes.About this task

Page 43 - Contents of an agent policy

Clearing the Alerts logUse the Alerts page in the Proventia Manager to clear all events from the Alert log.Before you beginClearing the Alert log dele

Page 44 - Network Locations policy

If you want to... Then...Search the Alert log file by filteringoptions1. Select Auto Off from the Refresh Datalist.2. Select an option from the Filter

Page 45

If you want to... Then...Search the Alert log file by Alert IDnumber1. Type the 26-character alert ID number inthe Search by Alert Id# box.Tip: You ca

Page 46 - Notification policy

Configuring scanning interface DNS settingsUse the DNS tab on the Network Interface Configuration page on the appliance toconfigure the DNS settings f

Page 47 - Access policy

132 Enterprise Scanner: User Guide

Page 48 - Networking policy

Chapter 10. Ticketing and remediationThis chapter explains how to use information from Enterprise Scanner with theticketing feature in SiteProtector t

Page 49

Ticketing and Enterprise ScannerSiteProtector works with Enterprise Scanner to streamline your event tracking andremediation processes. This topic exp

Page 50

When you save the ticket in SiteProtector, the action request system stores theinformation, too. You can edit and maintain tickets in the action reque

Page 51 - Services policy

If you do not want to modify the cycle duration for your background scans, youcan run an ad hoc scan to verify and close tickets that are pending syst

Page 52 - Time policy

Table 40. Options for the Ticketing reportsOption Tab DescriptionShare report with otherSiteProtector usersGeneral Select this option to giveother Sit

Page 53 - Update Settings policy

Table 40. Options for the Ticketing reports (continued)Option Tab DescriptionNumber of Records Report Format Specifies the number ofrecords that will

Page 54 - Discovery policy

Part 3. MaintenanceThis section explains how to maintain and update the Enterprise Scanner agent.ChaptersChapter 11, “Performing routine maintenance,”

Page 55 - Defining assets to discover

140 Enterprise Scanner: User Guide

Page 56 - Assessment policy

Chapter 11. Performing routine maintenanceThis chapter explains maintenance procedures that you need to perform on theEnterprise Scanner agent.Topics“

Page 57

Assigning perspective to a scanning interfaceUse the Network Locations tab on the Network Locations page on the appliance toassign a perspective (netw

Page 58

Shutting down your Enterprise ScannerYou can shut down Enterprise Scanner from the Proventia Manager. The shutdown option also turns off the appliance

Page 59

Removing an agent from SiteProtectorUse this procedure to remove an agent from SiteProtector.Procedure1. In the SiteProtector Console, open a tab with

Page 60

Options for backing up Enterprise ScannerUse the Backup and Recovery page to manage snapshots of configuration settingsand to create complete system b

Page 61

Backing up configuration settingsUse the Settings Backup tab on the Backup and Recovery page to create a settingssnapshot file of the configuration se

Page 62

Making full system backupsUse the Full Backup tab on the Backup and Recovery page to create a completeimage of the operating system and current config

Page 63 - Assessment Credentials policy

Chapter 12. Updating Enterprise ScannerThis chapter describes how to configure an agent for XPUs, how to scheduleautomatic and one-time XPUs, and how

Page 64

XPU basicsThis topic describes the types of updates for your Enterprise Scanner agent andexplains where you can get the updates.Types of updatesThe fo

Page 65 - Scan Control policy

Updating optionsThe XPU process provides the option to schedule automatic updates on a periodicbasis, schedule one-time updates, or update an agent ma

Page 66

Configuring explicit-trust authentication with an XPU serverYou can configure the authentication between an Enterprise Scanner agent and aSiteProtecto

Page 67 - Scan Window policy

Configuring an Alternate Update locationUse the Alternate Update Server page in the Update Settings policy on theSiteProtector Console if you want to

Page 68

Option DescriptionMetric If you configure more than one route to thesame segment for one perspective, a numberthat indicates the preferred route. The

Page 69 - Scan Exclusion policy

Option DescriptionTrust Level The authentication level for communicationswith the SiteProtector update server.Authentication level options for theSite

Page 70 - Network Services policy

Configuring an HTTP ProxyUse the Proxy Server page in the Update Settings policy on the SiteProtectorConsole to configure proxy server information if

Page 71

Scheduling a one-time firmware updateOccasionally, you might not want to wait for your automatic update process toinstall an important update. You can

Page 72 - Ad Hoc Scan Control policy

Option DescriptionCheck for updates at given intervals Checks for updates at the interval that youspecify.Note: The range is 60 minutes to 1440minutes

Page 73

Manually installing updatesIn the Proventia Manager for the agent, you can manually download and installupdates. You download firmware and assessment

Page 74 - Option Description

Chapter 13. Viewing the status of the Enterprise ScanneragentThis chapter explains the status information that is available for Enterprise Scannerin P

Page 75

Proventia Manager Home pageThe Proventia Manager Home page provides the latest diagnostic informationabout the appliance.Navigation: To access the Pro

Page 76 - What is perspective?

Table 47. Current status of network interfaces (continued)Model Network interfacesES1500 ETH0 (management port)ETH1 (scanning port)ETH2 (scanning port

Page 77 - Defining perspectives

Viewing agent status in the SiteProtector ConsoleThe same system status information that is available in the Proventia ManagerHome page is available i

Page 78

Viewing the status of the CAM modulesUse the CAM Modules page in the Proventia Manager to view information aboutCAM sessions in Enterprise Scanner.Pro

Page 79 - Scan jobs and related terms

7. If you want to add previously known assets that are already defined in othergroups to the scan group, select the Add previously known assets to gro

Page 80 - Types of tasks

Table 50. Sensor processes (continued)Module or process Description Troubleshooting optionEnterprise Scanner schedulermodule or iss-esmSchedulerproces

Page 81 - Priorities for running tasks

Part 4. Appendixes© Copyright IBM Corp. 1997, 2009 163

Page 82 - Stages of a scanning process

164 Enterprise Scanner: User Guide

Page 83

Appendix. Safety, environmental, and electronic emissionsnoticesSafety notices may be printed throughout this guide. DANGER notices warn youof conditi

Page 84 - Assessment cycle duration

When working on or around the system, observe the following precautions:Electrical voltage and current from power, telephone, and communicationcables

Page 85 - Achieving the right balance

CAUTION:The battery contains lithium. To avoid possible explosion, do not burn or chargethe battery.Do not:v Throw or immerse into waterv Heat to more

Page 86

Product safety labelsOne or more of the following safety labels may apply to this product.DANGERHazardous voltage, current, or energy levels are prese

Page 87

Laser safety informationThe following laser safety notices apply to this product:CAUTION:This product may contain one or more of the following devices

Page 88

Notice: This mark applies only to countries within the European Union (EU) andNorway.Appliances are labeled in accordance with European Directive 2002

Page 89

on disposal of batteries outside the United States, go to http://www.ibm.com/ibm/environment/products/ batteryrecycle.shtm or contact your local waste

Page 90

If you want to... Then...Create groupings from a selection list1. Click the Group By icon.The Group by Columns windowappears.2. Select a column to gro

Page 91

In accordance with the European Directive 2006/66/EC, batteries and accumulatorsare labeled to indicate that they are to be collected separately and r

Page 92 - Enabling background scanning

Note: This device complies with Part 15 of the FCC Rules. Operation is subject tothe following two conditions: (1) this device may not cause harmful i

Page 93

IBM verändert bzw. wenn Erweiterungskomponenten von Fremdherstellern ohneEmpfehlung der IBM gesteckt/eingebaut werden.EN 55022 Klasse A Geräte müssen

Page 94

Korean Class A Compliance Statement:Appendix. Safety, environmental, and electronic emissions notices 175

Page 95

176 Enterprise Scanner: User Guide

Page 96 - Defining network services

IndexAAccess policy 35, 39account lockout 12account lockout (SiteProtector) 51active module icon 158ad hoc assessment scan 65monitoring status 23ad ho

Page 97

Enterprise Scanner reportviewing in SiteProtector Console 119Enterprise Scanner reportsrunning in SiteProtector 117Enterprise Scanner scan module 161E

Page 98

scan job (continued)resuming 96scan jobs (SiteProtector) 71scan policyconfiguring from LMI 20scan priority 99Scan Reports page 24scan resultsexporting

Page 99

Selecting assessment checks with filtersUse the Checks tab in the Assessment policy to provide filtering values on aselected list of assessment checks

Page 100 - Viewing discovery job results

Copyright statement© Copyright IBM Corporation 1997, 2009.All Rights Reserved.U.S. Government Users Restricted Rights — Use, duplication or disclosure

Page 101 - Procedure

Configuring common assessment settings for an AssessmentpolicyUse the Common Settings tab in the Assessment policy to choose settings thatdefine addit

Page 102

Option DescriptionPorts to scan with generic UDP checks The set of UDP ports to scan with genericUDP checks. You can specify ports using anyof the fol

Page 103

Option DescriptionDo not perform application fingerprinting Does not try to specifically identify whichapplications are communicating over whichports,

Page 104 - Impact of stopping scan jobs

Option DescriptionAllowed account lockout Select a type of lockout:v No lockout allowed: Enterprise Scanneravoids running password guessing checksif a

Page 105

Defining assessment credentials for a policyUse the Assessment Credentials policy type on the Policy Management page todefine authentication credentia

Page 106 - Minimum scanning requirements

Option DescriptionAccount Type: SSH LocalIndicates that the user account is definedlocally on a single Unix device that allowsSSH logons. The account

Page 107 - Inheritance

Defining the service names associated with TCP and UDPportsUse the Network Services policy type on the Policy Management page to defineservice names a

Page 108

Defining ports or assets to exclude from a scanUse the Scan Exclusion policy type on the Policy Management page to definespecific ports or assets to e

Page 109

Configuring and saving a scan policy in the ProventiaManagerUse the Policy Management page on the appliance to configure discovery andassessment scan

Page 110

Chapter 2. Interpreting scan results in the Proventia ManagerThis chapter explains how to monitor and view scan results in the ProventiaManager.Topics

Page 111

Trademarks and DisclaimerIBM®and the IBM logo are trademarks or registered trademarks of InternationalBusiness Machines Corporation in the United Stat

Page 112 - Certainty of OSID sources

Running an ad hoc scanUse the LMI Scan Control page on the appliance to define and run ad hoc scansfor assessment and discovery.Before you beginBefore

Page 113 - About user-supplied OSIDs

Monitoring the status of a scanUse the Scan Status page on the appliance to view the status of ad hoc discoveryand assessment scans you have initializ

Page 114

Viewing the results of an ad hoc scanUse the Scan Results page on the appliance to analyze security-related datadiscovered by an ad hoc scan.Procedure

Page 115

Purging scan data from the databaseUse the Scan Results page on the appliance to schedule the removal of scan datafiles from the /var/log/esm/lmiScans

Page 116 - Benefits

26 Enterprise Scanner: User Guide

Page 117 - Field descriptions

Part 2. Scanning from the SiteProtector ConsoleThis section explains how to manage scans from the SiteProtector Console for theEnterprise Scanner agen

Page 118

28 Enterprise Scanner: User Guide

Page 119

Chapter 3. Enterprise Scanner policiesThis chapter explains how to use Enterprise Scanner policies to customize yourscanning processes. The policies b

Page 120

Policy inheritance with Enterprise Scanner policiesThe inheritance properties of policies in SiteProtector provide a flexible andefficient method for

Page 121

v If you do not override the settings, the column follows the inheritance describedin the table above; however, you must configure those policies.Depl

Page 122 - Enterprise Scanner

iv Enterprise Scanner: User Guide

Page 123

Migrating a locally managed Enterprise Scanner agent intoSiteProtectorYou must migrate the Enterprise Scanner agent out of the Locally Managed Agentsa

Page 124

Viewing asset or agent policies for Enterprise ScannerIn the SiteProtector Console, you can view asset and agent policies together, or youcan view the

Page 125 - Types of assessment reports

Getting vulnerability help for a SiteProtector Console without InternetaccessIf you use the SiteProtector Console on a computer without an Internet co

Page 126

Agent policies for Enterprise ScannerAgent policies apply to Enterprise Scanner appliances and describe operationalsettings for the agents or global s

Page 127

Network Locations policyUse the Network Locations policy to define the perspective (network location) ofan agent and to define routes for those perspe

Page 128

Important: Users who do not have permission to view the Network Locationspolicy, either through group association or by a specific grant, cannot runEn

Page 129 - Chapter 9. Logs and alerts

Option DescriptionMetric If you configure more than one route to thesame segment for one perspective, a numberthat indicates the preferred route. The

Page 130 - Viewing log files

Configuring advanced parameters for event notificationUse the Advanced Parameters tab in the Notification policy on the SiteProtectorConsole to provid

Page 131 - System logs

2. In the navigation pane, select a group, and then open the Access policy for thatgroup.3. For each password you want to change, complete the followi

Page 132 - Enterprise Scanner (ES) logs

Configuring the scanning network interfaceUse the Scan Interface tab in the Networking policy on the SiteProtector Console toconfigure the scanning in

Page 133 - Changing logging detail

ContentsTrademarks and Disclaimer ...iiiAbout this book ...viiRelated publications ...viiiTechnical support contacts ...viiiP

Page 134

Configuring scanning interface DNS settingsUse the DNS tab in the Networking policy on the SiteProtector Console toconfigure the DNS settings for the

Page 135 - Alerts log

Services policyUse the Services policy on the SiteProtector Console to enable or disable access toyour appliance from SSH (Secure Shell) applications

Page 136

Time policyUse the Time policy on the SiteProtector Console to change the date and the timeof the Enterprise Scanner agent, and to enable the network

Page 137 - Clearing the Alerts log

Update Settings policyUse the Update Settings policy on the SiteProtector Console to configure how theagent automatically locates, downloads, and inst

Page 138

v A Discovery policy applies to only the group where you define it.v The remaining policies are inheritable. A subgroup inherits a policy from thefirs

Page 139

Defining assets to discoverUse the Discovery policy on the SiteProtector Console to define the parametersused to perform a discovery scan on a portion

Page 140

Assessment policyUse the Assessment policy on the SiteProtector Console to define the checks to runfor assessment scans.The Assessment policy contains

Page 141

Displaying assessment checks by groupsUse the Checks tab in the Assessment policy on the SiteProtector Console to groupchecks by any combination of co

Page 142 - Custom categories

Selecting assessment checks with filtersUse the Checks tab in the Assessment policy on the SiteProtector Console toprovide filtering values on a selec

Page 143 - Scanning recommendations

Configuring common assessment settingsUse the Common Settings tab in the Assessment policy on the SiteProtectorConsole to choose settings that define

Page 144 - Task overview

Scanning behaviors for ad hoc scans ...99Chapter 8. Interpreting scan results inSiteProtector ...103OS identification (OSID) certainty ...

Page 145

Option DescriptionPorts to scan with generic UDP checks The set of UDP ports to scan with genericUDP checks. You can specify ports using anyof the fol

Page 146

Option DescriptionDo not perform application fingerprinting Does not try to specifically identify whichapplications are communicating over whichports,

Page 147 - Part 3. Maintenance

Option DescriptionAllowed account lockout Select a type of lockout:v No lockout allowed: Enterprise Scanneravoids running password guessing checksif a

Page 148

Assessment Credentials policyUse the Assessment Credentials policy on the SiteProtector Console to defineauthentication credentials for your assets.Th

Page 149

Option DescriptionAccount Type: WindowsDomain/WorkgroupIndicates that the user account is defined ina Windows Domain or Workgroup. Theaccount is used

Page 150 - Before you begin

Scan Control policyUse the Scan Control policy on the SiteProtector Console to define the duration ofscanning cycles and to assign user-defined perspe

Page 151

Defining scanning cycles and assigning perspectives to scansUse the Scan Control policy on the SiteProtector Console to define the duration ofscanning

Page 152 - Date of last system backup

Scan Window policyUse the Scan Window policy on the SiteProtector Console to define hours ofallowed scanning for discovery scans (scan windows), asses

Page 153

Defining when scanning is allowedUse the Scan Window policy on the SiteProtector Console to define the days andhours that scanning is allowed.About th

Page 154 - Making full system backups

Scan Exclusion policyUse the Scan Exclusion policy on the SiteProtector Console to define specific portsor assets to exclude from a scan of a group of

Page 155

About this bookThis section describes the audience for this guide; identifies related publications;and provides contact information.AudienceUsers of t

Page 156 - XPU basics

Network Services policyUse the Network Services policy on the SiteProtector Console to define servicenames associated with TCP and UDP ports.You can m

Page 157 - Updating options

Configuring a Network Services policyUse the Network Services policy on the SiteProtector Console to define servicenames associated with TCP and UDP p

Page 158

Ad Hoc Scan Control policyUse the Ad Hoc Scan Control policy on the SiteProtector Console to defineEnterprise Scanner ad hoc scans for assessment and

Page 159

11. If you want to add newly discovered assets to the group where you havedefined the scan, rather than to the Ungrouped Assets group, select the Addn

Page 160 - 5. Click Save Changes

Option DescriptionHalf-Scan Connections The maximum number of connections thescan should use for opening and closingports.13. Click the Debug Settings

Page 161 - Configuring an HTTP Proxy

Chapter 4. Understanding scanning processes inSiteProtectorThis chapter explains the high-level processes behind ad hoc and backgroundscanning. It als

Page 162 - Configuring automatic updates

What is perspective?When you scan a group of assets, you anticipate and interpret results based on thelocation of your agent relative to the location

Page 163

firewall, descriptive perspective names might be Atlanta-InsideFirewall andAtlanta-OutsideFirewall.Placing agents in the correct perspectiveA perspect

Page 164 - Manually installing updates

To scan some asset groups from inside your firewall and others from within yourDMZ, follow these steps:1. Set up two groups in SiteProtector:v One gro

Page 165

Scan jobs and related termsTo tune your system correctly, you must understand how scan jobs run and howthe options you define in policies affect jobs

Page 166 - Proventia Manager Home page

Related publicationsUse this topic to help you access information about your Enterprise Scannerappliance.PublicationsThe following documents are avail

Page 167 - Protection status

Scheduled and running scansTo make it easier to explain the scanning processes, scans are considered scheduledwhen they are displayed in the Command J

Page 168 - Viewing agent status

Tasks per type of scanThe following table explains the tasks needed for discovery and assessment scans:Table 10. Tasks per type of scanScan type Numbe

Page 169

Task prioritizationThe following table explains the reasons behind prioritization of scanning tasks:Table 11. Reasons for task prioritizationType of s

Page 170

The process for a scanning cycleThe following table describes the general process for a scanning cycle:Table 12. The process of a scanning cycleStage

Page 171 - Part 4. Appendixes

Optimizing cycle duration, scan windows, and subtasks for EnterpriseScannerBackground scanning jobs persist throughout a scan cycle, but are active on

Page 172

Achieving the right balanceIf a refresh cycle is too short, you cannot scan all of your assets during the cycle. Ifa scan window is too short to finis

Page 173 - DANGER notices

78 Enterprise Scanner: User Guide

Page 174 - CAUTION notices

Chapter 5. Background scanning in SiteProtectorThis chapter describes the minimum requirements and options for definingbackground scanning in the Site

Page 175 - Product handling information

Determining when background scans runThis topic describes two important concepts for background scanning: scanningrefresh cycles and scanning windows.

Page 176 - Product safety labels

How policies apply to ad hoc and background scansAgent policies apply to both ad hoc and background scans, while asset policiesapply to both ad hoc an

Page 177 - Laser compliance

Part 1. Scanning from the Proventia ManagerThis section explains how to manage scans from the Proventia Manager for theEnterprise Scanner agent.Chapte

Page 178 - Battery return program

Table 15. Changes to Assessment and Discovery policies (continued)If you... Then you...Modify the configured settings Cannot save the policy. Therefor

Page 179

Background scanning checklists for Enterprise ScannerThis topic describes the minimum requirements to set up background discoveryand background assess

Page 180 - Electronic emissions notices

Enabling background scanningUse the Scan Control policy on the SiteProtector Console to define the duration ofrefresh cycles and to assign user-define

Page 181

Option DescriptionNext cycle start date The beginning date of the next scan cycle.(Display only.)Use Discovery’s start date/duration andwait for disco

Page 182

Procedure1. From the SiteProtector Console, create a tab to display asset policies.2. In the navigation pane, select a group, and then open the Scan W

Page 183

Defining ports or assets to exclude from a scanUse the Scan Exclusion policy on the SiteProtector Console to define the specificports, specific assets

Page 184

Defining network servicesUse the Network Services policy on the SiteProtector Console to define servicenames associated with TCP and UDP ports.Procedu

Page 185

Defining assessment credentials for a policyUse the Assessment Credentials policy on the SiteProtector Console to defineauthentication credentials for

Page 186

Option DescriptionAccount Type: SSH LocalIndicates that the user account is definedlocally on a single Unix device that allowsSSH logons. The account

Page 187

Chapter 6. Monitoring scans in SiteProtectorThis chapter uses terms that define scanning parameters for scan jobs withSiteProtector.Topics“Viewing you

Commentaires sur ces manuels

Pas de commentaire