IBM Partner Pavilion Proventia Network Enterprise Scanner 2.3 Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Softwarové příručky IBM Partner Pavilion Proventia Network Enterprise Scanner 2.3. IBM Partner Pavilion Proventia Network Enterprise Scanner 2.3 User's Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 187
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - Version 2.3

IBM Pro ventia Network Enterprise ScannerUser GuideVersion 2.3

Strany 2

2 Enterprise Scanner: User Guide

Strany 3 - Trademarks and Disclaimer

Viewing your scan jobsUse the Command Jobs window on the SiteProtector Console to view the status ofa job, watch its progress, and view its final resu

Strany 4

Viewing assessment job resultsYou can open a scanning job in the Command Jobs window as the job runs to seeadditional information it. Some information

Strany 5 - Contents

94 Enterprise Scanner: User Guide

Strany 6

Chapter 7. Managing scans in SiteProtectorThis chapter explains different ways to stop and restart scans. It also describesexpected scanning behaviors

Strany 7 - About this book

Stopping and restarting scan jobsYou can stop a scan job by pausing or canceling the job. You can also rerun a scanjob. These actions apply to current

Strany 8 - Technical support contacts

Suspending and enabling all background scansYou can suspend and enable all scanning for the groups controlled by a ScanControl policy. This applies to

Strany 9

Minimum scanning requirementsThis topic provides a brief review and summary of the minimum requirements forinitiating different types of scans.Registr

Strany 10

Scanning behaviors for ad hoc scansDifferent aspects of scanning behaviors are discussed in detail in different parts ofthis guide. This topic answers

Strany 11

A: You did not define at least one IP address for a discovery scan.A: If you set up the scan to run during scan windows, but you have not definedScan

Strany 12

v If the agent to run the background scan is available, the scan job appears in theCommand Jobs window at midnight on the day of a new refresh cycle.v

Strany 13

Chapter 1. Ad hoc scanning in the Proventia ManagerThis chapter explains how to use perspective and the high-level processes behindad hoc scanning fro

Strany 14

If you set up the Scan Control policy sothat the assessment scan... Then, the assessment scan...Does not wait for the discovery scan tofinish before t

Strany 15

Chapter 8. Interpreting scan results in SiteProtectorThis chapter explains how to use OS identification and the views in SiteProtectorto analyze the r

Strany 16

OS identification (OSID) certaintyEnterprise Scanner determines whether to run a check against a host based on thecertainty of the OS information in S

Strany 17

How OSID is updated in Enterprise ScannerEnterprise Scanner uses OSID information or reassesses the OSID during anassessment scan, and it explains whe

Strany 18

Setting up a Summary view for vulnerability managementUse the Summary view in the SiteProtector Console to dynamically displayinformation about scanni

Strany 19

Table 25. Vulnerability management options (continued)Portal DescriptionVulnerability History by Day Displays a bar graph that illustrates thefollowin

Strany 20

Viewing vulnerabilities in the SiteProtector Console using EnterpriseScannerUse the Analysis view in the SiteProtector Console to view event data coll

Strany 21 - Fingerprinting section:

Field descriptionsThe following table describes the fields and descriptions for this vulnerabilityview:Table 26. Vulnerability view by assetField Desc

Strany 22 - Control section:

Table 26. Vulnerability view by asset (continued)Field DescriptionTag Count Use to filter events according to the TagCount column in the analysis view

Strany 23

Viewing vulnerabilities by detail in Enterprise ScannerUse this view to examine event details that might be related to an attack or thatyou consider u

Strany 24

Section A: Network configurationThis section explains how to define the network interfaces for the management andscanning ports, how to assign perspec

Strany 25

Table 27. Vulnerability view by detail (continued)Field DescriptionObject Type Use this filter to analyze a specific type ofobject that you suspect is

Strany 26

Viewing vulnerabilities by object in Enterprise ScannerUse this view to examine objects on your network or desktop computers that are asource of vulne

Strany 27

Table 28. Vulnerability view by object (continued)Field DescriptionTag Count Use to filter events according to the TagCount column in the analysis vie

Strany 28

Table 29. Vulnerability view by target operating system (continued)Field DescriptionStatus Use the Status filter differently for eventsand vulnerabili

Strany 29

Table 30. Vulnerability view by vulnerability name (continued)Field DescriptionStatus You use the Status filter differently forevents and vulnerabilit

Strany 30 - Running an ad hoc scan

Running reports in the SiteProtector ConsoleUse the Report view in the SiteProtector Console to schedule Enterprise Scannerreports.Procedure1. In the

Strany 31

Table 31. Assessment reports descriptions (continued)Report DescriptionTop Vulnerabilities A list of the top vulnerabilities, by frequency,for a speci

Strany 32

Viewing an Enterprise Scanner report in the SiteProtector ConsoleUse the Report view in the SiteProtector Console to open an Enterprise Scannerreport

Strany 33

120 Enterprise Scanner: User Guide

Strany 34

Chapter 9. Logs and alertsThis chapter explains how to generate log files and to set up alert notifications forthe appliance.Topics“Log files and aler

Strany 35 - Chapters

Configuring the scanning network interfaceUse the Scan Interface tab on the Network Interface Configuration page on theappliance to configure the scan

Strany 36

Log files and alert notificationEnterprise Scanner maintains log files on the appliance to use for diagnosingproblems with the agent. The log files co

Strany 37

System logsUse the System Event Log page in the Proventia Manager to examine entries in thesystem logs.System log descriptionsThe following table desc

Strany 38 - Inheritance indicators

Getting log status informationUse the Log Status page in the Proventia Manager to view usage information foralert event log statistics.Navigation: To

Strany 39

Table 37. Enterprise Scanner (ES) log descriptions (continued)Log name (file_name) DescriptionInterface Log (crm-esm.log) Details communications betwe

Strany 40 - SiteProtector

Downloading Enterprise Scanner (ES) log filesUse the Log File Management page in the Proventia Manager to download anEnterprise Scanner (ES) log file

Strany 41

Alerts logUse the Alert Event Log page in the Proventia Manager to view and managesecurity and system-related alerts.Navigation: You can access this p

Strany 42

Downloading and saving an Alerts logUse the Alerts page in the Proventia Manager to save an alert log file to use forforensic purposes.About this task

Strany 43 - Contents of an agent policy

Clearing the Alerts logUse the Alerts page in the Proventia Manager to clear all events from the Alert log.Before you beginClearing the Alert log dele

Strany 44 - Network Locations policy

If you want to... Then...Search the Alert log file by filteringoptions1. Select Auto Off from the Refresh Datalist.2. Select an option from the Filter

Strany 45

If you want to... Then...Search the Alert log file by Alert IDnumber1. Type the 26-character alert ID number inthe Search by Alert Id# box.Tip: You ca

Strany 46 - Notification policy

Configuring scanning interface DNS settingsUse the DNS tab on the Network Interface Configuration page on the appliance toconfigure the DNS settings f

Strany 47 - Access policy

132 Enterprise Scanner: User Guide

Strany 48 - Networking policy

Chapter 10. Ticketing and remediationThis chapter explains how to use information from Enterprise Scanner with theticketing feature in SiteProtector t

Strany 49

Ticketing and Enterprise ScannerSiteProtector works with Enterprise Scanner to streamline your event tracking andremediation processes. This topic exp

Strany 50

When you save the ticket in SiteProtector, the action request system stores theinformation, too. You can edit and maintain tickets in the action reque

Strany 51 - Services policy

If you do not want to modify the cycle duration for your background scans, youcan run an ad hoc scan to verify and close tickets that are pending syst

Strany 52 - Time policy

Table 40. Options for the Ticketing reportsOption Tab DescriptionShare report with otherSiteProtector usersGeneral Select this option to giveother Sit

Strany 53 - Update Settings policy

Table 40. Options for the Ticketing reports (continued)Option Tab DescriptionNumber of Records Report Format Specifies the number ofrecords that will

Strany 54 - Discovery policy

Part 3. MaintenanceThis section explains how to maintain and update the Enterprise Scanner agent.ChaptersChapter 11, “Performing routine maintenance,”

Strany 55 - Defining assets to discover

140 Enterprise Scanner: User Guide

Strany 56 - Assessment policy

Chapter 11. Performing routine maintenanceThis chapter explains maintenance procedures that you need to perform on theEnterprise Scanner agent.Topics“

Strany 57

Assigning perspective to a scanning interfaceUse the Network Locations tab on the Network Locations page on the appliance toassign a perspective (netw

Strany 58

Shutting down your Enterprise ScannerYou can shut down Enterprise Scanner from the Proventia Manager. The shutdown option also turns off the appliance

Strany 59

Removing an agent from SiteProtectorUse this procedure to remove an agent from SiteProtector.Procedure1. In the SiteProtector Console, open a tab with

Strany 60

Options for backing up Enterprise ScannerUse the Backup and Recovery page to manage snapshots of configuration settingsand to create complete system b

Strany 61

Backing up configuration settingsUse the Settings Backup tab on the Backup and Recovery page to create a settingssnapshot file of the configuration se

Strany 62

Making full system backupsUse the Full Backup tab on the Backup and Recovery page to create a completeimage of the operating system and current config

Strany 63 - Assessment Credentials policy

Chapter 12. Updating Enterprise ScannerThis chapter describes how to configure an agent for XPUs, how to scheduleautomatic and one-time XPUs, and how

Strany 64

XPU basicsThis topic describes the types of updates for your Enterprise Scanner agent andexplains where you can get the updates.Types of updatesThe fo

Strany 65 - Scan Control policy

Updating optionsThe XPU process provides the option to schedule automatic updates on a periodicbasis, schedule one-time updates, or update an agent ma

Strany 66

Configuring explicit-trust authentication with an XPU serverYou can configure the authentication between an Enterprise Scanner agent and aSiteProtecto

Strany 67 - Scan Window policy

Configuring an Alternate Update locationUse the Alternate Update Server page in the Update Settings policy on theSiteProtector Console if you want to

Strany 68

Option DescriptionMetric If you configure more than one route to thesame segment for one perspective, a numberthat indicates the preferred route. The

Strany 69 - Scan Exclusion policy

Option DescriptionTrust Level The authentication level for communicationswith the SiteProtector update server.Authentication level options for theSite

Strany 70 - Network Services policy

Configuring an HTTP ProxyUse the Proxy Server page in the Update Settings policy on the SiteProtectorConsole to configure proxy server information if

Strany 71

Scheduling a one-time firmware updateOccasionally, you might not want to wait for your automatic update process toinstall an important update. You can

Strany 72 - Ad Hoc Scan Control policy

Option DescriptionCheck for updates at given intervals Checks for updates at the interval that youspecify.Note: The range is 60 minutes to 1440minutes

Strany 73

Manually installing updatesIn the Proventia Manager for the agent, you can manually download and installupdates. You download firmware and assessment

Strany 74 - Option Description

Chapter 13. Viewing the status of the Enterprise ScanneragentThis chapter explains the status information that is available for Enterprise Scannerin P

Strany 75

Proventia Manager Home pageThe Proventia Manager Home page provides the latest diagnostic informationabout the appliance.Navigation: To access the Pro

Strany 76 - What is perspective?

Table 47. Current status of network interfaces (continued)Model Network interfacesES1500 ETH0 (management port)ETH1 (scanning port)ETH2 (scanning port

Strany 77 - Defining perspectives

Viewing agent status in the SiteProtector ConsoleThe same system status information that is available in the Proventia ManagerHome page is available i

Strany 78

Viewing the status of the CAM modulesUse the CAM Modules page in the Proventia Manager to view information aboutCAM sessions in Enterprise Scanner.Pro

Strany 79 - Scan jobs and related terms

7. If you want to add previously known assets that are already defined in othergroups to the scan group, select the Add previously known assets to gro

Strany 80 - Types of tasks

Table 50. Sensor processes (continued)Module or process Description Troubleshooting optionEnterprise Scanner schedulermodule or iss-esmSchedulerproces

Strany 81 - Priorities for running tasks

Part 4. Appendixes© Copyright IBM Corp. 1997, 2009 163

Strany 82 - Stages of a scanning process

164 Enterprise Scanner: User Guide

Strany 83

Appendix. Safety, environmental, and electronic emissionsnoticesSafety notices may be printed throughout this guide. DANGER notices warn youof conditi

Strany 84 - Assessment cycle duration

When working on or around the system, observe the following precautions:Electrical voltage and current from power, telephone, and communicationcables

Strany 85 - Achieving the right balance

CAUTION:The battery contains lithium. To avoid possible explosion, do not burn or chargethe battery.Do not:v Throw or immerse into waterv Heat to more

Strany 86

Product safety labelsOne or more of the following safety labels may apply to this product.DANGERHazardous voltage, current, or energy levels are prese

Strany 87

Laser safety informationThe following laser safety notices apply to this product:CAUTION:This product may contain one or more of the following devices

Strany 88

Notice: This mark applies only to countries within the European Union (EU) andNorway.Appliances are labeled in accordance with European Directive 2002

Strany 89

on disposal of batteries outside the United States, go to http://www.ibm.com/ibm/environment/products/ batteryrecycle.shtm or contact your local waste

Strany 90

If you want to... Then...Create groupings from a selection list1. Click the Group By icon.The Group by Columns windowappears.2. Select a column to gro

Strany 91

In accordance with the European Directive 2006/66/EC, batteries and accumulatorsare labeled to indicate that they are to be collected separately and r

Strany 92 - Enabling background scanning

Note: This device complies with Part 15 of the FCC Rules. Operation is subject tothe following two conditions: (1) this device may not cause harmful i

Strany 93

IBM verändert bzw. wenn Erweiterungskomponenten von Fremdherstellern ohneEmpfehlung der IBM gesteckt/eingebaut werden.EN 55022 Klasse A Geräte müssen

Strany 94

Korean Class A Compliance Statement:Appendix. Safety, environmental, and electronic emissions notices 175

Strany 95

176 Enterprise Scanner: User Guide

Strany 96 - Defining network services

IndexAAccess policy 35, 39account lockout 12account lockout (SiteProtector) 51active module icon 158ad hoc assessment scan 65monitoring status 23ad ho

Strany 97

Enterprise Scanner reportviewing in SiteProtector Console 119Enterprise Scanner reportsrunning in SiteProtector 117Enterprise Scanner scan module 161E

Strany 98

scan job (continued)resuming 96scan jobs (SiteProtector) 71scan policyconfiguring from LMI 20scan priority 99Scan Reports page 24scan resultsexporting

Strany 99

Selecting assessment checks with filtersUse the Checks tab in the Assessment policy to provide filtering values on aselected list of assessment checks

Strany 100 - Viewing discovery job results

Copyright statement© Copyright IBM Corporation 1997, 2009.All Rights Reserved.U.S. Government Users Restricted Rights — Use, duplication or disclosure

Strany 101 - Procedure

Configuring common assessment settings for an AssessmentpolicyUse the Common Settings tab in the Assessment policy to choose settings thatdefine addit

Strany 102

Option DescriptionPorts to scan with generic UDP checks The set of UDP ports to scan with genericUDP checks. You can specify ports using anyof the fol

Strany 103

Option DescriptionDo not perform application fingerprinting Does not try to specifically identify whichapplications are communicating over whichports,

Strany 104 - Impact of stopping scan jobs

Option DescriptionAllowed account lockout Select a type of lockout:v No lockout allowed: Enterprise Scanneravoids running password guessing checksif a

Strany 105

Defining assessment credentials for a policyUse the Assessment Credentials policy type on the Policy Management page todefine authentication credentia

Strany 106 - Minimum scanning requirements

Option DescriptionAccount Type: SSH LocalIndicates that the user account is definedlocally on a single Unix device that allowsSSH logons. The account

Strany 107 - Inheritance

Defining the service names associated with TCP and UDPportsUse the Network Services policy type on the Policy Management page to defineservice names a

Strany 108

Defining ports or assets to exclude from a scanUse the Scan Exclusion policy type on the Policy Management page to definespecific ports or assets to e

Strany 109

Configuring and saving a scan policy in the ProventiaManagerUse the Policy Management page on the appliance to configure discovery andassessment scan

Strany 110

Chapter 2. Interpreting scan results in the Proventia ManagerThis chapter explains how to monitor and view scan results in the ProventiaManager.Topics

Strany 111

Trademarks and DisclaimerIBM®and the IBM logo are trademarks or registered trademarks of InternationalBusiness Machines Corporation in the United Stat

Strany 112 - Certainty of OSID sources

Running an ad hoc scanUse the LMI Scan Control page on the appliance to define and run ad hoc scansfor assessment and discovery.Before you beginBefore

Strany 113 - About user-supplied OSIDs

Monitoring the status of a scanUse the Scan Status page on the appliance to view the status of ad hoc discoveryand assessment scans you have initializ

Strany 114

Viewing the results of an ad hoc scanUse the Scan Results page on the appliance to analyze security-related datadiscovered by an ad hoc scan.Procedure

Strany 115

Purging scan data from the databaseUse the Scan Results page on the appliance to schedule the removal of scan datafiles from the /var/log/esm/lmiScans

Strany 116 - Benefits

26 Enterprise Scanner: User Guide

Strany 117 - Field descriptions

Part 2. Scanning from the SiteProtector ConsoleThis section explains how to manage scans from the SiteProtector Console for theEnterprise Scanner agen

Strany 118

28 Enterprise Scanner: User Guide

Strany 119

Chapter 3. Enterprise Scanner policiesThis chapter explains how to use Enterprise Scanner policies to customize yourscanning processes. The policies b

Strany 120

Policy inheritance with Enterprise Scanner policiesThe inheritance properties of policies in SiteProtector provide a flexible andefficient method for

Strany 121

v If you do not override the settings, the column follows the inheritance describedin the table above; however, you must configure those policies.Depl

Strany 122 - Enterprise Scanner

iv Enterprise Scanner: User Guide

Strany 123

Migrating a locally managed Enterprise Scanner agent intoSiteProtectorYou must migrate the Enterprise Scanner agent out of the Locally Managed Agentsa

Strany 124

Viewing asset or agent policies for Enterprise ScannerIn the SiteProtector Console, you can view asset and agent policies together, or youcan view the

Strany 125 - Types of assessment reports

Getting vulnerability help for a SiteProtector Console without InternetaccessIf you use the SiteProtector Console on a computer without an Internet co

Strany 126

Agent policies for Enterprise ScannerAgent policies apply to Enterprise Scanner appliances and describe operationalsettings for the agents or global s

Strany 127

Network Locations policyUse the Network Locations policy to define the perspective (network location) ofan agent and to define routes for those perspe

Strany 128

Important: Users who do not have permission to view the Network Locationspolicy, either through group association or by a specific grant, cannot runEn

Strany 129 - Chapter 9. Logs and alerts

Option DescriptionMetric If you configure more than one route to thesame segment for one perspective, a numberthat indicates the preferred route. The

Strany 130 - Viewing log files

Configuring advanced parameters for event notificationUse the Advanced Parameters tab in the Notification policy on the SiteProtectorConsole to provid

Strany 131 - System logs

2. In the navigation pane, select a group, and then open the Access policy for thatgroup.3. For each password you want to change, complete the followi

Strany 132 - Enterprise Scanner (ES) logs

Configuring the scanning network interfaceUse the Scan Interface tab in the Networking policy on the SiteProtector Console toconfigure the scanning in

Strany 133 - Changing logging detail

ContentsTrademarks and Disclaimer ...iiiAbout this book ...viiRelated publications ...viiiTechnical support contacts ...viiiP

Strany 134

Configuring scanning interface DNS settingsUse the DNS tab in the Networking policy on the SiteProtector Console toconfigure the DNS settings for the

Strany 135 - Alerts log

Services policyUse the Services policy on the SiteProtector Console to enable or disable access toyour appliance from SSH (Secure Shell) applications

Strany 136

Time policyUse the Time policy on the SiteProtector Console to change the date and the timeof the Enterprise Scanner agent, and to enable the network

Strany 137 - Clearing the Alerts log

Update Settings policyUse the Update Settings policy on the SiteProtector Console to configure how theagent automatically locates, downloads, and inst

Strany 138

v A Discovery policy applies to only the group where you define it.v The remaining policies are inheritable. A subgroup inherits a policy from thefirs

Strany 139

Defining assets to discoverUse the Discovery policy on the SiteProtector Console to define the parametersused to perform a discovery scan on a portion

Strany 140

Assessment policyUse the Assessment policy on the SiteProtector Console to define the checks to runfor assessment scans.The Assessment policy contains

Strany 141

Displaying assessment checks by groupsUse the Checks tab in the Assessment policy on the SiteProtector Console to groupchecks by any combination of co

Strany 142 - Custom categories

Selecting assessment checks with filtersUse the Checks tab in the Assessment policy on the SiteProtector Console toprovide filtering values on a selec

Strany 143 - Scanning recommendations

Configuring common assessment settingsUse the Common Settings tab in the Assessment policy on the SiteProtectorConsole to choose settings that define

Strany 144 - Task overview

Scanning behaviors for ad hoc scans ...99Chapter 8. Interpreting scan results inSiteProtector ...103OS identification (OSID) certainty ...

Strany 145

Option DescriptionPorts to scan with generic UDP checks The set of UDP ports to scan with genericUDP checks. You can specify ports using anyof the fol

Strany 146

Option DescriptionDo not perform application fingerprinting Does not try to specifically identify whichapplications are communicating over whichports,

Strany 147 - Part 3. Maintenance

Option DescriptionAllowed account lockout Select a type of lockout:v No lockout allowed: Enterprise Scanneravoids running password guessing checksif a

Strany 148

Assessment Credentials policyUse the Assessment Credentials policy on the SiteProtector Console to defineauthentication credentials for your assets.Th

Strany 149

Option DescriptionAccount Type: WindowsDomain/WorkgroupIndicates that the user account is defined ina Windows Domain or Workgroup. Theaccount is used

Strany 150 - Before you begin

Scan Control policyUse the Scan Control policy on the SiteProtector Console to define the duration ofscanning cycles and to assign user-defined perspe

Strany 151

Defining scanning cycles and assigning perspectives to scansUse the Scan Control policy on the SiteProtector Console to define the duration ofscanning

Strany 152 - Date of last system backup

Scan Window policyUse the Scan Window policy on the SiteProtector Console to define hours ofallowed scanning for discovery scans (scan windows), asses

Strany 153

Defining when scanning is allowedUse the Scan Window policy on the SiteProtector Console to define the days andhours that scanning is allowed.About th

Strany 154 - Making full system backups

Scan Exclusion policyUse the Scan Exclusion policy on the SiteProtector Console to define specific portsor assets to exclude from a scan of a group of

Strany 155

About this bookThis section describes the audience for this guide; identifies related publications;and provides contact information.AudienceUsers of t

Strany 156 - XPU basics

Network Services policyUse the Network Services policy on the SiteProtector Console to define servicenames associated with TCP and UDP ports.You can m

Strany 157 - Updating options

Configuring a Network Services policyUse the Network Services policy on the SiteProtector Console to define servicenames associated with TCP and UDP p

Strany 158

Ad Hoc Scan Control policyUse the Ad Hoc Scan Control policy on the SiteProtector Console to defineEnterprise Scanner ad hoc scans for assessment and

Strany 159

11. If you want to add newly discovered assets to the group where you havedefined the scan, rather than to the Ungrouped Assets group, select the Addn

Strany 160 - 5. Click Save Changes

Option DescriptionHalf-Scan Connections The maximum number of connections thescan should use for opening and closingports.13. Click the Debug Settings

Strany 161 - Configuring an HTTP Proxy

Chapter 4. Understanding scanning processes inSiteProtectorThis chapter explains the high-level processes behind ad hoc and backgroundscanning. It als

Strany 162 - Configuring automatic updates

What is perspective?When you scan a group of assets, you anticipate and interpret results based on thelocation of your agent relative to the location

Strany 163

firewall, descriptive perspective names might be Atlanta-InsideFirewall andAtlanta-OutsideFirewall.Placing agents in the correct perspectiveA perspect

Strany 164 - Manually installing updates

To scan some asset groups from inside your firewall and others from within yourDMZ, follow these steps:1. Set up two groups in SiteProtector:v One gro

Strany 165

Scan jobs and related termsTo tune your system correctly, you must understand how scan jobs run and howthe options you define in policies affect jobs

Strany 166 - Proventia Manager Home page

Related publicationsUse this topic to help you access information about your Enterprise Scannerappliance.PublicationsThe following documents are avail

Strany 167 - Protection status

Scheduled and running scansTo make it easier to explain the scanning processes, scans are considered scheduledwhen they are displayed in the Command J

Strany 168 - Viewing agent status

Tasks per type of scanThe following table explains the tasks needed for discovery and assessment scans:Table 10. Tasks per type of scanScan type Numbe

Strany 169

Task prioritizationThe following table explains the reasons behind prioritization of scanning tasks:Table 11. Reasons for task prioritizationType of s

Strany 170

The process for a scanning cycleThe following table describes the general process for a scanning cycle:Table 12. The process of a scanning cycleStage

Strany 171 - Part 4. Appendixes

Optimizing cycle duration, scan windows, and subtasks for EnterpriseScannerBackground scanning jobs persist throughout a scan cycle, but are active on

Strany 172

Achieving the right balanceIf a refresh cycle is too short, you cannot scan all of your assets during the cycle. Ifa scan window is too short to finis

Strany 173 - DANGER notices

78 Enterprise Scanner: User Guide

Strany 174 - CAUTION notices

Chapter 5. Background scanning in SiteProtectorThis chapter describes the minimum requirements and options for definingbackground scanning in the Site

Strany 175 - Product handling information

Determining when background scans runThis topic describes two important concepts for background scanning: scanningrefresh cycles and scanning windows.

Strany 176 - Product safety labels

How policies apply to ad hoc and background scansAgent policies apply to both ad hoc and background scans, while asset policiesapply to both ad hoc an

Strany 177 - Laser compliance

Part 1. Scanning from the Proventia ManagerThis section explains how to manage scans from the Proventia Manager for theEnterprise Scanner agent.Chapte

Strany 178 - Battery return program

Table 15. Changes to Assessment and Discovery policies (continued)If you... Then you...Modify the configured settings Cannot save the policy. Therefor

Strany 179

Background scanning checklists for Enterprise ScannerThis topic describes the minimum requirements to set up background discoveryand background assess

Strany 180 - Electronic emissions notices

Enabling background scanningUse the Scan Control policy on the SiteProtector Console to define the duration ofrefresh cycles and to assign user-define

Strany 181

Option DescriptionNext cycle start date The beginning date of the next scan cycle.(Display only.)Use Discovery’s start date/duration andwait for disco

Strany 182

Procedure1. From the SiteProtector Console, create a tab to display asset policies.2. In the navigation pane, select a group, and then open the Scan W

Strany 183

Defining ports or assets to exclude from a scanUse the Scan Exclusion policy on the SiteProtector Console to define the specificports, specific assets

Strany 184

Defining network servicesUse the Network Services policy on the SiteProtector Console to define servicenames associated with TCP and UDP ports.Procedu

Strany 185

Defining assessment credentials for a policyUse the Assessment Credentials policy on the SiteProtector Console to defineauthentication credentials for

Strany 186

Option DescriptionAccount Type: SSH LocalIndicates that the user account is definedlocally on a single Unix device that allowsSSH logons. The account

Strany 187

Chapter 6. Monitoring scans in SiteProtectorThis chapter uses terms that define scanning parameters for scan jobs withSiteProtector.Topics“Viewing you

Komentáře k této Příručce

Žádné komentáře