IBM Partner Pavilion Proventia Network Enterprise Scanner 2.3 Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Podręczniki do oprogramowania IBM Partner Pavilion Proventia Network Enterprise Scanner 2.3. IBM Partner Pavilion Proventia Network Enterprise Scanner 2.3 User's Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 187
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów

Podsumowanie treści

Strona 1 - Version 2.3

IBM Pro ventia Network Enterprise ScannerUser GuideVersion 2.3

Strona 2

2 Enterprise Scanner: User Guide

Strona 3 - Trademarks and Disclaimer

Viewing your scan jobsUse the Command Jobs window on the SiteProtector Console to view the status ofa job, watch its progress, and view its final resu

Strona 4

Viewing assessment job resultsYou can open a scanning job in the Command Jobs window as the job runs to seeadditional information it. Some information

Strona 5 - Contents

94 Enterprise Scanner: User Guide

Strona 6

Chapter 7. Managing scans in SiteProtectorThis chapter explains different ways to stop and restart scans. It also describesexpected scanning behaviors

Strona 7 - About this book

Stopping and restarting scan jobsYou can stop a scan job by pausing or canceling the job. You can also rerun a scanjob. These actions apply to current

Strona 8 - Technical support contacts

Suspending and enabling all background scansYou can suspend and enable all scanning for the groups controlled by a ScanControl policy. This applies to

Strona 9

Minimum scanning requirementsThis topic provides a brief review and summary of the minimum requirements forinitiating different types of scans.Registr

Strona 10

Scanning behaviors for ad hoc scansDifferent aspects of scanning behaviors are discussed in detail in different parts ofthis guide. This topic answers

Strona 11

A: You did not define at least one IP address for a discovery scan.A: If you set up the scan to run during scan windows, but you have not definedScan

Strona 12

v If the agent to run the background scan is available, the scan job appears in theCommand Jobs window at midnight on the day of a new refresh cycle.v

Strona 13

Chapter 1. Ad hoc scanning in the Proventia ManagerThis chapter explains how to use perspective and the high-level processes behindad hoc scanning fro

Strona 14

If you set up the Scan Control policy sothat the assessment scan... Then, the assessment scan...Does not wait for the discovery scan tofinish before t

Strona 15

Chapter 8. Interpreting scan results in SiteProtectorThis chapter explains how to use OS identification and the views in SiteProtectorto analyze the r

Strona 16

OS identification (OSID) certaintyEnterprise Scanner determines whether to run a check against a host based on thecertainty of the OS information in S

Strona 17

How OSID is updated in Enterprise ScannerEnterprise Scanner uses OSID information or reassesses the OSID during anassessment scan, and it explains whe

Strona 18

Setting up a Summary view for vulnerability managementUse the Summary view in the SiteProtector Console to dynamically displayinformation about scanni

Strona 19

Table 25. Vulnerability management options (continued)Portal DescriptionVulnerability History by Day Displays a bar graph that illustrates thefollowin

Strona 20

Viewing vulnerabilities in the SiteProtector Console using EnterpriseScannerUse the Analysis view in the SiteProtector Console to view event data coll

Strona 21 - Fingerprinting section:

Field descriptionsThe following table describes the fields and descriptions for this vulnerabilityview:Table 26. Vulnerability view by assetField Desc

Strona 22 - Control section:

Table 26. Vulnerability view by asset (continued)Field DescriptionTag Count Use to filter events according to the TagCount column in the analysis view

Strona 23

Viewing vulnerabilities by detail in Enterprise ScannerUse this view to examine event details that might be related to an attack or thatyou consider u

Strona 24

Section A: Network configurationThis section explains how to define the network interfaces for the management andscanning ports, how to assign perspec

Strona 25

Table 27. Vulnerability view by detail (continued)Field DescriptionObject Type Use this filter to analyze a specific type ofobject that you suspect is

Strona 26

Viewing vulnerabilities by object in Enterprise ScannerUse this view to examine objects on your network or desktop computers that are asource of vulne

Strona 27

Table 28. Vulnerability view by object (continued)Field DescriptionTag Count Use to filter events according to the TagCount column in the analysis vie

Strona 28

Table 29. Vulnerability view by target operating system (continued)Field DescriptionStatus Use the Status filter differently for eventsand vulnerabili

Strona 29

Table 30. Vulnerability view by vulnerability name (continued)Field DescriptionStatus You use the Status filter differently forevents and vulnerabilit

Strona 30 - Running an ad hoc scan

Running reports in the SiteProtector ConsoleUse the Report view in the SiteProtector Console to schedule Enterprise Scannerreports.Procedure1. In the

Strona 31

Table 31. Assessment reports descriptions (continued)Report DescriptionTop Vulnerabilities A list of the top vulnerabilities, by frequency,for a speci

Strona 32

Viewing an Enterprise Scanner report in the SiteProtector ConsoleUse the Report view in the SiteProtector Console to open an Enterprise Scannerreport

Strona 33

120 Enterprise Scanner: User Guide

Strona 34

Chapter 9. Logs and alertsThis chapter explains how to generate log files and to set up alert notifications forthe appliance.Topics“Log files and aler

Strona 35 - Chapters

Configuring the scanning network interfaceUse the Scan Interface tab on the Network Interface Configuration page on theappliance to configure the scan

Strona 36

Log files and alert notificationEnterprise Scanner maintains log files on the appliance to use for diagnosingproblems with the agent. The log files co

Strona 37

System logsUse the System Event Log page in the Proventia Manager to examine entries in thesystem logs.System log descriptionsThe following table desc

Strona 38 - Inheritance indicators

Getting log status informationUse the Log Status page in the Proventia Manager to view usage information foralert event log statistics.Navigation: To

Strona 39

Table 37. Enterprise Scanner (ES) log descriptions (continued)Log name (file_name) DescriptionInterface Log (crm-esm.log) Details communications betwe

Strona 40 - SiteProtector

Downloading Enterprise Scanner (ES) log filesUse the Log File Management page in the Proventia Manager to download anEnterprise Scanner (ES) log file

Strona 41

Alerts logUse the Alert Event Log page in the Proventia Manager to view and managesecurity and system-related alerts.Navigation: You can access this p

Strona 42

Downloading and saving an Alerts logUse the Alerts page in the Proventia Manager to save an alert log file to use forforensic purposes.About this task

Strona 43 - Contents of an agent policy

Clearing the Alerts logUse the Alerts page in the Proventia Manager to clear all events from the Alert log.Before you beginClearing the Alert log dele

Strona 44 - Network Locations policy

If you want to... Then...Search the Alert log file by filteringoptions1. Select Auto Off from the Refresh Datalist.2. Select an option from the Filter

Strona 45

If you want to... Then...Search the Alert log file by Alert IDnumber1. Type the 26-character alert ID number inthe Search by Alert Id# box.Tip: You ca

Strona 46 - Notification policy

Configuring scanning interface DNS settingsUse the DNS tab on the Network Interface Configuration page on the appliance toconfigure the DNS settings f

Strona 47 - Access policy

132 Enterprise Scanner: User Guide

Strona 48 - Networking policy

Chapter 10. Ticketing and remediationThis chapter explains how to use information from Enterprise Scanner with theticketing feature in SiteProtector t

Strona 49

Ticketing and Enterprise ScannerSiteProtector works with Enterprise Scanner to streamline your event tracking andremediation processes. This topic exp

Strona 50

When you save the ticket in SiteProtector, the action request system stores theinformation, too. You can edit and maintain tickets in the action reque

Strona 51 - Services policy

If you do not want to modify the cycle duration for your background scans, youcan run an ad hoc scan to verify and close tickets that are pending syst

Strona 52 - Time policy

Table 40. Options for the Ticketing reportsOption Tab DescriptionShare report with otherSiteProtector usersGeneral Select this option to giveother Sit

Strona 53 - Update Settings policy

Table 40. Options for the Ticketing reports (continued)Option Tab DescriptionNumber of Records Report Format Specifies the number ofrecords that will

Strona 54 - Discovery policy

Part 3. MaintenanceThis section explains how to maintain and update the Enterprise Scanner agent.ChaptersChapter 11, “Performing routine maintenance,”

Strona 55 - Defining assets to discover

140 Enterprise Scanner: User Guide

Strona 56 - Assessment policy

Chapter 11. Performing routine maintenanceThis chapter explains maintenance procedures that you need to perform on theEnterprise Scanner agent.Topics“

Strona 57

Assigning perspective to a scanning interfaceUse the Network Locations tab on the Network Locations page on the appliance toassign a perspective (netw

Strona 58

Shutting down your Enterprise ScannerYou can shut down Enterprise Scanner from the Proventia Manager. The shutdown option also turns off the appliance

Strona 59

Removing an agent from SiteProtectorUse this procedure to remove an agent from SiteProtector.Procedure1. In the SiteProtector Console, open a tab with

Strona 60

Options for backing up Enterprise ScannerUse the Backup and Recovery page to manage snapshots of configuration settingsand to create complete system b

Strona 61

Backing up configuration settingsUse the Settings Backup tab on the Backup and Recovery page to create a settingssnapshot file of the configuration se

Strona 62

Making full system backupsUse the Full Backup tab on the Backup and Recovery page to create a completeimage of the operating system and current config

Strona 63 - Assessment Credentials policy

Chapter 12. Updating Enterprise ScannerThis chapter describes how to configure an agent for XPUs, how to scheduleautomatic and one-time XPUs, and how

Strona 64

XPU basicsThis topic describes the types of updates for your Enterprise Scanner agent andexplains where you can get the updates.Types of updatesThe fo

Strona 65 - Scan Control policy

Updating optionsThe XPU process provides the option to schedule automatic updates on a periodicbasis, schedule one-time updates, or update an agent ma

Strona 66

Configuring explicit-trust authentication with an XPU serverYou can configure the authentication between an Enterprise Scanner agent and aSiteProtecto

Strona 67 - Scan Window policy

Configuring an Alternate Update locationUse the Alternate Update Server page in the Update Settings policy on theSiteProtector Console if you want to

Strona 68

Option DescriptionMetric If you configure more than one route to thesame segment for one perspective, a numberthat indicates the preferred route. The

Strona 69 - Scan Exclusion policy

Option DescriptionTrust Level The authentication level for communicationswith the SiteProtector update server.Authentication level options for theSite

Strona 70 - Network Services policy

Configuring an HTTP ProxyUse the Proxy Server page in the Update Settings policy on the SiteProtectorConsole to configure proxy server information if

Strona 71

Scheduling a one-time firmware updateOccasionally, you might not want to wait for your automatic update process toinstall an important update. You can

Strona 72 - Ad Hoc Scan Control policy

Option DescriptionCheck for updates at given intervals Checks for updates at the interval that youspecify.Note: The range is 60 minutes to 1440minutes

Strona 73

Manually installing updatesIn the Proventia Manager for the agent, you can manually download and installupdates. You download firmware and assessment

Strona 74 - Option Description

Chapter 13. Viewing the status of the Enterprise ScanneragentThis chapter explains the status information that is available for Enterprise Scannerin P

Strona 75

Proventia Manager Home pageThe Proventia Manager Home page provides the latest diagnostic informationabout the appliance.Navigation: To access the Pro

Strona 76 - What is perspective?

Table 47. Current status of network interfaces (continued)Model Network interfacesES1500 ETH0 (management port)ETH1 (scanning port)ETH2 (scanning port

Strona 77 - Defining perspectives

Viewing agent status in the SiteProtector ConsoleThe same system status information that is available in the Proventia ManagerHome page is available i

Strona 78

Viewing the status of the CAM modulesUse the CAM Modules page in the Proventia Manager to view information aboutCAM sessions in Enterprise Scanner.Pro

Strona 79 - Scan jobs and related terms

7. If you want to add previously known assets that are already defined in othergroups to the scan group, select the Add previously known assets to gro

Strona 80 - Types of tasks

Table 50. Sensor processes (continued)Module or process Description Troubleshooting optionEnterprise Scanner schedulermodule or iss-esmSchedulerproces

Strona 81 - Priorities for running tasks

Part 4. Appendixes© Copyright IBM Corp. 1997, 2009 163

Strona 82 - Stages of a scanning process

164 Enterprise Scanner: User Guide

Strona 83

Appendix. Safety, environmental, and electronic emissionsnoticesSafety notices may be printed throughout this guide. DANGER notices warn youof conditi

Strona 84 - Assessment cycle duration

When working on or around the system, observe the following precautions:Electrical voltage and current from power, telephone, and communicationcables

Strona 85 - Achieving the right balance

CAUTION:The battery contains lithium. To avoid possible explosion, do not burn or chargethe battery.Do not:v Throw or immerse into waterv Heat to more

Strona 86

Product safety labelsOne or more of the following safety labels may apply to this product.DANGERHazardous voltage, current, or energy levels are prese

Strona 87

Laser safety informationThe following laser safety notices apply to this product:CAUTION:This product may contain one or more of the following devices

Strona 88

Notice: This mark applies only to countries within the European Union (EU) andNorway.Appliances are labeled in accordance with European Directive 2002

Strona 89

on disposal of batteries outside the United States, go to http://www.ibm.com/ibm/environment/products/ batteryrecycle.shtm or contact your local waste

Strona 90

If you want to... Then...Create groupings from a selection list1. Click the Group By icon.The Group by Columns windowappears.2. Select a column to gro

Strona 91

In accordance with the European Directive 2006/66/EC, batteries and accumulatorsare labeled to indicate that they are to be collected separately and r

Strona 92 - Enabling background scanning

Note: This device complies with Part 15 of the FCC Rules. Operation is subject tothe following two conditions: (1) this device may not cause harmful i

Strona 93

IBM verändert bzw. wenn Erweiterungskomponenten von Fremdherstellern ohneEmpfehlung der IBM gesteckt/eingebaut werden.EN 55022 Klasse A Geräte müssen

Strona 94

Korean Class A Compliance Statement:Appendix. Safety, environmental, and electronic emissions notices 175

Strona 95

176 Enterprise Scanner: User Guide

Strona 96 - Defining network services

IndexAAccess policy 35, 39account lockout 12account lockout (SiteProtector) 51active module icon 158ad hoc assessment scan 65monitoring status 23ad ho

Strona 97

Enterprise Scanner reportviewing in SiteProtector Console 119Enterprise Scanner reportsrunning in SiteProtector 117Enterprise Scanner scan module 161E

Strona 98

scan job (continued)resuming 96scan jobs (SiteProtector) 71scan policyconfiguring from LMI 20scan priority 99Scan Reports page 24scan resultsexporting

Strona 99

Selecting assessment checks with filtersUse the Checks tab in the Assessment policy to provide filtering values on aselected list of assessment checks

Strona 100 - Viewing discovery job results

Copyright statement© Copyright IBM Corporation 1997, 2009.All Rights Reserved.U.S. Government Users Restricted Rights — Use, duplication or disclosure

Strona 101 - Procedure

Configuring common assessment settings for an AssessmentpolicyUse the Common Settings tab in the Assessment policy to choose settings thatdefine addit

Strona 102

Option DescriptionPorts to scan with generic UDP checks The set of UDP ports to scan with genericUDP checks. You can specify ports using anyof the fol

Strona 103

Option DescriptionDo not perform application fingerprinting Does not try to specifically identify whichapplications are communicating over whichports,

Strona 104 - Impact of stopping scan jobs

Option DescriptionAllowed account lockout Select a type of lockout:v No lockout allowed: Enterprise Scanneravoids running password guessing checksif a

Strona 105

Defining assessment credentials for a policyUse the Assessment Credentials policy type on the Policy Management page todefine authentication credentia

Strona 106 - Minimum scanning requirements

Option DescriptionAccount Type: SSH LocalIndicates that the user account is definedlocally on a single Unix device that allowsSSH logons. The account

Strona 107 - Inheritance

Defining the service names associated with TCP and UDPportsUse the Network Services policy type on the Policy Management page to defineservice names a

Strona 108

Defining ports or assets to exclude from a scanUse the Scan Exclusion policy type on the Policy Management page to definespecific ports or assets to e

Strona 109

Configuring and saving a scan policy in the ProventiaManagerUse the Policy Management page on the appliance to configure discovery andassessment scan

Strona 110

Chapter 2. Interpreting scan results in the Proventia ManagerThis chapter explains how to monitor and view scan results in the ProventiaManager.Topics

Strona 111

Trademarks and DisclaimerIBM®and the IBM logo are trademarks or registered trademarks of InternationalBusiness Machines Corporation in the United Stat

Strona 112 - Certainty of OSID sources

Running an ad hoc scanUse the LMI Scan Control page on the appliance to define and run ad hoc scansfor assessment and discovery.Before you beginBefore

Strona 113 - About user-supplied OSIDs

Monitoring the status of a scanUse the Scan Status page on the appliance to view the status of ad hoc discoveryand assessment scans you have initializ

Strona 114

Viewing the results of an ad hoc scanUse the Scan Results page on the appliance to analyze security-related datadiscovered by an ad hoc scan.Procedure

Strona 115

Purging scan data from the databaseUse the Scan Results page on the appliance to schedule the removal of scan datafiles from the /var/log/esm/lmiScans

Strona 116 - Benefits

26 Enterprise Scanner: User Guide

Strona 117 - Field descriptions

Part 2. Scanning from the SiteProtector ConsoleThis section explains how to manage scans from the SiteProtector Console for theEnterprise Scanner agen

Strona 118

28 Enterprise Scanner: User Guide

Strona 119

Chapter 3. Enterprise Scanner policiesThis chapter explains how to use Enterprise Scanner policies to customize yourscanning processes. The policies b

Strona 120

Policy inheritance with Enterprise Scanner policiesThe inheritance properties of policies in SiteProtector provide a flexible andefficient method for

Strona 121

v If you do not override the settings, the column follows the inheritance describedin the table above; however, you must configure those policies.Depl

Strona 122 - Enterprise Scanner

iv Enterprise Scanner: User Guide

Strona 123

Migrating a locally managed Enterprise Scanner agent intoSiteProtectorYou must migrate the Enterprise Scanner agent out of the Locally Managed Agentsa

Strona 124

Viewing asset or agent policies for Enterprise ScannerIn the SiteProtector Console, you can view asset and agent policies together, or youcan view the

Strona 125 - Types of assessment reports

Getting vulnerability help for a SiteProtector Console without InternetaccessIf you use the SiteProtector Console on a computer without an Internet co

Strona 126

Agent policies for Enterprise ScannerAgent policies apply to Enterprise Scanner appliances and describe operationalsettings for the agents or global s

Strona 127

Network Locations policyUse the Network Locations policy to define the perspective (network location) ofan agent and to define routes for those perspe

Strona 128

Important: Users who do not have permission to view the Network Locationspolicy, either through group association or by a specific grant, cannot runEn

Strona 129 - Chapter 9. Logs and alerts

Option DescriptionMetric If you configure more than one route to thesame segment for one perspective, a numberthat indicates the preferred route. The

Strona 130 - Viewing log files

Configuring advanced parameters for event notificationUse the Advanced Parameters tab in the Notification policy on the SiteProtectorConsole to provid

Strona 131 - System logs

2. In the navigation pane, select a group, and then open the Access policy for thatgroup.3. For each password you want to change, complete the followi

Strona 132 - Enterprise Scanner (ES) logs

Configuring the scanning network interfaceUse the Scan Interface tab in the Networking policy on the SiteProtector Console toconfigure the scanning in

Strona 133 - Changing logging detail

ContentsTrademarks and Disclaimer ...iiiAbout this book ...viiRelated publications ...viiiTechnical support contacts ...viiiP

Strona 134

Configuring scanning interface DNS settingsUse the DNS tab in the Networking policy on the SiteProtector Console toconfigure the DNS settings for the

Strona 135 - Alerts log

Services policyUse the Services policy on the SiteProtector Console to enable or disable access toyour appliance from SSH (Secure Shell) applications

Strona 136

Time policyUse the Time policy on the SiteProtector Console to change the date and the timeof the Enterprise Scanner agent, and to enable the network

Strona 137 - Clearing the Alerts log

Update Settings policyUse the Update Settings policy on the SiteProtector Console to configure how theagent automatically locates, downloads, and inst

Strona 138

v A Discovery policy applies to only the group where you define it.v The remaining policies are inheritable. A subgroup inherits a policy from thefirs

Strona 139

Defining assets to discoverUse the Discovery policy on the SiteProtector Console to define the parametersused to perform a discovery scan on a portion

Strona 140

Assessment policyUse the Assessment policy on the SiteProtector Console to define the checks to runfor assessment scans.The Assessment policy contains

Strona 141

Displaying assessment checks by groupsUse the Checks tab in the Assessment policy on the SiteProtector Console to groupchecks by any combination of co

Strona 142 - Custom categories

Selecting assessment checks with filtersUse the Checks tab in the Assessment policy on the SiteProtector Console toprovide filtering values on a selec

Strona 143 - Scanning recommendations

Configuring common assessment settingsUse the Common Settings tab in the Assessment policy on the SiteProtectorConsole to choose settings that define

Strona 144 - Task overview

Scanning behaviors for ad hoc scans ...99Chapter 8. Interpreting scan results inSiteProtector ...103OS identification (OSID) certainty ...

Strona 145

Option DescriptionPorts to scan with generic UDP checks The set of UDP ports to scan with genericUDP checks. You can specify ports using anyof the fol

Strona 146

Option DescriptionDo not perform application fingerprinting Does not try to specifically identify whichapplications are communicating over whichports,

Strona 147 - Part 3. Maintenance

Option DescriptionAllowed account lockout Select a type of lockout:v No lockout allowed: Enterprise Scanneravoids running password guessing checksif a

Strona 148

Assessment Credentials policyUse the Assessment Credentials policy on the SiteProtector Console to defineauthentication credentials for your assets.Th

Strona 149

Option DescriptionAccount Type: WindowsDomain/WorkgroupIndicates that the user account is defined ina Windows Domain or Workgroup. Theaccount is used

Strona 150 - Before you begin

Scan Control policyUse the Scan Control policy on the SiteProtector Console to define the duration ofscanning cycles and to assign user-defined perspe

Strona 151

Defining scanning cycles and assigning perspectives to scansUse the Scan Control policy on the SiteProtector Console to define the duration ofscanning

Strona 152 - Date of last system backup

Scan Window policyUse the Scan Window policy on the SiteProtector Console to define hours ofallowed scanning for discovery scans (scan windows), asses

Strona 153

Defining when scanning is allowedUse the Scan Window policy on the SiteProtector Console to define the days andhours that scanning is allowed.About th

Strona 154 - Making full system backups

Scan Exclusion policyUse the Scan Exclusion policy on the SiteProtector Console to define specific portsor assets to exclude from a scan of a group of

Strona 155

About this bookThis section describes the audience for this guide; identifies related publications;and provides contact information.AudienceUsers of t

Strona 156 - XPU basics

Network Services policyUse the Network Services policy on the SiteProtector Console to define servicenames associated with TCP and UDP ports.You can m

Strona 157 - Updating options

Configuring a Network Services policyUse the Network Services policy on the SiteProtector Console to define servicenames associated with TCP and UDP p

Strona 158

Ad Hoc Scan Control policyUse the Ad Hoc Scan Control policy on the SiteProtector Console to defineEnterprise Scanner ad hoc scans for assessment and

Strona 159

11. If you want to add newly discovered assets to the group where you havedefined the scan, rather than to the Ungrouped Assets group, select the Addn

Strona 160 - 5. Click Save Changes

Option DescriptionHalf-Scan Connections The maximum number of connections thescan should use for opening and closingports.13. Click the Debug Settings

Strona 161 - Configuring an HTTP Proxy

Chapter 4. Understanding scanning processes inSiteProtectorThis chapter explains the high-level processes behind ad hoc and backgroundscanning. It als

Strona 162 - Configuring automatic updates

What is perspective?When you scan a group of assets, you anticipate and interpret results based on thelocation of your agent relative to the location

Strona 163

firewall, descriptive perspective names might be Atlanta-InsideFirewall andAtlanta-OutsideFirewall.Placing agents in the correct perspectiveA perspect

Strona 164 - Manually installing updates

To scan some asset groups from inside your firewall and others from within yourDMZ, follow these steps:1. Set up two groups in SiteProtector:v One gro

Strona 165

Scan jobs and related termsTo tune your system correctly, you must understand how scan jobs run and howthe options you define in policies affect jobs

Strona 166 - Proventia Manager Home page

Related publicationsUse this topic to help you access information about your Enterprise Scannerappliance.PublicationsThe following documents are avail

Strona 167 - Protection status

Scheduled and running scansTo make it easier to explain the scanning processes, scans are considered scheduledwhen they are displayed in the Command J

Strona 168 - Viewing agent status

Tasks per type of scanThe following table explains the tasks needed for discovery and assessment scans:Table 10. Tasks per type of scanScan type Numbe

Strona 169

Task prioritizationThe following table explains the reasons behind prioritization of scanning tasks:Table 11. Reasons for task prioritizationType of s

Strona 170

The process for a scanning cycleThe following table describes the general process for a scanning cycle:Table 12. The process of a scanning cycleStage

Strona 171 - Part 4. Appendixes

Optimizing cycle duration, scan windows, and subtasks for EnterpriseScannerBackground scanning jobs persist throughout a scan cycle, but are active on

Strona 172

Achieving the right balanceIf a refresh cycle is too short, you cannot scan all of your assets during the cycle. Ifa scan window is too short to finis

Strona 173 - DANGER notices

78 Enterprise Scanner: User Guide

Strona 174 - CAUTION notices

Chapter 5. Background scanning in SiteProtectorThis chapter describes the minimum requirements and options for definingbackground scanning in the Site

Strona 175 - Product handling information

Determining when background scans runThis topic describes two important concepts for background scanning: scanningrefresh cycles and scanning windows.

Strona 176 - Product safety labels

How policies apply to ad hoc and background scansAgent policies apply to both ad hoc and background scans, while asset policiesapply to both ad hoc an

Strona 177 - Laser compliance

Part 1. Scanning from the Proventia ManagerThis section explains how to manage scans from the Proventia Manager for theEnterprise Scanner agent.Chapte

Strona 178 - Battery return program

Table 15. Changes to Assessment and Discovery policies (continued)If you... Then you...Modify the configured settings Cannot save the policy. Therefor

Strona 179

Background scanning checklists for Enterprise ScannerThis topic describes the minimum requirements to set up background discoveryand background assess

Strona 180 - Electronic emissions notices

Enabling background scanningUse the Scan Control policy on the SiteProtector Console to define the duration ofrefresh cycles and to assign user-define

Strona 181

Option DescriptionNext cycle start date The beginning date of the next scan cycle.(Display only.)Use Discovery’s start date/duration andwait for disco

Strona 182

Procedure1. From the SiteProtector Console, create a tab to display asset policies.2. In the navigation pane, select a group, and then open the Scan W

Strona 183

Defining ports or assets to exclude from a scanUse the Scan Exclusion policy on the SiteProtector Console to define the specificports, specific assets

Strona 184

Defining network servicesUse the Network Services policy on the SiteProtector Console to define servicenames associated with TCP and UDP ports.Procedu

Strona 185

Defining assessment credentials for a policyUse the Assessment Credentials policy on the SiteProtector Console to defineauthentication credentials for

Strona 186

Option DescriptionAccount Type: SSH LocalIndicates that the user account is definedlocally on a single Unix device that allowsSSH logons. The account

Strona 187

Chapter 6. Monitoring scans in SiteProtectorThis chapter uses terms that define scanning parameters for scan jobs withSiteProtector.Topics“Viewing you

Komentarze do niniejszej Instrukcji

Brak uwag