Chapter 11: Managing Scans
156
IBM Internet Security Systems
Generally Expected Scanning Behaviors
Introduction
Different aspects of scanning behaviors are discussed in detail in different parts of this
guide. This topic answers some of the most common questions about how jobs are
scheduled and how they appear in the Command Jobs window.
Inheritance
Expect the following regarding inheritance:
●
There is a one-to-one correspondence between Scan Control policies and assessment
jobs. A single assessment scan covers the group that has the Scan Control policy and
any groups that inherit the policy.
●
Discovery policies are not inherited. (See “Stopping and Restarting Scan Jobs” on
page 152.)
Priority
Expect the following regarding scan priority:
●
Scans run in priority order as follows:
■
ad hoc discovery scans
■
ad hoc assessment scans (in order of asset criticality)
■
background discovery scans
■
background assessment scans (in order of asset criticality)
●
A change in processing order does not have to wait for an entire job to finish; scan
priorities can cause changes in job processing order that take effect at the completion
of the work assigned to a subtask.
Summary of Contents for Proventia Network Enterprise
Page 1: ...IBM Internet Security Systems IBM Proventia Network Enterprise Scanner User Guide Version 1 3 ...
Page 8: ...8 Contents IBM Internet Security Systems ...
Page 14: ...Preface 14 IBM Internet Security Systems ...
Page 15: ...Part I Getting Started ...
Page 16: ......
Page 69: ...Part II Configuring Enterprise Vulnerability Protection ...
Page 70: ......
Page 80: ...Chapter 5 Introduction to Enterprise Scanner Policies 80 IBM Internet Security Systems ...
Page 120: ...Chapter 8 Defining Agent Policies 120 IBM Internet Security Systems ...
Page 121: ...Part III Scanning ...
Page 122: ......
Page 134: ...Chapter 9 Understanding Scanning Processes in SiteProtector 134 IBM Internet Security Systems ...
Page 150: ...Chapter 10 Monitoring Scans 150 IBM Internet Security Systems ...
Page 164: ...Chapter 11 Managing Scans 164 IBM Internet Security Systems ...
Page 165: ...Part IV Analysis Tracking and Remediation ...
Page 166: ......
Page 190: ...Chapter 13 Tracking and Remediation 190 IBM Internet Security Systems ...
Page 197: ...Part V Maintenance ...
Page 198: ......
Page 212: ...Chapter 16 Updating Enterprise Scanner 212 IBM Internet Security Systems ...
Page 218: ...Chapter 16 Updating Enterprise Scanner 218 IBM Internet Security Systems ...
Page 224: ...Chapter 16 Updating Enterprise Scanner 224 IBM Internet Security Systems ...
Page 252: ...Chapter 18 Enterprise Scanner Logs and Alerts 252 IBM Internet Security Systems ...
Page 258: ...Glossary 258 IBM Internet Security Systems ...
Page 268: ......