Glossary
255
IBM Proventia Network Enterprise Scanner User Guide, Version 1.3
g
group-level permissions—
Permissions that control the user’s ability to view, modify, and work with agents and
assets in a specific group.
h
heartbeat interval—
The number of seconds you want the agent to wait between the times it contacts SiteProtector
for changed policies and updates to firmware and assessment content.
hostname—
The fully qualified domain name for the Enterprise Scanner.
i
inheritance—
A policy for a group in your group structure, which applies to the group’s subgroups unless a
subgroup already has its own version of the policy.
interface log—
The log that communicates details between SiteProtector and the Enterprise Scanner.
j
job—
The command job in SiteProtector that defines and managers the overall scanning requirements of a group.
l
logs—
The log that traces the execution logic of the agent.
m
management interface—
The interface that Enterprise Scanner uses to communicate with SiteProtector for
configuration and for passing scan results SiteProtector.
n
nameservers—
The primary, secondary, and tertiary nameservers to use for resolving DNS names.
Network Services policy—
A asset-centric policy that defines service names associated with TCP and UDP ports.
Networking policy—
A policy that enables you to reconfigure the network configuration settings for the
management and scan interfaces and for the DNS serves and search paths.
Notification policy—
A policy that configures responses for the Enterprise Scanner agent.
o
OneTrust Infrastructure—
Provides the license for the appliance and provides updates for firmware and
assessment content updates.
operator—
A user in the SiteProtector user group that has limited task ability.
Summary of Contents for Proventia Network Enterprise
Page 1: ...IBM Internet Security Systems IBM Proventia Network Enterprise Scanner User Guide Version 1 3 ...
Page 8: ...8 Contents IBM Internet Security Systems ...
Page 14: ...Preface 14 IBM Internet Security Systems ...
Page 15: ...Part I Getting Started ...
Page 16: ......
Page 69: ...Part II Configuring Enterprise Vulnerability Protection ...
Page 70: ......
Page 80: ...Chapter 5 Introduction to Enterprise Scanner Policies 80 IBM Internet Security Systems ...
Page 120: ...Chapter 8 Defining Agent Policies 120 IBM Internet Security Systems ...
Page 121: ...Part III Scanning ...
Page 122: ......
Page 134: ...Chapter 9 Understanding Scanning Processes in SiteProtector 134 IBM Internet Security Systems ...
Page 150: ...Chapter 10 Monitoring Scans 150 IBM Internet Security Systems ...
Page 164: ...Chapter 11 Managing Scans 164 IBM Internet Security Systems ...
Page 165: ...Part IV Analysis Tracking and Remediation ...
Page 166: ......
Page 190: ...Chapter 13 Tracking and Remediation 190 IBM Internet Security Systems ...
Page 197: ...Part V Maintenance ...
Page 198: ......
Page 212: ...Chapter 16 Updating Enterprise Scanner 212 IBM Internet Security Systems ...
Page 218: ...Chapter 16 Updating Enterprise Scanner 218 IBM Internet Security Systems ...
Page 224: ...Chapter 16 Updating Enterprise Scanner 224 IBM Internet Security Systems ...
Page 252: ...Chapter 18 Enterprise Scanner Logs and Alerts 252 IBM Internet Security Systems ...
Page 258: ...Glossary 258 IBM Internet Security Systems ...
Page 268: ......