![IBM Proventia Network Enterprise User Manual Download Page 72](http://html.mh-extra.com/html/ibm/proventia-network-enterprise/proventia-network-enterprise_user-manual_608165072.webp)
Chapter 5: Introduction to Enterprise Scanner Policies
72
IBM Internet Security Systems
Introduction to Asset and Agent Policies
Introduction
The most important difference with Enterprise Scanner policies is the difference between
asset and agent policies:
●
Asset policies apply to groups of assets and describe the security policy for those
assets.
●
Agent policies apply to Enterprise Scanner appliances and primarily describe
operational settings for the agents or global settings for all scans. In addition, some
agent policies apply to only one agent.
●
Some policies define characteristics that apply to both assets and agents.
Approach to asset
and agent policies
The approach to scanning with Enterprise Scanner considers the differences between asset
and agent policies:
●
When you configure policies for scanning a group of assets, you first identify IP
addresses to discover. Then, you identify assessment-related characteristics, such as
which checks to run for those assets. You do not define any characteristics of the
scanning agent, except to identify the potential pool (perspective) of agents to run the
scan.
●
When you define characteristics of an agent, you define operational features, such as
how to divide discovery and assessment scans into subtasks, the passwords for the
agent’s accounts, and its perspective; but you do not define security-related
parameters.
Advantages
By separating asset and agent policies, scanning is flexible and easily scalable, as
demonstrated in the following examples:
●
You can configure assessment scans for two groups of assets with different security
needs—such as a group of Web servers and a group on an internal subnet. After the
initial configuration, you could scan both groups with the same agent without
changing any policies on the agent or on the groups of assets.
●
You can also respond to changes in your network more easily. If a group of assets
grows, and you need to increase the scanning power for that group; you can add an
agent to the pool (by assigning it to the correct perspective). After you set up the agent
and register it with your the SiteProtector system, the agent immediately begins to
share the workload for the pool of agents assigned to that perspective.
●
Likewise, you could remove an agent from a pool, and the agents that remain would
continue to share the work load assigned to that pool.
Summary of Contents for Proventia Network Enterprise
Page 1: ...IBM Internet Security Systems IBM Proventia Network Enterprise Scanner User Guide Version 1 3 ...
Page 8: ...8 Contents IBM Internet Security Systems ...
Page 14: ...Preface 14 IBM Internet Security Systems ...
Page 15: ...Part I Getting Started ...
Page 16: ......
Page 69: ...Part II Configuring Enterprise Vulnerability Protection ...
Page 70: ......
Page 80: ...Chapter 5 Introduction to Enterprise Scanner Policies 80 IBM Internet Security Systems ...
Page 120: ...Chapter 8 Defining Agent Policies 120 IBM Internet Security Systems ...
Page 121: ...Part III Scanning ...
Page 122: ......
Page 134: ...Chapter 9 Understanding Scanning Processes in SiteProtector 134 IBM Internet Security Systems ...
Page 150: ...Chapter 10 Monitoring Scans 150 IBM Internet Security Systems ...
Page 164: ...Chapter 11 Managing Scans 164 IBM Internet Security Systems ...
Page 165: ...Part IV Analysis Tracking and Remediation ...
Page 166: ......
Page 190: ...Chapter 13 Tracking and Remediation 190 IBM Internet Security Systems ...
Page 197: ...Part V Maintenance ...
Page 198: ......
Page 212: ...Chapter 16 Updating Enterprise Scanner 212 IBM Internet Security Systems ...
Page 218: ...Chapter 16 Updating Enterprise Scanner 218 IBM Internet Security Systems ...
Page 224: ...Chapter 16 Updating Enterprise Scanner 224 IBM Internet Security Systems ...
Page 252: ...Chapter 18 Enterprise Scanner Logs and Alerts 252 IBM Internet Security Systems ...
Page 258: ...Glossary 258 IBM Internet Security Systems ...
Page 268: ......