Descriptions of Asset Policies
75
IBM Proventia Network Enterprise Scanner User Guide, Version 1.3
Descriptions of Asset Policies
Introduction
This topic describes the policies that define scanning requirements for groups of assets
(asset policies).
Asset policy
descriptions
Table 22 describes the asset policies:
Icon
Policy
Description
Assessment
Defines the following for assessment scans:
•
which checks to run against assets in the group
•
assessment check parameters
•
common settings for assessment scans
Assessment
Credentials
Contains logon account information for running checks that
require authenticated access.
Discovery
Defines the following for discovery scans:
•
IP addresses and address ranges for a scan to discover
•
how to handle discovered assets
Network Locations
a
a. You can have only one Network Locations policy. It defines perspectives that are used by all agents and
assets at the Site. It appears once for the Site at the Site Group level.
Defines relative locations of agents on the network to use as
scanning perspectives. For assets, think of perspective as the
location from which you want to scan the assets in the group.
Network Services
Defines the ports on which services run.
Scan Control
Controls the following:
•
whether discovery and/or assessment scanning is enabled
•
refresh cycles for background discovery and assessment
scans
•
the perspective from which to run background scans against
this group
Important:
This policy initiates background scanning. Do not
save it until you have completely configured background scanning.
Scan Exclusion
Defines IP addresses and/or ports that you want to exclude from
assessment scans.
Scan Window
Defines the allowable windows for background discovery and/or
assessment scanning as well as the time zone for the scanning
windows.
Tip:
Optionally, you can limit ad hoc scans to run only during open
scanning windows.
Table 22:
Descriptions of the asset policies
Summary of Contents for Proventia Network Enterprise
Page 1: ...IBM Internet Security Systems IBM Proventia Network Enterprise Scanner User Guide Version 1 3 ...
Page 8: ...8 Contents IBM Internet Security Systems ...
Page 14: ...Preface 14 IBM Internet Security Systems ...
Page 15: ...Part I Getting Started ...
Page 16: ......
Page 69: ...Part II Configuring Enterprise Vulnerability Protection ...
Page 70: ......
Page 80: ...Chapter 5 Introduction to Enterprise Scanner Policies 80 IBM Internet Security Systems ...
Page 120: ...Chapter 8 Defining Agent Policies 120 IBM Internet Security Systems ...
Page 121: ...Part III Scanning ...
Page 122: ......
Page 134: ...Chapter 9 Understanding Scanning Processes in SiteProtector 134 IBM Internet Security Systems ...
Page 150: ...Chapter 10 Monitoring Scans 150 IBM Internet Security Systems ...
Page 164: ...Chapter 11 Managing Scans 164 IBM Internet Security Systems ...
Page 165: ...Part IV Analysis Tracking and Remediation ...
Page 166: ......
Page 190: ...Chapter 13 Tracking and Remediation 190 IBM Internet Security Systems ...
Page 197: ...Part V Maintenance ...
Page 198: ......
Page 212: ...Chapter 16 Updating Enterprise Scanner 212 IBM Internet Security Systems ...
Page 218: ...Chapter 16 Updating Enterprise Scanner 218 IBM Internet Security Systems ...
Page 224: ...Chapter 16 Updating Enterprise Scanner 224 IBM Internet Security Systems ...
Page 252: ...Chapter 18 Enterprise Scanner Logs and Alerts 252 IBM Internet Security Systems ...
Page 258: ...Glossary 258 IBM Internet Security Systems ...
Page 268: ......