![IBM Proventia Network Enterprise User Manual Download Page 86](http://html.mh-extra.com/html/ibm/proventia-network-enterprise/proventia-network-enterprise_user-manual_608165086.webp)
Chapter 6: Defining Background Scans
86
IBM Internet Security Systems
Background Scanning Checklists
Introduction
You can set up background scans by configuring only the required policies, or you can
fully customize background scans by configuring additional policies. This topic describes
the minimum requirements to set up background discovery and background assessment
scanning. You should also use any other policies that help you configure you scanning
environment to meet your security goals.
Checklist for
background
discovery scans
The following table describes the requirements for setting up background discovery
scanning for a group:
Checklist for
background
assessment scans
The following table describes the requirements for setting up background assessment
scanning for a group:
9
Requirement
Apply a Discovery policy to the group.
See “Defining Assets to Discover (Discovery Policy)” on page 99.
Apply a Scan Window policy to the group (either directly or through inheritance from a higher
group).
See “Defining Periods of Allowed Scanning (Scan Window Policy)” on page 89.
Optional: Apply an Assessment Credentials policy to the group for better OS identification.
See “Defining Assessment Credentials (Assessment Credentials Policy)” on page 94.
Apply a Scan Control policy to the group (either directly or through inheritance from a higher
group).
See “Enabling Background Scanning (Scan Control Policy)” on page 87.
Table 32:
Checklist for background discovery scanning
9
Requirement
Verify that the group already contains assets, possibly from a recent discovery scan.
Apply an Assessment policy to the group (either directly or through inheritance from a higher
group).
See “Defining Assessment Details Introduction (Assessment Policy)” on page 100.
Apply a Scan Window policy to the group (either directly or through inheritance from a higher
group).
See “Defining Periods of Allowed Scanning (Scan Window Policy)” on page 89.
Optional: Apply an Assessment Credentials policy to the group for better OS identification.
See “Defining Assessment Credentials (Assessment Credentials Policy)” on page 94.
Apply a Scan Control policy to the group (either directly or through inheritance from a higher
group).
See “Enabling Background Scanning (Scan Control Policy)” on page 87.
Table 33:
Checklist for background discovery scanning
Summary of Contents for Proventia Network Enterprise
Page 1: ...IBM Internet Security Systems IBM Proventia Network Enterprise Scanner User Guide Version 1 3 ...
Page 8: ...8 Contents IBM Internet Security Systems ...
Page 14: ...Preface 14 IBM Internet Security Systems ...
Page 15: ...Part I Getting Started ...
Page 16: ......
Page 69: ...Part II Configuring Enterprise Vulnerability Protection ...
Page 70: ......
Page 80: ...Chapter 5 Introduction to Enterprise Scanner Policies 80 IBM Internet Security Systems ...
Page 120: ...Chapter 8 Defining Agent Policies 120 IBM Internet Security Systems ...
Page 121: ...Part III Scanning ...
Page 122: ......
Page 134: ...Chapter 9 Understanding Scanning Processes in SiteProtector 134 IBM Internet Security Systems ...
Page 150: ...Chapter 10 Monitoring Scans 150 IBM Internet Security Systems ...
Page 164: ...Chapter 11 Managing Scans 164 IBM Internet Security Systems ...
Page 165: ...Part IV Analysis Tracking and Remediation ...
Page 166: ......
Page 190: ...Chapter 13 Tracking and Remediation 190 IBM Internet Security Systems ...
Page 197: ...Part V Maintenance ...
Page 198: ......
Page 212: ...Chapter 16 Updating Enterprise Scanner 212 IBM Internet Security Systems ...
Page 218: ...Chapter 16 Updating Enterprise Scanner 218 IBM Internet Security Systems ...
Page 224: ...Chapter 16 Updating Enterprise Scanner 224 IBM Internet Security Systems ...
Page 252: ...Chapter 18 Enterprise Scanner Logs and Alerts 252 IBM Internet Security Systems ...
Page 258: ...Glossary 258 IBM Internet Security Systems ...
Page 268: ......