72
COMMANDCENTER NOC ADMINISTRATOR GUIDE
3.
Click
add
to have the targets added, or excluded, from the scan.
4.
Click
save settings
to save all addresses entered and return to the previous page.
5.
Scroll to the bottom of the page and create a scanning schedule. Vulnerability scanning can
be scheduled to occur when it won't adversely impact your network. This will allow you to
perform the more intensive vulnerability scanning without impacting your network
availability. Recurring scans can also be configured, allowing you to maintain your network
security.
Figure 87 Create a Vulnerability Scanning Schedule
6.
Select one of the options to perform a one-time scan of the devices that were specified or set
up a scan that repeats according to the frequency you specify.
7.
Click
schedule this vulnerability scan
.
Summary of Contents for COMMANDCENTER NOC
Page 2: ...This page intentionally left blank...
Page 12: ...xii FIGURES...
Page 20: ...8 COMMANDCENTER NOC ADMINISTRATOR GUIDE...
Page 114: ...102 COMMANDCENTER NOC ADMINISTRATOR GUIDE...
Page 132: ...120 COMMANDCENTER NOC ADMINISTRATOR GUIDE...
Page 144: ...132 COMMANDCENTER NOC ADMINISTRATOR GUIDE...
Page 148: ...136 COMMANDCENTER NOC ADMINISTRATOR GUIDE...
Page 155: ...APPENDIX G NETWORK TRAFFIC OVERHEAD NETWORK MANAGEMENT S NECESSARY EVIL 143 255 80 5301 00...