Description of Check Information (Assessment Policy)
101
IBM Proventia Network Enterprise Scanner User Guide, Version 1.3
Description of Check Information (Assessment Policy)
Introduction
The checks that Enterprise Scanner uses appear in the Checks tab of the Assessment
policy. This topic describes the information available about each check.
Check group
definitions
Table 38 describes the columns of information available about each check in the Checks
tab of the Assessment policy:
Column
Description
Authentication
The type of authentication required to run the check, if any.
Category
The check’s vulnerability category.
For example, a check could be related to a back door, an email exploit, or
SNMP.
Tip:
To see all the categories of checks, group the checks by category.
Check
The name of the check.
Check ID
An unsigned 64-bit integer that is the check’s unique identifier in the number
system IBM ISS uses for checks.
Comment
Indicates whether the check has a configured option enabled, such as a timeout
setting.
Customized
Indicates that one or more parameters have been changed from their default
settings.
Note:
This condition is set automatically when you change or reset a
parameter that you can customize.
Description
A short phrase describing the vulnerability detected by the check and the
method the check employs to detect it.
Example:
“Looks at the Windows registry to determine whether an AOL Instant
Messaging Client is present on the system.”
Enabled
Enables the check for the scan.
Impact
A value describing the check’s impact on the target host or network. Some
possible impacts may include crashing the target host, slowing the target host,
crashing the target service, slowing the target service, slowing the network, or
none.
Note:
The impact of
None
, indicates that the check does not create a denial-of-
service (DoS) situation on an asset.
Info
A link to the IBM ISS Web site location of up-to-date remedy information for the
assessment checks.
No target result
A value indicating what result (present, absent, or unknown) should be returned
if the check does not run due to its target type not being found on the host being
assessed.
Severity
The severity or risk level assigned to the vulnerability:
•
low
•
medium
•
high
Table 38:
Check grouping definitions
Содержание Proventia Network Enterprise
Страница 1: ...IBM Internet Security Systems IBM Proventia Network Enterprise Scanner User Guide Version 1 3 ...
Страница 8: ...8 Contents IBM Internet Security Systems ...
Страница 14: ...Preface 14 IBM Internet Security Systems ...
Страница 15: ...Part I Getting Started ...
Страница 16: ......
Страница 69: ...Part II Configuring Enterprise Vulnerability Protection ...
Страница 70: ......
Страница 80: ...Chapter 5 Introduction to Enterprise Scanner Policies 80 IBM Internet Security Systems ...
Страница 120: ...Chapter 8 Defining Agent Policies 120 IBM Internet Security Systems ...
Страница 121: ...Part III Scanning ...
Страница 122: ......
Страница 134: ...Chapter 9 Understanding Scanning Processes in SiteProtector 134 IBM Internet Security Systems ...
Страница 150: ...Chapter 10 Monitoring Scans 150 IBM Internet Security Systems ...
Страница 164: ...Chapter 11 Managing Scans 164 IBM Internet Security Systems ...
Страница 165: ...Part IV Analysis Tracking and Remediation ...
Страница 166: ......
Страница 190: ...Chapter 13 Tracking and Remediation 190 IBM Internet Security Systems ...
Страница 197: ...Part V Maintenance ...
Страница 198: ......
Страница 212: ...Chapter 16 Updating Enterprise Scanner 212 IBM Internet Security Systems ...
Страница 218: ...Chapter 16 Updating Enterprise Scanner 218 IBM Internet Security Systems ...
Страница 224: ...Chapter 16 Updating Enterprise Scanner 224 IBM Internet Security Systems ...
Страница 252: ...Chapter 18 Enterprise Scanner Logs and Alerts 252 IBM Internet Security Systems ...
Страница 258: ...Glossary 258 IBM Internet Security Systems ...
Страница 268: ......