![IBM Proventia Network Enterprise Скачать руководство пользователя страница 104](http://html.mh-extra.com/html/ibm/proventia-network-enterprise/proventia-network-enterprise_user-manual_608165104.webp)
Chapter 7: Configuring Discovery and Assessment Policies
104
IBM Internet Security Systems
Example: Checks by
groups
Figure 22 is an example of grouping checks by Category, Severity, and then Impact. The
category, CGI-Bin, contains checks with High, Medium, and Low severity. Within the
High severity checks, five have no impact while one may crash an asset:
Figure 22:
Check grouping example
Creating groupings
To modify the Check Information list:
1. In the SiteProtector Console, set up a tab to display asset policies. (See page 74.)
2. On the navigation pane, select a group, and then open the Assessment policy for that
group.
3. Do any of the following
that is sorted and reverse its sort
order
click the column heading.
The sort order is reversed.
in a particular order
right-click the column heading, and then select either
Sort Ascending
or
Sort Descending
from the pop-up
menu.
when vulnerabilities are displayed
in groupings
click the column heading, and then expand the groups to
see the effect of the sorting.
If you want to sort a column…
Then…
If you want to…
Then…
group by a single column
right-click a column, and then select
Group by
from the pop-up
menu.
group by multiple
columns
click
, and then move the columns you want to group by from
the
All Columns
list to the
Group By These Columns
list in the
order you want to group by.
Note:
If the column you want to group by is not available, add it,
and then try again.
Содержание Proventia Network Enterprise
Страница 1: ...IBM Internet Security Systems IBM Proventia Network Enterprise Scanner User Guide Version 1 3 ...
Страница 8: ...8 Contents IBM Internet Security Systems ...
Страница 14: ...Preface 14 IBM Internet Security Systems ...
Страница 15: ...Part I Getting Started ...
Страница 16: ......
Страница 69: ...Part II Configuring Enterprise Vulnerability Protection ...
Страница 70: ......
Страница 80: ...Chapter 5 Introduction to Enterprise Scanner Policies 80 IBM Internet Security Systems ...
Страница 120: ...Chapter 8 Defining Agent Policies 120 IBM Internet Security Systems ...
Страница 121: ...Part III Scanning ...
Страница 122: ......
Страница 134: ...Chapter 9 Understanding Scanning Processes in SiteProtector 134 IBM Internet Security Systems ...
Страница 150: ...Chapter 10 Monitoring Scans 150 IBM Internet Security Systems ...
Страница 164: ...Chapter 11 Managing Scans 164 IBM Internet Security Systems ...
Страница 165: ...Part IV Analysis Tracking and Remediation ...
Страница 166: ......
Страница 190: ...Chapter 13 Tracking and Remediation 190 IBM Internet Security Systems ...
Страница 197: ...Part V Maintenance ...
Страница 198: ......
Страница 212: ...Chapter 16 Updating Enterprise Scanner 212 IBM Internet Security Systems ...
Страница 218: ...Chapter 16 Updating Enterprise Scanner 218 IBM Internet Security Systems ...
Страница 224: ...Chapter 16 Updating Enterprise Scanner 224 IBM Internet Security Systems ...
Страница 252: ...Chapter 18 Enterprise Scanner Logs and Alerts 252 IBM Internet Security Systems ...
Страница 258: ...Glossary 258 IBM Internet Security Systems ...
Страница 268: ......