Considerations for Subtask Sizes
111
IBM Proventia Network Enterprise Scanner User Guide, Version 1.3
Considerations for Subtask Sizes
Introduction
This topic describes considerations for configuring the sizes of subtasks in the ESM
(Enterprise Scanner Module) policy. Subtasks consist of the following:
●
the number of IP addresses to discover at one time in a discovery scan
●
the number of assets to scan at one time in an assessment scan
Purpose of a
subtask
Dividing a scanning job into tasks, and dividing those tasks into subtasks, makes it
possible to do the following:
●
Run a scan faster by using more than one Enterprise Scanner agent.
●
Run a scan in increments that can finish during allowable scan windows.
Two values in the ESM policy—Max IPs per discovery subtask and Max assets per
assessment subtask—control the size of subtasks that run over the associated scanning
network interface.
Determining
subtask size
The goal in defining subtask sizes is to maximize the average number of hosts scanned per
hour from each perspective. Average per-IP discovery times and per-host assessment
times vary across perspective for the following reasons:
●
differences in the average response time
●
the profiles of the hosts being scanned
●
the number of appliances sharing the work at each perspective
Because of these differences, the optimal subtask sizes may differ by perspective.
Suggestion:
Because the optimal settings vary by perspective, you should generally use
the same subtask sizes for all appliances that share a perspective.
Advantages of
different-sized
subtasks
Consider the following advantages of larger and smaller subtasks:
●
Larger subtasks involve less task management overhead (because fewer subtasks per
task are needed to scan a given number of hosts or IP addresses).
●
With smaller subtasks, there is less work to redo when a subtask is not finished before
a scan window closes. If a five-minute subtask is canceled because it is still running
when a scan window closes, then at most, five-minutes worth of scanning will be
redone at the beginning of the next open scan window.
●
Smaller subtasks allow finer-grained load balancing of work across multiple
appliances that share the same perspective.
Defaults
The default maximum sizes for IPs per discovery subtask and assets per assessment
subtask are reasonable starting points. If the default settings allow you to scan all of your
assets once per cycle within the scan windows you have defined, then you should not
need to change the default settings.
Содержание Proventia Network Enterprise
Страница 1: ...IBM Internet Security Systems IBM Proventia Network Enterprise Scanner User Guide Version 1 3 ...
Страница 8: ...8 Contents IBM Internet Security Systems ...
Страница 14: ...Preface 14 IBM Internet Security Systems ...
Страница 15: ...Part I Getting Started ...
Страница 16: ......
Страница 69: ...Part II Configuring Enterprise Vulnerability Protection ...
Страница 70: ......
Страница 80: ...Chapter 5 Introduction to Enterprise Scanner Policies 80 IBM Internet Security Systems ...
Страница 120: ...Chapter 8 Defining Agent Policies 120 IBM Internet Security Systems ...
Страница 121: ...Part III Scanning ...
Страница 122: ......
Страница 134: ...Chapter 9 Understanding Scanning Processes in SiteProtector 134 IBM Internet Security Systems ...
Страница 150: ...Chapter 10 Monitoring Scans 150 IBM Internet Security Systems ...
Страница 164: ...Chapter 11 Managing Scans 164 IBM Internet Security Systems ...
Страница 165: ...Part IV Analysis Tracking and Remediation ...
Страница 166: ......
Страница 190: ...Chapter 13 Tracking and Remediation 190 IBM Internet Security Systems ...
Страница 197: ...Part V Maintenance ...
Страница 198: ......
Страница 212: ...Chapter 16 Updating Enterprise Scanner 212 IBM Internet Security Systems ...
Страница 218: ...Chapter 16 Updating Enterprise Scanner 218 IBM Internet Security Systems ...
Страница 224: ...Chapter 16 Updating Enterprise Scanner 224 IBM Internet Security Systems ...
Страница 252: ...Chapter 18 Enterprise Scanner Logs and Alerts 252 IBM Internet Security Systems ...
Страница 258: ...Glossary 258 IBM Internet Security Systems ...
Страница 268: ......