Possible Scenarios
185
IBM Proventia Network Enterprise Scanner User Guide, Version 1.3
Possible Scenarios
Introduction
The tracking features available with Enterprise Scanner and SiteProtector are adaptable,
and you can easily integrate them with your company’s workflow. This topic suggests
some ways to use the tracking and remediation features.
What assets are
vulnerable to
attacks?
Scenario:
You want to check all assets on the network for vulnerabilities.
Action plan:
Run an assessment scan to identify which assets on the network have
vulnerabilities that have not been patched. If you find vulnerable assets, create a ticket to
patch the vulnerabilities.
What assets are on
the network?
Scenario:
You do not want assets added to the network without approval. You want to
know what assets are currently running on your network.
Action plan:
Run a discovery scan to identify all assets on the network. If you find an
unauthorized asset, create a ticket to locate the asset and take appropriate action.
What services are
running?
Scenario:
You want to verify that assets on your network are running only approved
services.
Action plan:
Identify services you do not want to run on any assets in the network. Run an
assessment scan to determine what services are running on network assets. Enterprise
Scanner can scan for TCP services, UDP services, or both. Create a ticket to investigate and
disable unauthorized services or remove assets from the network.
What operating
systems are
running?
Scenario:
You want to verify that assets on the network are running only approved
operating systems.
Action plan:
Run a discovery scan for the range of IP addresses for active assets. Identify
any assets running unapproved or outdated operating systems. Create a ticket to locate
assets that are out of compliance, and update their operating systems.
Содержание Proventia Network Enterprise
Страница 1: ...IBM Internet Security Systems IBM Proventia Network Enterprise Scanner User Guide Version 1 3 ...
Страница 8: ...8 Contents IBM Internet Security Systems ...
Страница 14: ...Preface 14 IBM Internet Security Systems ...
Страница 15: ...Part I Getting Started ...
Страница 16: ......
Страница 69: ...Part II Configuring Enterprise Vulnerability Protection ...
Страница 70: ......
Страница 80: ...Chapter 5 Introduction to Enterprise Scanner Policies 80 IBM Internet Security Systems ...
Страница 120: ...Chapter 8 Defining Agent Policies 120 IBM Internet Security Systems ...
Страница 121: ...Part III Scanning ...
Страница 122: ......
Страница 134: ...Chapter 9 Understanding Scanning Processes in SiteProtector 134 IBM Internet Security Systems ...
Страница 150: ...Chapter 10 Monitoring Scans 150 IBM Internet Security Systems ...
Страница 164: ...Chapter 11 Managing Scans 164 IBM Internet Security Systems ...
Страница 165: ...Part IV Analysis Tracking and Remediation ...
Страница 166: ......
Страница 190: ...Chapter 13 Tracking and Remediation 190 IBM Internet Security Systems ...
Страница 197: ...Part V Maintenance ...
Страница 198: ......
Страница 212: ...Chapter 16 Updating Enterprise Scanner 212 IBM Internet Security Systems ...
Страница 218: ...Chapter 16 Updating Enterprise Scanner 218 IBM Internet Security Systems ...
Страница 224: ...Chapter 16 Updating Enterprise Scanner 224 IBM Internet Security Systems ...
Страница 252: ...Chapter 18 Enterprise Scanner Logs and Alerts 252 IBM Internet Security Systems ...
Страница 258: ...Glossary 258 IBM Internet Security Systems ...
Страница 268: ......