Chapter 3: Running Your First Scans
54
IBM Internet Security Systems
Background Scanning Overview
Introduction
You can run ad hoc scans whenever necessary, but you get the greatest benefit from
Enterprise Scanner when you set up cyclical scans to run automatically in the background.
Reference:
For a description of background scanning, see “Key Concepts” on page 20.
About these
procedures
Background discovery and background assessment scans run separately, just as ad hoc
discovery and assessment scans do. The process for setting up background discovery and
background assessment scans is very similar. The process in this topic combines the
procedures for both types of scans in one set of procedures.
Before you begin
When you complete this process, you will have defined a cycle of scanning for a group of
assets that will repeat until you disable it. If you want to continue these scans after the
testing period, you can change the settings as needed for your environment. If you want
to discontinue these scans, you can stop them. The procedure for stopping the scans
follows the process for starting them.
Tip:
Use a small range of IP addresses to keep the
scan time short. Include assets that are known to have vulnerabilities, if possible.
Tips
are optional
These instructions guide you through the process without explaining every detail. If you
are interested in the details, refer to the information in the
Tips
for different steps. If you
are not interested in the details, you can ignore the tips.
Содержание Proventia Network Enterprise
Страница 1: ...IBM Internet Security Systems IBM Proventia Network Enterprise Scanner User Guide Version 1 3 ...
Страница 8: ...8 Contents IBM Internet Security Systems ...
Страница 14: ...Preface 14 IBM Internet Security Systems ...
Страница 15: ...Part I Getting Started ...
Страница 16: ......
Страница 69: ...Part II Configuring Enterprise Vulnerability Protection ...
Страница 70: ......
Страница 80: ...Chapter 5 Introduction to Enterprise Scanner Policies 80 IBM Internet Security Systems ...
Страница 120: ...Chapter 8 Defining Agent Policies 120 IBM Internet Security Systems ...
Страница 121: ...Part III Scanning ...
Страница 122: ......
Страница 134: ...Chapter 9 Understanding Scanning Processes in SiteProtector 134 IBM Internet Security Systems ...
Страница 150: ...Chapter 10 Monitoring Scans 150 IBM Internet Security Systems ...
Страница 164: ...Chapter 11 Managing Scans 164 IBM Internet Security Systems ...
Страница 165: ...Part IV Analysis Tracking and Remediation ...
Страница 166: ......
Страница 190: ...Chapter 13 Tracking and Remediation 190 IBM Internet Security Systems ...
Страница 197: ...Part V Maintenance ...
Страница 198: ......
Страница 212: ...Chapter 16 Updating Enterprise Scanner 212 IBM Internet Security Systems ...
Страница 218: ...Chapter 16 Updating Enterprise Scanner 218 IBM Internet Security Systems ...
Страница 224: ...Chapter 16 Updating Enterprise Scanner 224 IBM Internet Security Systems ...
Страница 252: ...Chapter 18 Enterprise Scanner Logs and Alerts 252 IBM Internet Security Systems ...
Страница 258: ...Glossary 258 IBM Internet Security Systems ...
Страница 268: ......