![IBM Proventia Network Enterprise Скачать руководство пользователя страница 96](http://html.mh-extra.com/html/ibm/proventia-network-enterprise/proventia-network-enterprise_user-manual_608165096.webp)
Chapter 6: Defining Background Scans
96
IBM Internet Security Systems
Key Parameters for Defining Scan Jobs
Introduction
If you understand how to define ad hoc and background scans with Enterprise Scanner,
you can use this topic to quickly reference key scanning parameters.
Key parameters
The following table describes how to find and configure key parameters to define scans:
If you want to…
Then, open the…
And then…
define perspectives to use for
your Site
Network Locations policy for
the Site
add a new
Network Location
Name
.
define the perspective of an
agent
ESM policy for the agent
select the network location
from the
Perspective
(Network location)
list.
define the perspective from
which you want to scan a group
with a background scan
Scan Control policy for the
group to scan
select the perspective from the
Perform background scans
from this perspective
(Network location)
list.
define the perspective from
which you want to scan a group
with an ad hoc scan
Remote Scan (ad hoc) policy
(right-click a group, and then
select
Scan
from the pop-up
menu)
select the perspective from the
Perform one-time scan from
this perspective (network
location)
list.
define the number of assets in
a subgroup to scan in one
subtask
a
a. For guidance in determining the size of subtasks, see “Considerations for Subtask Sizes” on page 111.
ESM policy for the agent
change the
Maximum IPs per
discovery subtask
and/or the
Maximum assets per
assessment subtask
boxes.
define the duration of the
scanning cycle—the amount of
time that passes before the
scans automatically run again
and refresh the data—for a
group of assets
Scan Control policy for the
group to scan
configure
Cycle start date
and
Cycle duration
for discovery
and for assessment scans.
define the windows when
scanning is allowed
Scan Window policy for the
group to scan
configure the
Discovery
Windows
and the
Assessment Windows
.
Table 34:
Key scanning parameters
Содержание Proventia Network Enterprise
Страница 1: ...IBM Internet Security Systems IBM Proventia Network Enterprise Scanner User Guide Version 1 3 ...
Страница 8: ...8 Contents IBM Internet Security Systems ...
Страница 14: ...Preface 14 IBM Internet Security Systems ...
Страница 15: ...Part I Getting Started ...
Страница 16: ......
Страница 69: ...Part II Configuring Enterprise Vulnerability Protection ...
Страница 70: ......
Страница 80: ...Chapter 5 Introduction to Enterprise Scanner Policies 80 IBM Internet Security Systems ...
Страница 120: ...Chapter 8 Defining Agent Policies 120 IBM Internet Security Systems ...
Страница 121: ...Part III Scanning ...
Страница 122: ......
Страница 134: ...Chapter 9 Understanding Scanning Processes in SiteProtector 134 IBM Internet Security Systems ...
Страница 150: ...Chapter 10 Monitoring Scans 150 IBM Internet Security Systems ...
Страница 164: ...Chapter 11 Managing Scans 164 IBM Internet Security Systems ...
Страница 165: ...Part IV Analysis Tracking and Remediation ...
Страница 166: ......
Страница 190: ...Chapter 13 Tracking and Remediation 190 IBM Internet Security Systems ...
Страница 197: ...Part V Maintenance ...
Страница 198: ......
Страница 212: ...Chapter 16 Updating Enterprise Scanner 212 IBM Internet Security Systems ...
Страница 218: ...Chapter 16 Updating Enterprise Scanner 218 IBM Internet Security Systems ...
Страница 224: ...Chapter 16 Updating Enterprise Scanner 224 IBM Internet Security Systems ...
Страница 252: ...Chapter 18 Enterprise Scanner Logs and Alerts 252 IBM Internet Security Systems ...
Страница 258: ...Glossary 258 IBM Internet Security Systems ...
Страница 268: ......