Accessing The Saas Vulnerability Scanning Portal; Overview Of Scanning Process - McAfee TSA00M005PAA - Total Protection Service Product Manual

Processor guide
Hide thumbs Also See for TSA00M005PAA - Total Protection Service:
Table of Contents

Advertisement

Using the SaaS Vulnerability Scanning Service

Overview of scanning process

Accessing the SaaS vulnerability scanning portal

Use this task to access the SaaS vulnerability scanning portal, which provides tools for
managing network security and certification.
Task
1 On the Dashboard page of the SecurityCenter, in the SaaS Vulnerability Scanning/PCI
Certification widget, select Click here to configure.
The SaaS vulnerability scanning portal opens in a separate browser window.
NOTE:
If the widget is not displayed, click Add Widget to display the Dashboard Widget
Gallery. Locate the SaaS Vulnerability Scanning/PCI Certification widget, then click Add
to Dashboard.
2 In the portal, click the Security tab to display the Security Dashboard page.
• View status and alerts for devices and scans.
• View discovery results, or add domains and networks for scanning.
• Configure and perform scans.
• Access scan results for information about detected vulnerabilities and
remediation options.
3 Click Logout to close the portal and return to the SecurityCenter.
Overview of scanning process
This is the high-level process for configuring vulnerability scans for your network.
1
Log on to the SaaS vulnerability scanning portal.
2
Specify what to scan by one of these methods:
• If you know which IP addresses to scan — Add one or more IP addresses.
• If you do not know which IP addresses to scan — Add a domain, then run a discovery
scan to identify the active IP addresses.
IP addresses (and ranges of IP addresses comprising networks) are called devices in the
vulnerability scanning portal.
3 Configure the devices you want to scan. This includes selecting the type of device, which
determines the standard used for scanning.
4
Configure the devices to accept the IP addresses (maintained by McAfee) where
vulnerability scans originate.
5
Create groups where devices can be placed. (Optional)
6
Configure and initiate scans manually, or schedule them to occur at a later time.
If your subscription includes certification, scans are required at specific intervals.
Check the requirements for your subscription.
7
View results of the scans and suggested remediation tasks (if vulnerabilities were found).
Optionally, generate customized reports and schedule remediation tasks.
McAfee Total Protection Service Product Guide
122

Advertisement

Table of Contents
loading

Table of Contents