Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - MANAGING VULNERABILITY ASSESSMENT V1 Manual page 25

Managing vulnerability assessment
Table of Contents

Advertisement

Step 6
Step 7
Step 8
Editing an Nmap
Scanner
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Step 7
Table 5-2 Nmap Parameters (continued)
Parameter
Description
Login Password
If Enable Key Authentication is disabled, specify the password
necessary to log in to the Nessus client system.
If key authentication is disabled, you must set a login password.
Private Key File
Specify the directory path to the file that contains the private key
information. The default is /opt/qradar/conf/vis.ssh.key.
This parameter is mandatory if key authentication is enabled.
Note: If the scanner is configured to use a password, the SSH scanner server to
which STRM connects must support password authentication. If it does not, SSH
authentication for the scanner will fail. Make sure the following line appears exactly
as shown in your sshd_config file, which is typically found in the /etc/ssh directory
on the SSH server:
PasswordAuthentication yes.
does not use OpenSSH, the configuration may be slightly different.
To configure the CIDR ranges you wish this scanner to consider:
In the text field, enter the CIDR range you wish this scanner to consider or click
a
Browse to select the CIDR range from the network list.
Click Add.
b
Click Save.
From the STRM Administration Console menu, select Configurations > Deploy
Configuration Changes.
To edit an Nmap scanner:
In the Administration Console, click the SIM Configuration tab.
The SIM Configuration panel appears.
Click the VA Scanners icon.
The VA Scanners window appears.
Select the scanner you wish to edit.
Click Edit.
The Edit Scanner window appears.
Update parameters, as necessary. See
Click Save.
From the STRM Administration Console menu, select Configurations > Deploy
Configuration Changes.
Managing Vulnerability Assessment
Editing an Nmap Scanner
If your scanner server
Table
5-2.
23

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager

Table of Contents