Editing A Scan Schedule - Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - MANAGING VULNERABILITY ASSESSMENT V1 Manual

Managing vulnerability assessment
Table of Contents

Advertisement

Step 5
Step 6
Editing a Scan
Schedule
Step 1
Step 2
Table 10-1 Scan Schedule Parameters (continued)
Parameter
Description
Potency
Specify the level of scan you wish to perform. The precise
interpretation of the levels depends on the scanner, however,
typically, the levels indicate:
Priority
Specify the priority you wish to assign to this scan. The options
are: High or Low.
Ports
Specify the ports you wish this scan to apply.
Start Time
Specify the start date and time for the scan. The default is the
local time of your STRM system.
Interval
Specify how often you wish this scan to run. An interval of 0
indicates that the scan will run once.
Concurrent Scans Specify the number of vulnerability scans you wish to occur at the
same time.
Click Save.
From the STRM Administration Console menu, select Configurations > Deploy
Configuration Changes.
To edit a Vulnerability Assessment scan schedule:
In the Administration Console, click the SIM Configuration tab.
The SIM Configuration panel appears.
Click the Schedule VA Scanner icon.
The VA Scanners appears.
Managing Vulnerability Assessment
Very safe - Specifies a safe, non-intrusive assessment. They
may generate false results.
Safe - Specifies an intermediate assessment and produces
safe, banner-based results.
Medium - Specifies a safe intermediate assessment with
accurate results.
Somewhat safe - Specifies an intermediate assessment but
may leave service unresponsive.
Somewhat unsafe - Specifies an intermediate assessment,
however, may result in your host or server cease functioning.
Unsafe - Specifies an intermediate assessment, however, this
may cause your service to become unresponsive.
Very unsafe - Specifies an unsafe, aggressive assessment
that may result in your host or server becoming unresponsive.

Editing a Scan Schedule

49

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager

Table of Contents