Overview - IBM Proventia Network Enterprise Scanner User Manual

Table of Contents

Advertisement

Chapter 9
Understanding Scanning Processes in
SiteProtector

Overview

Introduction
Additional
information
Prerequisites
In this chapter
IBM Proventia Network Enterprise Scanner User Guide, Version 1.3
The best strategy for managing vulnerabilities with Enterprise Scanner is as follows:
Use background scanning for automated vulnerability management.
Use ad hoc scanning as needed to handle exceptional cases.
This chapter explains the high-level processes behind ad hoc and background scanning. It
also explains how policy settings affect those processes.
For detailed information about scanning behavior and about tracking scans in
SiteProtector see the following chapters:
Chapter 10, "Monitoring Scans" on page 135.
Chapter 11, "Managing Scans" on page 151.
This chapter uses terms that define scanning parameters that are described in detail in the
policy descriptions in Part II, Configuring Enterprise Vulnerability Protection. Before you
continue, you should understand scanning windows (p. 89) and refresh cycles (p. 87).
This chapter contains the following topics:
Topic
Page
124
125
126
127
128
129
131
132
123

Advertisement

Table of Contents
loading

Table of Contents