Chapter 14: Running Ad Hoc Scans
Understanding How Ad Hoc Scans Use Policies
Introduction
Shared policies
Separately
configurable policies
Policy initialization
Policy inheritance
192
All scans, whether ad hoc or background, follow the options specified in the applicable
policies. Some policies are shared between ad hoc and background scans while others are
defined separately.
Ad hoc scans share these policies with background scans in the same scanning group:
Assessment Credentials
●
Network Services
●
Scan Exclusion
●
This policy applies only to assessment scans for either ad hoc or background
Note:
scans.
Scan Window (optional)
●
You can change the following policies for ad hoc scans when you configure the scan:
Assessment
●
Discovery
●
Scan Control
●
Changes you make to these policies do not affect the settings for the policies in
background scans. For an example of the ad hoc scan user interface, see Figure 4 on
page 47.
As a convenience, ad hoc scans start with the settings defined for Discovery and
Assessment policies, if those background policies are defined.
Policy inheritance for ad hoc scans works as follows:
Discovery scans run against only the group for which they are defined.
●
Assessment scans run against the group for which they are defined and every
●
subgroup that inherits the assessment policy.
IBM Internet Security Systems
Need help?
Do you have a question about the Proventia Network Enterprise Scanner and is the answer not in the manual?
Questions and answers