Understanding How Ad Hoc Scans Use Policies - IBM Proventia Network Enterprise Scanner User Manual

Table of Contents

Advertisement

Chapter 14: Running Ad Hoc Scans

Understanding How Ad Hoc Scans Use Policies

Introduction
Shared policies
Separately
configurable policies
Policy initialization
Policy inheritance
192
All scans, whether ad hoc or background, follow the options specified in the applicable
policies. Some policies are shared between ad hoc and background scans while others are
defined separately.
Ad hoc scans share these policies with background scans in the same scanning group:
Assessment Credentials
Network Services
Scan Exclusion
This policy applies only to assessment scans for either ad hoc or background
Note:
scans.
Scan Window (optional)
You can change the following policies for ad hoc scans when you configure the scan:
Assessment
Discovery
Scan Control
Changes you make to these policies do not affect the settings for the policies in
background scans. For an example of the ad hoc scan user interface, see Figure 4 on
page 47.
As a convenience, ad hoc scans start with the settings defined for Discovery and
Assessment policies, if those background policies are defined.
Policy inheritance for ad hoc scans works as follows:
Discovery scans run against only the group for which they are defined.
Assessment scans run against the group for which they are defined and every
subgroup that inherits the assessment policy.
IBM Internet Security Systems

Advertisement

Table of Contents
loading

Table of Contents