Background Scanning Overview - IBM Proventia Network Enterprise Scanner User Manual

Table of Contents

Advertisement

Chapter 3: Running Your First Scans

Background Scanning Overview

Introduction
About these
procedures
Before you begin
Tips are optional
54
You can run ad hoc scans whenever necessary, but you get the greatest benefit from
Enterprise Scanner when you set up cyclical scans to run automatically in the background.
For a description of background scanning, see "Key Concepts" on page 20.
Reference:
Background discovery and background assessment scans run separately, just as ad hoc
discovery and assessment scans do. The process for setting up background discovery and
background assessment scans is very similar. The process in this topic combines the
procedures for both types of scans in one set of procedures.
When you complete this process, you will have defined a cycle of scanning for a group of
assets that will repeat until you disable it. If you want to continue these scans after the
testing period, you can change the settings as needed for your environment. If you want
to discontinue these scans, you can stop them. The procedure for stopping the scans
follows the process for starting them.
scan time short. Include assets that are known to have vulnerabilities, if possible.
These instructions guide you through the process without explaining every detail. If you
are interested in the details, refer to the information in the Tips for different steps. If you
are not interested in the details, you can ignore the tips.
Use a small range of IP addresses to keep the
Tip:
IBM Internet Security Systems

Advertisement

Table of Contents
loading

Table of Contents