Chapter 6: Defining Background Scans
How Policies Apply to Ad Hoc and Background Scans
Introduction
Two types of scans
Asset policies and
ad hoc scans
Changing
Assessment and
Discovery policies
84
Policies apply to ad hoc and to background scans as follows:
Agent policies apply to both ad hoc and background scans.
●
Asset policies apply to both ad hoc and background scans; however, you can
●
reconfigure some asset policies when you define an ad hoc scan.
Table 27 describes ad hoc and background scans:
Type of Scan
Description
Ad hoc
One-time scans that you start manually for discovery and/or assessment scans,
usually in response to network changes or newly discovered threats.
Note: You can run an ad hoc scan immediately, or you can run it only during the
scan windows defined for the group in the Scan Window policy.
Background
Automatic, recurring scans that run on separately definable refresh cycles for
discovery and for assessment scanning.
Table 27: Descriptions of ad hoc and background scans
Table 28 defines configuration options for policies used by ad hoc scans:
Background asset policies that...
you can reconfigure for ad hoc scans •
differ for ad hoc scans
contain the same settings for ad hoc
scans as for background scans
Table 28: Asset policies for ad hoc and background scans
An ad hoc scan initially uses any settings currently configured in the Assessment and
Discovery policies for the group. You can run the scan with those settings, or you can
modify the settings. Table 29 describes the advantages of each method:
If you...
use the configured settings
modify the configured
settings
Table 29: Changes to Assessment and Discovery policies
Are as follows:
Assessment
•
Discovery
Scan Control
•
Assessment Credentials
•
Network Services
•
Scan Exclusion
Note: This policy applies only to assessment scans,
but it applies to both ad hoc and background scans.
•
Scan Window (optional)
Then you...
can easily start an ad hoc scan that duplicates a configured
background scan.
cannot save the policy. Therefore, the changes apply to only that
ad hoc scan and do not affect configured background scans.
IBM Internet Security Systems
Need help?
Do you have a question about the Proventia Network Enterprise Scanner and is the answer not in the manual?
Questions and answers