Chapter 6: Defining Background Scans
Background Scanning Checklists
Introduction
Checklist for
background
discovery scans
Checklist for
background
assessment scans
86
You can set up background scans by configuring only the required policies, or you can
fully customize background scans by configuring additional policies. This topic describes
the minimum requirements to set up background discovery and background assessment
scanning. You should also use any other policies that help you configure you scanning
environment to meet your security goals.
The following table describes the requirements for setting up background discovery
scanning for a group:
Requirement
Apply a Discovery policy to the group.
See "Defining Assets to Discover (Discovery Policy)" on page 99.
Apply a Scan Window policy to the group (either directly or through inheritance from a higher
group).
See "Defining Periods of Allowed Scanning (Scan Window Policy)" on page 89.
Optional: Apply an Assessment Credentials policy to the group for better OS identification.
See "Defining Assessment Credentials (Assessment Credentials Policy)" on page 94.
Apply a Scan Control policy to the group (either directly or through inheritance from a higher
group).
See "Enabling Background Scanning (Scan Control Policy)" on page 87.
Table 32: Checklist for background discovery scanning
The following table describes the requirements for setting up background assessment
scanning for a group:
Requirement
Verify that the group already contains assets, possibly from a recent discovery scan.
Apply an Assessment policy to the group (either directly or through inheritance from a higher
group).
See "Defining Assessment Details Introduction (Assessment Policy)" on page 100.
Apply a Scan Window policy to the group (either directly or through inheritance from a higher
group).
See "Defining Periods of Allowed Scanning (Scan Window Policy)" on page 89.
Optional: Apply an Assessment Credentials policy to the group for better OS identification.
See "Defining Assessment Credentials (Assessment Credentials Policy)" on page 94.
Apply a Scan Control policy to the group (either directly or through inheritance from a higher
group).
See "Enabling Background Scanning (Scan Control Policy)" on page 87.
Table 33: Checklist for background discovery scanning
IBM Internet Security Systems
Need help?
Do you have a question about the Proventia Network Enterprise Scanner and is the answer not in the manual?
Questions and answers