Background Scanning Checklists - IBM Proventia Network Enterprise Scanner User Manual

Table of Contents

Advertisement

Chapter 6: Defining Background Scans

Background Scanning Checklists

Introduction
Checklist for
background
discovery scans
Checklist for
background
assessment scans
86
You can set up background scans by configuring only the required policies, or you can
fully customize background scans by configuring additional policies. This topic describes
the minimum requirements to set up background discovery and background assessment
scanning. You should also use any other policies that help you configure you scanning
environment to meet your security goals.
The following table describes the requirements for setting up background discovery
scanning for a group:
Requirement
Apply a Discovery policy to the group.
See "Defining Assets to Discover (Discovery Policy)" on page 99.
Apply a Scan Window policy to the group (either directly or through inheritance from a higher
group).
See "Defining Periods of Allowed Scanning (Scan Window Policy)" on page 89.
Optional: Apply an Assessment Credentials policy to the group for better OS identification.
See "Defining Assessment Credentials (Assessment Credentials Policy)" on page 94.
Apply a Scan Control policy to the group (either directly or through inheritance from a higher
group).
See "Enabling Background Scanning (Scan Control Policy)" on page 87.
Table 32: Checklist for background discovery scanning
The following table describes the requirements for setting up background assessment
scanning for a group:
Requirement
Verify that the group already contains assets, possibly from a recent discovery scan.
Apply an Assessment policy to the group (either directly or through inheritance from a higher
group).
See "Defining Assessment Details Introduction (Assessment Policy)" on page 100.
Apply a Scan Window policy to the group (either directly or through inheritance from a higher
group).
See "Defining Periods of Allowed Scanning (Scan Window Policy)" on page 89.
Optional: Apply an Assessment Credentials policy to the group for better OS identification.
See "Defining Assessment Credentials (Assessment Credentials Policy)" on page 94.
Apply a Scan Control policy to the group (either directly or through inheritance from a higher
group).
See "Enabling Background Scanning (Scan Control Policy)" on page 87.
Table 33: Checklist for background discovery scanning
IBM Internet Security Systems

Advertisement

Table of Contents
loading

Table of Contents