Chapter 4. Understanding scanning processes inSiteProtector
This chapter explains the high-level processes behind ad hoc and background
scanning. It also explains how policy settings affect those processes.
Use the following strategies for managing vulnerabilities with Enterprise Scanner:
vUse background scanning for automated vulnerability management.
vUse ad hoc scanning as needed to handle exceptional cases.
Topics
“What is perspective?” on page 68
“Defining perspectives” on page 69
“Scan jobs and related terms” on page 71
“Types of tasks” on page 72
“Priorities for running tasks” on page 73
“Stages of a scanning process” on page 74
“Optimizing cycle duration, scan windows, and subtasks for Enterprise Scanner”
on page 76
© Copyright IBM Corp. 1997, 2009 67