Chapter 4. Understanding scanning processes in SiteProtector
This chapter explains the
Use the following strategies for managing vulnerabilities with Enterprise Scanner:
vUse background scanning for automated vulnerability management.
vUse ad hoc scanning as needed to handle exceptional cases.
Topics
“What is perspective?” on page 68
“Defining perspectives” on page 69
“Scan jobs and related terms” on page 71
“Types of tasks” on page 72
“Priorities for running tasks” on page 73
“Stages of a scanning process” on page 74
“Optimizing cycle duration, scan windows, and subtasks for Enterprise Scanner” on page 76
© Copyright IBM Corp. 1997, 2009 | 67 |