Background scanning checklists for Enterprise Scanner

This topic describes the minimum requirements to set up background discovery and background assessment scanning. You should also use any other policies that help you configure your scanning environment to meet your security goals.

Checklist for background discovery scanning

The following table describes the requirements for setting up background discovery scanning for a group:

1.Apply a Discovery policy to the group.

2.Apply a Scan Window policy to the group (either directly or through inheritance from a group that is at a higher level in the group structure).

3.Optional: Apply an Assessment Credentials policy to the group for better OS identification.

4.Apply a Scan Control policy to the group (either directly or through inheritance from a group that is at a higher level in the group structure).

Checklist for background assessment scanning

The following table describes the requirements for setting up background assessment scanning for a group:

1.Verify that the group already contains assets, possibly from a recent discovery scan.

2.Apply an Assessment policy to the group (either directly or through inheritance from a group that is at a higher level in the group structure).

3.Apply a Scan Window policy to the group (either directly or through inheritance from a group that is at a higher level in the group structure).

4.Optional: Apply an Assessment Credentials policy to the group for better OS identification.

5.Apply a Scan Control policy to the group (either directly or through inheritance from a group that is at a higher level in the group structure).

Chapter 5. Background scanning in SiteProtector 83

Page 91
Image 91
IBM Partner Pavilion 2.3 manual Background scanning checklists for Enterprise Scanner