Background scanning checklists for Enterprise Scanner
This topic describes the minimum requirements to set up background discovery
and background assessment scanning. You should also use any other policies that
help you configure your scanning environment to meet your security goals.

Checklist for background discovery scanning

The following table describes the requirements for setting up background
discovery scanning for a group:
1. Apply a Discovery policy to the group.
2. Apply a Scan Window policy to the group (either directly or through
inheritance from a group that is at a higher level in the group structure).
3. Optional: Apply an Assessment Credentials policy to the group for better OS
identification.
4. Apply a Scan Control policy to the group (either directly or through inheritance
from a group that is at a higher level in the group structure).

Checklist for background assessment scanning

The following table describes the requirements for setting up background
assessment scanning for a group:
1. Verify that the group alreadycontains assets, possibly from a recent discovery
scan.
2. Apply an Assessment policy to the group (either directly or through inheritance
from a group that is at a higher level in the group structure).
3. Apply a Scan Window policy to the group (either directly or through
inheritance from a group that is at a higher level in the group structure).
4. Optional: Apply an Assessment Credentials policy to the group for better OS
identification.
5. Apply a Scan Control policy to the group (either directly or through inheritance
from a group that is at a higher level in the group structure).
Chapter5. Background scanning in SiteProtector 83