
Background scanning checklists for Enterprise Scanner
This topic describes the minimum requirements to set up background discovery and background assessment scanning. You should also use any other policies that help you configure your scanning environment to meet your security goals.
Checklist for background discovery scanning
The following table describes the requirements for setting up background discovery scanning for a group:
1.Apply a Discovery policy to the group.
2.Apply a Scan Window policy to the group (either directly or through inheritance from a group that is at a higher level in the group structure).
3.Optional: Apply an Assessment Credentials policy to the group for better OS identification.
4.Apply a Scan Control policy to the group (either directly or through inheritance from a group that is at a higher level in the group structure).
Checklist for background assessment scanning
The following table describes the requirements for setting up background assessment scanning for a group:
1.Verify that the group already contains assets, possibly from a recent discovery scan.
2.Apply an Assessment policy to the group (either directly or through inheritance from a group that is at a higher level in the group structure).
3.Apply a Scan Window policy to the group (either directly or through inheritance from a group that is at a higher level in the group structure).
4.Optional: Apply an Assessment Credentials policy to the group for better OS identification.
5.Apply a Scan Control policy to the group (either directly or through inheritance from a group that is at a higher level in the group structure).
Chapter 5. Background scanning in SiteProtector 83